diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 056a5276b4..40410b65c0 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-17T08:08:02Z", + "updated_at": "2023-03-19T10:43:27Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1642, - "watchers_count": 1642, + "stargazers_count": 1643, + "watchers_count": 1643, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1642, + "watchers": 1643, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 263161ec7a..97738868cf 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -42,10 +42,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-17T08:08:02Z", + "updated_at": "2023-03-19T10:43:27Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1642, - "watchers_count": 1642, + "stargazers_count": 1643, + "watchers_count": 1643, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1642, + "watchers": 1643, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 6ae31f198d..cbed8f7a2a 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -568,10 +568,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-17T08:08:02Z", + "updated_at": "2023-03-19T10:43:27Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1642, - "watchers_count": 1642, + "stargazers_count": 1643, + "watchers_count": 1643, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -601,7 +601,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1642, + "watchers": 1643, "score": 0 }, { diff --git a/2018/CVE-2018-3639.json b/2018/CVE-2018-3639.json index 1977193e6a..27314d787d 100644 --- a/2018/CVE-2018-3639.json +++ b/2018/CVE-2018-3639.json @@ -77,10 +77,10 @@ "description": "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux", "fork": false, "created_at": "2019-05-11T12:11:05Z", - "updated_at": "2023-03-11T14:31:06Z", + "updated_at": "2023-03-19T08:41:46Z", "pushed_at": "2021-10-22T16:05:33Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -93,7 +93,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json index 7cda815eb3..ff0c13ae7e 100644 --- a/2018/CVE-2018-6242.json +++ b/2018/CVE-2018-6242.json @@ -13,10 +13,10 @@ "description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)", "fork": false, "created_at": "2018-04-28T11:50:00Z", - "updated_at": "2023-03-08T09:30:11Z", + "updated_at": "2023-03-19T11:31:46Z", "pushed_at": "2022-12-11T10:44:39Z", - "stargazers_count": 475, - "watchers_count": 475, + "stargazers_count": 477, + "watchers_count": 477, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 60, - "watchers": 475, + "watchers": 477, "score": 0 }, { diff --git a/2018/CVE-2018-6376.json b/2018/CVE-2018-6376.json index f33abf765c..5354e30d7b 100644 --- a/2018/CVE-2018-6376.json +++ b/2018/CVE-2018-6376.json @@ -13,7 +13,7 @@ "description": "Joomla!, Second Order SQL Injection", "fork": false, "created_at": "2018-02-12T05:02:52Z", - "updated_at": "2018-10-04T17:23:42Z", + "updated_at": "2023-03-19T07:44:34Z", "pushed_at": "2018-02-12T12:14:40Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index 3e6a5cb3d8..7e267326b3 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -42,10 +42,10 @@ "description": "CVE-2019-1458 Windows LPE Exploit", "fork": false, "created_at": "2020-03-11T08:30:14Z", - "updated_at": "2023-02-04T13:29:09Z", + "updated_at": "2023-03-19T07:59:19Z", "pushed_at": "2020-03-11T09:59:01Z", - "stargazers_count": 125, - "watchers_count": 125, + "stargazers_count": 126, + "watchers_count": 126, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -58,7 +58,7 @@ ], "visibility": "public", "forks": 37, - "watchers": 125, + "watchers": 126, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 4ad5dfbb07..706b29ccce 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -187,10 +187,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-17T08:08:02Z", + "updated_at": "2023-03-19T10:43:27Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1642, - "watchers_count": 1642, + "stargazers_count": 1643, + "watchers_count": 1643, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -220,7 +220,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1642, + "watchers": 1643, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-12928.json b/2020/CVE-2020-12928.json index 4fa6515958..8cafc09bdc 100644 --- a/2020/CVE-2020-12928.json +++ b/2020/CVE-2020-12928.json @@ -13,10 +13,10 @@ "description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#", "fork": false, "created_at": "2020-11-10T13:08:21Z", - "updated_at": "2023-03-01T04:16:33Z", + "updated_at": "2023-03-19T10:17:07Z", "pushed_at": "2021-02-14T15:08:01Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 35, + "watchers": 36, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 0e7a89d157..4ea75a8287 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -165,10 +165,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2023-03-16T22:40:21Z", + "updated_at": "2023-03-19T11:58:04Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 522, - "watchers_count": 522, + "stargazers_count": 523, + "watchers_count": 523, "has_discussions": false, "forks_count": 141, "allow_forking": true, @@ -177,7 +177,7 @@ "topics": [], "visibility": "public", "forks": 141, - "watchers": 522, + "watchers": 523, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index d0786afd53..3b3ea4f3fc 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-17T08:08:02Z", + "updated_at": "2023-03-19T10:43:27Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1642, - "watchers_count": 1642, + "stargazers_count": 1643, + "watchers_count": 1643, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1642, + "watchers": 1643, "score": 0 }, { diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json index ea8ff7f7c6..c5b597e8f0 100644 --- a/2021/CVE-2021-36934.json +++ b/2021/CVE-2021-36934.json @@ -81,13 +81,13 @@ "stargazers_count": 33, "watchers_count": 33, "has_discussions": false, - "forks_count": 18, + "forks_count": 19, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 18, + "forks": 19, "watchers": 33, "score": 0 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 6040688c69..a3e34371de 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -77,10 +77,10 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2023-03-18T18:36:52Z", + "updated_at": "2023-03-19T10:33:22Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1766, - "watchers_count": 1766, + "stargazers_count": 1767, + "watchers_count": 1767, "has_discussions": false, "forks_count": 505, "allow_forking": true, @@ -89,7 +89,7 @@ "topics": [], "visibility": "public", "forks": 505, - "watchers": 1766, + "watchers": 1767, "score": 0 }, { diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json index 698deba8ad..6f19e71b12 100644 --- a/2021/CVE-2021-4045.json +++ b/2021/CVE-2021-4045.json @@ -13,10 +13,10 @@ "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera", "fork": false, "created_at": "2021-11-15T14:48:14Z", - "updated_at": "2023-03-14T14:38:39Z", + "updated_at": "2023-03-19T11:17:05Z", "pushed_at": "2023-01-01T21:12:20Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 30, + "watchers": 31, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index a5c87cd06e..58261889c2 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -5156,10 +5156,10 @@ "description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046", "fork": false, "created_at": "2021-12-13T21:47:41Z", - "updated_at": "2023-03-09T09:24:17Z", + "updated_at": "2023-03-19T07:59:48Z", "pushed_at": "2022-12-27T20:59:51Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 69, + "watchers_count": 69, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -5176,7 +5176,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 68, + "watchers": 69, "score": 0 }, { diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json index 5ffa4527db..911f98d091 100644 --- a/2022/CVE-2022-0337.json +++ b/2022/CVE-2022-0337.json @@ -13,7 +13,7 @@ "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "fork": false, "created_at": "2022-03-19T08:10:46Z", - "updated_at": "2023-03-13T15:04:56Z", + "updated_at": "2023-03-19T11:58:01Z", "pushed_at": "2022-09-04T17:28:56Z", "stargazers_count": 313, "watchers_count": 313, diff --git a/2022/CVE-2022-0739.json b/2022/CVE-2022-0739.json index 20959af826..163e220e82 100644 --- a/2022/CVE-2022-0739.json +++ b/2022/CVE-2022-0739.json @@ -206,5 +206,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 616018302, + "name": "Bash-exploit-for-CVE-2022-0739", + "full_name": "luxel-h\/Bash-exploit-for-CVE-2022-0739", + "owner": { + "login": "luxel-h", + "id": 125658579, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125658579?v=4", + "html_url": "https:\/\/github.com\/luxel-h" + }, + "html_url": "https:\/\/github.com\/luxel-h\/Bash-exploit-for-CVE-2022-0739", + "description": null, + "fork": false, + "created_at": "2023-03-19T11:35:03Z", + "updated_at": "2023-03-19T11:53:50Z", + "pushed_at": "2023-03-19T11:52:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index 6bda86baed..10d7a110bf 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "fork": false, "created_at": "2023-01-10T16:24:51Z", - "updated_at": "2023-03-17T07:07:00Z", + "updated_at": "2023-03-19T07:40:28Z", "pushed_at": "2023-01-10T16:25:49Z", - "stargazers_count": 177, - "watchers_count": 177, + "stargazers_count": 178, + "watchers_count": 178, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 177, + "watchers": 178, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-23773.json b/2022/CVE-2022-23773.json index e7b08f5862..a7b93328f0 100644 --- a/2022/CVE-2022-23773.json +++ b/2022/CVE-2022-23773.json @@ -56,5 +56,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 615996454, + "name": "CVE-2022-23773-Reproduce", + "full_name": "Liuyushung\/CVE-2022-23773-Reproduce", + "owner": { + "login": "Liuyushung", + "id": 51371214, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51371214?v=4", + "html_url": "https:\/\/github.com\/Liuyushung" + }, + "html_url": "https:\/\/github.com\/Liuyushung\/CVE-2022-23773-Reproduce", + "description": null, + "fork": false, + "created_at": "2023-03-19T10:08:47Z", + "updated_at": "2023-03-19T10:12:25Z", + "pushed_at": "2023-03-19T11:57:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json index fd83fcd4d3..8570a19620 100644 --- a/2022/CVE-2022-2588.json +++ b/2022/CVE-2022-2588.json @@ -13,10 +13,10 @@ "description": "exploit for CVE-2022-2588", "fork": false, "created_at": "2022-08-11T06:01:24Z", - "updated_at": "2023-03-14T21:03:40Z", + "updated_at": "2023-03-19T12:02:56Z", "pushed_at": "2023-03-04T05:52:28Z", - "stargazers_count": 418, - "watchers_count": 418, + "stargazers_count": 419, + "watchers_count": 419, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 60, - "watchers": 418, + "watchers": 419, "score": 0 }, { diff --git a/2022/CVE-2022-27255.json b/2022/CVE-2022-27255.json index 2cff4568ac..7742266c1f 100644 --- a/2022/CVE-2022-27255.json +++ b/2022/CVE-2022-27255.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-07-06T17:29:04Z", - "updated_at": "2023-03-08T18:09:28Z", + "updated_at": "2023-03-19T09:55:07Z", "pushed_at": "2022-08-30T13:23:51Z", - "stargazers_count": 253, - "watchers_count": 253, + "stargazers_count": 254, + "watchers_count": 254, "has_discussions": false, "forks_count": 49, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 49, - "watchers": 253, + "watchers": 254, "score": 0 }, { diff --git a/2022/CVE-2022-32250.json b/2022/CVE-2022-32250.json index 02d5d64d97..b8566f1455 100644 --- a/2022/CVE-2022-32250.json +++ b/2022/CVE-2022-32250.json @@ -18,13 +18,13 @@ "stargazers_count": 131, "watchers_count": 131, "has_discussions": false, - "forks_count": 34, + "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 34, + "forks": 35, "watchers": 131, "score": 0 }, diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json index 3d8aad49b3..eed565d7a9 100644 --- a/2022/CVE-2022-34918.json +++ b/2022/CVE-2022-34918.json @@ -158,10 +158,10 @@ "description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC", "fork": false, "created_at": "2022-08-02T09:52:02Z", - "updated_at": "2023-03-17T14:35:51Z", + "updated_at": "2023-03-19T08:31:56Z", "pushed_at": "2022-09-15T03:19:28Z", - "stargazers_count": 199, - "watchers_count": 199, + "stargazers_count": 200, + "watchers_count": 200, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -170,7 +170,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 199, + "watchers": 200, "score": 0 }, { diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json index cc4e6c2697..e12a6e6402 100644 --- a/2022/CVE-2022-3699.json +++ b/2022/CVE-2022-3699.json @@ -13,10 +13,10 @@ "description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W", "fork": false, "created_at": "2022-11-09T14:15:30Z", - "updated_at": "2023-02-27T03:17:02Z", + "updated_at": "2023-03-19T12:09:44Z", "pushed_at": "2022-12-05T23:36:42Z", - "stargazers_count": 140, - "watchers_count": 140, + "stargazers_count": 141, + "watchers_count": 141, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 140, + "watchers": 141, "score": 0 }, { diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index 0ca64deb26..304a6eb8cf 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -18,13 +18,13 @@ "stargazers_count": 214, "watchers_count": 214, "has_discussions": false, - "forks_count": 30, + "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 30, + "forks": 31, "watchers": 214, "score": 0 }, @@ -195,13 +195,13 @@ "stargazers_count": 114, "watchers_count": 114, "has_discussions": false, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, + "forks": 18, "watchers": 114, "score": 0 }, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index c7f2733b43..600ab55474 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -378,10 +378,10 @@ "description": "Example of CVE-2022-46689 aka MacDirtyCow.", "fork": false, "created_at": "2023-03-01T08:23:49Z", - "updated_at": "2023-03-18T11:28:54Z", + "updated_at": "2023-03-19T10:34:06Z", "pushed_at": "2023-03-01T08:25:46Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -397,7 +397,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-0861.json b/2023/CVE-2023-0861.json index 534e152696..d38ce34433 100644 --- a/2023/CVE-2023-0861.json +++ b/2023/CVE-2023-0861.json @@ -13,10 +13,10 @@ "description": "Analyzing and Reproducing the Command Injection Vulnerability (CVE-2023-0861) in NetModule Routers", "fork": false, "created_at": "2023-03-12T17:43:00Z", - "updated_at": "2023-03-18T17:22:37Z", + "updated_at": "2023-03-19T11:04:34Z", "pushed_at": "2023-03-16T19:17:47Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21036.json b/2023/CVE-2023-21036.json index d08e684854..1ef10c3920 100644 --- a/2023/CVE-2023-21036.json +++ b/2023/CVE-2023-21036.json @@ -13,10 +13,10 @@ "description": "Discord bot which monitors for and deletes images vulnerable to the Acropalypse exploit (CVE-2023-21036)", "fork": false, "created_at": "2023-03-19T02:15:23Z", - "updated_at": "2023-03-19T05:21:46Z", + "updated_at": "2023-03-19T07:34:00Z", "pushed_at": "2023-03-19T05:21:43Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21608.json b/2023/CVE-2023-21608.json index a836c86903..f280657b56 100644 --- a/2023/CVE-2023-21608.json +++ b/2023/CVE-2023-21608.json @@ -13,10 +13,10 @@ "description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit", "fork": false, "created_at": "2023-01-30T12:57:48Z", - "updated_at": "2023-03-16T15:50:50Z", + "updated_at": "2023-03-19T12:17:46Z", "pushed_at": "2023-02-27T04:51:20Z", - "stargazers_count": 183, - "watchers_count": 183, + "stargazers_count": 184, + "watchers_count": 184, "has_discussions": false, "forks_count": 41, "allow_forking": true, @@ -35,7 +35,7 @@ ], "visibility": "public", "forks": 41, - "watchers": 183, + "watchers": 184, "score": 0 }, { diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 9c6a2e0dd5..9da85e3718 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -18,13 +18,13 @@ "stargazers_count": 306, "watchers_count": 306, "has_discussions": false, - "forks_count": 113, + "forks_count": 114, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 113, + "forks": 114, "watchers": 306, "score": 0 }, @@ -71,12 +71,12 @@ "description": "Using CVE-2023-21768 to manual map kernel mode driver ", "fork": false, "created_at": "2023-03-10T19:08:28Z", - "updated_at": "2023-03-19T01:51:36Z", + "updated_at": "2023-03-19T07:30:27Z", "pushed_at": "2023-03-10T20:16:53Z", - "stargazers_count": 90, - "watchers_count": 90, + "stargazers_count": 91, + "watchers_count": 91, "has_discussions": false, - "forks_count": 26, + "forks_count": 27, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -90,8 +90,8 @@ "windows" ], "visibility": "public", - "forks": 26, - "watchers": 90, + "forks": 27, + "watchers": 91, "score": 0 }, { @@ -113,13 +113,13 @@ "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 10, "score": 0 } diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index 0d923b6c97..2e94860c7c 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -13,10 +13,10 @@ "description": "Exploit for the CVE-2023-23397", "fork": false, "created_at": "2023-03-15T17:03:38Z", - "updated_at": "2023-03-18T22:39:44Z", + "updated_at": "2023-03-19T11:45:58Z", "pushed_at": "2023-03-15T17:53:53Z", - "stargazers_count": 115, - "watchers_count": 115, + "stargazers_count": 116, + "watchers_count": 116, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 115, + "watchers": 116, "score": 0 }, { @@ -129,10 +129,10 @@ "description": "Simple PoC in PowerShell for CVE-2023-23397", "fork": false, "created_at": "2023-03-16T19:10:37Z", - "updated_at": "2023-03-18T14:34:33Z", + "updated_at": "2023-03-19T11:45:46Z", "pushed_at": "2023-03-16T19:29:49Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -151,7 +151,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 11, "score": 0 }, { @@ -168,10 +168,10 @@ "description": null, "fork": false, "created_at": "2023-03-16T19:43:39Z", - "updated_at": "2023-03-19T03:55:03Z", + "updated_at": "2023-03-19T11:46:11Z", "pushed_at": "2023-03-17T07:47:40Z", - "stargazers_count": 173, - "watchers_count": 173, + "stargazers_count": 179, + "watchers_count": 179, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -180,7 +180,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 173, + "watchers": 179, "score": 0 }, { @@ -327,5 +327,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 615967703, + "name": "CVE-2023-23397-POC-Using-Interop-Outlook", + "full_name": "ahmedkhlief\/CVE-2023-23397-POC-Using-Interop-Outlook", + "owner": { + "login": "ahmedkhlief", + "id": 24752712, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24752712?v=4", + "html_url": "https:\/\/github.com\/ahmedkhlief" + }, + "html_url": "https:\/\/github.com\/ahmedkhlief\/CVE-2023-23397-POC-Using-Interop-Outlook", + "description": null, + "fork": false, + "created_at": "2023-03-19T08:07:58Z", + "updated_at": "2023-03-19T10:18:31Z", + "pushed_at": "2023-03-19T08:10:44Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-23415.json b/2023/CVE-2023-23415.json index ca4ddfebdc..7e2d7a691e 100644 --- a/2023/CVE-2023-23415.json +++ b/2023/CVE-2023-23415.json @@ -13,19 +13,19 @@ "description": "CVE-2023-23415", "fork": false, "created_at": "2023-03-17T12:38:30Z", - "updated_at": "2023-03-19T04:43:02Z", + "updated_at": "2023-03-19T12:08:40Z", "pushed_at": "2023-03-17T12:45:04Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, - "forks_count": 2, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 16, + "forks": 4, + "watchers": 28, "score": 0 }, { diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index 62f34f7fee..be5f8bc353 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -71,10 +71,10 @@ "description": "OpenSSH 9.1 vulnerability mass scan and exploit", "fork": false, "created_at": "2023-02-22T19:44:08Z", - "updated_at": "2023-03-18T15:07:54Z", + "updated_at": "2023-03-19T11:12:46Z", "pushed_at": "2023-03-07T10:43:36Z", - "stargazers_count": 83, - "watchers_count": 83, + "stargazers_count": 85, + "watchers_count": 85, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 83, + "watchers": 85, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 188b2d782b..6829e15a6c 100644 --- a/README.md +++ b/README.md @@ -264,6 +264,7 @@ Microsoft Outlook Elevation of Privilege Vulnerability - [ahmedkhlief/CVE-2023-23397-POC](https://github.com/ahmedkhlief/CVE-2023-23397-POC) - [BillSkiCO/CVE-2023-23397_EXPLOIT](https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT) - [djackreuter/CVE-2023-23397-PoC](https://github.com/djackreuter/CVE-2023-23397-PoC) +- [ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook](https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook) ### CVE-2023-23415 (2023-03-14) @@ -572,6 +573,7 @@ The BookingPress WordPress plugin before 1.0.11 fails to properly sanitize user - [Ki11i0n4ir3/CVE-2022-0739](https://github.com/Ki11i0n4ir3/CVE-2022-0739) - [viardant/CVE-2022-0739](https://github.com/viardant/CVE-2022-0739) - [ElGanz0/CVE-2022-0739](https://github.com/ElGanz0/CVE-2022-0739) +- [luxel-h/Bash-exploit-for-CVE-2022-0739](https://github.com/luxel-h/Bash-exploit-for-CVE-2022-0739) ### CVE-2022-0778 (2022-03-15) @@ -2359,6 +2361,7 @@ cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch nam - [danbudris/CVE-2022-23773-repro](https://github.com/danbudris/CVE-2022-23773-repro) - [danbudris/CVE-2022-23773-repro-target](https://github.com/danbudris/CVE-2022-23773-repro-target) +- [Liuyushung/CVE-2022-23773-Reproduce](https://github.com/Liuyushung/CVE-2022-23773-Reproduce) ### CVE-2022-23779 (2022-03-02)