From 98d8322a0ed6a62bab8d89328cc9a3afcfa06b6c Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 18 Mar 2023 21:28:16 +0900 Subject: [PATCH] Auto Update 2023/03/18 12:28:16 --- 2016/CVE-2016-5195.json | 8 ++++---- 2017/CVE-2017-7921.json | 8 ++++---- 2019/CVE-2019-0708.json | 4 ++-- 2020/CVE-2020-0022.json | 2 +- 2020/CVE-2020-0601.json | 8 ++++---- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-1472.json | 4 ++-- 2020/CVE-2020-27358.json | 8 ++++---- 2021/CVE-2021-25094.json | 29 +++++++++++++++++++++++++++++ 2021/CVE-2021-26084.json | 8 ++++---- 2021/CVE-2021-36260.json | 4 ++-- 2021/CVE-2021-4034.json | 4 ++-- 2021/CVE-2021-42237.json | 8 ++++---- 2021/CVE-2021-42278.json | 8 ++++---- 2021/CVE-2021-44228.json | 16 ++++++++-------- 2022/CVE-2022-0540.json | 8 ++++---- 2022/CVE-2022-22639.json | 8 ++++---- 2022/CVE-2022-22963.json | 29 +++++++++++++++++++++++++++++ 2022/CVE-2022-23935.json | 8 ++++---- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-43959.json | 2 +- 2022/CVE-2022-44268.json | 12 ++++++------ 2022/CVE-2022-44877.json | 2 +- 2022/CVE-2022-46689.json | 16 ++++++++-------- 2023/CVE-2023-0179.json | 12 ++++++------ 2023/CVE-2023-21768.json | 8 ++++---- 2023/CVE-2023-23397.json | 24 ++++++++++++------------ 2023/CVE-2023-23415.json | 8 ++++---- README.md | 2 ++ 29 files changed, 167 insertions(+), 107 deletions(-) diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 116021e09e..69c1997e8b 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -433,10 +433,10 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2023-03-14T08:07:56Z", + "updated_at": "2023-03-18T07:49:11Z", "pushed_at": "2021-04-08T11:35:12Z", - "stargazers_count": 710, - "watchers_count": 710, + "stargazers_count": 711, + "watchers_count": 711, "has_discussions": false, "forks_count": 424, "allow_forking": true, @@ -449,7 +449,7 @@ ], "visibility": "public", "forks": 424, - "watchers": 710, + "watchers": 711, "score": 0 }, { diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index 601aaf487e..1daee647ca 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -42,10 +42,10 @@ "description": "海康威视未授权访问检测poc及口令爆破", "fork": false, "created_at": "2020-11-12T09:02:10Z", - "updated_at": "2023-01-10T04:06:02Z", + "updated_at": "2023-03-18T09:02:54Z", "pushed_at": "2020-11-19T08:58:04Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 33, + "watchers": 34, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index d38ff01589..dba1ed4d42 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1312,13 +1312,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 405, + "forks_count": 404, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 405, + "forks": 404, "watchers": 3, "score": 0 }, diff --git a/2020/CVE-2020-0022.json b/2020/CVE-2020-0022.json index 96e4d5bbbb..efaa98172f 100644 --- a/2020/CVE-2020-0022.json +++ b/2020/CVE-2020-0022.json @@ -13,7 +13,7 @@ "description": "BlueFrag experiments", "fork": false, "created_at": "2020-02-12T22:00:35Z", - "updated_at": "2022-11-09T18:06:16Z", + "updated_at": "2023-03-18T11:53:32Z", "pushed_at": "2020-05-16T18:06:43Z", "stargazers_count": 43, "watchers_count": 43, diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index 231d8a86c1..0cb4cfc122 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -551,10 +551,10 @@ "description": "CVE-2020-0601 #curveball - Alternative Key Calculator", "fork": false, "created_at": "2020-01-20T16:24:20Z", - "updated_at": "2022-11-03T21:48:27Z", + "updated_at": "2023-03-18T09:54:53Z", "pushed_at": "2020-01-20T23:00:14Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -563,7 +563,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 73, + "watchers": 74, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 64091bcc73..d0246a75b4 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1369,10 +1369,10 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2023-03-02T11:32:02Z", + "updated_at": "2023-03-18T08:18:47Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 483, - "watchers_count": 483, + "stargazers_count": 484, + "watchers_count": 484, "has_discussions": false, "forks_count": 157, "allow_forking": true, @@ -1387,7 +1387,7 @@ ], "visibility": "public", "forks": 157, - "watchers": 483, + "watchers": 484, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index acfa801cea..0e7a89d157 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -315,13 +315,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 3, "score": 0 }, diff --git a/2020/CVE-2020-27358.json b/2020/CVE-2020-27358.json index 4247a7e2eb..e062cd764b 100644 --- a/2020/CVE-2020-27358.json +++ b/2020/CVE-2020-27358.json @@ -13,10 +13,10 @@ "description": "CVE-2020-27358 and CVE-2020-27359", "fork": false, "created_at": "2020-11-02T04:54:52Z", - "updated_at": "2022-11-24T11:12:36Z", + "updated_at": "2023-03-18T09:51:23Z", "pushed_at": "2020-11-02T05:10:02Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-25094.json b/2021/CVE-2021-25094.json index e3d99b0f4c..779b145e38 100644 --- a/2021/CVE-2021-25094.json +++ b/2021/CVE-2021-25094.json @@ -85,5 +85,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 615681761, + "name": "TypeHub-Exploiter", + "full_name": "aliestercrowleymv\/TypeHub-Exploiter", + "owner": { + "login": "aliestercrowleymv", + "id": 124184894, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124184894?v=4", + "html_url": "https:\/\/github.com\/aliestercrowleymv" + }, + "html_url": "https:\/\/github.com\/aliestercrowleymv\/TypeHub-Exploiter", + "description": "This script exploits a vulnerability (CVE-2021-25094) in the TypeHub WordPress plugin.", + "fork": false, + "created_at": "2023-03-18T11:19:33Z", + "updated_at": "2023-03-18T11:20:37Z", + "pushed_at": "2023-03-18T12:05:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 44c112392f..464e7ce6fe 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -622,10 +622,10 @@ "description": "Confluence server webwork OGNL injection", "fork": false, "created_at": "2021-09-05T09:27:55Z", - "updated_at": "2023-03-13T12:49:04Z", + "updated_at": "2023-03-18T09:22:44Z", "pushed_at": "2023-03-16T17:38:55Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -634,7 +634,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 5, "score": 0 }, { diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 17cb620936..63f5a8e141 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -134,7 +134,7 @@ "stargazers_count": 63, "watchers_count": 63, "has_discussions": false, - "forks_count": 14, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -143,7 +143,7 @@ "exploit" ], "visibility": "public", - "forks": 14, + "forks": 15, "watchers": 63, "score": 0 } diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 218cfb4cc3..998d222797 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -82,13 +82,13 @@ "stargazers_count": 1765, "watchers_count": 1765, "has_discussions": false, - "forks_count": 504, + "forks_count": 505, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 504, + "forks": 505, "watchers": 1765, "score": 0 }, diff --git a/2021/CVE-2021-42237.json b/2021/CVE-2021-42237.json index 1d7ca35840..04bc5b1918 100644 --- a/2021/CVE-2021-42237.json +++ b/2021/CVE-2021-42237.json @@ -42,10 +42,10 @@ "description": null, "fork": false, "created_at": "2022-06-30T10:44:23Z", - "updated_at": "2022-06-30T10:47:14Z", + "updated_at": "2023-03-18T12:11:55Z", "pushed_at": "2022-06-30T10:47:27Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index e3741d8597..15d63b8556 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -47,10 +47,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2023-03-17T19:05:17Z", + "updated_at": "2023-03-18T12:14:42Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 542, - "watchers_count": 542, + "stargazers_count": 543, + "watchers_count": 543, "has_discussions": false, "forks_count": 97, "allow_forking": true, @@ -59,7 +59,7 @@ "topics": [], "visibility": "public", "forks": 97, - "watchers": 542, + "watchers": 543, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index b9e0893554..fc864f9155 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -13,10 +13,10 @@ "description": "Apache Log4j 远程代码执行", "fork": false, "created_at": "2021-12-09T15:27:38Z", - "updated_at": "2023-03-12T15:53:02Z", + "updated_at": "2023-03-18T10:14:29Z", "pushed_at": "2022-07-25T20:41:30Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 50, + "watchers_count": 50, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 49, + "watchers": 50, "score": 0 }, { @@ -972,10 +972,10 @@ "description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam", "fork": false, "created_at": "2021-12-10T23:35:31Z", - "updated_at": "2023-03-15T17:27:57Z", + "updated_at": "2023-03-18T08:33:41Z", "pushed_at": "2021-12-14T13:43:35Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -989,7 +989,7 @@ ], "visibility": "public", "forks": 18, - "watchers": 92, + "watchers": 93, "score": 0 }, { diff --git a/2022/CVE-2022-0540.json b/2022/CVE-2022-0540.json index 916acce068..b50e309595 100644 --- a/2022/CVE-2022-0540.json +++ b/2022/CVE-2022-0540.json @@ -13,10 +13,10 @@ "description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)", "fork": false, "created_at": "2022-05-25T10:47:04Z", - "updated_at": "2023-03-17T02:17:46Z", + "updated_at": "2023-03-18T11:04:16Z", "pushed_at": "2022-05-25T13:43:16Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 65, + "watchers_count": 65, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 64, + "watchers": 65, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22639.json b/2022/CVE-2022-22639.json index c32e306fa1..a217807dcc 100644 --- a/2022/CVE-2022-22639.json +++ b/2022/CVE-2022-22639.json @@ -13,10 +13,10 @@ "description": "CVE-2022-22639: Get a Root Shell on macOS Monterey", "fork": false, "created_at": "2022-03-17T06:16:54Z", - "updated_at": "2023-03-11T00:43:11Z", + "updated_at": "2023-03-18T10:47:06Z", "pushed_at": "2022-04-05T05:11:29Z", - "stargazers_count": 115, - "watchers_count": 115, + "stargazers_count": 116, + "watchers_count": 116, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 115, + "watchers": 116, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22963.json b/2022/CVE-2022-22963.json index d52743a5fd..cc7be938de 100644 --- a/2022/CVE-2022-22963.json +++ b/2022/CVE-2022-22963.json @@ -571,5 +571,34 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 615687765, + "name": "CVE-2022-22963_Reverse-Shell-Exploit", + "full_name": "J0ey17\/CVE-2022-22963_Reverse-Shell-Exploit", + "owner": { + "login": "J0ey17", + "id": 72118225, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72118225?v=4", + "html_url": "https:\/\/github.com\/J0ey17" + }, + "html_url": "https:\/\/github.com\/J0ey17\/CVE-2022-22963_Reverse-Shell-Exploit", + "description": "CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script will verify if the vulnerability exists, and if it does, will give you a reverse shell.", + "fork": false, + "created_at": "2023-03-18T11:43:00Z", + "updated_at": "2023-03-18T11:47:57Z", + "pushed_at": "2023-03-18T11:47:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-23935.json b/2022/CVE-2022-23935.json index d9a30b699d..b0f0b89c29 100644 --- a/2022/CVE-2022-23935.json +++ b/2022/CVE-2022-23935.json @@ -42,10 +42,10 @@ "description": "CVE-2022-23935 exploit PoC exiftool version 12.37 written in python", "fork": false, "created_at": "2023-02-07T13:02:40Z", - "updated_at": "2023-03-03T11:57:59Z", + "updated_at": "2023-03-18T10:11:59Z", "pushed_at": "2023-02-07T13:10:30Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 16dd982583..e50d2f294b 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2023-03-17T06:02:09Z", + "updated_at": "2023-03-18T07:05:38Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 946, - "watchers_count": 946, + "stargazers_count": 947, + "watchers_count": 947, "has_discussions": true, "forks_count": 164, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 164, - "watchers": 946, + "watchers": 947, "score": 0 }, { diff --git a/2022/CVE-2022-43959.json b/2022/CVE-2022-43959.json index be0b48b295..35e88f3579 100644 --- a/2022/CVE-2022-43959.json +++ b/2022/CVE-2022-43959.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2022-10-28T08:52:17Z", "updated_at": "2023-02-16T07:04:41Z", - "pushed_at": "2022-10-28T10:14:25Z", + "pushed_at": "2023-03-18T10:34:26Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index f71097d24d..3e566d2364 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -13,10 +13,10 @@ "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator", "fork": false, "created_at": "2023-02-02T15:34:28Z", - "updated_at": "2023-03-17T19:03:32Z", + "updated_at": "2023-03-18T07:50:51Z", "pushed_at": "2023-02-02T16:53:37Z", - "stargazers_count": 212, - "watchers_count": 212, + "stargazers_count": 213, + "watchers_count": 213, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 212, + "watchers": 213, "score": 0 }, { @@ -195,13 +195,13 @@ "stargazers_count": 114, "watchers_count": 114, "has_discussions": false, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, + "forks": 17, "watchers": 114, "score": 0 }, diff --git a/2022/CVE-2022-44877.json b/2022/CVE-2022-44877.json index 8b71a1809d..b0aae36b19 100644 --- a/2022/CVE-2022-44877.json +++ b/2022/CVE-2022-44877.json @@ -130,7 +130,7 @@ "fork": false, "created_at": "2023-02-15T15:22:48Z", "updated_at": "2023-03-11T16:28:02Z", - "pushed_at": "2023-03-18T00:44:14Z", + "pushed_at": "2023-03-18T10:21:05Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 49d98d043c..4feef7f3be 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -71,10 +71,10 @@ "description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.", "fork": false, "created_at": "2022-12-26T06:56:35Z", - "updated_at": "2023-03-18T03:59:17Z", + "updated_at": "2023-03-18T09:44:16Z", "pushed_at": "2023-02-21T04:16:19Z", - "stargazers_count": 770, - "watchers_count": 770, + "stargazers_count": 772, + "watchers_count": 772, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 55, - "watchers": 770, + "watchers": 772, "score": 0 }, { @@ -378,10 +378,10 @@ "description": "Example of CVE-2022-46689 aka MacDirtyCow.", "fork": false, "created_at": "2023-03-01T08:23:49Z", - "updated_at": "2023-03-01T09:03:52Z", + "updated_at": "2023-03-18T11:28:54Z", "pushed_at": "2023-03-01T08:25:46Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -397,7 +397,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-0179.json b/2023/CVE-2023-0179.json index bee91b2e2a..d9e1fb5748 100644 --- a/2023/CVE-2023-0179.json +++ b/2023/CVE-2023-0179.json @@ -42,19 +42,19 @@ "description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,尽管该利用在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。", "fork": false, "created_at": "2023-03-16T02:20:52Z", - "updated_at": "2023-03-18T01:45:23Z", + "updated_at": "2023-03-18T12:00:25Z", "pushed_at": "2023-03-16T02:22:28Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 9, + "forks": 4, + "watchers": 12, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index e5c5eb18b3..548f60846c 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -13,10 +13,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2023-03-18T05:42:00Z", + "updated_at": "2023-03-18T12:01:48Z", "pushed_at": "2023-03-10T08:58:44Z", - "stargazers_count": 301, - "watchers_count": 301, + "stargazers_count": 303, + "watchers_count": 303, "has_discussions": false, "forks_count": 113, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 113, - "watchers": 301, + "watchers": 303, "score": 0 }, { diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index d176af39ae..1b85de5d55 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -13,10 +13,10 @@ "description": "Exploit for the CVE-2023-23397", "fork": false, "created_at": "2023-03-15T17:03:38Z", - "updated_at": "2023-03-18T04:43:18Z", + "updated_at": "2023-03-18T12:01:07Z", "pushed_at": "2023-03-15T17:53:53Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 113, + "watchers_count": 113, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 110, + "watchers": 113, "score": 0 }, { @@ -129,10 +129,10 @@ "description": "Simple PoC in PowerShell for CVE-2023-23397", "fork": false, "created_at": "2023-03-16T19:10:37Z", - "updated_at": "2023-03-18T04:35:40Z", + "updated_at": "2023-03-18T11:29:28Z", "pushed_at": "2023-03-16T19:29:49Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -151,7 +151,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 8, "score": 0 }, { @@ -168,10 +168,10 @@ "description": null, "fork": false, "created_at": "2023-03-16T19:43:39Z", - "updated_at": "2023-03-18T05:50:43Z", + "updated_at": "2023-03-18T12:17:40Z", "pushed_at": "2023-03-17T07:47:40Z", - "stargazers_count": 139, - "watchers_count": 139, + "stargazers_count": 148, + "watchers_count": 148, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -180,7 +180,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 139, + "watchers": 148, "score": 0 }, { diff --git a/2023/CVE-2023-23415.json b/2023/CVE-2023-23415.json index 54ee11a46f..288b9c4ab2 100644 --- a/2023/CVE-2023-23415.json +++ b/2023/CVE-2023-23415.json @@ -13,10 +13,10 @@ "description": "CVE-2023-23415", "fork": false, "created_at": "2023-03-17T12:38:30Z", - "updated_at": "2023-03-17T13:51:40Z", + "updated_at": "2023-03-18T11:37:10Z", "pushed_at": "2023-03-17T12:45:04Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index fb64ba6a2e..32e0398754 100644 --- a/README.md +++ b/README.md @@ -2043,6 +2043,7 @@ In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, w - [iliass-dahman/CVE-2022-22963-POC](https://github.com/iliass-dahman/CVE-2022-22963-POC) - [charis3306/CVE-2022-22963](https://github.com/charis3306/CVE-2022-22963) - [lemmyz4n3771/CVE-2022-22963-PoC](https://github.com/lemmyz4n3771/CVE-2022-22963-PoC) +- [J0ey17/CVE-2022-22963_Reverse-Shell-Exploit](https://github.com/J0ey17/CVE-2022-22963_Reverse-Shell-Exploit) ### CVE-2022-22965 (2022-04-01) @@ -8640,6 +8641,7 @@ The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used with - [darkpills/CVE-2021-25094-tatsu-preauth-rce](https://github.com/darkpills/CVE-2021-25094-tatsu-preauth-rce) - [TUANB4DUT/typehub-exploiter](https://github.com/TUANB4DUT/typehub-exploiter) - [xdx57/CVE-2021-25094](https://github.com/xdx57/CVE-2021-25094) +- [aliestercrowleymv/TypeHub-Exploiter](https://github.com/aliestercrowleymv/TypeHub-Exploiter) ### CVE-2021-25162 (2021-03-29)