From 914cc2ae506d0eddb561a04917c0c8ee0373c879 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Fri, 14 Jul 2023 09:28:00 +0900 Subject: [PATCH] Auto Update 2023/07/14 00:28:00 --- 2014/CVE-2014-4210.json | 4 ++-- 2016/CVE-2016-0638.json | 4 ++-- 2016/CVE-2016-3308.json | 8 ++++---- 2016/CVE-2016-5195.json | 8 ++++---- 2017/CVE-2017-3248.json | 4 ++-- 2018/CVE-2018-0114.json | 30 ------------------------------ 2018/CVE-2018-19320.json | 8 ++++---- 2018/CVE-2018-2628.json | 4 ++-- 2018/CVE-2018-5955.json | 2 +- 2019/CVE-2019-2618.json | 4 ++-- 2019/CVE-2019-5418.json | 2 +- 2020/CVE-2020-0688.json | 8 ++++---- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-14386.json | 2 +- 2020/CVE-2020-1472.json | 8 ++++---- 2020/CVE-2020-17144.json | 8 ++++---- 2020/CVE-2020-25265.json | 2 +- 2020/CVE-2020-2551.json | 4 ++-- 2020/CVE-2020-8004.json | 2 +- 2020/CVE-2020-8165.json | 2 +- 2020/CVE-2020-9484.json | 2 +- 2021/CVE-2021-1675.json | 2 +- 2021/CVE-2021-1965.json | 2 +- 2021/CVE-2021-22204.json | 2 +- 2021/CVE-2021-22555.json | 2 +- 2021/CVE-2021-26855.json | 8 ++++---- 2021/CVE-2021-29447.json | 2 +- 2021/CVE-2021-3156.json | 2 +- 2021/CVE-2021-3560.json | 2 +- 2021/CVE-2021-38647.json | 8 ++++---- 2021/CVE-2021-40449.json | 16 ++++++++-------- 2021/CVE-2021-40870.json | 6 +++--- 2021/CVE-2021-41773.json | 2 +- 2021/CVE-2021-44228.json | 12 ++++++------ 2022/CVE-2022-21894.json | 16 ++++++++-------- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-29464.json | 8 ++++---- 2022/CVE-2022-37969.json | 8 ++++---- 2022/CVE-2022-40684.json | 16 ++++++++-------- 2022/CVE-2022-4510.json | 8 ++++---- 2023/CVE-2023-21036.json | 8 ++++---- 2023/CVE-2023-23333.json | 8 ++++---- 2023/CVE-2023-23638.json | 2 +- 2023/CVE-2023-28121.json | 2 +- 2023/CVE-2023-2825.json | 8 ++++---- 2023/CVE-2023-28252.json | 2 +- 2023/CVE-2023-29343.json | 8 ++++---- 2023/CVE-2023-3460.json | 8 ++++---- 2023/CVE-2023-35803.json | 8 ++++---- 2023/CVE-2023-35829.json | 32 -------------------------------- README.md | 34 +++++++++++++++++++--------------- 51 files changed, 158 insertions(+), 216 deletions(-) delete mode 100644 2023/CVE-2023-35829.json diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 49e06cfb2a..60f6e94e53 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -48,7 +48,7 @@ "stargazers_count": 1737, "watchers_count": 1737, "has_discussions": false, - "forks_count": 330, + "forks_count": 329, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -75,7 +75,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 330, + "forks": 329, "watchers": 1737, "score": 0, "subscribers_count": 33 diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index c627f4f7da..5eac651f64 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -18,7 +18,7 @@ "stargazers_count": 1737, "watchers_count": 1737, "has_discussions": false, - "forks_count": 330, + "forks_count": 329, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,7 +45,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 330, + "forks": 329, "watchers": 1737, "score": 0, "subscribers_count": 33 diff --git a/2016/CVE-2016-3308.json b/2016/CVE-2016-3308.json index 4afa0db0bd..89f0995919 100644 --- a/2016/CVE-2016-3308.json +++ b/2016/CVE-2016-3308.json @@ -13,10 +13,10 @@ "description": "Use CVE-2016-3308 corrupt win32k desktop heap", "fork": false, "created_at": "2016-09-18T03:48:53Z", - "updated_at": "2023-02-17T10:04:08Z", + "updated_at": "2023-07-13T20:15:21Z", "pushed_at": "2016-09-18T05:48:27Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 51, + "watchers": 52, "score": 0, "subscribers_count": 3 } diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 8ab932994a..76aa481df2 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -233,10 +233,10 @@ "description": "PoC for Dirty COW (CVE-2016-5195)", "fork": false, "created_at": "2016-10-22T15:25:34Z", - "updated_at": "2023-07-13T14:23:14Z", + "updated_at": "2023-07-13T20:58:41Z", "pushed_at": "2022-03-16T12:08:54Z", - "stargazers_count": 442, - "watchers_count": 442, + "stargazers_count": 443, + "watchers_count": 443, "has_discussions": false, "forks_count": 150, "allow_forking": true, @@ -245,7 +245,7 @@ "topics": [], "visibility": "public", "forks": 150, - "watchers": 442, + "watchers": 443, "score": 0, "subscribers_count": 20 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 8d4d09aa4f..02bd8fd637 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -48,7 +48,7 @@ "stargazers_count": 1737, "watchers_count": 1737, "has_discussions": false, - "forks_count": 330, + "forks_count": 329, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -75,7 +75,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 330, + "forks": 329, "watchers": 1737, "score": 0, "subscribers_count": 33 diff --git a/2018/CVE-2018-0114.json b/2018/CVE-2018-0114.json index 3902b2ea62..a1c431550e 100644 --- a/2018/CVE-2018-0114.json +++ b/2018/CVE-2018-0114.json @@ -268,35 +268,5 @@ "watchers": 1, "score": 0, "subscribers_count": 2 - }, - { - "id": 614760486, - "name": "jwt-spoof-tool", - "full_name": "amr9k8\/jwt-spoof-tool", - "owner": { - "login": "amr9k8", - "id": 61662153, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61662153?v=4", - "html_url": "https:\/\/github.com\/amr9k8" - }, - "html_url": "https:\/\/github.com\/amr9k8\/jwt-spoof-tool", - "description": "Automate JWT Exploit (CVE-2018-0114)", - "fork": false, - "created_at": "2023-03-16T09:08:05Z", - "updated_at": "2023-03-16T09:53:58Z", - "pushed_at": "2023-03-16T09:14:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index 06799b5ca7..35af8446d1 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -73,10 +73,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2023-07-12T20:35:47Z", + "updated_at": "2023-07-13T18:28:36Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 70, + "watchers": 71, "score": 0, "subscribers_count": 4 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index b038dadb06..2879fc1aba 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -592,7 +592,7 @@ "stargazers_count": 1737, "watchers_count": 1737, "has_discussions": false, - "forks_count": 330, + "forks_count": 329, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -619,7 +619,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 330, + "forks": 329, "watchers": 1737, "score": 0, "subscribers_count": 33 diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index f7b93b37c4..567d79a33a 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -87,7 +87,7 @@ "fork": false, "created_at": "2023-06-23T20:25:47Z", "updated_at": "2023-07-12T00:37:38Z", - "pushed_at": "2023-07-12T00:35:10Z", + "pushed_at": "2023-07-13T22:14:43Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index a2b822b7ea..bfde5a3def 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -198,7 +198,7 @@ "stargazers_count": 1737, "watchers_count": 1737, "has_discussions": false, - "forks_count": 330, + "forks_count": 329, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -225,7 +225,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 330, + "forks": 329, "watchers": 1737, "score": 0, "subscribers_count": 33 diff --git a/2019/CVE-2019-5418.json b/2019/CVE-2019-5418.json index 7a0682a897..0472f382e8 100644 --- a/2019/CVE-2019-5418.json +++ b/2019/CVE-2019-5418.json @@ -202,7 +202,7 @@ "fork": false, "created_at": "2019-10-04T19:28:10Z", "updated_at": "2019-10-04T19:29:56Z", - "pushed_at": "2023-05-04T21:06:27Z", + "pushed_at": "2023-07-13T22:14:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index f79c137bfa..30aad530ee 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -265,10 +265,10 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2023-07-13T04:55:28Z", + "updated_at": "2023-07-13T19:19:58Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 337, - "watchers_count": 337, + "stargazers_count": 338, + "watchers_count": 338, "has_discussions": false, "forks_count": 79, "allow_forking": true, @@ -277,7 +277,7 @@ "topics": [], "visibility": "public", "forks": 79, - "watchers": 337, + "watchers": 338, "score": 0, "subscribers_count": 11 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index bd40823542..f0d9013357 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1690,10 +1690,10 @@ "description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection", "fork": false, "created_at": "2020-06-10T16:44:39Z", - "updated_at": "2023-07-12T13:37:46Z", + "updated_at": "2023-07-13T21:13:11Z", "pushed_at": "2022-03-30T14:02:04Z", - "stargazers_count": 228, - "watchers_count": 228, + "stargazers_count": 229, + "watchers_count": 229, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -1702,7 +1702,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 228, + "watchers": 229, "score": 0, "subscribers_count": 6 }, diff --git a/2020/CVE-2020-14386.json b/2020/CVE-2020-14386.json index 6fd6162039..6fd89fa01a 100644 --- a/2020/CVE-2020-14386.json +++ b/2020/CVE-2020-14386.json @@ -27,6 +27,6 @@ "forks": 17, "watchers": 43, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index f83905014c..e676447131 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -440,10 +440,10 @@ "description": "cve-2020-1472 复现利用及其exp", "fork": false, "created_at": "2020-09-16T03:40:47Z", - "updated_at": "2023-07-13T13:11:33Z", + "updated_at": "2023-07-14T00:05:54Z", "pushed_at": "2020-09-16T15:03:32Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -452,7 +452,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 92, + "watchers": 93, "score": 0, "subscribers_count": 4 }, diff --git a/2020/CVE-2020-17144.json b/2020/CVE-2020-17144.json index 29ced22788..7b700e7ca7 100644 --- a/2020/CVE-2020-17144.json +++ b/2020/CVE-2020-17144.json @@ -43,10 +43,10 @@ "description": "weaponized tool for CVE-2020-17144", "fork": false, "created_at": "2020-12-09T20:57:16Z", - "updated_at": "2023-06-29T12:40:40Z", + "updated_at": "2023-07-13T19:20:15Z", "pushed_at": "2020-12-09T20:57:32Z", - "stargazers_count": 155, - "watchers_count": 155, + "stargazers_count": 156, + "watchers_count": 156, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 155, + "watchers": 156, "score": 0, "subscribers_count": 4 } diff --git a/2020/CVE-2020-25265.json b/2020/CVE-2020-25265.json index 716fc6c37d..0568d4e3fd 100644 --- a/2020/CVE-2020-25265.json +++ b/2020/CVE-2020-25265.json @@ -27,6 +27,6 @@ "forks": 1, "watchers": 1, "score": 0, - "subscribers_count": 3 + "subscribers_count": 4 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 22fc234836..eb0fde35d2 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -18,7 +18,7 @@ "stargazers_count": 1737, "watchers_count": 1737, "has_discussions": false, - "forks_count": 330, + "forks_count": 329, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,7 +45,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 330, + "forks": 329, "watchers": 1737, "score": 0, "subscribers_count": 33 diff --git a/2020/CVE-2020-8004.json b/2020/CVE-2020-8004.json index 8251e1f61b..b41d839c46 100644 --- a/2020/CVE-2020-8004.json +++ b/2020/CVE-2020-8004.json @@ -27,6 +27,6 @@ "forks": 8, "watchers": 18, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 } ] \ No newline at end of file diff --git a/2020/CVE-2020-8165.json b/2020/CVE-2020-8165.json index 0ebd296ff8..3fee6b4a32 100644 --- a/2020/CVE-2020-8165.json +++ b/2020/CVE-2020-8165.json @@ -147,7 +147,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 329840409, diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index 8d6991cd0e..146b4540d8 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -297,7 +297,7 @@ "forks": 4, "watchers": 6, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 337782636, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 09d58425c1..653099353a 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -1109,7 +1109,7 @@ "forks": 4, "watchers": 20, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 453589665, diff --git a/2021/CVE-2021-1965.json b/2021/CVE-2021-1965.json index 118cb20203..5be390146b 100644 --- a/2021/CVE-2021-1965.json +++ b/2021/CVE-2021-1965.json @@ -27,7 +27,7 @@ "forks": 30, "watchers": 167, "score": 0, - "subscribers_count": 6 + "subscribers_count": 5 }, { "id": 461350628, diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index 64ce4e8e9a..8d97aab150 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -150,7 +150,7 @@ "forks": 10, "watchers": 27, "score": 0, - "subscribers_count": 3 + "subscribers_count": 4 }, { "id": 424626163, diff --git a/2021/CVE-2021-22555.json b/2021/CVE-2021-22555.json index d456489710..0d088a5f4f 100644 --- a/2021/CVE-2021-22555.json +++ b/2021/CVE-2021-22555.json @@ -87,7 +87,7 @@ "forks": 2, "watchers": 4, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 412296277, diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 7a3012cd0e..0f6ddc1a76 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -1160,10 +1160,10 @@ "description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.", "fork": false, "created_at": "2021-04-14T11:12:30Z", - "updated_at": "2023-06-03T10:20:20Z", + "updated_at": "2023-07-13T18:59:32Z", "pushed_at": "2022-10-21T08:59:23Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -1172,7 +1172,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 169, + "watchers": 170, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json index dfdad9a0f4..41b58e9a82 100644 --- a/2021/CVE-2021-29447.json +++ b/2021/CVE-2021-29447.json @@ -117,7 +117,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 562278922, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 8618dbace7..57e9eab408 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -57,7 +57,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 18 + "subscribers_count": 17 }, { "id": 333483141, diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 8c887931ce..0b4341274e 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -246,7 +246,7 @@ "forks": 3, "watchers": 25, "score": 0, - "subscribers_count": 3 + "subscribers_count": 4 }, { "id": 382305236, diff --git a/2021/CVE-2021-38647.json b/2021/CVE-2021-38647.json index 28b48cbf84..4cc63856fe 100644 --- a/2021/CVE-2021-38647.json +++ b/2021/CVE-2021-38647.json @@ -133,10 +133,10 @@ "description": "OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the \"OMIGOD\" vulnerabilities discovered by Wiz's threat research team, specifically CVE-2021-38647.", "fork": false, "created_at": "2021-09-16T15:34:03Z", - "updated_at": "2022-07-13T20:33:30Z", + "updated_at": "2023-07-13T18:34:04Z", "pushed_at": "2021-09-22T12:46:31Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -150,7 +150,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 13, + "watchers": 14, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 454d66ba42..96d3506baa 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2021-10-16T16:17:44Z", - "updated_at": "2023-07-07T19:11:04Z", + "updated_at": "2023-07-13T21:11:43Z", "pushed_at": "2021-11-11T17:09:56Z", - "stargazers_count": 438, - "watchers_count": 438, + "stargazers_count": 439, + "watchers_count": 439, "has_discussions": false, "forks_count": 95, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 95, - "watchers": 438, + "watchers": 439, "score": 0, "subscribers_count": 12 }, @@ -167,10 +167,10 @@ "description": null, "fork": false, "created_at": "2022-02-20T16:23:26Z", - "updated_at": "2022-11-09T18:15:22Z", + "updated_at": "2023-07-13T21:12:59Z", "pushed_at": "2022-02-20T16:34:32Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -179,7 +179,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-40870.json b/2021/CVE-2021-40870.json index f5f5fb4be2..4417681354 100644 --- a/2021/CVE-2021-40870.json +++ b/2021/CVE-2021-40870.json @@ -112,12 +112,12 @@ "description": "Unrestricted upload of file with dangerous type in Aviatrix allows an authenticated user to execute arbitrary code", "fork": false, "created_at": "2021-10-08T05:35:40Z", - "updated_at": "2021-10-09T06:42:40Z", + "updated_at": "2023-07-13T21:06:58Z", "pushed_at": "2022-04-15T06:06:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -125,7 +125,7 @@ "cve-2021-40870" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 64b5138a9b..8b6d8bce0a 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -790,7 +790,7 @@ "forks": 1, "watchers": 3, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 414402542, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 8a0a771a86..4c9ccf024b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -3703,10 +3703,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2023-07-12T03:01:58Z", + "updated_at": "2023-07-13T19:10:05Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3269, - "watchers_count": 3269, + "stargazers_count": 3270, + "watchers_count": 3270, "has_discussions": true, "forks_count": 744, "allow_forking": true, @@ -3715,7 +3715,7 @@ "topics": [], "visibility": "public", "forks": 744, - "watchers": 3269, + "watchers": 3270, "score": 0, "subscribers_count": 60 }, @@ -6322,7 +6322,7 @@ "forks": 91, "watchers": 344, "score": 0, - "subscribers_count": 32 + "subscribers_count": 35 }, { "id": 438449548, @@ -7183,7 +7183,7 @@ "forks": 18, "watchers": 2, "score": 0, - "subscribers_count": 10 + "subscribers_count": 9 }, { "id": 438773632, diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index 7a1b2f37a8..d982ec4405 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -13,12 +13,12 @@ "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "fork": false, "created_at": "2022-08-09T15:53:48Z", - "updated_at": "2023-07-13T13:27:22Z", + "updated_at": "2023-07-13T20:42:50Z", "pushed_at": "2023-05-10T00:02:31Z", - "stargazers_count": 228, - "watchers_count": 228, + "stargazers_count": 229, + "watchers_count": 229, "has_discussions": false, - "forks_count": 45, + "forks_count": 47, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -32,8 +32,8 @@ "windows-boot" ], "visibility": "public", - "forks": 45, - "watchers": 228, + "forks": 47, + "watchers": 229, "score": 0, "subscribers_count": 8 }, @@ -86,13 +86,13 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 5, "score": 0, "subscribers_count": 3 diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 7b2d639657..a9fa0fd09c 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2023-07-11T13:57:42Z", + "updated_at": "2023-07-13T19:36:40Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1004, - "watchers_count": 1004, + "stargazers_count": 1005, + "watchers_count": 1005, "has_discussions": true, "forks_count": 176, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 176, - "watchers": 1004, + "watchers": 1005, "score": 0, "subscribers_count": 17 }, diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 391451a60e..e65e5bed33 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -13,10 +13,10 @@ "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "fork": false, "created_at": "2022-04-20T21:23:52Z", - "updated_at": "2023-07-07T19:11:43Z", + "updated_at": "2023-07-13T18:28:29Z", "pushed_at": "2022-04-27T05:52:43Z", - "stargazers_count": 353, - "watchers_count": 353, + "stargazers_count": 354, + "watchers_count": 354, "has_discussions": false, "forks_count": 93, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 93, - "watchers": 353, + "watchers": 354, "score": 0, "subscribers_count": 7 }, diff --git a/2022/CVE-2022-37969.json b/2022/CVE-2022-37969.json index 081906588a..4cc1317c00 100644 --- a/2022/CVE-2022-37969.json +++ b/2022/CVE-2022-37969.json @@ -13,10 +13,10 @@ "description": "Windows LPE exploit for CVE-2022-37969", "fork": false, "created_at": "2023-03-09T21:17:44Z", - "updated_at": "2023-07-13T06:26:29Z", + "updated_at": "2023-07-13T21:37:01Z", "pushed_at": "2023-07-11T16:50:28Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 103, + "watchers": 104, "score": 0, "subscribers_count": 4 } diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index 337b6ddbdc..0e8c84db48 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -13,10 +13,10 @@ "description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager", "fork": false, "created_at": "2022-10-13T14:24:12Z", - "updated_at": "2023-07-05T11:29:30Z", + "updated_at": "2023-07-13T22:35:50Z", "pushed_at": "2022-10-13T15:25:00Z", - "stargazers_count": 322, - "watchers_count": 322, + "stargazers_count": 323, + "watchers_count": 323, "has_discussions": false, "forks_count": 95, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 95, - "watchers": 322, + "watchers": 323, "score": 0, "subscribers_count": 8 }, @@ -103,10 +103,10 @@ "description": "Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager", "fork": false, "created_at": "2022-10-13T21:07:50Z", - "updated_at": "2023-03-20T03:24:25Z", + "updated_at": "2023-07-13T22:51:23Z", "pushed_at": "2023-01-21T02:17:48Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -125,7 +125,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-4510.json b/2022/CVE-2022-4510.json index 3406518dda..be4a6defc4 100644 --- a/2022/CVE-2022-4510.json +++ b/2022/CVE-2022-4510.json @@ -103,10 +103,10 @@ "description": "Python script that generates pfs payloads to exploit CVE-2022-4510", "fork": false, "created_at": "2023-07-11T20:55:58Z", - "updated_at": "2023-07-11T20:57:15Z", + "updated_at": "2023-07-13T19:05:50Z", "pushed_at": "2023-07-11T20:59:48Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-21036.json b/2023/CVE-2023-21036.json index d87575a061..f03d4a923e 100644 --- a/2023/CVE-2023-21036.json +++ b/2023/CVE-2023-21036.json @@ -50,10 +50,10 @@ "description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036", "fork": false, "created_at": "2023-03-22T14:59:42Z", - "updated_at": "2023-06-29T10:01:11Z", + "updated_at": "2023-07-13T21:27:16Z", "pushed_at": "2023-05-15T12:12:33Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 71, + "watchers": 72, "score": 0, "subscribers_count": 9 }, diff --git a/2023/CVE-2023-23333.json b/2023/CVE-2023-23333.json index 9bf6c88b85..e7ce229e12 100644 --- a/2023/CVE-2023-23333.json +++ b/2023/CVE-2023-23333.json @@ -13,10 +13,10 @@ "description": "There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.", "fork": false, "created_at": "2023-02-06T06:20:40Z", - "updated_at": "2023-07-10T19:26:15Z", + "updated_at": "2023-07-13T20:44:04Z", "pushed_at": "2023-02-06T06:35:29Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-23638.json b/2023/CVE-2023-23638.json index 56ff929b50..86532795fa 100644 --- a/2023/CVE-2023-23638.json +++ b/2023/CVE-2023-23638.json @@ -43,7 +43,7 @@ "description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践", "fork": false, "created_at": "2023-05-11T07:37:52Z", - "updated_at": "2023-07-13T16:56:32Z", + "updated_at": "2023-07-13T23:07:18Z", "pushed_at": "2023-06-15T01:25:03Z", "stargazers_count": 189, "watchers_count": 189, diff --git a/2023/CVE-2023-28121.json b/2023/CVE-2023-28121.json index 1aada54217..c516e66646 100644 --- a/2023/CVE-2023-28121.json +++ b/2023/CVE-2023-28121.json @@ -44,7 +44,7 @@ "fork": false, "created_at": "2023-07-12T02:41:26Z", "updated_at": "2023-07-12T15:21:26Z", - "pushed_at": "2023-07-12T03:21:23Z", + "pushed_at": "2023-07-14T00:19:22Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2023/CVE-2023-2825.json b/2023/CVE-2023-2825.json index df1a03f0cf..dc12eee069 100644 --- a/2023/CVE-2023-2825.json +++ b/2023/CVE-2023-2825.json @@ -13,10 +13,10 @@ "description": "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0.", "fork": false, "created_at": "2023-05-25T13:25:10Z", - "updated_at": "2023-07-13T01:39:15Z", + "updated_at": "2023-07-13T23:51:28Z", "pushed_at": "2023-06-02T12:10:06Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 133, + "watchers_count": 133, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 30, - "watchers": 132, + "watchers": 133, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index fcf60beae5..eb1bd6faa7 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -43,7 +43,7 @@ "description": "POC for CVE-2023-28252", "fork": false, "created_at": "2023-07-12T17:52:30Z", - "updated_at": "2023-07-13T09:02:37Z", + "updated_at": "2023-07-13T19:11:35Z", "pushed_at": "2023-07-12T18:48:52Z", "stargazers_count": 7, "watchers_count": 7, diff --git a/2023/CVE-2023-29343.json b/2023/CVE-2023-29343.json index 690e79e48f..7b5b7840b3 100644 --- a/2023/CVE-2023-29343.json +++ b/2023/CVE-2023-29343.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-18T11:14:08Z", - "updated_at": "2023-07-13T14:42:31Z", + "updated_at": "2023-07-13T21:30:50Z", "pushed_at": "2023-06-18T11:51:54Z", - "stargazers_count": 151, - "watchers_count": 151, + "stargazers_count": 152, + "watchers_count": 152, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 151, + "watchers": 152, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-3460.json b/2023/CVE-2023-3460.json index 7aa5766e5d..2547bc9e54 100644 --- a/2023/CVE-2023-3460.json +++ b/2023/CVE-2023-3460.json @@ -136,10 +136,10 @@ "description": "CVE-2023-3460", "fork": false, "created_at": "2023-07-11T13:44:18Z", - "updated_at": "2023-07-13T12:18:09Z", + "updated_at": "2023-07-13T23:16:56Z", "pushed_at": "2023-07-11T14:02:16Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -148,7 +148,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-35803.json b/2023/CVE-2023-35803.json index 0df3840a3a..f9220969f6 100644 --- a/2023/CVE-2023-35803.json +++ b/2023/CVE-2023-35803.json @@ -13,10 +13,10 @@ "description": "PoC Exploit for CVE-2023-35803 Unauthenticated Buffer Overflow in Aerohive HiveOS\/Extreme Networks IQ Engine", "fork": false, "created_at": "2023-07-10T19:58:22Z", - "updated_at": "2023-07-13T15:08:14Z", + "updated_at": "2023-07-13T23:17:34Z", "pushed_at": "2023-07-12T08:20:38Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-35829.json b/2023/CVE-2023-35829.json deleted file mode 100644 index 73c2ca5d5e..0000000000 --- a/2023/CVE-2023-35829.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 661823194, - "name": "CVE-2023-35829-poc", - "full_name": "apkc\/CVE-2023-35829-poc", - "owner": { - "login": "apkc", - "id": 18083944, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18083944?v=4", - "html_url": "https:\/\/github.com\/apkc" - }, - "html_url": "https:\/\/github.com\/apkc\/CVE-2023-35829-poc", - "description": "CVE-2023-35829 Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers\/staging\/media\/rkvdec\/rkvdec.c. ", - "fork": false, - "created_at": "2023-07-03T18:26:04Z", - "updated_at": "2023-07-13T17:18:21Z", - "pushed_at": "2023-07-03T13:16:22Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 20, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 20, - "watchers": 8, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/README.md b/README.md index 6fc8cb9f7c..55b9e85e88 100644 --- a/README.md +++ b/README.md @@ -974,7 +974,7 @@ - [istern/CVE-2023-26262](https://github.com/istern/CVE-2023-26262) -### CVE-2023-26563 (-) +### CVE-2023-26563 (2023-07-12) The Syncfusion EJ2 Node File Provider 0102271 is vulnerable to filesystem-server.js directory traversal. As a result, an unauthenticated attacker can: - On Windows, list files in any directory, read any file, delete any file, upload any file to any directory accessible by the web server. - On Linux, read any file, download any directory, delete any file, upload any file to any directory accessible by the web server. @@ -1629,14 +1629,14 @@ - [sahiloj/CVE-2023-31703](https://github.com/sahiloj/CVE-2023-31703) -### CVE-2023-31704 (-) +### CVE-2023-31704 (2023-07-13) Sourcecodester Online Computer and Laptop Store 1.0 is vulnerable to Incorrect Access Control, which allows remote attackers to elevate privileges to the administrator's role. - [d34dun1c02n/CVE-2023-31704](https://github.com/d34dun1c02n/CVE-2023-31704) -### CVE-2023-31705 (-) +### CVE-2023-31705 (2023-07-13) A Reflected Cross-site scripting (XSS) vulnerability in Sourcecodester Task Reminder System 1.0 allows an authenticated user to inject malicious javascript into the page parameter. @@ -1900,7 +1900,7 @@ - [c53elyas/CVE-2023-33733](https://github.com/c53elyas/CVE-2023-33733) -### CVE-2023-33768 (-) +### CVE-2023-33768 (2023-07-13) Incorrect signature verification of the firmware during the Device Firmware Update process of Belkin Wemo Smart Plug WSP080 v1.2 allows attackers to cause a Denial of Service (DoS) via a crafted firmware file. @@ -2100,13 +2100,6 @@ ### CVE-2023-35803 - [lachlan2k/CVE-2023-35803](https://github.com/lachlan2k/CVE-2023-35803) -### CVE-2023-35829 (2023-06-18) - -An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c. - - -- [apkc/CVE-2023-35829-poc](https://github.com/apkc/CVE-2023-35829-poc) - ### CVE-2023-35840 (2023-06-18) _joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver connector. @@ -2226,10 +2219,18 @@ - [sahiloj/CVE-2023-37597](https://github.com/sahiloj/CVE-2023-37597) -### CVE-2023-37598 +### CVE-2023-37598 (2023-07-13) + +A Cross Site Request Forgery (CSRF) vulnerability in issabel-pbx v.4.0.0-6 allows a remote attacker to cause a denial of service via the delete new virtual fax function. + + - [sahiloj/CVE-2023-37598](https://github.com/sahiloj/CVE-2023-37598) -### CVE-2023-37599 +### CVE-2023-37599 (2023-07-13) + +An issue in issabel-pbx v.4.0.0-6 allows a remote attacker to obtain sensitive information via the modules directory + + - [sahiloj/CVE-2023-37599](https://github.com/sahiloj/CVE-2023-37599) ### CVE-2023-51504 @@ -7333,7 +7334,11 @@ - [111ddea/Xstream_cve-2022-41966](https://github.com/111ddea/Xstream_cve-2022-41966) -### CVE-2022-42045 +### CVE-2022-42045 (2023-07-13) + +Certain Zemana products are vulnerable to Arbitrary code injection. This affects Watchdog Anti-Malware 4.1.422 and Zemana AntiMalware 3.2.28. + + - [ReCryptLLC/CVE-2022-42045](https://github.com/ReCryptLLC/CVE-2022-42045) ### CVE-2022-42046 (2022-12-20) @@ -23299,7 +23304,6 @@ - [j4k0m/CVE-2018-0114](https://github.com/j4k0m/CVE-2018-0114) - [mmeza-developer/CVE-2018-0114](https://github.com/mmeza-developer/CVE-2018-0114) - [CyberSecurityUP/CVE-2018-0114-Exploit](https://github.com/CyberSecurityUP/CVE-2018-0114-Exploit) -- [amr9k8/jwt-spoof-tool](https://github.com/amr9k8/jwt-spoof-tool) ### CVE-2018-0171 (2018-03-28)