diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 7ffd6e4717..cecd72212b 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -246,13 +246,13 @@ "stargazers_count": 493, "watchers_count": 493, "has_discussions": false, - "forks_count": 145, + "forks_count": 146, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 145, + "forks": 146, "watchers": 493, "score": 0, "subscribers_count": 21 diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index e9fa2b32de..8256708b6a 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -417,10 +417,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2025-01-17T03:21:16Z", + "updated_at": "2025-01-17T08:44:37Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 176, - "watchers_count": 176, + "stargazers_count": 178, + "watchers_count": 178, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -437,7 +437,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 176, + "watchers": 178, "score": 0, "subscribers_count": 2 }, diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json index 3e9f106b61..6d465a0cc7 100644 --- a/2017/CVE-2017-5753.json +++ b/2017/CVE-2017-5753.json @@ -14,10 +14,10 @@ "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", "fork": false, "created_at": "2018-01-04T00:28:50Z", - "updated_at": "2024-12-27T03:05:22Z", + "updated_at": "2025-01-17T09:27:03Z", "pushed_at": "2018-01-10T01:14:44Z", - "stargazers_count": 758, - "watchers_count": 758, + "stargazers_count": 759, + "watchers_count": 759, "has_discussions": false, "forks_count": 168, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 168, - "watchers": 758, + "watchers": 759, "score": 0, "subscribers_count": 41 }, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index de0e20b43c..816de43aad 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -76,10 +76,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2025-01-17T02:08:32Z", + "updated_at": "2025-01-17T07:31:00Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 224, - "watchers_count": 224, + "stargazers_count": 225, + "watchers_count": 225, "has_discussions": false, "forks_count": 59, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 59, - "watchers": 224, + "watchers": 225, "score": 0, "subscribers_count": 10 } diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 5e2cad290f..1371feb9ae 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -375,10 +375,10 @@ "description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600", "fork": false, "created_at": "2018-04-17T15:38:15Z", - "updated_at": "2024-12-11T14:22:18Z", + "updated_at": "2025-01-17T06:25:29Z", "pushed_at": "2018-04-26T15:40:28Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 132, + "watchers_count": 132, "has_discussions": false, "forks_count": 64, "allow_forking": true, @@ -387,7 +387,7 @@ "topics": [], "visibility": "public", "forks": 64, - "watchers": 131, + "watchers": 132, "score": 0, "subscribers_count": 5 }, diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 818da36003..9269ad5576 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -45,10 +45,10 @@ "description": "CVE-2018-8120 Windows LPE exploit", "fork": false, "created_at": "2018-05-19T02:43:15Z", - "updated_at": "2025-01-06T03:02:21Z", + "updated_at": "2025-01-17T06:27:10Z", "pushed_at": "2018-05-30T13:09:54Z", - "stargazers_count": 495, - "watchers_count": 495, + "stargazers_count": 496, + "watchers_count": 496, "has_discussions": false, "forks_count": 191, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 191, - "watchers": 495, + "watchers": 496, "score": 0, "subscribers_count": 23 }, diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index eb6c029ce5..ec3120fa91 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2025-01-13T08:49:52Z", + "updated_at": "2025-01-17T06:23:10Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1801, - "watchers_count": 1801, + "stargazers_count": 1802, + "watchers_count": 1802, "has_discussions": false, "forks_count": 249, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 249, - "watchers": 1801, + "watchers": 1802, "score": 0, "subscribers_count": 37 }, @@ -107,10 +107,10 @@ "description": "php-fpm+Nginx RCE", "fork": false, "created_at": "2019-10-23T23:26:57Z", - "updated_at": "2024-12-16T11:23:42Z", + "updated_at": "2025-01-17T06:23:00Z", "pushed_at": "2020-08-20T04:43:25Z", - "stargazers_count": 102, - "watchers_count": 102, + "stargazers_count": 103, + "watchers_count": 103, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 37, - "watchers": 102, + "watchers": 103, "score": 0, "subscribers_count": 4 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 5f40168037..fcf8c77654 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -107,10 +107,10 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2025-01-08T16:50:27Z", + "updated_at": "2025-01-17T07:50:12Z", "pushed_at": "2024-06-16T15:35:20Z", - "stargazers_count": 951, - "watchers_count": 951, + "stargazers_count": 952, + "watchers_count": 952, "has_discussions": false, "forks_count": 176, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 176, - "watchers": 951, + "watchers": 952, "score": 0, "subscribers_count": 18 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 8f4e04c14f..272198d62c 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -65,10 +65,10 @@ "description": "CVE-2020–14882、CVE-2020–14883", "fork": false, "created_at": "2020-10-28T11:43:37Z", - "updated_at": "2024-12-03T03:14:00Z", + "updated_at": "2025-01-17T09:53:36Z", "pushed_at": "2020-11-16T04:23:09Z", - "stargazers_count": 282, - "watchers_count": 282, + "stargazers_count": 283, + "watchers_count": 283, "has_discussions": false, "forks_count": 63, "allow_forking": true, @@ -77,7 +77,7 @@ "topics": [], "visibility": "public", "forks": 63, - "watchers": 282, + "watchers": 283, "score": 0, "subscribers_count": 7 }, @@ -1016,5 +1016,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 918084911, + "name": "weblogic-cve-2020-14882", + "full_name": "KKC73\/weblogic-cve-2020-14882", + "owner": { + "login": "KKC73", + "id": 50138914, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50138914?v=4", + "html_url": "https:\/\/github.com\/KKC73", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/KKC73\/weblogic-cve-2020-14882", + "description": "This is a repository that aims to provide research material on CVE-2020-14882 as part of a project in partial fullfilment of ACS EDU Program.", + "fork": false, + "created_at": "2025-01-17T08:13:39Z", + "updated_at": "2025-01-17T08:15:24Z", + "pushed_at": "2025-01-17T08:15:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 2cb45521ec..3e50ab39dd 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -386,10 +386,10 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2024-12-15T13:01:38Z", + "updated_at": "2025-01-17T07:49:43Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 369, - "watchers_count": 369, + "stargazers_count": 370, + "watchers_count": 370, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -404,7 +404,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 369, + "watchers": 370, "score": 0, "subscribers_count": 5 }, @@ -981,10 +981,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2025-01-17T03:21:16Z", + "updated_at": "2025-01-17T08:44:37Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 176, - "watchers_count": 176, + "stargazers_count": 178, + "watchers_count": 178, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -1001,7 +1001,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 176, + "watchers": 178, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index d8b45e1550..6b021ecedc 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -45,10 +45,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2025-01-16T06:34:05Z", + "updated_at": "2025-01-17T08:04:47Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1856, - "watchers_count": 1856, + "stargazers_count": 1857, + "watchers_count": 1857, "has_discussions": false, "forks_count": 585, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 585, - "watchers": 1856, + "watchers": 1857, "score": 0, "subscribers_count": 43 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 4058119274..ee5f924af3 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2025-01-16T10:30:47Z", + "updated_at": "2025-01-17T07:55:13Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1367, - "watchers_count": 1367, + "stargazers_count": 1368, + "watchers_count": 1368, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 1367, + "watchers": 1368, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 624f28b432..eaa897cc39 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1307,10 +1307,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2025-01-15T09:32:37Z", + "updated_at": "2025-01-17T10:00:13Z", "pushed_at": "2023-06-13T09:17:54Z", - "stargazers_count": 811, - "watchers_count": 811, + "stargazers_count": 812, + "watchers_count": 812, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -1324,7 +1324,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 811, + "watchers": 812, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index 3b6887924e..1f608b864a 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "fork": false, "created_at": "2023-01-10T16:24:51Z", - "updated_at": "2025-01-15T07:40:15Z", + "updated_at": "2025-01-17T07:44:07Z", "pushed_at": "2023-04-12T17:28:49Z", - "stargazers_count": 282, - "watchers_count": 282, + "stargazers_count": 283, + "watchers_count": 283, "has_discussions": false, "forks_count": 51, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 51, - "watchers": 282, + "watchers": 283, "score": 0, "subscribers_count": 9 } diff --git a/2022/CVE-2022-20474.json b/2022/CVE-2022-20474.json index cc35dbfcf7..4e02f9b987 100644 --- a/2022/CVE-2022-20474.json +++ b/2022/CVE-2022-20474.json @@ -14,10 +14,10 @@ "description": "PoC of CVE-2022-20474", "fork": false, "created_at": "2024-11-14T08:48:59Z", - "updated_at": "2024-12-01T14:56:17Z", + "updated_at": "2025-01-17T11:42:27Z", "pushed_at": "2024-12-01T14:56:14Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 4e350bd616..84a586c32e 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2025-01-16T10:30:47Z", + "updated_at": "2025-01-17T07:55:13Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1367, - "watchers_count": 1367, + "stargazers_count": 1368, + "watchers_count": 1368, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 1367, + "watchers": 1368, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index ef625b69c0..a988b2f2e2 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -332,10 +332,10 @@ "description": "CobaltStrike <= 4.7.1 RCE", "fork": false, "created_at": "2022-10-14T11:46:01Z", - "updated_at": "2025-01-11T06:37:47Z", + "updated_at": "2025-01-17T09:16:07Z", "pushed_at": "2022-10-25T05:32:54Z", - "stargazers_count": 378, - "watchers_count": 378, + "stargazers_count": 379, + "watchers_count": 379, "has_discussions": false, "forks_count": 77, "allow_forking": true, @@ -344,7 +344,7 @@ "topics": [], "visibility": "public", "forks": 77, - "watchers": 378, + "watchers": 379, "score": 0, "subscribers_count": 7 }, diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index dfc27a37d3..e8ee052909 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -14,10 +14,10 @@ "description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager", "fork": false, "created_at": "2022-10-13T14:24:12Z", - "updated_at": "2025-01-16T13:12:41Z", + "updated_at": "2025-01-17T09:19:33Z", "pushed_at": "2022-10-13T15:25:00Z", - "stargazers_count": 342, - "watchers_count": 342, + "stargazers_count": 343, + "watchers_count": 343, "has_discussions": false, "forks_count": 90, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 90, - "watchers": 342, + "watchers": 343, "score": 0, "subscribers_count": 7 }, @@ -743,19 +743,19 @@ "description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group", "fork": false, "created_at": "2025-01-16T06:54:15Z", - "updated_at": "2025-01-17T04:41:20Z", + "updated_at": "2025-01-17T11:03:19Z", "pushed_at": "2025-01-16T09:56:36Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, - "forks_count": 11, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, - "watchers": 33, + "forks": 15, + "watchers": 37, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 68a9917004..085415da97 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -593,6 +593,37 @@ "score": 0, "subscribers_count": 0 }, + { + "id": 738213429, + "name": "Exploit-CVE-2023-22515", + "full_name": "CalegariMindSec\/Exploit-CVE-2023-22515", + "owner": { + "login": "CalegariMindSec", + "id": 68512056, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512056?v=4", + "html_url": "https:\/\/github.com\/CalegariMindSec", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/CalegariMindSec\/Exploit-CVE-2023-22515", + "description": "A simple exploit for CVE-2023-22515", + "fork": false, + "created_at": "2024-01-02T17:40:24Z", + "updated_at": "2024-01-02T23:11:04Z", + "pushed_at": "2024-01-02T23:15:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 762759550, "name": "CVE-2023-22515", diff --git a/2023/CVE-2023-24329.json b/2023/CVE-2023-24329.json index b6b4970a65..fc1109f8f0 100644 --- a/2023/CVE-2023-24329.json +++ b/2023/CVE-2023-24329.json @@ -60,5 +60,36 @@ "watchers": 0, "score": 0, "subscribers_count": 0 + }, + { + "id": 795324648, + "name": "CVE-2023-24329-Exploit", + "full_name": "PenTestMano\/CVE-2023-24329-Exploit", + "owner": { + "login": "PenTestMano", + "id": 162714784, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162714784?v=4", + "html_url": "https:\/\/github.com\/PenTestMano", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/PenTestMano\/CVE-2023-24329-Exploit", + "description": "Example of CVE-2023-24329 ", + "fork": false, + "created_at": "2024-05-03T03:16:02Z", + "updated_at": "2024-05-03T03:16:02Z", + "pushed_at": "2023-10-13T07:42:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-27163.json b/2023/CVE-2023-27163.json index d6bbb55ca7..5fb03c9bde 100644 --- a/2023/CVE-2023-27163.json +++ b/2023/CVE-2023-27163.json @@ -417,6 +417,68 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 739001610, + "name": "CVE-2023-27163", + "full_name": "Rubioo02\/CVE-2023-27163", + "owner": { + "login": "Rubioo02", + "id": 153825296, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153825296?v=4", + "html_url": "https:\/\/github.com\/Rubioo02", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Rubioo02\/CVE-2023-27163", + "description": "A exploit for the CVE-2023-27163 (SSRF) vulnerability in the web application request-baskets (<= v.1.2.1)", + "fork": false, + "created_at": "2024-01-04T14:46:13Z", + "updated_at": "2024-01-04T17:04:49Z", + "pushed_at": "2024-01-04T16:40:47Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 739760866, + "name": "CVE-2023-27163", + "full_name": "madhavmehndiratta\/CVE-2023-27163", + "owner": { + "login": "madhavmehndiratta", + "id": 43489174, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43489174?v=4", + "html_url": "https:\/\/github.com\/madhavmehndiratta", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/madhavmehndiratta\/CVE-2023-27163", + "description": "PoC for SSRF in request-baskets v1.2.1 (CVE-2023-27163)", + "fork": false, + "created_at": "2024-01-06T13:16:29Z", + "updated_at": "2024-01-06T15:53:16Z", + "pushed_at": "2024-01-06T15:52:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 820848497, "name": "CVE-2023-27163-ssrf-to-port-scanning", diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index 5662ee4c3f..5d37e6e520 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -92,6 +92,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 737810016, + "name": "Compiled-PoC-Binary-For-CVE-2023-28252", + "full_name": "bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252", + "owner": { + "login": "bkstephen", + "id": 8013595, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8013595?v=4", + "html_url": "https:\/\/github.com\/bkstephen", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252", + "description": "The repo contains a precompiled binary which can be run on a Windows machine vulnerable to CVE-2023-28252", + "fork": false, + "created_at": "2024-01-01T15:30:33Z", + "updated_at": "2024-06-21T07:22:21Z", + "pushed_at": "2024-01-01T15:39:15Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0, + "subscribers_count": 1 + }, { "id": 746601760, "name": "CVE-2023-28252-Compiled-exe", diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json index edd15c3bdf..e02f18b6ec 100644 --- a/2023/CVE-2023-28432.json +++ b/2023/CVE-2023-28432.json @@ -498,6 +498,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 740067240, + "name": "CVE-2023-28432", + "full_name": "netuseradministrator\/CVE-2023-28432", + "owner": { + "login": "netuseradministrator", + "id": 96680088, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96680088?v=4", + "html_url": "https:\/\/github.com\/netuseradministrator", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/netuseradministrator\/CVE-2023-28432", + "description": null, + "fork": false, + "created_at": "2024-01-07T12:34:49Z", + "updated_at": "2024-01-31T02:25:36Z", + "pushed_at": "2024-01-07T15:20:56Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + }, { "id": 741968176, "name": "CVE-2023-28432", diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json index 29235c0e98..b8e6a0c265 100644 --- a/2023/CVE-2023-29357.json +++ b/2023/CVE-2023-29357.json @@ -130,6 +130,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 737886117, + "name": "CVE-2023-29357-Check", + "full_name": "Jev1337\/CVE-2023-29357-Check", + "owner": { + "login": "Jev1337", + "id": 19759761, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19759761?v=4", + "html_url": "https:\/\/github.com\/Jev1337", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Jev1337\/CVE-2023-29357-Check", + "description": "A Python script that verifies whether a target is vulnerable to CVE-2023-29357 or not", + "fork": false, + "created_at": "2024-01-01T21:08:22Z", + "updated_at": "2024-11-06T09:07:45Z", + "pushed_at": "2024-01-01T21:13:58Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 0 + }, { "id": 856513093, "name": "Event-ID-189-Rule-Name-SOC227-CVE-2023-29357", diff --git a/2023/CVE-2023-31446.json b/2023/CVE-2023-31446.json new file mode 100644 index 0000000000..dc8eeee6ac --- /dev/null +++ b/2023/CVE-2023-31446.json @@ -0,0 +1,33 @@ +[ + { + "id": 739746679, + "name": "CVE-2023-31446-Remote-Code-Execution", + "full_name": "Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution", + "owner": { + "login": "Dodge-MPTC", + "id": 75072113, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75072113?v=4", + "html_url": "https:\/\/github.com\/Dodge-MPTC", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution", + "description": "Repository contains description for CVE-2023-31446", + "fork": false, + "created_at": "2024-01-06T12:23:50Z", + "updated_at": "2024-01-09T09:34:42Z", + "pushed_at": "2024-01-06T12:57:49Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 4, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json index 42dda24651..0099e862ae 100644 --- a/2023/CVE-2023-34362.json +++ b/2023/CVE-2023-34362.json @@ -233,6 +233,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 737660313, + "name": "MOVEit-CVE-2023-34362", + "full_name": "Chinyemba-ck\/MOVEit-CVE-2023-34362", + "owner": { + "login": "Chinyemba-ck", + "id": 85675608, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85675608?v=4", + "html_url": "https:\/\/github.com\/Chinyemba-ck", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Chinyemba-ck\/MOVEit-CVE-2023-34362", + "description": "A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project)", + "fork": false, + "created_at": "2024-01-01T00:55:07Z", + "updated_at": "2024-01-01T00:55:07Z", + "pushed_at": "2024-01-01T00:56:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 821497009, "name": "MoveIT-CVE-2023-34362-RCE", diff --git a/2023/CVE-2023-38408.json b/2023/CVE-2023-38408.json index ac78d01454..c26488e1db 100644 --- a/2023/CVE-2023-38408.json +++ b/2023/CVE-2023-38408.json @@ -67,6 +67,37 @@ "score": 0, "subscribers_count": 3 }, + { + "id": 739947067, + "name": "CVE-2023-38408", + "full_name": "classic130\/CVE-2023-38408", + "owner": { + "login": "classic130", + "id": 69665702, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69665702?v=4", + "html_url": "https:\/\/github.com\/classic130", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/classic130\/CVE-2023-38408", + "description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent", + "fork": false, + "created_at": "2024-01-07T03:03:06Z", + "updated_at": "2024-09-08T06:41:32Z", + "pushed_at": "2023-07-25T22:16:44Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 2, + "score": 0, + "subscribers_count": 0 + }, { "id": 758630242, "name": "CVE-2023-38408", diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index d29b2b9414..7d6f474038 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -1099,6 +1099,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 767222866, + "name": "CVE-2023-38646", + "full_name": "DaniTheHack3r\/CVE-2023-38646", + "owner": { + "login": "DaniTheHack3r", + "id": 51076007, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51076007?v=4", + "html_url": "https:\/\/github.com\/DaniTheHack3r", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/DaniTheHack3r\/CVE-2023-38646", + "description": "CVE-2023-38646 Metabase 0.46.6 exploit", + "fork": false, + "created_at": "2024-03-04T23:01:43Z", + "updated_at": "2024-03-04T23:01:48Z", + "pushed_at": "2023-10-11T15:26:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 892415497, "name": "cve-2023-38646-poc", diff --git a/2023/CVE-2023-40084.json b/2023/CVE-2023-40084.json new file mode 100644 index 0000000000..73b1bd5b58 --- /dev/null +++ b/2023/CVE-2023-40084.json @@ -0,0 +1,33 @@ +[ + { + "id": 739336852, + "name": "platform_system_netd_AOSP10_r33_CVE-2023-40084", + "full_name": "Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084", + "owner": { + "login": "Trinadh465", + "id": 102574296, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4", + "html_url": "https:\/\/github.com\/Trinadh465", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084", + "description": null, + "fork": false, + "created_at": "2024-01-05T10:20:57Z", + "updated_at": "2024-01-05T10:22:41Z", + "pushed_at": "2024-01-05T10:23:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index 1796f285ab..1e4d7c3c01 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -45,10 +45,10 @@ "description": "Proof of concept for DoS exploit ", "fork": false, "created_at": "2023-10-11T01:59:47Z", - "updated_at": "2024-10-11T01:41:10Z", + "updated_at": "2025-01-17T07:24:59Z", "pushed_at": "2023-10-13T11:19:10Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -65,7 +65,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 52, + "watchers": 53, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 6934b0bcc6..cd7f27c109 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,7 +14,7 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-17T04:44:33Z", + "updated_at": "2025-01-17T11:20:55Z", "pushed_at": "2024-08-18T08:26:46Z", "stargazers_count": 1389, "watchers_count": 1389, diff --git a/2023/CVE-2023-48981.json b/2023/CVE-2023-48981.json new file mode 100644 index 0000000000..497aeac8af --- /dev/null +++ b/2023/CVE-2023-48981.json @@ -0,0 +1,33 @@ +[ + { + "id": 737775658, + "name": "CVE-2023-48981", + "full_name": "tristao-marinho\/CVE-2023-48981", + "owner": { + "login": "tristao-marinho", + "id": 101610912, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4", + "html_url": "https:\/\/github.com\/tristao-marinho", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48981", + "description": "POC CVE-2023-48981", + "fork": false, + "created_at": "2024-01-01T13:06:39Z", + "updated_at": "2024-01-01T13:06:40Z", + "pushed_at": "2024-01-01T13:18:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-48982.json b/2023/CVE-2023-48982.json new file mode 100644 index 0000000000..17a1573e25 --- /dev/null +++ b/2023/CVE-2023-48982.json @@ -0,0 +1,33 @@ +[ + { + "id": 737777512, + "name": "CVE-2023-48982", + "full_name": "tristao-marinho\/CVE-2023-48982", + "owner": { + "login": "tristao-marinho", + "id": 101610912, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4", + "html_url": "https:\/\/github.com\/tristao-marinho", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48982", + "description": "POC CVE-2023-48982", + "fork": false, + "created_at": "2024-01-01T13:14:49Z", + "updated_at": "2024-01-01T13:14:49Z", + "pushed_at": "2024-01-01T13:17:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-48983.json b/2023/CVE-2023-48983.json new file mode 100644 index 0000000000..05adb7a92d --- /dev/null +++ b/2023/CVE-2023-48983.json @@ -0,0 +1,33 @@ +[ + { + "id": 737778720, + "name": "CVE-2023-48983", + "full_name": "tristao-marinho\/CVE-2023-48983", + "owner": { + "login": "tristao-marinho", + "id": 101610912, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4", + "html_url": "https:\/\/github.com\/tristao-marinho", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48983", + "description": "POC CVE-2023-48983", + "fork": false, + "created_at": "2024-01-01T13:19:54Z", + "updated_at": "2024-01-02T12:18:35Z", + "pushed_at": "2024-01-01T13:23:01Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-49070.json b/2023/CVE-2023-49070.json index a92559b663..465a6aa408 100644 --- a/2023/CVE-2023-49070.json +++ b/2023/CVE-2023-49070.json @@ -103,6 +103,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 740289485, + "name": "Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz", + "full_name": "UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz", + "owner": { + "login": "UserConnecting", + "id": 97047842, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97047842?v=4", + "html_url": "https:\/\/github.com\/UserConnecting", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz", + "description": "Authentication Bypass Vulnerability Apache OFBiz < 18.12.10.", + "fork": false, + "created_at": "2024-01-08T03:13:43Z", + "updated_at": "2024-04-13T04:19:46Z", + "pushed_at": "2024-01-08T07:03:01Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 4, + "score": 0, + "subscribers_count": 1 + }, { "id": 742169705, "name": "CVE-2023-49070_CVE-2023-51467", diff --git a/2023/CVE-2023-50386.json b/2023/CVE-2023-50386.json index 6e8ec56c40..f2dfdecc3d 100644 --- a/2023/CVE-2023-50386.json +++ b/2023/CVE-2023-50386.json @@ -14,10 +14,10 @@ "description": "Apache Solr Backup\/Restore APIs RCE Poc (CVE-2023-50386)", "fork": false, "created_at": "2024-02-29T08:57:47Z", - "updated_at": "2024-11-20T16:30:41Z", + "updated_at": "2025-01-17T09:47:42Z", "pushed_at": "2024-02-29T12:54:56Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 61, + "watchers": 62, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-51073.json b/2023/CVE-2023-51073.json new file mode 100644 index 0000000000..7d0b69f59b --- /dev/null +++ b/2023/CVE-2023-51073.json @@ -0,0 +1,33 @@ +[ + { + "id": 739242348, + "name": "CVE-2023-51073", + "full_name": "christopher-pace\/CVE-2023-51073", + "owner": { + "login": "christopher-pace", + "id": 22531478, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22531478?v=4", + "html_url": "https:\/\/github.com\/christopher-pace", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/christopher-pace\/CVE-2023-51073", + "description": "Firmware Update Server Verification Vulnerability on Buffalo LS210D Version 1.78-0.03", + "fork": false, + "created_at": "2024-01-05T05:16:18Z", + "updated_at": "2024-01-07T02:12:37Z", + "pushed_at": "2024-01-07T01:40:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51126.json b/2023/CVE-2023-51126.json new file mode 100644 index 0000000000..76eac48c45 --- /dev/null +++ b/2023/CVE-2023-51126.json @@ -0,0 +1,33 @@ +[ + { + "id": 737937769, + "name": "CVE-2023-51126", + "full_name": "risuxx\/CVE-2023-51126", + "owner": { + "login": "risuxx", + "id": 47944560, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4", + "html_url": "https:\/\/github.com\/risuxx", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51126", + "description": null, + "fork": false, + "created_at": "2024-01-02T02:31:06Z", + "updated_at": "2024-01-03T14:30:50Z", + "pushed_at": "2024-01-02T02:38:11Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51127.json b/2023/CVE-2023-51127.json new file mode 100644 index 0000000000..d9a17ee262 --- /dev/null +++ b/2023/CVE-2023-51127.json @@ -0,0 +1,33 @@ +[ + { + "id": 737940013, + "name": "CVE-2023-51127", + "full_name": "risuxx\/CVE-2023-51127", + "owner": { + "login": "risuxx", + "id": 47944560, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4", + "html_url": "https:\/\/github.com\/risuxx", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51127", + "description": null, + "fork": false, + "created_at": "2024-01-02T02:43:09Z", + "updated_at": "2024-01-03T14:30:37Z", + "pushed_at": "2024-01-02T02:46:58Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-51385.json b/2023/CVE-2023-51385.json index 32f30a0a40..0671dbb085 100644 --- a/2023/CVE-2023-51385.json +++ b/2023/CVE-2023-51385.json @@ -216,6 +216,130 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 737934166, + "name": "CVE-2023-51385", + "full_name": "WOOOOONG\/CVE-2023-51385", + "owner": { + "login": "WOOOOONG", + "id": 40143329, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40143329?v=4", + "html_url": "https:\/\/github.com\/WOOOOONG", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/WOOOOONG\/CVE-2023-51385", + "description": "CVE-2023-51385 PoC Exploit ", + "fork": false, + "created_at": "2024-01-02T02:12:35Z", + "updated_at": "2024-07-03T04:28:13Z", + "pushed_at": "2024-01-02T06:48:39Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 738402073, + "name": "CVE-2023-51385", + "full_name": "uccu99\/CVE-2023-51385", + "owner": { + "login": "uccu99", + "id": 155516921, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155516921?v=4", + "html_url": "https:\/\/github.com\/uccu99", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/uccu99\/CVE-2023-51385", + "description": null, + "fork": false, + "created_at": "2024-01-03T06:28:34Z", + "updated_at": "2024-01-03T06:28:35Z", + "pushed_at": "2024-01-03T06:28:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 738661198, + "name": "exploit-CVE-2023-51385", + "full_name": "julienbrs\/exploit-CVE-2023-51385", + "owner": { + "login": "julienbrs", + "id": 106234742, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4", + "html_url": "https:\/\/github.com\/julienbrs", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/julienbrs\/exploit-CVE-2023-51385", + "description": null, + "fork": false, + "created_at": "2024-01-03T18:40:44Z", + "updated_at": "2024-01-03T18:40:44Z", + "pushed_at": "2024-01-03T18:41:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 738669696, + "name": "malicious-exploit-CVE-2023-51385", + "full_name": "julienbrs\/malicious-exploit-CVE-2023-51385", + "owner": { + "login": "julienbrs", + "id": 106234742, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4", + "html_url": "https:\/\/github.com\/julienbrs", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/julienbrs\/malicious-exploit-CVE-2023-51385", + "description": null, + "fork": false, + "created_at": "2024-01-03T19:08:28Z", + "updated_at": "2024-01-03T19:08:28Z", + "pushed_at": "2024-01-03T20:06:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 741050517, "name": "CVE-2023-51385", diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json index 57bd4fdf4d..0360e3c0e3 100644 --- a/2023/CVE-2023-51467.json +++ b/2023/CVE-2023-51467.json @@ -144,6 +144,68 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 738955975, + "name": "Exploit_CVE-2023-51467", + "full_name": "Subha-BOO7\/Exploit_CVE-2023-51467", + "owner": { + "login": "Subha-BOO7", + "id": 141217634, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141217634?v=4", + "html_url": "https:\/\/github.com\/Subha-BOO7", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Subha-BOO7\/Exploit_CVE-2023-51467", + "description": null, + "fork": false, + "created_at": "2024-01-04T12:44:43Z", + "updated_at": "2024-01-04T12:51:15Z", + "pushed_at": "2024-01-04T12:45:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 739631896, + "name": "CVE-2023-51467-Exploit", + "full_name": "JaneMandy\/CVE-2023-51467-Exploit", + "owner": { + "login": "JaneMandy", + "id": 36792635, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4", + "html_url": "https:\/\/github.com\/JaneMandy", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/JaneMandy\/CVE-2023-51467-Exploit", + "description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具", + "fork": false, + "created_at": "2024-01-06T04:07:07Z", + "updated_at": "2024-09-05T01:30:59Z", + "pushed_at": "2024-01-06T10:33:34Z", + "stargazers_count": 39, + "watchers_count": 39, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 39, + "score": 0, + "subscribers_count": 1 + }, { "id": 741082767, "name": "cve-2023-51467", diff --git a/2023/CVE-2023-51764.json b/2023/CVE-2023-51764.json index 06527e9aa5..911079b831 100644 --- a/2023/CVE-2023-51764.json +++ b/2023/CVE-2023-51764.json @@ -93,5 +93,36 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 739273926, + "name": "CVE-2023-51764", + "full_name": "Double-q1015\/CVE-2023-51764", + "owner": { + "login": "Double-q1015", + "id": 77765134, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77765134?v=4", + "html_url": "https:\/\/github.com\/Double-q1015", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Double-q1015\/CVE-2023-51764", + "description": "CVE-2023-51764 poc", + "fork": false, + "created_at": "2024-01-05T07:07:47Z", + "updated_at": "2024-01-05T07:12:42Z", + "pushed_at": "2024-01-05T07:12:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-7172.json b/2023/CVE-2023-7172.json new file mode 100644 index 0000000000..b8ca2b8fe6 --- /dev/null +++ b/2023/CVE-2023-7172.json @@ -0,0 +1,33 @@ +[ + { + "id": 738005679, + "name": "CVE-2023-7172", + "full_name": "sharathc213\/CVE-2023-7172", + "owner": { + "login": "sharathc213", + "id": 63504490, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4", + "html_url": "https:\/\/github.com\/sharathc213", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7172", + "description": null, + "fork": false, + "created_at": "2024-01-02T07:28:25Z", + "updated_at": "2024-09-07T10:22:34Z", + "pushed_at": "2024-01-02T08:01:27Z", + "stargazers_count": 6, + "watchers_count": 6, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 6, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-7173.json b/2023/CVE-2023-7173.json new file mode 100644 index 0000000000..3820055136 --- /dev/null +++ b/2023/CVE-2023-7173.json @@ -0,0 +1,33 @@ +[ + { + "id": 738027789, + "name": "CVE-2023-7173", + "full_name": "sharathc213\/CVE-2023-7173", + "owner": { + "login": "sharathc213", + "id": 63504490, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4", + "html_url": "https:\/\/github.com\/sharathc213", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7173", + "description": null, + "fork": false, + "created_at": "2024-01-02T08:41:10Z", + "updated_at": "2024-09-07T10:22:32Z", + "pushed_at": "2024-01-02T08:55:56Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-0012.json b/2024/CVE-2024-0012.json index 706ade6863..463bdf4497 100644 --- a/2024/CVE-2024-0012.json +++ b/2024/CVE-2024-0012.json @@ -45,10 +45,10 @@ "description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC", "fork": false, "created_at": "2024-11-19T11:30:25Z", - "updated_at": "2024-12-05T00:53:26Z", + "updated_at": "2025-01-17T10:14:10Z", "pushed_at": "2024-11-19T11:37:09Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-11972.json b/2024/CVE-2024-11972.json index 16b4a64868..19c3dfeaf0 100644 --- a/2024/CVE-2024-11972.json +++ b/2024/CVE-2024-11972.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index db9ded04fa..6e2d6c3752 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -107,19 +107,19 @@ "description": "CVE-2024-21413 PoC for THM Lab", "fork": false, "created_at": "2024-02-17T14:52:52Z", - "updated_at": "2025-01-03T18:59:22Z", + "updated_at": "2025-01-17T11:12:24Z", "pushed_at": "2024-03-13T02:44:28Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 15, - "watchers": 60, + "forks": 16, + "watchers": 61, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index afff30baaa..e372d22e11 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -45,10 +45,10 @@ "description": "This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses.", "fork": false, "created_at": "2024-03-11T12:28:05Z", - "updated_at": "2025-01-15T11:04:23Z", + "updated_at": "2025-01-17T11:25:57Z", "pushed_at": "2024-03-25T11:28:23Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index f294c6d456..8da19bb80d 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -946,6 +946,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-40094.json b/2024/CVE-2024-40094.json new file mode 100644 index 0000000000..43f12e041d --- /dev/null +++ b/2024/CVE-2024-40094.json @@ -0,0 +1,33 @@ +[ + { + "id": 918083293, + "name": "CVE-2024-40094", + "full_name": "inpentest\/CVE-2024-40094", + "owner": { + "login": "inpentest", + "id": 56630479, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56630479?v=4", + "html_url": "https:\/\/github.com\/inpentest", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/inpentest\/CVE-2024-40094", + "description": "This script exploits the CVE-2024-40094 vulnerability in graphql-java", + "fork": false, + "created_at": "2025-01-17T08:09:37Z", + "updated_at": "2025-01-17T08:29:02Z", + "pushed_at": "2025-01-17T08:21:43Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-41453.json b/2024/CVE-2024-41453.json index 26d1346dc6..b89798811b 100644 --- a/2024/CVE-2024-41453.json +++ b/2024/CVE-2024-41453.json @@ -30,6 +30,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-43468.json b/2024/CVE-2024-43468.json index 9111e50034..e6c9d5aa5d 100644 --- a/2024/CVE-2024-43468.json +++ b/2024/CVE-2024-43468.json @@ -14,19 +14,50 @@ "description": null, "fork": false, "created_at": "2024-11-26T12:39:44Z", - "updated_at": "2025-01-17T05:12:02Z", + "updated_at": "2025-01-17T12:18:16Z", "pushed_at": "2025-01-16T09:48:07Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, - "forks_count": 3, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 29, + "forks": 6, + "watchers": 32, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 918185186, + "name": "CVE-2024-43468_mTLS_go", + "full_name": "nikallass\/CVE-2024-43468_mTLS_go", + "owner": { + "login": "nikallass", + "id": 10115306, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10115306?v=4", + "html_url": "https:\/\/github.com\/nikallass", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/nikallass\/CVE-2024-43468_mTLS_go", + "description": "CVE-2024-43468 SCCM SQL Injection Exploit (mTLS version)", + "fork": false, + "created_at": "2025-01-17T12:20:09Z", + "updated_at": "2025-01-17T12:24:24Z", + "pushed_at": "2025-01-17T12:24:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index d26d77c760..9e68fbcb13 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -50,13 +50,13 @@ "stargazers_count": 120, "watchers_count": 120, "has_discussions": false, - "forks_count": 20, + "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 20, + "forks": 21, "watchers": 120, "score": 0, "subscribers_count": 3 diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 98f037f726..096e3be459 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -1442,13 +1442,13 @@ "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 15, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index 646375478d..5016680947 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,10 +14,10 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-17T00:30:51Z", + "updated_at": "2025-01-17T09:02:57Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 447, - "watchers_count": 447, + "stargazers_count": 448, + "watchers_count": 448, "has_discussions": false, "forks_count": 105, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 105, - "watchers": 447, + "watchers": 448, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-49138.json b/2024/CVE-2024-49138.json index 2fd77fbb73..0211b368de 100644 --- a/2024/CVE-2024-49138.json +++ b/2024/CVE-2024-49138.json @@ -14,10 +14,10 @@ "description": "POC exploit for CVE-2024-49138", "fork": false, "created_at": "2025-01-15T00:43:37Z", - "updated_at": "2025-01-17T02:59:00Z", + "updated_at": "2025-01-17T07:12:54Z", "pushed_at": "2025-01-15T01:01:21Z", - "stargazers_count": 142, - "watchers_count": 142, + "stargazers_count": 144, + "watchers_count": 144, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 142, + "watchers": 144, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-50633.json b/2024/CVE-2024-50633.json index 8fa477ce35..723067bc53 100644 --- a/2024/CVE-2024-50633.json +++ b/2024/CVE-2024-50633.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50967.json b/2024/CVE-2024-50967.json index 968645d701..b963f76aaa 100644 --- a/2024/CVE-2024-50967.json +++ b/2024/CVE-2024-50967.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-510.json b/2024/CVE-2024-510.json index c72460d785..d4d2fce697 100644 --- a/2024/CVE-2024-510.json +++ b/2024/CVE-2024-510.json @@ -14,8 +14,8 @@ "description": null, "fork": false, "created_at": "2025-01-16T19:51:01Z", - "updated_at": "2025-01-16T19:57:24Z", - "pushed_at": "2025-01-16T19:57:21Z", + "updated_at": "2025-01-17T10:12:45Z", + "pushed_at": "2025-01-17T10:12:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-54262.json b/2024/CVE-2024-54262.json index ba28f4ba51..5870e2fe3b 100644 --- a/2024/CVE-2024-54262.json +++ b/2024/CVE-2024-54262.json @@ -29,5 +29,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 918159164, + "name": "CVE-2024-54262", + "full_name": "Nxploited\/CVE-2024-54262", + "owner": { + "login": "Nxploited", + "id": 188819918, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", + "html_url": "https:\/\/github.com\/Nxploited", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-54262", + "description": "Exploit CVE-2024-54262: Arbitrary File Upload in Import Export for WooCommerce", + "fork": false, + "created_at": "2025-01-17T11:13:36Z", + "updated_at": "2025-01-17T11:50:07Z", + "pushed_at": "2025-01-17T11:50:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-54363.json b/2024/CVE-2024-54363.json index b83601d3c1..1794941fed 100644 --- a/2024/CVE-2024-54363.json +++ b/2024/CVE-2024-54363.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-55591.json b/2024/CVE-2024-55591.json index 0f65ed6cc9..0edce200c9 100644 --- a/2024/CVE-2024-55591.json +++ b/2024/CVE-2024-55591.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2025-01-16T07:26:15Z", - "updated_at": "2025-01-17T02:26:36Z", + "updated_at": "2025-01-17T10:16:00Z", "pushed_at": "2025-01-16T08:58:49Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,8 +26,8 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 30, + "watchers": 34, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json index 31ab07a5f3..3a38386f02 100644 --- a/2024/CVE-2024-56145.json +++ b/2024/CVE-2024-56145.json @@ -28,7 +28,7 @@ "forks": 11, "watchers": 36, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 906949463, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index cfb8097b17..970eccf146 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -28,7 +28,7 @@ "forks": 183, "watchers": 473, "score": 0, - "subscribers_count": 5 + "subscribers_count": 4 }, { "id": 822579775, @@ -59,7 +59,7 @@ "forks": 90, "watchers": 378, "score": 0, - "subscribers_count": 8 + "subscribers_count": 7 }, { "id": 822584501, diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json index 58d781eb7b..1a35ee35d7 100644 --- a/2025/CVE-2025-0282.json +++ b/2025/CVE-2025-0282.json @@ -45,10 +45,10 @@ "description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.", "fork": false, "created_at": "2025-01-11T02:06:51Z", - "updated_at": "2025-01-16T11:51:34Z", + "updated_at": "2025-01-17T09:43:45Z", "pushed_at": "2025-01-11T23:54:06Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 30, + "watchers": 31, "score": 0, "subscribers_count": 0 }, @@ -138,19 +138,19 @@ "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", "fork": false, "created_at": "2025-01-15T18:27:12Z", - "updated_at": "2025-01-17T04:05:43Z", + "updated_at": "2025-01-17T10:17:32Z", "pushed_at": "2025-01-16T15:44:15Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 11, + "forks": 6, + "watchers": 12, "score": 0, "subscribers_count": 0 }, @@ -169,10 +169,10 @@ "description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways", "fork": false, "created_at": "2025-01-16T14:45:53Z", - "updated_at": "2025-01-17T05:55:41Z", + "updated_at": "2025-01-17T11:25:38Z", "pushed_at": "2025-01-16T20:09:52Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 13, + "watchers": 16, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index dea48e49a7..635ebfa230 100644 --- a/README.md +++ b/README.md @@ -6323,6 +6323,13 @@ ### CVE-2024-40080 - [perras/CVE-2024-40080](https://github.com/perras/CVE-2024-40080) +### CVE-2024-40094 (2024-07-30) + +GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions. + + +- [inpentest/CVE-2024-40094](https://github.com/inpentest/CVE-2024-40094) + ### CVE-2024-40110 (2024-07-12) Sourcecodester Poultry Farm Management System v1.0 contains an Unauthenticated Remote Code Execution (RCE) vulnerability via the productimage parameter at /farm/product.php. @@ -6796,6 +6803,7 @@ - [synacktiv/CVE-2024-43468](https://github.com/synacktiv/CVE-2024-43468) +- [nikallass/CVE-2024-43468_mTLS_go](https://github.com/nikallass/CVE-2024-43468_mTLS_go) ### CVE-2024-43532 (2024-10-08) @@ -8192,6 +8200,7 @@ - [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262) +- [Nxploited/CVE-2024-54262](https://github.com/Nxploited/CVE-2024-54262) ### CVE-2024-54292 (2024-12-13) @@ -10081,6 +10090,20 @@ - [soltanali0/CVE-2023-7028](https://github.com/soltanali0/CVE-2023-7028) - [gh-ost00/CVE-2023-7028](https://github.com/gh-ost00/CVE-2023-7028) +### CVE-2023-7172 (2023-12-30) + +Eine kritische Schwachstelle wurde in PHPGurukul Hospital Management System 1.0 entdeckt. Es geht hierbei um eine nicht näher spezifizierte Funktion der Komponente Admin Dashboard. Durch Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. + + +- [sharathc213/CVE-2023-7172](https://github.com/sharathc213/CVE-2023-7172) + +### CVE-2023-7173 (2023-12-30) + +Es wurde eine problematische Schwachstelle in PHPGurukul Hospital Management System 1.0 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei registration.php. Durch das Beeinflussen des Arguments First Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. + + +- [sharathc213/CVE-2023-7173](https://github.com/sharathc213/CVE-2023-7173) + ### CVE-2023-7261 (2024-06-07) Inappropriate implementation in Google Updator prior to 1.3.36.351 in Google Chrome allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: High) @@ -10677,6 +10700,7 @@ - [aaaademo/Confluence-EvilJar](https://github.com/aaaademo/Confluence-EvilJar) - [edsonjt81/CVE-2023-22515-Scan.](https://github.com/edsonjt81/CVE-2023-22515-Scan.) - [INTfinityConsulting/cve-2023-22515](https://github.com/INTfinityConsulting/cve-2023-22515) +- [CalegariMindSec/Exploit-CVE-2023-22515](https://github.com/CalegariMindSec/Exploit-CVE-2023-22515) - [rxerium/CVE-2023-22515](https://github.com/rxerium/CVE-2023-22515) - [fyx1t/NSE--CVE-2023-22515](https://github.com/fyx1t/NSE--CVE-2023-22515) - [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check) @@ -11091,6 +11115,7 @@ - [H4R335HR/CVE-2023-24329-PoC](https://github.com/H4R335HR/CVE-2023-24329-PoC) - [Pandante-Central/CVE-2023-24329-codeql-test](https://github.com/Pandante-Central/CVE-2023-24329-codeql-test) +- [PenTestMano/CVE-2023-24329-Exploit](https://github.com/PenTestMano/CVE-2023-24329-Exploit) ### CVE-2023-24488 (2023-07-10) @@ -11533,6 +11558,8 @@ - [Hamibubu/CVE-2023-27163](https://github.com/Hamibubu/CVE-2023-27163) - [KharimMchatta/basketcraft](https://github.com/KharimMchatta/basketcraft) - [MasterCode112/CVE-2023-27163](https://github.com/MasterCode112/CVE-2023-27163) +- [Rubioo02/CVE-2023-27163](https://github.com/Rubioo02/CVE-2023-27163) +- [madhavmehndiratta/CVE-2023-27163](https://github.com/madhavmehndiratta/CVE-2023-27163) - [Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning](https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning) - [btar1gan/exploit_CVE-2023-27163](https://github.com/btar1gan/exploit_CVE-2023-27163) @@ -11772,6 +11799,7 @@ - [fortra/CVE-2023-28252](https://github.com/fortra/CVE-2023-28252) - [726232111/CVE-2023-28252](https://github.com/726232111/CVE-2023-28252) - [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-) +- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252) - [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe) - [byt3n33dl3/CLFS](https://github.com/byt3n33dl3/CLFS) - [Vulmatch/CVE-2023-28252](https://github.com/Vulmatch/CVE-2023-28252) @@ -11841,6 +11869,7 @@ - [yTxZx/CVE-2023-28432](https://github.com/yTxZx/CVE-2023-28432) - [unam4/CVE-2023-28432-minio_update_rce](https://github.com/unam4/CVE-2023-28432-minio_update_rce) - [C1ph3rX13/CVE-2023-28432](https://github.com/C1ph3rX13/CVE-2023-28432) +- [netuseradministrator/CVE-2023-28432](https://github.com/netuseradministrator/CVE-2023-28432) - [xk-mt/CVE-2023-28432](https://github.com/xk-mt/CVE-2023-28432) - [0xRulez/CVE-2023-28432](https://github.com/0xRulez/CVE-2023-28432) @@ -11961,6 +11990,7 @@ - [LuemmelSec/CVE-2023-29357](https://github.com/LuemmelSec/CVE-2023-29357) - [KeyStrOke95/CVE-2023-29357-ExE](https://github.com/KeyStrOke95/CVE-2023-29357-ExE) - [Guillaume-Risch/cve-2023-29357-Sharepoint](https://github.com/Guillaume-Risch/cve-2023-29357-Sharepoint) +- [Jev1337/CVE-2023-29357-Check](https://github.com/Jev1337/CVE-2023-29357-Check) - [AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357](https://github.com/AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357) ### CVE-2023-29360 (2023-06-13) @@ -12369,6 +12399,13 @@ - [Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure](https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure) +### CVE-2023-31446 (2024-01-10) + +In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup. + + +- [Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution](https://github.com/Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution) + ### CVE-2023-31497 (2023-05-11) Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Security (EPS) all versions prior to v8.0 allows attackers to escalate privileges to root via supplying a crafted binary to the target system. @@ -13135,6 +13172,7 @@ - [Malwareman007/CVE-2023-34362](https://github.com/Malwareman007/CVE-2023-34362) - [toorandom/moveit-payload-decrypt-CVE-2023-34362](https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362) - [errorfiathck/MOVEit-Exploit](https://github.com/errorfiathck/MOVEit-Exploit) +- [Chinyemba-ck/MOVEit-CVE-2023-34362](https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362) - [glen-pearson/MoveIT-CVE-2023-34362-RCE](https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE) - [aditibv/MOVEit-CVE-2023-34362](https://github.com/aditibv/MOVEit-CVE-2023-34362) @@ -13991,6 +14029,7 @@ - [kali-mx/CVE-2023-38408](https://github.com/kali-mx/CVE-2023-38408) - [LucasPDiniz/CVE-2023-38408](https://github.com/LucasPDiniz/CVE-2023-38408) +- [classic130/CVE-2023-38408](https://github.com/classic130/CVE-2023-38408) - [wxrdnx/CVE-2023-38408](https://github.com/wxrdnx/CVE-2023-38408) - [mrtacojr/CVE-2023-38408](https://github.com/mrtacojr/CVE-2023-38408) - [fazilbaig1/cve_2023_38408_scanner](https://github.com/fazilbaig1/cve_2023_38408_scanner) @@ -14101,6 +14140,7 @@ - [Shisones/MetabaseRCE_CVE-2023-38646](https://github.com/Shisones/MetabaseRCE_CVE-2023-38646) - [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-) - [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase) +- [DaniTheHack3r/CVE-2023-38646](https://github.com/DaniTheHack3r/CVE-2023-38646) - [XiaomingX/cve-2023-38646-poc](https://github.com/XiaomingX/cve-2023-38646-poc) - [JayRyz/CVE-2023-38646-PoC-Metabase](https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase) @@ -14396,6 +14436,13 @@ - [kenbuckler/WS_FTP-CVE-2023-40044](https://github.com/kenbuckler/WS_FTP-CVE-2023-40044) +### CVE-2023-40084 (2023-12-04) + +In run of MDnsSdListener.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. + + +- [Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084](https://github.com/Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084) + ### CVE-2023-40109 (2024-02-15) In createFromParcel of UsbConfiguration.java, there is a possible background activity launch (BAL) due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. @@ -16304,6 +16351,15 @@ - [vinnie1717/CVE-2023-48974](https://github.com/vinnie1717/CVE-2023-48974) +### CVE-2023-48981 +- [tristao-marinho/CVE-2023-48981](https://github.com/tristao-marinho/CVE-2023-48981) + +### CVE-2023-48982 +- [tristao-marinho/CVE-2023-48982](https://github.com/tristao-marinho/CVE-2023-48982) + +### CVE-2023-48983 +- [tristao-marinho/CVE-2023-48983](https://github.com/tristao-marinho/CVE-2023-48983) + ### CVE-2023-49002 (2023-12-27) An issue in Xenom Technologies (sinous) Phone Dialer-voice Call Dialer v.1.2.5 allows an attacker to bypass intended access restrictions via interaction with com.funprime.calldialer.ui.activities.OutgoingActivity. @@ -16340,6 +16396,7 @@ - [abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC](https://github.com/abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC) - [0xrobiul/CVE-2023-49070](https://github.com/0xrobiul/CVE-2023-49070) - [D0g3-8Bit/OFBiz-Attack](https://github.com/D0g3-8Bit/OFBiz-Attack) +- [UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz](https://github.com/UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz) - [yukselberkay/CVE-2023-49070_CVE-2023-51467](https://github.com/yukselberkay/CVE-2023-49070_CVE-2023-51467) - [Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467](https://github.com/Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467) @@ -16794,9 +16851,30 @@ ### CVE-2023-51000 - [Team-Byerus/CVE-2023-51000](https://github.com/Team-Byerus/CVE-2023-51000) +### CVE-2023-51073 (2024-01-11) + +An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh. + + +- [christopher-pace/CVE-2023-51073](https://github.com/christopher-pace/CVE-2023-51073) + ### CVE-2023-51119 - [OscarAkaElvis/CVE-2023-51119](https://github.com/OscarAkaElvis/CVE-2023-51119) +### CVE-2023-51126 (2024-01-10) + +Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to 1.46.16 allows attackers to run arbitrary commands via the value parameter. + + +- [risuxx/CVE-2023-51126](https://github.com/risuxx/CVE-2023-51126) + +### CVE-2023-51127 (2024-01-10) + +FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file. + + +- [risuxx/CVE-2023-51127](https://github.com/risuxx/CVE-2023-51127) + ### CVE-2023-51214 - [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214) @@ -16819,6 +16897,10 @@ - [LtmThink/CVE-2023-51385_test](https://github.com/LtmThink/CVE-2023-51385_test) - [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test) - [power1314520/CVE-2023-51385_test](https://github.com/power1314520/CVE-2023-51385_test) +- [WOOOOONG/CVE-2023-51385](https://github.com/WOOOOONG/CVE-2023-51385) +- [uccu99/CVE-2023-51385](https://github.com/uccu99/CVE-2023-51385) +- [julienbrs/exploit-CVE-2023-51385](https://github.com/julienbrs/exploit-CVE-2023-51385) +- [julienbrs/malicious-exploit-CVE-2023-51385](https://github.com/julienbrs/malicious-exploit-CVE-2023-51385) - [Sonicrrrr/CVE-2023-51385](https://github.com/Sonicrrrr/CVE-2023-51385) - [farliy-hacker/CVE-2023-51385](https://github.com/farliy-hacker/CVE-2023-51385) - [farliy-hacker/CVE-2023-51385-save](https://github.com/farliy-hacker/CVE-2023-51385-save) @@ -16855,6 +16937,8 @@ - [Chocapikk/CVE-2023-51467](https://github.com/Chocapikk/CVE-2023-51467) - [K3ysTr0K3R/CVE-2023-51467-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-51467-EXPLOIT) - [jakabakos/Apache-OFBiz-Authentication-Bypass](https://github.com/jakabakos/Apache-OFBiz-Authentication-Bypass) +- [Subha-BOO7/Exploit_CVE-2023-51467](https://github.com/Subha-BOO7/Exploit_CVE-2023-51467) +- [JaneMandy/CVE-2023-51467-Exploit](https://github.com/JaneMandy/CVE-2023-51467-Exploit) - [vulncheck-oss/cve-2023-51467](https://github.com/vulncheck-oss/cve-2023-51467) - [2ptr/BadBizness-CVE-2023-51467](https://github.com/2ptr/BadBizness-CVE-2023-51467) - [AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-](https://github.com/AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-) @@ -16881,6 +16965,7 @@ - [duy-31/CVE-2023-51764](https://github.com/duy-31/CVE-2023-51764) - [eeenvik1/CVE-2023-51764](https://github.com/eeenvik1/CVE-2023-51764) - [d4op/CVE-2023-51764-POC](https://github.com/d4op/CVE-2023-51764-POC) +- [Double-q1015/CVE-2023-51764](https://github.com/Double-q1015/CVE-2023-51764) ### CVE-2023-51800 (2024-02-29) @@ -33971,6 +34056,7 @@ - [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882) - [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC) - [AleksaZatezalo/CVE-2020-14882](https://github.com/AleksaZatezalo/CVE-2020-14882) +- [KKC73/weblogic-cve-2020-14882](https://github.com/KKC73/weblogic-cve-2020-14882) ### CVE-2020-14883 (2020-10-21)