diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 1957b55d4b..a0c166c91d 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -48,7 +48,7 @@ "stargazers_count": 1806, "watchers_count": 1806, "has_discussions": false, - "forks_count": 335, + "forks_count": 336, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -75,7 +75,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 335, + "forks": 336, "watchers": 1806, "score": 0, "subscribers_count": 34 diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index ab947c97b9..786dab0647 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -43,10 +43,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2023-10-14T01:55:01Z", + "updated_at": "2023-10-19T07:34:57Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 330, - "watchers_count": 330, + "stargazers_count": 331, + "watchers_count": 331, "has_discussions": false, "forks_count": 123, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 123, - "watchers": 330, + "watchers": 331, "score": 0, "subscribers_count": 48 } diff --git a/2015/CVE-2015-9235.json b/2015/CVE-2015-9235.json index dfee4b71b8..f036e5d818 100644 --- a/2015/CVE-2015-9235.json +++ b/2015/CVE-2015-9235.json @@ -55,10 +55,10 @@ "description": null, "fork": false, "created_at": "2023-09-10T11:27:23Z", - "updated_at": "2023-09-20T06:29:48Z", + "updated_at": "2023-10-19T09:16:27Z", "pushed_at": "2023-09-18T07:50:03Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -67,7 +67,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 4503a1bed8..3e4e0b2246 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -18,7 +18,7 @@ "stargazers_count": 1806, "watchers_count": 1806, "has_discussions": false, - "forks_count": 335, + "forks_count": 336, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,7 +45,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 335, + "forks": 336, "watchers": 1806, "score": 0, "subscribers_count": 34 diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index ce98ae2dda..43f68140d3 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -43,10 +43,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2023-10-14T01:55:01Z", + "updated_at": "2023-10-19T07:34:57Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 330, - "watchers_count": 330, + "stargazers_count": 331, + "watchers_count": 331, "has_discussions": false, "forks_count": 123, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 123, - "watchers": 330, + "watchers": 331, "score": 0, "subscribers_count": 48 } diff --git a/2016/CVE-2016-3309.json b/2016/CVE-2016-3309.json index 08cb94ea7c..0b8f2200e0 100644 --- a/2016/CVE-2016-3309.json +++ b/2016/CVE-2016-3309.json @@ -13,7 +13,7 @@ "description": "Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques", "fork": false, "created_at": "2017-10-06T07:59:07Z", - "updated_at": "2023-09-27T07:21:32Z", + "updated_at": "2023-10-19T08:13:57Z", "pushed_at": "2017-10-06T09:47:43Z", "stargazers_count": 50, "watchers_count": 50, diff --git a/2016/CVE-2016-4622.json b/2016/CVE-2016-4622.json index 6c33cb6c82..efe753337b 100644 --- a/2016/CVE-2016-4622.json +++ b/2016/CVE-2016-4622.json @@ -13,10 +13,10 @@ "description": "PoC exploit for CVE-2016-4622", "fork": false, "created_at": "2016-10-09T15:22:06Z", - "updated_at": "2023-10-16T06:37:06Z", + "updated_at": "2023-10-19T06:08:46Z", "pushed_at": "2023-09-18T16:58:56Z", - "stargazers_count": 96, - "watchers_count": 96, + "stargazers_count": 97, + "watchers_count": 97, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 40, - "watchers": 96, + "watchers": 97, "score": 0, "subscribers_count": 11 }, diff --git a/2016/CVE-2016-5696.json b/2016/CVE-2016-5696.json index 10fb9b1535..b63b14dbc8 100644 --- a/2016/CVE-2016-5696.json +++ b/2016/CVE-2016-5696.json @@ -59,6 +59,36 @@ "score": 0, "subscribers_count": 7 }, + { + "id": 66317906, + "name": "challack", + "full_name": "jduck\/challack", + "owner": { + "login": "jduck", + "id": 479840, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/479840?v=4", + "html_url": "https:\/\/github.com\/jduck" + }, + "html_url": "https:\/\/github.com\/jduck\/challack", + "description": "Proof-of-concept exploit code for CVE-2016-5696", + "fork": false, + "created_at": "2016-08-23T00:21:18Z", + "updated_at": "2023-09-28T10:35:51Z", + "pushed_at": "2016-08-30T06:32:43Z", + "stargazers_count": 71, + "watchers_count": 71, + "has_discussions": false, + "forks_count": 32, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 32, + "watchers": 71, + "score": 0, + "subscribers_count": 8 + }, { "id": 66661635, "name": "chackd", diff --git a/2017/CVE-2017-1000253.json b/2017/CVE-2017-1000253.json index c01dab9470..d7078530d3 100644 --- a/2017/CVE-2017-1000253.json +++ b/2017/CVE-2017-1000253.json @@ -1,34 +1,4 @@ [ - { - "id": 137769369, - "name": "PIE-Stack-Clash-CVE-2017-1000253", - "full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253", - "owner": { - "login": "RicterZ", - "id": 5282759, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4", - "html_url": "https:\/\/github.com\/RicterZ" - }, - "html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253", - "description": "Demo-ing CVE-2017-1000253 in a container", - "fork": false, - "created_at": "2018-06-18T15:22:01Z", - "updated_at": "2023-06-01T08:36:39Z", - "pushed_at": "2017-11-01T07:59:24Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 5, - "score": 0, - "subscribers_count": 2 - }, { "id": 552591833, "name": "CVE-2017-1000253", diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index fc15bb5079..30ddf04a20 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -149,36 +149,6 @@ "score": 0, "subscribers_count": 4 }, - { - "id": 116099094, - "name": "weblogic_wls_wsat_rce", - "full_name": "cjjduck\/weblogic_wls_wsat_rce", - "owner": { - "login": "cjjduck", - "id": 23519154, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4", - "html_url": "https:\/\/github.com\/cjjduck" - }, - "html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce", - "description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l", - "fork": false, - "created_at": "2018-01-03T06:14:28Z", - "updated_at": "2020-10-09T02:33:00Z", - "pushed_at": "2018-01-03T00:42:57Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 40, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 40, - "watchers": 3, - "score": 0, - "subscribers_count": 0 - }, { "id": 116430643, "name": "CVE-2017-10271", @@ -449,13 +419,13 @@ "stargazers_count": 404, "watchers_count": 404, "has_discussions": false, - "forks_count": 156, + "forks_count": 157, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 156, + "forks": 157, "watchers": 404, "score": 0, "subscribers_count": 9 diff --git a/2017/CVE-2017-16997.json b/2017/CVE-2017-16997.json deleted file mode 100644 index 7f0fc060d6..0000000000 --- a/2017/CVE-2017-16997.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 116118639, - "name": "CVE-2017-16997-poc", - "full_name": "Xiami2012\/CVE-2017-16997-poc", - "owner": { - "login": "Xiami2012", - "id": 1927254, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4", - "html_url": "https:\/\/github.com\/Xiami2012" - }, - "html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc", - "description": "A proof-of-concept for CVE-2017-16997", - "fork": false, - "created_at": "2018-01-03T09:31:55Z", - "updated_at": "2018-01-03T09:33:01Z", - "pushed_at": "2018-01-03T10:39:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 3 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-3881.json b/2017/CVE-2017-3881.json index c3d14dce90..711172089a 100644 --- a/2017/CVE-2017-3881.json +++ b/2017/CVE-2017-3881.json @@ -118,35 +118,5 @@ "watchers": 1, "score": 0, "subscribers_count": 0 - }, - { - "id": 115962692, - "name": "CVE-2017-3881", - "full_name": "1337g\/CVE-2017-3881", - "owner": { - "login": "1337g", - "id": 32504404, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4", - "html_url": "https:\/\/github.com\/1337g" - }, - "html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881", - "description": "credit to artkond", - "fork": false, - "created_at": "2018-01-02T01:45:15Z", - "updated_at": "2022-04-11T12:16:38Z", - "pushed_at": "2018-01-02T01:46:19Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json index 514ad2bf80..8dcf5773b3 100644 --- a/2017/CVE-2017-5753.json +++ b/2017/CVE-2017-5753.json @@ -35,96 +35,6 @@ "score": 0, "subscribers_count": 41 }, - { - "id": 116268310, - "name": "Spectre-PoC", - "full_name": "EdwardOwusuAdjei\/Spectre-PoC", - "owner": { - "login": "EdwardOwusuAdjei", - "id": 16462560, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4", - "html_url": "https:\/\/github.com\/EdwardOwusuAdjei" - }, - "html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC", - "description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.", - "fork": false, - "created_at": "2018-01-04T14:20:13Z", - "updated_at": "2023-09-28T10:47:11Z", - "pushed_at": "2018-01-04T14:27:29Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 5, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 116347505, - "name": "spectre-attack-example", - "full_name": "poilynx\/spectre-attack-example", - "owner": { - "login": "poilynx", - "id": 8926090, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4", - "html_url": "https:\/\/github.com\/poilynx" - }, - "html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example", - "description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用", - "fork": false, - "created_at": "2018-01-05T05:51:34Z", - "updated_at": "2021-02-24T01:25:15Z", - "pushed_at": "2018-01-05T05:56:02Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 11, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 116442461, - "name": "spectre-attack-demo", - "full_name": "pedrolucasoliva\/spectre-attack-demo", - "owner": { - "login": "pedrolucasoliva", - "id": 10757421, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4", - "html_url": "https:\/\/github.com\/pedrolucasoliva" - }, - "html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo", - "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", - "fork": false, - "created_at": "2018-01-06T01:08:15Z", - "updated_at": "2018-01-15T06:12:51Z", - "pushed_at": "2018-01-06T01:09:56Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 116505944, "name": "spectreScope", diff --git a/2017/CVE-2017-5754.json b/2017/CVE-2017-5754.json index fd4f7be03b..5c25454cac 100644 --- a/2017/CVE-2017-5754.json +++ b/2017/CVE-2017-5754.json @@ -119,36 +119,6 @@ "score": 0, "subscribers_count": 17 }, - { - "id": 116449314, - "name": "Am-I-affected-by-Meltdown", - "full_name": "speecyy\/Am-I-affected-by-Meltdown", - "owner": { - "login": "speecyy", - "id": 35145287, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4", - "html_url": "https:\/\/github.com\/speecyy" - }, - "html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown", - "description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ", - "fork": false, - "created_at": "2018-01-06T03:16:33Z", - "updated_at": "2020-02-27T19:31:43Z", - "pushed_at": "2018-01-06T03:17:22Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 118008705, "name": "Meltdown", diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index 29d7a4c8c3..0c90d3a0d5 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -394,36 +394,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 201442014, - "name": "CVE-2017-7269", - "full_name": "ThanHuuTuan\/CVE-2017-7269", - "owner": { - "login": "ThanHuuTuan", - "id": 32167814, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4", - "html_url": "https:\/\/github.com\/ThanHuuTuan" - }, - "html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269", - "description": null, - "fork": false, - "created_at": "2019-08-09T10:01:50Z", - "updated_at": "2019-08-09T10:01:53Z", - "pushed_at": "2017-04-04T17:20:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, { "id": 386542444, "name": "CVE-2017-7269", diff --git a/2017/CVE-2017-9097.json b/2017/CVE-2017-9097.json deleted file mode 100644 index 1e1a04bf0f..0000000000 --- a/2017/CVE-2017-9097.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 116008243, - "name": "AntiWeb_testing-Suite", - "full_name": "MDudek-ICS\/AntiWeb_testing-Suite", - "owner": { - "login": "MDudek-ICS", - "id": 31083304, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4", - "html_url": "https:\/\/github.com\/MDudek-ICS" - }, - "html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite", - "description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)", - "fork": false, - "created_at": "2018-01-02T11:28:40Z", - "updated_at": "2023-09-28T10:47:07Z", - "pushed_at": "2017-11-21T20:19:08Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 11, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 11, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8440.json b/2018/CVE-2018-8440.json index 90e3e0b934..417f3aca37 100644 --- a/2018/CVE-2018-8440.json +++ b/2018/CVE-2018-8440.json @@ -13,10 +13,10 @@ "description": "CVE-2018-8440 standalone exploit", "fork": false, "created_at": "2018-10-31T17:00:43Z", - "updated_at": "2023-09-28T10:55:20Z", + "updated_at": "2023-10-19T06:40:46Z", "pushed_at": "2018-10-31T19:05:17Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 80, + "watchers_count": 80, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 79, + "watchers": 80, "score": 0, "subscribers_count": 6 } diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json index c1e004d187..2c1806d1fb 100644 --- a/2019/CVE-2019-11358.json +++ b/2019/CVE-2019-11358.json @@ -128,13 +128,13 @@ "stargazers_count": 77, "watchers_count": 77, "has_discussions": false, - "forks_count": 48, + "forks_count": 49, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 48, + "forks": 49, "watchers": 77, "score": 0, "subscribers_count": 12 diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 0f84ab6d0f..5e8f724c26 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -18,13 +18,13 @@ "stargazers_count": 404, "watchers_count": 404, "has_discussions": false, - "forks_count": 156, + "forks_count": 157, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 156, + "forks": 157, "watchers": 404, "score": 0, "subscribers_count": 9 diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index 34540cddcc..ad764740d8 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -599,7 +599,7 @@ "description": "CVE-2020-0601: Windows CryptoAPI Vulnerability. (CurveBall\/ChainOfFools)", "fork": false, "created_at": "2020-01-23T18:26:48Z", - "updated_at": "2023-09-28T11:10:26Z", + "updated_at": "2023-10-19T12:00:03Z", "pushed_at": "2023-05-30T20:05:31Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 03df911e46..9878cb3fc6 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -108,10 +108,10 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2023-10-18T08:40:06Z", + "updated_at": "2023-10-19T07:38:26Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 530, - "watchers_count": 530, + "stargazers_count": 531, + "watchers_count": 531, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -120,7 +120,7 @@ "topics": [], "visibility": "public", "forks": 66, - "watchers": 530, + "watchers": 531, "score": 0, "subscribers_count": 9 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index a543b5b65f..81eeab3484 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -172,10 +172,10 @@ "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-07-01T09:47:13Z", - "updated_at": "2023-09-28T11:29:09Z", + "updated_at": "2023-10-19T10:27:30Z", "pushed_at": "2021-07-05T06:46:12Z", - "stargazers_count": 333, - "watchers_count": 333, + "stargazers_count": 334, + "watchers_count": 334, "has_discussions": false, "forks_count": 79, "allow_forking": true, @@ -193,7 +193,7 @@ ], "visibility": "public", "forks": 79, - "watchers": 333, + "watchers": 334, "score": 0, "subscribers_count": 14 }, diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 0218fd689a..50ea1a9e81 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -133,10 +133,10 @@ "description": "CVE-2021-1732 poc & exp; tested on 20H2", "fork": false, "created_at": "2021-04-23T08:21:54Z", - "updated_at": "2023-09-28T11:27:05Z", + "updated_at": "2023-10-19T10:06:25Z", "pushed_at": "2021-04-23T08:28:53Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 66, + "watchers": 67, "score": 0, "subscribers_count": 6 }, diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index b988dda709..d082b0899b 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -13,10 +13,10 @@ "description": "Exploit to SYSTEM for CVE-2021-21551", "fork": false, "created_at": "2021-05-13T13:23:38Z", - "updated_at": "2023-09-28T11:27:38Z", + "updated_at": "2023-10-19T07:42:54Z", "pushed_at": "2021-05-20T20:33:09Z", - "stargazers_count": 238, - "watchers_count": 238, + "stargazers_count": 239, + "watchers_count": 239, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 238, + "watchers": 239, "score": 0, "subscribers_count": 10 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 53439129d3..467b1c99b3 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-10-17T07:16:46Z", + "updated_at": "2023-10-19T08:31:00Z", "pushed_at": "2023-10-10T05:38:02Z", - "stargazers_count": 1121, - "watchers_count": 1121, + "stargazers_count": 1122, + "watchers_count": 1122, "has_discussions": false, "forks_count": 144, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 144, - "watchers": 1121, + "watchers": 1122, "score": 0, "subscribers_count": 11 } diff --git a/2021/CVE-2021-25741.json b/2021/CVE-2021-25741.json index dba994de3d..cb16c9f5d3 100644 --- a/2021/CVE-2021-25741.json +++ b/2021/CVE-2021-25741.json @@ -28,5 +28,35 @@ "watchers": 28, "score": 0, "subscribers_count": 1 + }, + { + "id": 707080239, + "name": "CVE-2021-25741", + "full_name": "cdxiaodong\/CVE-2021-25741", + "owner": { + "login": "cdxiaodong", + "id": 84082748, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84082748?v=4", + "html_url": "https:\/\/github.com\/cdxiaodong" + }, + "html_url": "https:\/\/github.com\/cdxiaodong\/CVE-2021-25741", + "description": "fork on Betep0k\/CVE-2021-25741\/fork whose images is useless and test on metarget", + "fork": false, + "created_at": "2023-10-19T07:26:11Z", + "updated_at": "2023-10-19T07:31:06Z", + "pushed_at": "2023-10-19T07:35:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-39165.json b/2021/CVE-2021-39165.json index 7c95f8f994..6488b1b6f9 100644 --- a/2021/CVE-2021-39165.json +++ b/2021/CVE-2021-39165.json @@ -48,7 +48,7 @@ "fork": false, "created_at": "2023-09-20T22:19:55Z", "updated_at": "2023-09-20T22:25:16Z", - "pushed_at": "2023-09-20T22:26:08Z", + "pushed_at": "2023-10-19T09:55:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 2dd8770a26..6474945539 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2021-10-16T16:17:44Z", - "updated_at": "2023-10-18T20:28:39Z", + "updated_at": "2023-10-19T08:28:33Z", "pushed_at": "2021-11-11T17:09:56Z", - "stargazers_count": 452, - "watchers_count": 452, + "stargazers_count": 454, + "watchers_count": 454, "has_discussions": false, "forks_count": 95, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 95, - "watchers": 452, + "watchers": 454, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-41277.json b/2021/CVE-2021-41277.json index abca78b591..a37cb02d02 100644 --- a/2021/CVE-2021-41277.json +++ b/2021/CVE-2021-41277.json @@ -385,7 +385,7 @@ "fork": false, "created_at": "2023-04-24T16:34:13Z", "updated_at": "2023-09-13T09:44:36Z", - "pushed_at": "2023-04-24T20:43:45Z", + "pushed_at": "2023-10-19T10:55:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 79a7233cbb..3af53d6eb4 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2023-10-18T17:56:01Z", + "updated_at": "2023-10-19T08:03:06Z", "pushed_at": "2022-07-10T22:23:13Z", - "stargazers_count": 932, - "watchers_count": 932, + "stargazers_count": 933, + "watchers_count": 933, "has_discussions": false, "forks_count": 190, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 932, + "watchers": 933, "score": 0, "subscribers_count": 25 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 2ec08c03fb..071e375b73 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,10 +13,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2023-10-18T10:50:52Z", + "updated_at": "2023-10-19T07:59:41Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1262, - "watchers_count": 1262, + "stargazers_count": 1263, + "watchers_count": 1263, "has_discussions": false, "forks_count": 318, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 318, - "watchers": 1262, + "watchers": 1263, "score": 0, "subscribers_count": 27 }, diff --git a/2022/CVE-2022-20130.json b/2022/CVE-2022-20130.json deleted file mode 100644 index 4370c012dd..0000000000 --- a/2022/CVE-2022-20130.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 509461641, - "name": "external_aac_AOSP10_r33_CVE-2022-20130", - "full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130", - "owner": { - "login": "Satheesh575555", - "id": 102573923, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", - "html_url": "https:\/\/github.com\/Satheesh575555" - }, - "html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130", - "description": null, - "fork": false, - "created_at": "2022-07-01T13:16:14Z", - "updated_at": "2022-07-01T13:25:04Z", - "pushed_at": "2022-07-01T13:25:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json index b8c0801bf1..6ab11ed024 100644 --- a/2022/CVE-2022-20421.json +++ b/2022/CVE-2022-20421.json @@ -13,10 +13,10 @@ "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)", "fork": false, "created_at": "2023-03-23T10:25:59Z", - "updated_at": "2023-10-17T15:49:16Z", + "updated_at": "2023-10-19T09:12:09Z", "pushed_at": "2023-05-27T15:39:41Z", - "stargazers_count": 194, - "watchers_count": 194, + "stargazers_count": 195, + "watchers_count": 195, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 194, + "watchers": 195, "score": 0, "subscribers_count": 6 } diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index f55ebc211c..92cdc00693 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2023-10-12T16:36:57Z", + "updated_at": "2023-10-19T06:52:53Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 733, - "watchers_count": 733, + "stargazers_count": 734, + "watchers_count": 734, "has_discussions": false, "forks_count": 155, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 155, - "watchers": 733, + "watchers": 734, "score": 0, "subscribers_count": 16 } diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 6b0ce0e9ba..f7ac6f114f 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -692,66 +692,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 524471767, - "name": "CVE-2022-22954", - "full_name": "amit-pathak009\/CVE-2022-22954", - "owner": { - "login": "amit-pathak009", - "id": 72250138, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", - "html_url": "https:\/\/github.com\/amit-pathak009" - }, - "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954", - "description": null, - "fork": false, - "created_at": "2022-08-13T18:00:04Z", - "updated_at": "2022-06-02T01:44:19Z", - "pushed_at": "2022-06-02T01:44:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 524471940, - "name": "CVE-2022-22954-PoC", - "full_name": "amit-pathak009\/CVE-2022-22954-PoC", - "owner": { - "login": "amit-pathak009", - "id": 72250138, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", - "html_url": "https:\/\/github.com\/amit-pathak009" - }, - "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC", - "description": null, - "fork": false, - "created_at": "2022-08-13T18:00:39Z", - "updated_at": "2022-06-01T22:41:09Z", - "pushed_at": "2022-06-01T22:41:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, { "id": 545257457, "name": "VcenterKiller", @@ -766,10 +706,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-10-17T07:16:46Z", + "updated_at": "2023-10-19T08:31:00Z", "pushed_at": "2023-10-10T05:38:02Z", - "stargazers_count": 1121, - "watchers_count": 1121, + "stargazers_count": 1122, + "watchers_count": 1122, "has_discussions": false, "forks_count": 144, "allow_forking": true, @@ -785,7 +725,7 @@ ], "visibility": "public", "forks": 144, - "watchers": 1121, + "watchers": 1122, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index e1ae34e7e6..c9d403378a 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -87,10 +87,10 @@ "description": "Spring4Shell - Spring Core RCE - CVE-2022-22965", "fork": false, "created_at": "2022-03-30T17:05:46Z", - "updated_at": "2023-09-28T11:37:32Z", + "updated_at": "2023-10-19T10:34:13Z", "pushed_at": "2022-04-04T14:09:11Z", - "stargazers_count": 124, - "watchers_count": 124, + "stargazers_count": 125, + "watchers_count": 125, "has_discussions": false, "forks_count": 86, "allow_forking": true, @@ -110,7 +110,7 @@ ], "visibility": "public", "forks": 86, - "watchers": 124, + "watchers": 125, "score": 0, "subscribers_count": 5 }, diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 6ba7b996bc..bd8ae7c898 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -572,66 +572,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 524474931, - "name": "CVE-2022-29464", - "full_name": "amit-pathak009\/CVE-2022-29464", - "owner": { - "login": "amit-pathak009", - "id": 72250138, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", - "html_url": "https:\/\/github.com\/amit-pathak009" - }, - "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464", - "description": null, - "fork": false, - "created_at": "2022-08-13T18:14:43Z", - "updated_at": "2022-05-19T21:24:13Z", - "pushed_at": "2022-05-19T21:24:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, - { - "id": 524475053, - "name": "CVE-2022-29464-mass", - "full_name": "amit-pathak009\/CVE-2022-29464-mass", - "owner": { - "login": "amit-pathak009", - "id": 72250138, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", - "html_url": "https:\/\/github.com\/amit-pathak009" - }, - "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass", - "description": null, - "fork": false, - "created_at": "2022-08-13T18:15:18Z", - "updated_at": "2023-09-28T11:41:52Z", - "pushed_at": "2022-05-29T19:16:06Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0, - "subscribers_count": 0 - }, { "id": 540011346, "name": "CVE-2022-29464", diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 64b8cc2bdd..29c69e2d3e 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,10 +13,10 @@ "description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2023-10-15T04:21:40Z", + "updated_at": "2023-10-19T09:54:53Z", "pushed_at": "2023-10-14T08:02:40Z", - "stargazers_count": 104, - "watchers_count": 104, + "stargazers_count": 105, + "watchers_count": 105, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 17, - "watchers": 104, + "watchers": 105, "score": 0, "subscribers_count": 4 } diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index a11c671dbb..7cdad05293 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -13,10 +13,10 @@ "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator", "fork": false, "created_at": "2023-02-02T15:34:28Z", - "updated_at": "2023-10-10T12:02:36Z", + "updated_at": "2023-10-19T08:38:17Z", "pushed_at": "2023-02-02T16:53:37Z", - "stargazers_count": 261, - "watchers_count": 261, + "stargazers_count": 262, + "watchers_count": 262, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 261, + "watchers": 262, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-0255.json b/2023/CVE-2023-0255.json deleted file mode 100644 index fa997e9cea..0000000000 --- a/2023/CVE-2023-0255.json +++ /dev/null @@ -1,40 +0,0 @@ -[ - { - "id": 693902562, - "name": "CVE-2023-0255-PoC", - "full_name": "codeb0ss\/CVE-2023-0255-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-0255-PoC", - "description": "Mass Exploit - CVE-2023-0255 < WordPress < Enable Media+Plugin < Unauthenticated Arbitrary File Upload \/ Webshell Upload", - "fork": false, - "created_at": "2023-09-20T00:17:57Z", - "updated_at": "2023-10-09T21:27:28Z", - "pushed_at": "2023-09-25T17:08:11Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "codeboss", - "cve-2023-0225-exp", - "cve-2023-0225-exploit", - "cve-2023-0225-poc", - "exploit", - "wordpress" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json index 1586c952bf..2311dd371e 100644 --- a/2023/CVE-2023-0386.json +++ b/2023/CVE-2023-0386.json @@ -73,10 +73,10 @@ "description": "CVE-2023-0386在ubuntu22.04上的提权", "fork": false, "created_at": "2023-05-05T03:02:13Z", - "updated_at": "2023-10-18T16:38:16Z", + "updated_at": "2023-10-19T07:57:05Z", "pushed_at": "2023-06-13T08:58:53Z", - "stargazers_count": 362, - "watchers_count": 362, + "stargazers_count": 363, + "watchers_count": 363, "has_discussions": false, "forks_count": 65, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 65, - "watchers": 362, + "watchers": 363, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-1112.json b/2023/CVE-2023-1112.json index 05646e1b82..5d26771fef 100644 --- a/2023/CVE-2023-1112.json +++ b/2023/CVE-2023-1112.json @@ -28,49 +28,5 @@ "watchers": 23, "score": 0, "subscribers_count": 1 - }, - { - "id": 673139589, - "name": "CVE-2023-1112-EXP", - "full_name": "codeb0ss\/CVE-2023-1112-EXP", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-1112-EXP", - "description": "CVE-2023-1112 Auto Exploiter", - "fork": false, - "created_at": "2023-08-01T01:02:12Z", - "updated_at": "2023-10-09T21:34:00Z", - "pushed_at": "2023-08-01T01:09:38Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "codeboss", - "cve", - "cve-2023", - "cve-2023-1112", - "cve-2023-1112-exp", - "cve-2023-1112-exploiter", - "cve-2023-1112-wp", - "exploit", - "uncodeboss", - "wordpress", - "wordpress0day", - "wordpressexploit" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-1273.json b/2023/CVE-2023-1273.json deleted file mode 100644 index fd6312fa17..0000000000 --- a/2023/CVE-2023-1273.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 690304009, - "name": "CVE-2023-1273-PoC", - "full_name": "codeb0ss\/CVE-2023-1273-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-1273-PoC", - "description": "Mass Exploit - CVE-2023-1273 \/ ND Shortcodes < LFI", - "fork": false, - "created_at": "2023-09-12T00:10:58Z", - "updated_at": "2023-10-09T21:29:10Z", - "pushed_at": "2023-09-12T00:15:45Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-1698.json b/2023/CVE-2023-1698.json deleted file mode 100644 index 02cdaee03c..0000000000 --- a/2023/CVE-2023-1698.json +++ /dev/null @@ -1,45 +0,0 @@ -[ - { - "id": 689493802, - "name": "CVE-2023-1698-PoC", - "full_name": "codeb0ss\/CVE-2023-1698-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-1698-PoC", - "description": "Mass Exploit - CVE-2023-1698 < Unauthenticated Remote Command Execution", - "fork": false, - "created_at": "2023-09-10T01:29:48Z", - "updated_at": "2023-10-09T21:30:00Z", - "pushed_at": "2023-09-10T01:36:35Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "codeboss", - "cve", - "cve-2023-1698", - "cve-2023-1698-exp", - "cve-2023-1698-exploit", - "cve-2023-1698-poc", - "cve-2023-1698-rce", - "hackerone", - "rce", - "rce-exploit", - "remote-code-execution" - ], - "visibility": "public", - "forks": 3, - "watchers": 11, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-20073.json b/2023/CVE-2023-20073.json index e7b6af8e12..4d51d3aca4 100644 --- a/2023/CVE-2023-20073.json +++ b/2023/CVE-2023-20073.json @@ -28,50 +28,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 680672954, - "name": "CVE-2023-20073-", - "full_name": "codeb0ss\/CVE-2023-20073-", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-20073-", - "description": "Mass Exploit - CVE-2023-20073 - Cisco VPN Routers - [Unauthenticated Arbitrary File Upload and Stored XSS]", - "fork": false, - "created_at": "2023-08-20T02:45:50Z", - "updated_at": "2023-10-09T21:32:51Z", - "pushed_at": "2023-08-20T02:53:56Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "bug", - "bugbounty", - "cisco", - "codeb0ss", - "codeboss", - "cve", - "cve-2023-20073", - "exploit", - "hackerone", - "mass", - "mass-exploit", - "uncodeboss", - "vpn-router" - ], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-20178.json b/2023/CVE-2023-20178.json index d7c7b6c85f..f4c846783f 100644 --- a/2023/CVE-2023-20178.json +++ b/2023/CVE-2023-20178.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-18T12:22:57Z", - "updated_at": "2023-10-03T17:56:37Z", + "updated_at": "2023-10-19T12:57:32Z", "pushed_at": "2023-06-18T12:41:52Z", - "stargazers_count": 88, - "watchers_count": 88, + "stargazers_count": 89, + "watchers_count": 89, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 88, + "watchers": 89, "score": 0, "subscribers_count": 6 } diff --git a/2023/CVE-2023-20198.json b/2023/CVE-2023-20198.json index 643bb16561..d92a1fafbc 100644 --- a/2023/CVE-2023-20198.json +++ b/2023/CVE-2023-20198.json @@ -43,19 +43,19 @@ "description": "CVE-2023-20198 Checkscript", "fork": false, "created_at": "2023-10-17T08:00:18Z", - "updated_at": "2023-10-19T06:18:22Z", + "updated_at": "2023-10-19T11:16:58Z", "pushed_at": "2023-10-17T11:28:05Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 11, + "forks": 6, + "watchers": 13, "score": 0, "subscribers_count": 0 }, @@ -73,10 +73,10 @@ "description": "cisco-CVE-2023-20198-tester ", "fork": false, "created_at": "2023-10-17T15:44:01Z", - "updated_at": "2023-10-17T15:51:02Z", + "updated_at": "2023-10-19T10:01:05Z", "pushed_at": "2023-10-17T15:50:59Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 }, @@ -133,10 +133,10 @@ "description": "CVE-2023-20198 & 0Day Implant Scanner", "fork": false, "created_at": "2023-10-17T22:41:14Z", - "updated_at": "2023-10-19T01:23:49Z", + "updated_at": "2023-10-19T12:12:02Z", "pushed_at": "2023-10-17T23:10:02Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 1 }, @@ -258,13 +258,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 0 @@ -332,35 +332,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 706827261, - "name": "CVE-2023-20198", - "full_name": "exp166\/CVE-2023-20198", - "owner": { - "login": "exp166", - "id": 148376716, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148376716?v=4", - "html_url": "https:\/\/github.com\/exp166" - }, - "html_url": "https:\/\/github.com\/exp166\/CVE-2023-20198", - "description": "Cisco IOS XE exploit CVE-2023-20198 ", - "fork": false, - "created_at": "2023-10-18T17:36:04Z", - "updated_at": "2023-10-18T17:36:04Z", - "pushed_at": "2023-10-18T17:38:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-2023.json b/2023/CVE-2023-2023.json index 05ad029704..fdab01cc34 100644 --- a/2023/CVE-2023-2023.json +++ b/2023/CVE-2023-2023.json @@ -13,19 +13,19 @@ "description": "CVE-2023-2023", "fork": false, "created_at": "2021-11-22T12:57:22Z", - "updated_at": "2023-10-19T03:03:38Z", + "updated_at": "2023-10-19T08:43:31Z", "pushed_at": "2023-10-15T12:09:05Z", - "stargazers_count": 493, - "watchers_count": 493, + "stargazers_count": 494, + "watchers_count": 494, "has_discussions": false, - "forks_count": 189, + "forks_count": 190, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 189, - "watchers": 493, + "forks": 190, + "watchers": 494, "score": 0, "subscribers_count": 17 }, diff --git a/2023/CVE-2023-21971.json b/2023/CVE-2023-21971.json index 427ac959b6..81363f2b42 100644 --- a/2023/CVE-2023-21971.json +++ b/2023/CVE-2023-21971.json @@ -13,10 +13,10 @@ "description": "CVE-2023-21971 Connector\/J RCE Analysis分析", "fork": false, "created_at": "2023-06-08T03:05:54Z", - "updated_at": "2023-07-26T07:52:50Z", + "updated_at": "2023-10-19T08:06:25Z", "pushed_at": "2023-06-08T03:06:22Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 165c0853c8..b59c203ec7 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -73,10 +73,10 @@ "description": "CVE-2023-22515: Confluence Broken Access Control Exploit", "fork": false, "created_at": "2023-10-10T21:40:09Z", - "updated_at": "2023-10-19T04:12:45Z", + "updated_at": "2023-10-19T09:43:25Z", "pushed_at": "2023-10-17T22:04:13Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 65, + "watchers_count": 65, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -94,7 +94,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 64, + "watchers": 65, "score": 0, "subscribers_count": 1 }, @@ -112,10 +112,10 @@ "description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具", "fork": false, "created_at": "2023-10-11T08:42:17Z", - "updated_at": "2023-10-18T08:42:44Z", + "updated_at": "2023-10-19T08:23:47Z", "pushed_at": "2023-10-16T02:24:02Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -124,7 +124,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 69, + "watchers": 70, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-2333.json b/2023/CVE-2023-2333.json deleted file mode 100644 index 894b22acd3..0000000000 --- a/2023/CVE-2023-2333.json +++ /dev/null @@ -1,40 +0,0 @@ -[ - { - "id": 673576455, - "name": "CVE-2023-2333-EXP", - "full_name": "codeb0ss\/CVE-2023-2333-EXP", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-2333-EXP", - "description": "CVE-2023-2333-EXP", - "fork": false, - "created_at": "2023-08-02T00:36:27Z", - "updated_at": "2023-08-02T00:40:01Z", - "pushed_at": "2023-08-02T00:39:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "codeb0ss", - "codeboss", - "cve", - "cve-2023", - "kurdistan", - "uncodeboss" - ], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-24488.json b/2023/CVE-2023-24488.json index f6b6f93c33..084c23c14e 100644 --- a/2023/CVE-2023-24488.json +++ b/2023/CVE-2023-24488.json @@ -89,36 +89,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 662853030, - "name": "cve-2023-24488", - "full_name": "codeb0ss\/cve-2023-24488", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/cve-2023-24488", - "description": "CVE-2023-24488 By codeb0ss", - "fork": false, - "created_at": "2023-07-06T03:07:09Z", - "updated_at": "2023-10-09T21:34:33Z", - "pushed_at": "2023-07-06T03:07:28Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 2 - }, { "id": 663114176, "name": "CVE-2023-24488-SIEM-Sigma-Rule", diff --git a/2023/CVE-2023-24489.json b/2023/CVE-2023-24489.json index 12125da12b..06b94177ff 100644 --- a/2023/CVE-2023-24489.json +++ b/2023/CVE-2023-24489.json @@ -29,48 +29,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 670873412, - "name": "CVE-2023-24489-PoC", - "full_name": "codeb0ss\/CVE-2023-24489-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-24489-PoC", - "description": "CVE-2023-24489 PoC & Exploiter", - "fork": false, - "created_at": "2023-07-26T03:19:20Z", - "updated_at": "2023-10-09T21:34:16Z", - "pushed_at": "2023-07-26T03:24:22Z", - "stargazers_count": 18, - "watchers_count": 18, - "has_discussions": false, - "forks_count": 11, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "citrix-rce", - "cve", - "cve-2023", - "cve-2023-24489", - "cve-2023-24489-poc", - "cve-2023-24489-rce", - "kurdish", - "kurdistan", - "rce", - "remote", - "remote-code-execution" - ], - "visibility": "public", - "forks": 11, - "watchers": 18, - "score": 0, - "subscribers_count": 1 - }, { "id": 683690698, "name": "CVE-2023-24489-poc", diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index e901ee1cca..1c4a675553 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -138,13 +138,13 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-25573.json b/2023/CVE-2023-25573.json deleted file mode 100644 index 653ca90b3e..0000000000 --- a/2023/CVE-2023-25573.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 700120350, - "name": "CVE-2023-25573-PoC", - "full_name": "codeb0ss\/CVE-2023-25573-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-25573-PoC", - "description": "CVE-2023-25573 - Metersphere < Arbitrary File Read", - "fork": false, - "created_at": "2023-10-04T01:33:30Z", - "updated_at": "2023-10-04T01:34:47Z", - "pushed_at": "2023-10-04T01:36:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-27034.json b/2023/CVE-2023-27034.json deleted file mode 100644 index 4ff804bfb6..0000000000 --- a/2023/CVE-2023-27034.json +++ /dev/null @@ -1,47 +0,0 @@ -[ - { - "id": 687302632, - "name": "CVE-2023-27034-Exploit", - "full_name": "codeb0ss\/CVE-2023-27034-Exploit", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-27034-Exploit", - "description": "Mass Exploit - CVE-2023-27034", - "fork": false, - "created_at": "2023-09-05T04:43:06Z", - "updated_at": "2023-10-09T21:30:30Z", - "pushed_at": "2023-09-05T04:45:32Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "2023-poc", - "codeb0ss", - "codeboss", - "codeboss-team", - "cve", - "cve-2023", - "cve-2023-27034", - "cve-2023-27034-exp", - "cve-2023-27034-exploit", - "cve-2023-27034-poc", - "cve-poc", - "cves", - "hackerone", - "prestashop" - ], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-29343.json b/2023/CVE-2023-29343.json index f6f8af2c36..46551c673f 100644 --- a/2023/CVE-2023-29343.json +++ b/2023/CVE-2023-29343.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-18T11:14:08Z", - "updated_at": "2023-08-30T07:41:48Z", + "updated_at": "2023-10-19T06:48:36Z", "pushed_at": "2023-06-18T11:51:54Z", - "stargazers_count": 160, - "watchers_count": 160, + "stargazers_count": 161, + "watchers_count": 161, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 160, + "watchers": 161, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-33733.json b/2023/CVE-2023-33733.json index 4149f9c0ed..29ec5ae984 100644 --- a/2023/CVE-2023-33733.json +++ b/2023/CVE-2023-33733.json @@ -13,10 +13,10 @@ "description": "CVE-2023-33733 reportlab RCE", "fork": false, "created_at": "2023-05-30T22:22:50Z", - "updated_at": "2023-10-19T03:21:13Z", + "updated_at": "2023-10-19T09:20:23Z", "pushed_at": "2023-09-05T15:49:14Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 72, + "watchers_count": 72, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 70, + "watchers": 72, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-33831.json b/2023/CVE-2023-33831.json index 088db8b4ce..f912356274 100644 --- a/2023/CVE-2023-33831.json +++ b/2023/CVE-2023-33831.json @@ -28,47 +28,5 @@ "watchers": 7, "score": 0, "subscribers_count": 2 - }, - { - "id": 700114927, - "name": "CVE-2023-33831-PoC", - "full_name": "codeb0ss\/CVE-2023-33831-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-33831-PoC", - "description": "CVE-2023-33831 - FUXA < Unauthenticated Remote Code Execution [RCE]", - "fork": false, - "created_at": "2023-10-04T01:12:10Z", - "updated_at": "2023-10-09T21:27:48Z", - "pushed_at": "2023-10-04T01:15:12Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "codeb0ss", - "codeboss", - "cve-2023-33831", - "cve-2023-33831-exp", - "cve-2023-33831-exploit", - "cve-2023-33831-poc", - "cve-2023-33831-website", - "exploiter", - "fuxa", - "fuxa-exploit" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-34747.json b/2023/CVE-2023-34747.json deleted file mode 100644 index 66cac7a140..0000000000 --- a/2023/CVE-2023-34747.json +++ /dev/null @@ -1,49 +0,0 @@ -[ - { - "id": 687300976, - "name": "CVE-2023-34747-PoC", - "full_name": "codeb0ss\/CVE-2023-34747-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-34747-PoC", - "description": "Mass Exploit - CVE-2023-34747 - Ujcms - Arbitrary File Upload", - "fork": false, - "created_at": "2023-09-05T04:36:42Z", - "updated_at": "2023-10-09T21:30:40Z", - "pushed_at": "2023-09-05T04:39:19Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "arbitrary-file-upload", - "codeb0ss", - "codeboss", - "cve-2023", - "cve-2023-34747", - "cve-2023-34747-exp", - "cve-2023-34747-exploit", - "cve-2023-34747-exploiter", - "cve-2023-34747-poc", - "cve-pocs", - "hackerone", - "pocs", - "ujcms", - "ujcms-exploit", - "uncodeboss" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json index cacafd880f..4f9a82dda9 100644 --- a/2023/CVE-2023-36802.json +++ b/2023/CVE-2023-36802.json @@ -13,10 +13,10 @@ "description": "LPE exploit for CVE-2023-36802", "fork": false, "created_at": "2023-10-09T17:32:15Z", - "updated_at": "2023-10-18T02:30:38Z", + "updated_at": "2023-10-19T09:54:52Z", "pushed_at": "2023-10-10T17:44:17Z", - "stargazers_count": 97, - "watchers_count": 97, + "stargazers_count": 98, + "watchers_count": 98, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 97, + "watchers": 98, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-37979.json b/2023/CVE-2023-37979.json index 2f403de635..3cfe529093 100644 --- a/2023/CVE-2023-37979.json +++ b/2023/CVE-2023-37979.json @@ -88,47 +88,5 @@ "watchers": 2, "score": 0, "subscribers_count": 1 - }, - { - "id": 679508296, - "name": "CVE-2023-37979", - "full_name": "codeb0ss\/CVE-2023-37979", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-37979", - "description": "CVE-2023-37979 - WordPress Authenticated XSS in Ninja-forms Plugin + Upload File", - "fork": false, - "created_at": "2023-08-17T02:24:42Z", - "updated_at": "2023-10-09T21:33:44Z", - "pushed_at": "2023-08-17T02:29:28Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "codeb0ss", - "codeboss", - "cve-2023-37979", - "cve-2023-37979-exploit", - "hackerone", - "uncodeboss", - "wordpress", - "wordpress-development", - "wordpress-exploit", - "wordpress-plugin" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-37988.json b/2023/CVE-2023-37988.json deleted file mode 100644 index 343491075a..0000000000 --- a/2023/CVE-2023-37988.json +++ /dev/null @@ -1,43 +0,0 @@ -[ - { - "id": 701909425, - "name": "CVE-2023-37988-PoC", - "full_name": "codeb0ss\/CVE-2023-37988-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-37988-PoC", - "description": "CVE-2023-37988 - Wordpress\/Plugin - Contact Form Generator < Reflected Cross-Site Scripting [RXSS]", - "fork": false, - "created_at": "2023-10-07T23:40:53Z", - "updated_at": "2023-10-13T13:08:35Z", - "pushed_at": "2023-10-07T23:42:47Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "codeboss", - "cve-2023-37988", - "cve-2023-37988-exp", - "cve-2023-37988-exploit", - "cve-2023-37988-poc", - "cve-2023-37988-wp", - "wordpress", - "wordpress-cve-2023-37988", - "wp-exploit" - ], - "visibility": "public", - "forks": 1, - "watchers": 5, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-38146.json b/2023/CVE-2023-38146.json index 27e8a1b294..146504be04 100644 --- a/2023/CVE-2023-38146.json +++ b/2023/CVE-2023-38146.json @@ -13,19 +13,19 @@ "description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")", "fork": false, "created_at": "2023-09-13T04:00:14Z", - "updated_at": "2023-10-15T10:55:26Z", + "updated_at": "2023-10-19T10:44:18Z", "pushed_at": "2023-09-13T04:50:29Z", - "stargazers_count": 149, - "watchers_count": 149, + "stargazers_count": 150, + "watchers_count": 150, "has_discussions": false, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 32, - "watchers": 149, + "forks": 33, + "watchers": 150, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-3836.json b/2023/CVE-2023-3836.json index bd972f0c97..00d5b9d3ca 100644 --- a/2023/CVE-2023-3836.json +++ b/2023/CVE-2023-3836.json @@ -1,46 +1,4 @@ [ - { - "id": 680677641, - "name": "CVE-2023-3836", - "full_name": "codeb0ss\/CVE-2023-3836", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-3836", - "description": null, - "fork": false, - "created_at": "2023-08-20T03:16:31Z", - "updated_at": "2023-10-09T21:32:28Z", - "pushed_at": "2023-08-20T03:20:17Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "bugbounty", - "codeb0ss", - "codeboss", - "cve", - "cve-2023-3836", - "exploit", - "exploiter", - "hackerone", - "uncodeboss", - "webshell" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 685050566, "name": "CVE-2023-3836", diff --git a/2023/CVE-2023-38388.json b/2023/CVE-2023-38388.json deleted file mode 100644 index b7f451baca..0000000000 --- a/2023/CVE-2023-38388.json +++ /dev/null @@ -1,41 +0,0 @@ -[ - { - "id": 683297673, - "name": "CVE-2023-38388", - "full_name": "codeb0ss\/CVE-2023-38388", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-38388", - "description": "Mass Exploit - CVE-2023-38388 < Unauthenticated < Arbitrary File Upload", - "fork": false, - "created_at": "2023-08-26T05:51:06Z", - "updated_at": "2023-10-03T11:44:47Z", - "pushed_at": "2023-08-27T00:41:52Z", - "stargazers_count": 21, - "watchers_count": 21, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "codeboss", - "cve-2023-38388", - "cve-2023-38388-exploit", - "cve-2023-38388-poc", - "kurdish", - "kurdish-hacker", - "wordpress" - ], - "visibility": "public", - "forks": 4, - "watchers": 21, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-38389.json b/2023/CVE-2023-38389.json deleted file mode 100644 index d7f3c482c8..0000000000 --- a/2023/CVE-2023-38389.json +++ /dev/null @@ -1,41 +0,0 @@ -[ - { - "id": 683556466, - "name": "CVE-2023-38389-PoC", - "full_name": "codeb0ss\/CVE-2023-38389-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-38389-PoC", - "description": "CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover", - "fork": false, - "created_at": "2023-08-27T00:30:16Z", - "updated_at": "2023-10-09T21:32:03Z", - "pushed_at": "2023-08-27T00:41:40Z", - "stargazers_count": 26, - "watchers_count": 26, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "cve-2023-38389", - "cve-2023-38389-exp", - "cve-2023-38389-exploit", - "cve-2023-38389-poc", - "uncodeboss", - "wordpress", - "wordpress-exploiut" - ], - "visibility": "public", - "forks": 7, - "watchers": 26, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-38501.json b/2023/CVE-2023-38501.json deleted file mode 100644 index cef3052f19..0000000000 --- a/2023/CVE-2023-38501.json +++ /dev/null @@ -1,39 +0,0 @@ -[ - { - "id": 701146595, - "name": "CVE-2023-38501-Exploit", - "full_name": "codeb0ss\/CVE-2023-38501-Exploit", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-38501-Exploit", - "description": "Mass exploit - CVE-2023-38501 - Copyparty < Cross-Site Scripting [XSS]", - "fork": false, - "created_at": "2023-10-06T02:55:05Z", - "updated_at": "2023-10-09T21:26:31Z", - "pushed_at": "2023-10-06T02:57:07Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "codeboss", - "cve-2023-38501", - "cve-2023-38501-exp", - "cve-2023-38501-exploit", - "cve-2023-38501-poc" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-38545.json b/2023/CVE-2023-38545.json index 8ec7fb95e8..81f6f22617 100644 --- a/2023/CVE-2023-38545.json +++ b/2023/CVE-2023-38545.json @@ -193,19 +193,19 @@ "description": "socks5 heap buffer overflow", "fork": false, "created_at": "2023-10-17T09:03:15Z", - "updated_at": "2023-10-18T18:14:25Z", + "updated_at": "2023-10-19T10:02:27Z", "pushed_at": "2023-10-17T09:04:55Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, - "forks_count": 2, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 8, + "forks": 4, + "watchers": 10, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index 718f193cc7..d8328685f2 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -528,10 +528,10 @@ "description": "CVE-2023-38646 Metabase RCE", "fork": false, "created_at": "2023-10-11T03:18:09Z", - "updated_at": "2023-10-19T03:58:33Z", + "updated_at": "2023-10-19T09:51:06Z", "pushed_at": "2023-10-11T04:06:43Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -545,7 +545,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 2 }, @@ -713,10 +713,10 @@ "description": "Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)", "fork": false, "created_at": "2023-10-15T01:29:37Z", - "updated_at": "2023-10-17T05:09:32Z", + "updated_at": "2023-10-19T12:15:55Z", "pushed_at": "2023-10-15T01:51:31Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -725,7 +725,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index a31253b70b..9a5ca53080 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -43,10 +43,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2023-10-19T06:15:11Z", + "updated_at": "2023-10-19T12:11:18Z", "pushed_at": "2023-09-17T02:17:52Z", - "stargazers_count": 682, - "watchers_count": 682, + "stargazers_count": 683, + "watchers_count": 683, "has_discussions": false, "forks_count": 120, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 120, - "watchers": 682, + "watchers": 683, "score": 0, "subscribers_count": 8 }, diff --git a/2023/CVE-2023-39141.json b/2023/CVE-2023-39141.json deleted file mode 100644 index c102e1a4e2..0000000000 --- a/2023/CVE-2023-39141.json +++ /dev/null @@ -1,46 +0,0 @@ -[ - { - "id": 684867044, - "name": "CVE-2023-39141-PoC", - "full_name": "codeb0ss\/CVE-2023-39141-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-39141-PoC", - "description": "Mass Exploit - CVE-2023-39141 < Aria2 WebUI < Path traversal", - "fork": false, - "created_at": "2023-08-30T02:35:14Z", - "updated_at": "2023-08-30T02:40:05Z", - "pushed_at": "2023-08-30T02:38:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "codeboss", - "cve-2023-39141", - "cve-2023-39141-exp", - "cve-2023-39141-exploit", - "cve-2023-39141-poc", - "exploiter", - "hackerone", - "krd", - "mass-cve-2023-39141", - "mass-cve-2023-39141-exploit", - "mass-cve-2023-39141-poc", - "mass-exploit" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-39143.json b/2023/CVE-2023-39143.json deleted file mode 100644 index a764b17ff2..0000000000 --- a/2023/CVE-2023-39143.json +++ /dev/null @@ -1,41 +0,0 @@ -[ - { - "id": 679516211, - "name": "CVE-2023-39143", - "full_name": "codeb0ss\/CVE-2023-39143", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-39143", - "description": "CVE-2023-39143 < PaperCut < Path Traversal (PT)", - "fork": false, - "created_at": "2023-08-17T02:57:48Z", - "updated_at": "2023-08-17T02:59:36Z", - "pushed_at": "2023-08-17T03:00:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "codeb0ss", - "codeboss", - "cve", - "cve-2023-39143", - "exploiter", - "hackerone", - "papercut" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-41538.json b/2023/CVE-2023-41538.json deleted file mode 100644 index 982e031e3b..0000000000 --- a/2023/CVE-2023-41538.json +++ /dev/null @@ -1,47 +0,0 @@ -[ - { - "id": 687298456, - "name": "CVE-2023-41538-PoC", - "full_name": "codeb0ss\/CVE-2023-41538-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-41538-PoC", - "description": "Mass exploit - CVE-2023-41538 < phpjabbers PHP Forum < Cross Site Scripting (XSS)", - "fork": false, - "created_at": "2023-09-05T04:26:52Z", - "updated_at": "2023-10-09T21:31:01Z", - "pushed_at": "2023-09-05T04:32:35Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "codeb0ss", - "codeboss", - "cve", - "cve-2023", - "cve-2023-41538", - "cve-2023-41538-exp", - "cve-2023-41538-exploit", - "cve-2023-41538-poc", - "cve-poc", - "phpforum", - "phpjabber", - "phpjabbers", - "poc" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-4169.json b/2023/CVE-2023-4169.json index e6e96b32e6..168514a6a8 100644 --- a/2023/CVE-2023-4169.json +++ b/2023/CVE-2023-4169.json @@ -13,10 +13,10 @@ "description": "Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", "fork": false, "created_at": "2023-10-16T05:08:06Z", - "updated_at": "2023-10-19T06:00:34Z", + "updated_at": "2023-10-19T10:39:42Z", "pushed_at": "2023-10-18T12:27:17Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-4174.json b/2023/CVE-2023-4174.json index a89b419ded..df6a7e6731 100644 --- a/2023/CVE-2023-4174.json +++ b/2023/CVE-2023-4174.json @@ -28,43 +28,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 679513184, - "name": "CVE-2023-4174", - "full_name": "codeb0ss\/CVE-2023-4174", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-4174", - "description": "CVE-2023-4174 - mooSocial 3.1.6 - Reflected Cross Site Scripting (XSS)", - "fork": false, - "created_at": "2023-08-17T02:44:49Z", - "updated_at": "2023-10-09T21:33:15Z", - "pushed_at": "2023-08-17T02:47:31Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "codeb0ss", - "codeboss", - "cve-2023-4174", - "cve-2023-4174-exp", - "exploiter", - "uncodeboss" - ], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-41993.json b/2023/CVE-2023-41993.json index bfac098973..8b250821e0 100644 --- a/2023/CVE-2023-41993.json +++ b/2023/CVE-2023-41993.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-10-15T12:14:18Z", - "updated_at": "2023-10-19T06:06:36Z", + "updated_at": "2023-10-19T13:03:22Z", "pushed_at": "2023-10-19T05:45:16Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 121, + "watchers_count": 121, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 114, + "watchers": 121, "score": 0, "subscribers_count": 6 }, diff --git a/2023/CVE-2023-4238.json b/2023/CVE-2023-4238.json deleted file mode 100644 index 47b1346360..0000000000 --- a/2023/CVE-2023-4238.json +++ /dev/null @@ -1,43 +0,0 @@ -[ - { - "id": 690299358, - "name": "CVE-2023-4238-PoC", - "full_name": "codeb0ss\/CVE-2023-4238-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-4238-PoC", - "description": "Mass Exploit - CVE-2023-4238 \/ Wordpress Prevent files\/Access Plugin Upload_Webshell.php", - "fork": false, - "created_at": "2023-09-11T23:53:11Z", - "updated_at": "2023-10-09T21:29:47Z", - "pushed_at": "2023-09-12T00:04:56Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "codeb0ss", - "codeboss", - "cve-2023", - "cve-2023-4238", - "cve-2023-4238-exp", - "cve-2023-4238-poc", - "exploit-shell", - "wordpress", - "wordpress-exploit" - ], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json index 3d3e42d0d2..7b5c8eab76 100644 --- a/2023/CVE-2023-42442.json +++ b/2023/CVE-2023-42442.json @@ -43,10 +43,10 @@ "description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit", "fork": false, "created_at": "2023-10-14T09:35:07Z", - "updated_at": "2023-10-19T06:33:47Z", + "updated_at": "2023-10-19T12:22:32Z", "pushed_at": "2023-10-15T01:28:07Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 59, + "watchers_count": 59, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 56, + "watchers": 59, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-44227.json b/2023/CVE-2023-44227.json deleted file mode 100644 index 392418da1e..0000000000 --- a/2023/CVE-2023-44227.json +++ /dev/null @@ -1,41 +0,0 @@ -[ - { - "id": 706978920, - "name": "CVE-2023-44227-PoC", - "full_name": "codeb0ss\/CVE-2023-44227-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-44227-PoC", - "description": null, - "fork": false, - "created_at": "2023-10-19T01:33:08Z", - "updated_at": "2023-10-19T01:37:25Z", - "pushed_at": "2023-10-19T01:36:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "codeboss", - "cve", - "cve-2023-44227", - "cve-2023-44227-exp", - "cve-2023-44227-exploit", - "cve-2023-44227-poc", - "wordpress" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index b15750fb7f..ccf63a1924 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -13,10 +13,10 @@ "description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487", "fork": false, "created_at": "2023-10-10T14:20:42Z", - "updated_at": "2023-10-19T02:49:56Z", + "updated_at": "2023-10-19T07:07:31Z", "pushed_at": "2023-10-14T16:43:31Z", - "stargazers_count": 155, - "watchers_count": 155, + "stargazers_count": 156, + "watchers_count": 156, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 155, + "watchers": 156, "score": 0, "subscribers_count": 5 }, @@ -141,10 +141,10 @@ "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)", "fork": false, "created_at": "2023-10-13T23:55:32Z", - "updated_at": "2023-10-18T09:41:58Z", + "updated_at": "2023-10-19T12:16:47Z", "pushed_at": "2023-10-16T23:36:45Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -153,7 +153,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 13, + "watchers": 14, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45603.json b/2023/CVE-2023-45603.json deleted file mode 100644 index 9228a5d8b6..0000000000 --- a/2023/CVE-2023-45603.json +++ /dev/null @@ -1,43 +0,0 @@ -[ - { - "id": 705092876, - "name": "CVE-2023-45603-PoC", - "full_name": "codeb0ss\/CVE-2023-45603-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-45603-PoC", - "description": "Mass Exploit - CVE-2023-45603 - Wordpress\/plugin\/user-submitted-posts < Unauthenticated Arbitrary File Upload\/Exploit ", - "fork": false, - "created_at": "2023-10-15T01:57:25Z", - "updated_at": "2023-10-17T21:03:21Z", - "pushed_at": "2023-10-15T02:16:29Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "codeb0ss", - "codeboss", - "cve-2023-45603", - "cve-2023-45603-exp", - "cve-2023-45603-exploit", - "cve-2023-45603-poc", - "cve-2023-45603-wp", - "kurd", - "wordpress", - "wordpress-plugin" - ], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-45857.json b/2023/CVE-2023-45857.json index 1293c9d34d..147996cfe9 100644 --- a/2023/CVE-2023-45857.json +++ b/2023/CVE-2023-45857.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-10-18T12:19:34Z", "updated_at": "2023-10-18T19:25:42Z", - "pushed_at": "2023-10-18T19:25:38Z", + "pushed_at": "2023-10-19T07:11:42Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2017/CVE-2017-17692.json b/2023/CVE-2023-46003.json similarity index 50% rename from 2017/CVE-2017-17692.json rename to 2023/CVE-2023-46003.json index e9108d9cc0..8b537560b4 100644 --- a/2017/CVE-2017-17692.json +++ b/2023/CVE-2023-46003.json @@ -1,20 +1,20 @@ [ { - "id": 116205741, - "name": "CVE-2017-17692", - "full_name": "specloli\/CVE-2017-17692", + "id": 707100656, + "name": "CVE-2023-46003", + "full_name": "leekenghwa\/CVE-2023-46003", "owner": { - "login": "specloli", - "id": 10647366, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4", - "html_url": "https:\/\/github.com\/specloli" + "login": "leekenghwa", + "id": 45155253, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45155253?v=4", + "html_url": "https:\/\/github.com\/leekenghwa" }, - "html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692", + "html_url": "https:\/\/github.com\/leekenghwa\/CVE-2023-46003", "description": null, "fork": false, - "created_at": "2018-01-04T02:40:13Z", - "updated_at": "2021-11-23T15:08:43Z", - "pushed_at": "2018-01-02T13:58:02Z", + "created_at": "2023-10-19T08:17:53Z", + "updated_at": "2023-10-19T08:17:54Z", + "pushed_at": "2023-10-19T09:02:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index 2ef3c8684f..6e868ea197 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -73,10 +73,10 @@ "description": "CVE-2023-4911 proof of concept", "fork": false, "created_at": "2023-10-04T14:32:49Z", - "updated_at": "2023-10-17T23:55:04Z", + "updated_at": "2023-10-19T06:44:59Z", "pushed_at": "2023-10-08T23:24:24Z", - "stargazers_count": 147, - "watchers_count": 147, + "stargazers_count": 148, + "watchers_count": 148, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 147, + "watchers": 148, "score": 0, "subscribers_count": 3 }, @@ -163,10 +163,10 @@ "description": null, "fork": false, "created_at": "2023-10-10T22:04:23Z", - "updated_at": "2023-10-17T02:47:30Z", + "updated_at": "2023-10-19T09:25:38Z", "pushed_at": "2023-10-15T19:37:06Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-5074.json b/2023/CVE-2023-5074.json deleted file mode 100644 index 20e819d553..0000000000 --- a/2023/CVE-2023-5074.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 698443120, - "name": "CVE-2023-5074-PoC", - "full_name": "codeb0ss\/CVE-2023-5074-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-5074-PoC", - "description": "Mass Exploit - CVE-2023-5074 \/ D-Link D-View < Authentication Bypass", - "fork": false, - "created_at": "2023-09-30T00:07:52Z", - "updated_at": "2023-10-09T21:25:24Z", - "pushed_at": "2023-09-30T01:18:35Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-5142.json b/2023/CVE-2023-5142.json index 706bdb421a..d38e8bfbcb 100644 --- a/2023/CVE-2023-5142.json +++ b/2023/CVE-2023-5142.json @@ -18,13 +18,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-5601.json b/2023/CVE-2023-5601.json deleted file mode 100644 index 3f36307d37..0000000000 --- a/2023/CVE-2023-5601.json +++ /dev/null @@ -1,41 +0,0 @@ -[ - { - "id": 706967921, - "name": "CVE-2023-5601-PoC", - "full_name": "codeb0ss\/CVE-2023-5601-PoC", - "owner": { - "login": "codeb0ss", - "id": 135759201, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4", - "html_url": "https:\/\/github.com\/codeb0ss" - }, - "html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-5601-PoC", - "description": null, - "fork": false, - "created_at": "2023-10-19T00:47:06Z", - "updated_at": "2023-10-19T01:11:28Z", - "pushed_at": "2023-10-19T00:49:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0day", - "cve-2023-5601", - "cve-2023-5601-exploit", - "cve-2023-5601-poc", - "cve-2023-5601-wordpress", - "exploit", - "wordfrence", - "wpscan" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - } -] \ No newline at end of file diff --git a/README.md b/README.md index 817c6b6dea..893151167d 100644 --- a/README.md +++ b/README.md @@ -52,13 +52,6 @@ - [TurtleARM/CVE-2023-0179-PoC](https://github.com/TurtleARM/CVE-2023-0179-PoC) - [H4K6/CVE-2023-0179-PoC](https://github.com/H4K6/CVE-2023-0179-PoC) -### CVE-2023-0255 (2023-02-13) - -<code>The Enable Media Replace WordPress plugin before 4.0.2 does not prevent authors from uploading arbitrary files to the site, which may allow them to upload PHP shells on affected sites. -</code> - -- [codeb0ss/CVE-2023-0255-PoC](https://github.com/codeb0ss/CVE-2023-0255-PoC) - ### CVE-2023-0264 (2023-08-04) <code>A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability. @@ -166,7 +159,6 @@ </code> - [Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal](https://github.com/Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal) -- [codeb0ss/CVE-2023-1112-EXP](https://github.com/codeb0ss/CVE-2023-1112-EXP) ### CVE-2023-1177 (2023-03-24) @@ -176,13 +168,6 @@ - [hh-hunter/ml-CVE-2023-1177](https://github.com/hh-hunter/ml-CVE-2023-1177) - [iumiro/CVE-2023-1177-MLFlow](https://github.com/iumiro/CVE-2023-1177-MLFlow) -### CVE-2023-1273 (2023-07-04) - -<code>The ND Shortcodes WordPress plugin before 7.0 does not validate some shortcode attributes before using them to generate paths passed to include function/s, allowing any authenticated users such as subscriber to perform LFI attacks -</code> - -- [codeb0ss/CVE-2023-1273-PoC](https://github.com/codeb0ss/CVE-2023-1273-PoC) - ### CVE-2023-1337 (2023-03-10) <code>The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the clear_uucss_logs function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete plugin log files. @@ -240,13 +225,6 @@ - [W01fh4cker/CVE-2023-1671-POC](https://github.com/W01fh4cker/CVE-2023-1671-POC) - [csffs/cve-2023-1671](https://github.com/csffs/cve-2023-1671) -### CVE-2023-1698 (2023-05-15) - -<code>In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise. -</code> - -- [codeb0ss/CVE-2023-1698-PoC](https://github.com/codeb0ss/CVE-2023-1698-PoC) - ### CVE-2023-1767 (2023-04-20) <code>The Snyk Advisor website (https://snyk.io/advisor/) was vulnerable to a stored XSS prior to 28th March 2023. A feature of Snyk Advisor is to display the contents of a scanned package's Readme on its package health page. An attacker could create a package in NPM with an associated markdown README file containing XSS-able HTML tags. Upon Snyk Advisor importing the package, the XSS would run each time an end user browsed to the package's page on Snyk Advisor. @@ -323,13 +301,6 @@ - [elweth-sec/CVE-2023-2255](https://github.com/elweth-sec/CVE-2023-2255) -### CVE-2023-2333 (2023-07-04) - -<code>The Ninja Forms Google Sheet Connector WordPress plugin before 1.2.7, gsheetconnector-ninja-forms-pro WordPress plugin through 1.2.7 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin -</code> - -- [codeb0ss/CVE-2023-2333-EXP](https://github.com/codeb0ss/CVE-2023-2333-EXP) - ### CVE-2023-2516 (2023-05-05) <code>Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7. @@ -608,7 +579,6 @@ <code>In Dahua Smart Park Management bis 20230713 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /emap/devicePoint_addImgIco?hasSubsystem=true. Durch Manipulation des Arguments upload mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. </code> -- [codeb0ss/CVE-2023-3836](https://github.com/codeb0ss/CVE-2023-3836) - [zh-byte/CVE-2023-3836](https://github.com/zh-byte/CVE-2023-3836) ### CVE-2023-4128 (2023-08-10) @@ -645,14 +615,6 @@ </code> - [d0rb/CVE-2023-4174](https://github.com/d0rb/CVE-2023-4174) -- [codeb0ss/CVE-2023-4174](https://github.com/codeb0ss/CVE-2023-4174) - -### CVE-2023-4238 (2023-09-25) - -<code>The Prevent files / folders access WordPress plugin before 2.5.2 does not validate files to be uploaded, which could allow attackers to upload arbitrary files such as PHP on the server. -</code> - -- [codeb0ss/CVE-2023-4238-PoC](https://github.com/codeb0ss/CVE-2023-4238-PoC) ### CVE-2023-4278 (2023-09-11) @@ -793,13 +755,6 @@ ### CVE-2023-5070 - [RandomRobbieBF/CVE-2023-5070](https://github.com/RandomRobbieBF/CVE-2023-5070) -### CVE-2023-5074 (2023-09-20) - -<code>Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28 -</code> - -- [codeb0ss/CVE-2023-5074-PoC](https://github.com/codeb0ss/CVE-2023-5074-PoC) - ### CVE-2023-5142 (2023-09-24) <code>In H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 bis 20230908 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /userLogin.asp der Komponente Config File Handler. Durch das Beeinflussen mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Das Ausnutzen gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung. @@ -846,9 +801,6 @@ ### CVE-2023-5546 - [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546) -### CVE-2023-5601 -- [codeb0ss/CVE-2023-5601-PoC](https://github.com/codeb0ss/CVE-2023-5601-PoC) - ### CVE-2023-20025 (2023-01-20) <code>A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device. This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device. @@ -870,7 +822,6 @@ </code> - [RegularITCat/CVE-2023-20073](https://github.com/RegularITCat/CVE-2023-20073) -- [codeb0ss/CVE-2023-20073-](https://github.com/codeb0ss/CVE-2023-20073-) ### CVE-2023-20110 (2023-05-17) @@ -909,7 +860,6 @@ - [Tounsi007/CVE-2023-20198](https://github.com/Tounsi007/CVE-2023-20198) - [alekos3/CVE_2023_20198_Detector](https://github.com/alekos3/CVE_2023_20198_Detector) - [ditekshen/ansible-cve-2023-20198](https://github.com/ditekshen/ansible-cve-2023-20198) -- [exp166/CVE-2023-20198](https://github.com/exp166/CVE-2023-20198) ### CVE-2023-20209 (2023-08-16) @@ -1495,7 +1445,6 @@ - [SirBugs/CVE-2023-24488-PoC](https://github.com/SirBugs/CVE-2023-24488-PoC) - [Abo5/CVE-2023-24488](https://github.com/Abo5/CVE-2023-24488) - [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488) -- [codeb0ss/cve-2023-24488](https://github.com/codeb0ss/cve-2023-24488) - [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule) - [LazyySec/CVE-2023-24488](https://github.com/LazyySec/CVE-2023-24488) @@ -1505,7 +1454,6 @@ </code> - [adhikara13/CVE-2023-24489-ShareFile](https://github.com/adhikara13/CVE-2023-24489-ShareFile) -- [codeb0ss/CVE-2023-24489-PoC](https://github.com/codeb0ss/CVE-2023-24489-PoC) - [whalebone7/CVE-2023-24489-poc](https://github.com/whalebone7/CVE-2023-24489-poc) ### CVE-2023-24517 (2023-08-22) @@ -1631,13 +1579,6 @@ - [brainkok/CVE-2023-25292](https://github.com/brainkok/CVE-2023-25292) - [tucommenceapousser/CVE-2023-25292](https://github.com/tucommenceapousser/CVE-2023-25292) -### CVE-2023-25573 (2023-03-09) - -<code>metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in `/api/jmeter/download/files`, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. -</code> - -- [codeb0ss/CVE-2023-25573-PoC](https://github.com/codeb0ss/CVE-2023-25573-PoC) - ### CVE-2023-25610 - [qi4L/CVE-2023-25610](https://github.com/qi4L/CVE-2023-25610) @@ -1773,13 +1714,6 @@ - [bypazs/CVE-2023-26984](https://github.com/bypazs/CVE-2023-26984) -### CVE-2023-27034 (2023-03-23) - -<code>PrestaShop jmsblog 2.5.5 was discovered to contain a SQL injection vulnerability. -</code> - -- [codeb0ss/CVE-2023-27034-Exploit](https://github.com/codeb0ss/CVE-2023-27034-Exploit) - ### CVE-2023-27035 (2023-05-01) <code>An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send desktop notifications, record user audio and other unspecified impacts via embedded website on the canvas page. @@ -2954,7 +2888,6 @@ </code> - [rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831](https://github.com/rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831) -- [codeb0ss/CVE-2023-33831-PoC](https://github.com/codeb0ss/CVE-2023-33831-PoC) ### CVE-2023-33977 (2023-06-06) @@ -3063,13 +2996,6 @@ - [radman404/CVE-2023-34634](https://github.com/radman404/CVE-2023-34634) -### CVE-2023-34747 (2023-06-14) - -<code>File upload vulnerability in ujcms 6.0.2 via /api/backend/core/web-file-upload/upload. -</code> - -- [codeb0ss/CVE-2023-34747-PoC](https://github.com/codeb0ss/CVE-2023-34747-PoC) - ### CVE-2023-34761 (2023-06-28) <code>An unauthenticated attacker within BLE proximity can remotely connect to a 7-Eleven LED Message Cup, Hello Cup 1.3.1 for Android, and bypass the application's client-side chat censor filter. @@ -3629,14 +3555,6 @@ - [Fire-Null/CVE-2023-37979](https://github.com/Fire-Null/CVE-2023-37979) - [Mehran-Seifalinia/CVE-2023-37979](https://github.com/Mehran-Seifalinia/CVE-2023-37979) - [d0rb/CVE-2023-37979](https://github.com/d0rb/CVE-2023-37979) -- [codeb0ss/CVE-2023-37979](https://github.com/codeb0ss/CVE-2023-37979) - -### CVE-2023-37988 (2023-08-10) - -<code>Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Creative Solutions Contact Form Generator plugin <= 2.5.5 versions. -</code> - -- [codeb0ss/CVE-2023-37988-PoC](https://github.com/codeb0ss/CVE-2023-37988-PoC) ### CVE-2023-38035 (2023-08-21) @@ -3658,12 +3576,6 @@ - [gabe-k/themebleed](https://github.com/gabe-k/themebleed) - [Jnnshschl/CVE-2023-38146](https://github.com/Jnnshschl/CVE-2023-38146) -### CVE-2023-38388 -- [codeb0ss/CVE-2023-38388](https://github.com/codeb0ss/CVE-2023-38388) - -### CVE-2023-38389 -- [codeb0ss/CVE-2023-38389-PoC](https://github.com/codeb0ss/CVE-2023-38389-PoC) - ### CVE-2023-38408 (2023-07-19) <code>The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. @@ -3693,13 +3605,6 @@ - [lucas-cauhe/cargo-perm](https://github.com/lucas-cauhe/cargo-perm) -### CVE-2023-38501 (2023-07-25) - -<code>copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. Version 1.8.7 contains a patch for the issue. -</code> - -- [codeb0ss/CVE-2023-38501-Exploit](https://github.com/codeb0ss/CVE-2023-38501-Exploit) - ### CVE-2023-38545 (2023-10-17) <code>This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means "let the host resolve the name" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.\n @@ -3865,20 +3770,6 @@ - [Raj789-sec/CVE-2023-39115](https://github.com/Raj789-sec/CVE-2023-39115) -### CVE-2023-39141 (2023-08-22) - -<code>webui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability. -</code> - -- [codeb0ss/CVE-2023-39141-PoC](https://github.com/codeb0ss/CVE-2023-39141-PoC) - -### CVE-2023-39143 (2023-08-04) - -<code>PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration). -</code> - -- [codeb0ss/CVE-2023-39143](https://github.com/codeb0ss/CVE-2023-39143) - ### CVE-2023-39144 (2023-08-02) <code>Element55 KnowMore appliances version 21 and older was discovered to store passwords in plaintext. @@ -4090,13 +3981,6 @@ ### CVE-2023-41535 - [Sh33talUmath/CVE-2023-41535](https://github.com/Sh33talUmath/CVE-2023-41535) -### CVE-2023-41538 (2023-08-30) - -<code>phpjabbers PHP Forum Script 3.0 is vulnerable to Cross Site Scripting (XSS) via the keyword parameter. -</code> - -- [codeb0ss/CVE-2023-41538-PoC](https://github.com/codeb0ss/CVE-2023-41538-PoC) - ### CVE-2023-41575 (2023-09-08) <code>Multiple stored cross-site scripting (XSS) vulnerabilities in /bbdms/sign-up.php of Blood Bank & Donor Management v2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Full Name, Message, or Address parameters. @@ -4464,9 +4348,6 @@ - [soundarkutty/CVE-2023-44061](https://github.com/soundarkutty/CVE-2023-44061) -### CVE-2023-44227 -- [codeb0ss/CVE-2023-44227-PoC](https://github.com/codeb0ss/CVE-2023-44227-PoC) - ### CVE-2023-44487 (2023-10-10) <code>The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. @@ -4603,9 +4484,6 @@ - [ahrixia/CVE-2023-45542](https://github.com/ahrixia/CVE-2023-45542) -### CVE-2023-45603 -- [codeb0ss/CVE-2023-45603-PoC](https://github.com/codeb0ss/CVE-2023-45603-PoC) - ### CVE-2023-45828 - [RandomRobbieBF/CVE-2023-45828](https://github.com/RandomRobbieBF/CVE-2023-45828) @@ -4615,6 +4493,9 @@ ### CVE-2023-45966 - [jet-pentest/CVE-2023-45966](https://github.com/jet-pentest/CVE-2023-45966) +### CVE-2023-46003 +- [leekenghwa/CVE-2023-46003](https://github.com/leekenghwa/CVE-2023-46003) + ### CVE-2023-51504 - [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504) @@ -5654,13 +5535,6 @@ ### CVE-2022-20128 - [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128) -### CVE-2022-20130 (2022-06-15) - -<code>In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979 -</code> - -- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130) - ### CVE-2022-20138 (2022-06-15) <code>In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there is a possible way for unprivileged app to send MANAGED_PROFILE_PROVISIONED intent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-210469972 @@ -6307,8 +6181,6 @@ - [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954) - [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954) - [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954) -- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954) -- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC) - [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller) - [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_) - [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954) @@ -7937,8 +7809,6 @@ - [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464) - [xinghonghaoyue/CVE-2022-29464](https://github.com/xinghonghaoyue/CVE-2022-29464) - [r4x0r1337/-CVE-2022-29464](https://github.com/r4x0r1337/-CVE-2022-29464) -- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464) -- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass) - [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464) - [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464) - [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-) @@ -13028,6 +12898,7 @@ </code> - [Betep0k/CVE-2021-25741](https://github.com/Betep0k/CVE-2021-25741) +- [cdxiaodong/CVE-2021-25741](https://github.com/cdxiaodong/CVE-2021-25741) ### CVE-2021-25790 (2021-07-23) @@ -29641,7 +29512,6 @@ - [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-) - [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco) - [mzakyz666/PoC-CVE-2017-3881](https://github.com/mzakyz666/PoC-CVE-2017-3881) -- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881) ### CVE-2017-4490 - [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-) @@ -29849,9 +29719,6 @@ </code> - [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack) -- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC) -- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example) -- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo) - [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope) - [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753) - [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-) @@ -29864,7 +29731,6 @@ - [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck) - [raphaelsc/Am-I-affected-by-Meltdown](https://github.com/raphaelsc/Am-I-affected-by-Meltdown) - [Viralmaniar/In-Spectre-Meltdown](https://github.com/Viralmaniar/In-Spectre-Meltdown) -- [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown) - [zzado/Meltdown](https://github.com/zzado/Meltdown) - [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner) @@ -30041,7 +29907,6 @@ - [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool) - [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269) - [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269) -- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269) - [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269) - [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3) - [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269) @@ -30375,13 +30240,6 @@ - [jakabakos/CVE-2017-9096-iText-XXE](https://github.com/jakabakos/CVE-2017-9096-iText-XXE) -### CVE-2017-9097 (2017-06-15) - -<code>In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file. -</code> - -- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite) - ### CVE-2017-9101 (2017-05-21) <code>import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file. @@ -30613,7 +30471,6 @@ - [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271) - [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271) - [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271) -- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce) - [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271) - [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271) - [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc) @@ -31246,13 +31103,6 @@ - [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995) - [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995) -### CVE-2017-16997 (2017-12-17) - -<code>elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution. -</code> - -- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc) - ### CVE-2017-17058 (2017-11-29) <code>** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code. @@ -31307,13 +31157,6 @@ - [nu11pointer/goahead-rce-exploit](https://github.com/nu11pointer/goahead-rce-exploit) - [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562) -### CVE-2017-17692 (2017-12-21) - -<code>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property. -</code> - -- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692) - ### CVE-2017-17736 (2018-03-23) <code>Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard. @@ -31451,7 +31294,6 @@ <code>Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary. </code> -- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253) - [sxlmnwb/CVE-2017-1000253](https://github.com/sxlmnwb/CVE-2017-1000253) ### CVE-2017-1000353 (2018-01-29) @@ -32252,6 +32094,7 @@ - [Gnoxter/mountain_goat](https://github.com/Gnoxter/mountain_goat) - [violentshell/rover](https://github.com/violentshell/rover) +- [jduck/challack](https://github.com/jduck/challack) - [bplinux/chackd](https://github.com/bplinux/chackd) - [unkaktus/grill](https://github.com/unkaktus/grill)