From 99b9270d8967ded20562544e8d5a35545b9d06cf Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 9 Oct 2023 09:25:18 +0900 Subject: [PATCH] Auto Update 2023/10/09 00:25:18 --- 2005/CVE-2005-3299.json | 32 ++++++++++++++++++++++++++++++++ 2014/CVE-2014-6271.json | 8 ++++---- 2017/CVE-2017-0785.json | 8 ++++---- 2017/CVE-2017-5645.json | 8 ++++---- 2018/CVE-2018-10933.json | 8 ++++---- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-18634.json | 8 ++++---- 2019/CVE-2019-19781.json | 8 ++++---- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-1938.json | 2 +- 2020/CVE-2020-9054.json | 8 ++++---- 2021/CVE-2021-1675.json | 8 ++++---- 2021/CVE-2021-21985.json | 8 ++++---- 2021/CVE-2021-3493.json | 8 ++++---- 2021/CVE-2021-40444.json | 8 ++++---- 2021/CVE-2021-44228.json | 8 ++++---- 2022/CVE-2022-0847.json | 8 ++++---- 2022/CVE-2022-46169.json | 8 ++++---- 2023/CVE-2023-22515.json | 8 ++++---- 2023/CVE-2023-2640.json | 8 ++++---- 2023/CVE-2023-29357.json | 16 ++++++++-------- 2023/CVE-2023-29360.json | 8 ++++---- 2023/CVE-2023-32315.json | 8 ++++---- 2023/CVE-2023-34040.json | 4 ++-- 2023/CVE-2023-36845.json | 4 ++-- 2023/CVE-2023-38831.json | 8 ++++---- 2023/CVE-2023-43115.json | 8 ++++---- 2023/CVE-2023-4911.json | 22 +++++++++++----------- README.md | 7 +++++++ 29 files changed, 151 insertions(+), 112 deletions(-) create mode 100644 2005/CVE-2005-3299.json diff --git a/2005/CVE-2005-3299.json b/2005/CVE-2005-3299.json new file mode 100644 index 0000000000..82e260e1ff --- /dev/null +++ b/2005/CVE-2005-3299.json @@ -0,0 +1,32 @@ +[ + { + "id": 495096042, + "name": "CVE-2005-3299", + "full_name": "RizeKishimaro\/CVE-2005-3299", + "owner": { + "login": "RizeKishimaro", + "id": 75617768, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75617768?v=4", + "html_url": "https:\/\/github.com\/RizeKishimaro" + }, + "html_url": "https:\/\/github.com\/RizeKishimaro\/CVE-2005-3299", + "description": "CVE 2005 exploit.Perl in Perl.", + "fork": false, + "created_at": "2022-05-22T15:14:57Z", + "updated_at": "2022-06-01T09:55:14Z", + "pushed_at": "2022-05-22T15:25:13Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index b3d096a720..affa5f61cf 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -703,10 +703,10 @@ "description": "A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server", "fork": false, "created_at": "2014-09-28T04:08:07Z", - "updated_at": "2022-02-05T11:05:37Z", + "updated_at": "2023-10-08T19:41:46Z", "pushed_at": "2015-06-19T04:48:17Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -715,7 +715,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 2 }, diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json index 47408f43da..962cfd9a6b 100644 --- a/2017/CVE-2017-0785.json +++ b/2017/CVE-2017-0785.json @@ -13,10 +13,10 @@ "description": "Blueborne CVE-2017-0785 Android information leak vulnerability", "fork": false, "created_at": "2017-09-20T23:32:29Z", - "updated_at": "2023-09-28T10:44:36Z", + "updated_at": "2023-10-08T19:09:06Z", "pushed_at": "2017-09-23T05:11:45Z", - "stargazers_count": 453, - "watchers_count": 453, + "stargazers_count": 454, + "watchers_count": 454, "has_discussions": false, "forks_count": 200, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 200, - "watchers": 453, + "watchers": 454, "score": 0, "subscribers_count": 46 }, diff --git a/2017/CVE-2017-5645.json b/2017/CVE-2017-5645.json index e2e5586fd0..eb1d2ec04e 100644 --- a/2017/CVE-2017-5645.json +++ b/2017/CVE-2017-5645.json @@ -13,10 +13,10 @@ "description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization", "fork": false, "created_at": "2017-08-04T01:12:47Z", - "updated_at": "2023-09-28T10:43:33Z", + "updated_at": "2023-10-08T19:09:46Z", "pushed_at": "2018-11-18T11:14:20Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 95, + "watchers_count": 95, "has_discussions": false, "forks_count": 34, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 34, - "watchers": 94, + "watchers": 95, "score": 0, "subscribers_count": 2 }, diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index c358d992bb..d6a8597926 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -133,10 +133,10 @@ "description": "Script to identify hosts vulnerable to CVE-2018-10933", "fork": false, "created_at": "2018-10-17T23:05:10Z", - "updated_at": "2023-09-28T10:54:55Z", + "updated_at": "2023-10-08T20:54:05Z", "pushed_at": "2018-11-04T17:29:33Z", - "stargazers_count": 230, - "watchers_count": 230, + "stargazers_count": 231, + "watchers_count": 231, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 230, + "watchers": 231, "score": 0, "subscribers_count": 18 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 97007fb9cb..481fa3ba06 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2051,10 +2051,10 @@ "description": "Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS\/SSL and x509 support", "fork": false, "created_at": "2019-06-03T07:49:26Z", - "updated_at": "2023-10-08T07:02:15Z", + "updated_at": "2023-10-08T23:18:37Z", "pushed_at": "2019-06-12T08:48:17Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -2067,7 +2067,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 4 }, diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index 9df2654de9..5953bc27bb 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -43,10 +43,10 @@ "description": "Proof of Concept for CVE-2019-18634", "fork": false, "created_at": "2020-02-07T18:07:03Z", - "updated_at": "2023-10-03T20:00:19Z", + "updated_at": "2023-10-08T19:08:59Z", "pushed_at": "2021-09-12T02:55:24Z", - "stargazers_count": 178, - "watchers_count": 178, + "stargazers_count": 179, + "watchers_count": 179, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 178, + "watchers": 179, "score": 0, "subscribers_count": 3 }, diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index eedf1641fa..48b24b83d2 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -357,10 +357,10 @@ "description": "DFIR notes for Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781", "fork": false, "created_at": "2020-01-12T23:13:56Z", - "updated_at": "2023-09-28T11:09:59Z", + "updated_at": "2023-10-08T22:49:14Z", "pushed_at": "2020-02-05T11:45:25Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -369,7 +369,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 5 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 7cea42635a..5176e5d795 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1384,10 +1384,10 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2023-09-28T11:14:22Z", + "updated_at": "2023-10-08T19:08:26Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 501, - "watchers_count": 501, + "stargazers_count": 502, + "watchers_count": 502, "has_discussions": false, "forks_count": 161, "allow_forking": true, @@ -1402,7 +1402,7 @@ ], "visibility": "public", "forks": 161, - "watchers": 501, + "watchers": 502, "score": 0, "subscribers_count": 23 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index b5f58c8a36..63add39fe1 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -903,6 +903,6 @@ "forks": 14, "watchers": 91, "score": 0, - "subscribers_count": 3 + "subscribers_count": 4 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9054.json b/2020/CVE-2020-9054.json index 3b43815a29..600237d101 100644 --- a/2020/CVE-2020-9054.json +++ b/2020/CVE-2020-9054.json @@ -13,10 +13,10 @@ "description": "CVE-2020-9054 PoC for Zyxel", "fork": false, "created_at": "2021-09-09T16:16:34Z", - "updated_at": "2021-09-18T07:56:17Z", + "updated_at": "2023-10-08T23:35:13Z", "pushed_at": "2021-09-09T16:18:07Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index e8edb4f33b..79901a3730 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -301,10 +301,10 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2023-10-06T01:52:01Z", + "updated_at": "2023-10-08T19:34:12Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 939, - "watchers_count": 939, + "stargazers_count": 940, + "watchers_count": 940, "has_discussions": false, "forks_count": 230, "allow_forking": true, @@ -313,7 +313,7 @@ "topics": [], "visibility": "public", "forks": 230, - "watchers": 939, + "watchers": 940, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index 4a67fabedd..b6fbadc306 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -43,10 +43,10 @@ "description": null, "fork": false, "created_at": "2021-05-29T13:07:14Z", - "updated_at": "2023-10-04T16:05:27Z", + "updated_at": "2023-10-08T19:06:24Z", "pushed_at": "2023-01-19T16:24:33Z", - "stargazers_count": 212, - "watchers_count": 212, + "stargazers_count": 213, + "watchers_count": 213, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 212, + "watchers": 213, "score": 0, "subscribers_count": 7 }, diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index 6c47b4ed3b..b869f3dbc5 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -13,10 +13,10 @@ "description": "Ubuntu OverlayFS Local Privesc", "fork": false, "created_at": "2021-04-19T20:07:01Z", - "updated_at": "2023-10-08T14:29:18Z", + "updated_at": "2023-10-08T19:00:43Z", "pushed_at": "2021-09-28T04:08:43Z", - "stargazers_count": 359, - "watchers_count": 359, + "stargazers_count": 360, + "watchers_count": 360, "has_discussions": false, "forks_count": 127, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 127, - "watchers": 359, + "watchers": 360, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 5e1093c6ed..00d3a6968f 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -223,10 +223,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2023-09-28T11:31:19Z", + "updated_at": "2023-10-08T21:46:05Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1494, - "watchers_count": 1494, + "stargazers_count": 1493, + "watchers_count": 1493, "has_discussions": false, "forks_count": 492, "allow_forking": true, @@ -235,7 +235,7 @@ "topics": [], "visibility": "public", "forks": 492, - "watchers": 1494, + "watchers": 1493, "score": 0, "subscribers_count": 28 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 3da7fa8400..66ff43ad96 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -6067,10 +6067,10 @@ "description": null, "fork": false, "created_at": "2021-12-14T21:32:42Z", - "updated_at": "2023-09-29T11:56:40Z", + "updated_at": "2023-10-08T19:09:47Z", "pushed_at": "2021-12-15T11:23:38Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -6079,7 +6079,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 0368800ba3..19748559ab 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1185,10 +1185,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2023-10-03T20:29:42Z", + "updated_at": "2023-10-08T19:42:15Z", "pushed_at": "2023-05-20T05:55:45Z", - "stargazers_count": 453, - "watchers_count": 453, + "stargazers_count": 454, + "watchers_count": 454, "has_discussions": false, "forks_count": 129, "allow_forking": true, @@ -1197,7 +1197,7 @@ "topics": [], "visibility": "public", "forks": 129, - "watchers": 453, + "watchers": 454, "score": 0, "subscribers_count": 15 }, diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json index 15b84f60d0..043836cf3f 100644 --- a/2022/CVE-2022-46169.json +++ b/2022/CVE-2022-46169.json @@ -235,10 +235,10 @@ "description": "RCE POC for CVE-2022-46169", "fork": false, "created_at": "2023-01-16T10:21:26Z", - "updated_at": "2023-06-05T10:15:44Z", + "updated_at": "2023-10-08T20:21:44Z", "pushed_at": "2023-01-17T16:32:46Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -247,7 +247,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 7ec83bc950..43ac2efd27 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -13,10 +13,10 @@ "description": "Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence", "fork": false, "created_at": "2023-10-06T20:29:44Z", - "updated_at": "2023-10-08T17:48:30Z", + "updated_at": "2023-10-08T22:08:31Z", "pushed_at": "2023-10-06T21:59:30Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 22, + "watchers": 24, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json index cf5f2a4c8b..f79946c818 100644 --- a/2023/CVE-2023-2640.json +++ b/2023/CVE-2023-2640.json @@ -78,10 +78,10 @@ "description": "GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0", "fork": false, "created_at": "2023-09-17T23:17:22Z", - "updated_at": "2023-09-30T09:09:12Z", + "updated_at": "2023-10-08T19:25:44Z", "pushed_at": "2023-09-17T23:38:32Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -90,7 +90,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json index c38d33eb3a..b7853271ac 100644 --- a/2023/CVE-2023-29357.json +++ b/2023/CVE-2023-29357.json @@ -13,10 +13,10 @@ "description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability", "fork": false, "created_at": "2023-09-26T16:18:41Z", - "updated_at": "2023-10-08T13:47:43Z", + "updated_at": "2023-10-08T22:15:14Z", "pushed_at": "2023-09-26T19:04:21Z", - "stargazers_count": 151, - "watchers_count": 151, + "stargazers_count": 152, + "watchers_count": 152, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 151, + "watchers": 152, "score": 0, "subscribers_count": 2 }, @@ -50,10 +50,10 @@ "description": null, "fork": false, "created_at": "2023-09-30T23:17:04Z", - "updated_at": "2023-10-06T08:23:36Z", + "updated_at": "2023-10-08T22:07:44Z", "pushed_at": "2023-10-01T06:23:28Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 33, + "watchers": 34, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-29360.json b/2023/CVE-2023-29360.json index bbde75825f..03b867deb5 100644 --- a/2023/CVE-2023-29360.json +++ b/2023/CVE-2023-29360.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver", "fork": false, "created_at": "2023-09-24T21:59:23Z", - "updated_at": "2023-10-08T16:21:52Z", + "updated_at": "2023-10-08T18:30:32Z", "pushed_at": "2023-09-26T09:49:37Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index 4f67c899b1..9061c34326 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -103,10 +103,10 @@ "description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin", "fork": false, "created_at": "2023-06-18T15:42:00Z", - "updated_at": "2023-09-08T18:54:50Z", + "updated_at": "2023-10-08T18:46:33Z", "pushed_at": "2023-06-19T04:42:56Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-34040.json b/2023/CVE-2023-34040.json index 20963075d8..695486b060 100644 --- a/2023/CVE-2023-34040.json +++ b/2023/CVE-2023-34040.json @@ -48,13 +48,13 @@ "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 11, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-36845.json b/2023/CVE-2023-36845.json index 65fd81d16d..73d2be1ab9 100644 --- a/2023/CVE-2023-36845.json +++ b/2023/CVE-2023-36845.json @@ -50,7 +50,7 @@ "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -75,7 +75,7 @@ "web-application-security" ], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 18, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 2570c6a3e1..7402e6f3a3 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -43,10 +43,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2023-10-08T16:09:29Z", + "updated_at": "2023-10-08T19:40:26Z", "pushed_at": "2023-09-17T02:17:52Z", - "stargazers_count": 669, - "watchers_count": 669, + "stargazers_count": 670, + "watchers_count": 670, "has_discussions": false, "forks_count": 118, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 118, - "watchers": 669, + "watchers": 670, "score": 0, "subscribers_count": 8 }, diff --git a/2023/CVE-2023-43115.json b/2023/CVE-2023-43115.json index 76504e3736..71454af404 100644 --- a/2023/CVE-2023-43115.json +++ b/2023/CVE-2023-43115.json @@ -13,10 +13,10 @@ "description": "A small write-up with examples to understand CVE-2023-43115", "fork": false, "created_at": "2023-09-28T17:30:06Z", - "updated_at": "2023-10-08T08:41:46Z", + "updated_at": "2023-10-08T18:38:34Z", "pushed_at": "2023-09-29T18:21:56Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index 9d1ae40dde..d51920b344 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -43,10 +43,10 @@ "description": "PoC for CVE-2023-4911", "fork": false, "created_at": "2023-10-04T14:12:16Z", - "updated_at": "2023-10-08T17:44:16Z", + "updated_at": "2023-10-08T21:46:54Z", "pushed_at": "2023-10-04T14:16:36Z", - "stargazers_count": 274, - "watchers_count": 274, + "stargazers_count": 275, + "watchers_count": 275, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 37, - "watchers": 274, + "watchers": 275, "score": 0, "subscribers_count": 2 }, @@ -73,19 +73,19 @@ "description": "CVE-2023-4911 proof of concept", "fork": false, "created_at": "2023-10-04T14:32:49Z", - "updated_at": "2023-10-08T17:00:23Z", - "pushed_at": "2023-10-04T16:54:54Z", - "stargazers_count": 106, - "watchers_count": 106, + "updated_at": "2023-10-08T23:47:57Z", + "pushed_at": "2023-10-08T23:24:24Z", + "stargazers_count": 108, + "watchers_count": 108, "has_discussions": false, - "forks_count": 18, + "forks_count": 19, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 18, - "watchers": 106, + "forks": 19, + "watchers": 108, "score": 0, "subscribers_count": 3 }, diff --git a/README.md b/README.md index 934a3bf9b4..7e23047a66 100644 --- a/README.md +++ b/README.md @@ -35555,6 +35555,13 @@ - [schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit](https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit) +### CVE-2005-3299 (2005-10-23) + +PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array. + + +- [RizeKishimaro/CVE-2005-3299](https://github.com/RizeKishimaro/CVE-2005-3299) + ## 2004 ### CVE-2004-0558 (2004-09-17)