From a33661459a0e570b4a9624bc0225a11179200a3f Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 30 Dec 2023 15:26:05 +0900 Subject: [PATCH] Auto Update 2023/12/30 06:26:05 --- 2016/CVE-2016-0701.json | 32 ------ 2016/CVE-2016-0728.json | 30 ------ 2016/CVE-2016-0846.json | 30 ------ 2016/CVE-2016-2118.json | 32 ------ 2016/CVE-2016-3141.json | 32 ------ 2016/CVE-2016-4437.json | 30 ++++++ 2016/CVE-2016-5195.json | 8 +- 2017/CVE-2017-1000170.json | 8 +- 2019/CVE-2019-17558.json | 8 +- 2019/CVE-2019-18935.json | 12 +-- 2020/CVE-2020-14882.json | 8 +- 2020/CVE-2020-7661.json | 8 +- 2021/CVE-2021-1675.json | 4 +- 2021/CVE-2021-1732.json | 4 +- 2021/CVE-2021-24499.json | 30 ------ 2021/CVE-2021-27651.json | 34 ------ 2021/CVE-2021-34473.json | 8 +- 2021/CVE-2021-41773.json | 210 ------------------------------------- 2021/CVE-2021-44228.json | 16 +-- 2022/CVE-2022-0847.json | 2 +- 2022/CVE-2022-26134.json | 2 +- 2022/CVE-2022-31705.json | 8 +- 2022/CVE-2022-45688.json | 2 +- 2023/CVE-2023-21716.json | 8 +- 2023/CVE-2023-23752.json | 2 +- 2023/CVE-2023-27163.json | 2 +- 2023/CVE-2023-36845.json | 4 +- 2023/CVE-2023-36874.json | 8 +- 2023/CVE-2023-40121.json | 2 +- 2023/CVE-2023-49438.json | 2 +- 2023/CVE-2023-51385.json | 60 +++++------ 2023/CVE-2023-51467.json | 6 +- README.md | 35 +------ 33 files changed, 128 insertions(+), 559 deletions(-) delete mode 100644 2016/CVE-2016-0701.json delete mode 100644 2016/CVE-2016-2118.json delete mode 100644 2016/CVE-2016-3141.json diff --git a/2016/CVE-2016-0701.json b/2016/CVE-2016-0701.json deleted file mode 100644 index 3ed9011812..0000000000 --- a/2016/CVE-2016-0701.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 50957830, - "name": "cve-2016-0701", - "full_name": "luanjampa\/cve-2016-0701", - "owner": { - "login": "luanjampa", - "id": 4728927, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4728927?v=4", - "html_url": "https:\/\/github.com\/luanjampa" - }, - "html_url": "https:\/\/github.com\/luanjampa\/cve-2016-0701", - "description": null, - "fork": false, - "created_at": "2016-02-02T22:53:34Z", - "updated_at": "2016-02-15T06:03:46Z", - "pushed_at": "2016-02-24T17:32:15Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 4 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-0728.json b/2016/CVE-2016-0728.json index 9cfefcedc1..13defe366b 100644 --- a/2016/CVE-2016-0728.json +++ b/2016/CVE-2016-0728.json @@ -119,36 +119,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 50619014, - "name": "cve-2016-0728-testbed", - "full_name": "neuschaefer\/cve-2016-0728-testbed", - "owner": { - "login": "neuschaefer", - "id": 1021512, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1021512?v=4", - "html_url": "https:\/\/github.com\/neuschaefer" - }, - "html_url": "https:\/\/github.com\/neuschaefer\/cve-2016-0728-testbed", - "description": "A testbed for CVE-2016-0728, a refcount leak\/overflow bug in Linux", - "fork": false, - "created_at": "2016-01-28T22:38:13Z", - "updated_at": "2023-02-16T19:24:26Z", - "pushed_at": "2016-01-29T00:48:38Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0, - "subscribers_count": 4 - }, { "id": 53915696, "name": "cve-2016-0728", diff --git a/2016/CVE-2016-0846.json b/2016/CVE-2016-0846.json index ad0a17309d..bd50dd3ee4 100644 --- a/2016/CVE-2016-0846.json +++ b/2016/CVE-2016-0846.json @@ -28,35 +28,5 @@ "watchers": 38, "score": 0, "subscribers_count": 5 - }, - { - "id": 56596683, - "name": "CVE-2016-0846-PoC", - "full_name": "b0b0505\/CVE-2016-0846-PoC", - "owner": { - "login": "b0b0505", - "id": 6748041, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6748041?v=4", - "html_url": "https:\/\/github.com\/b0b0505" - }, - "html_url": "https:\/\/github.com\/b0b0505\/CVE-2016-0846-PoC", - "description": null, - "fork": false, - "created_at": "2016-04-19T12:56:44Z", - "updated_at": "2016-04-27T18:05:22Z", - "pushed_at": "2016-04-19T13:01:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 1, - "score": 0, - "subscribers_count": 3 } ] \ No newline at end of file diff --git a/2016/CVE-2016-2118.json b/2016/CVE-2016-2118.json deleted file mode 100644 index 51822187ee..0000000000 --- a/2016/CVE-2016-2118.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 56461631, - "name": "cfengine-CVE-2016-2118", - "full_name": "nickanderson\/cfengine-CVE-2016-2118", - "owner": { - "login": "nickanderson", - "id": 202896, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4", - "html_url": "https:\/\/github.com\/nickanderson" - }, - "html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118", - "description": "An example detection and remediation policy.", - "fork": false, - "created_at": "2016-04-17T22:22:04Z", - "updated_at": "2016-04-18T02:57:44Z", - "pushed_at": "2016-04-19T14:24:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-3141.json b/2016/CVE-2016-3141.json deleted file mode 100644 index c8f293c780..0000000000 --- a/2016/CVE-2016-3141.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 56758577, - "name": "CVE-2016-3141", - "full_name": "peternguyen93\/CVE-2016-3141", - "owner": { - "login": "peternguyen93", - "id": 1802870, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4", - "html_url": "https:\/\/github.com\/peternguyen93" - }, - "html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141", - "description": "CVE-2016-3141", - "fork": false, - "created_at": "2016-04-21T08:59:05Z", - "updated_at": "2023-03-11T18:41:15Z", - "pushed_at": "2016-04-23T15:55:01Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 15, - "score": 0, - "subscribers_count": 3 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-4437.json b/2016/CVE-2016-4437.json index 80c87bc2d7..d5081bc2e0 100644 --- a/2016/CVE-2016-4437.json +++ b/2016/CVE-2016-4437.json @@ -88,5 +88,35 @@ "watchers": 23, "score": 0, "subscribers_count": 1 + }, + { + "id": 734562621, + "name": "CVE-2016-4437", + "full_name": "pizza-power\/CVE-2016-4437", + "owner": { + "login": "pizza-power", + "id": 6135659, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4", + "html_url": "https:\/\/github.com\/pizza-power" + }, + "html_url": "https:\/\/github.com\/pizza-power\/CVE-2016-4437", + "description": "Python POC to Exploit CVE-2016-4437 Apache Shiro Deserialization Vulnerability Due to Hardcode Encryption Key", + "fork": false, + "created_at": "2023-12-22T02:26:01Z", + "updated_at": "2023-12-30T02:29:10Z", + "pushed_at": "2023-12-30T02:30:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 030d22b8a2..10ccd11124 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -447,10 +447,10 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2023-12-29T09:10:06Z", + "updated_at": "2023-12-30T03:41:29Z", "pushed_at": "2021-04-08T11:35:12Z", - "stargazers_count": 787, - "watchers_count": 787, + "stargazers_count": 788, + "watchers_count": 788, "has_discussions": false, "forks_count": 436, "allow_forking": true, @@ -463,7 +463,7 @@ ], "visibility": "public", "forks": 436, - "watchers": 787, + "watchers": 788, "score": 0, "subscribers_count": 11 }, diff --git a/2017/CVE-2017-1000170.json b/2017/CVE-2017-1000170.json index 10b8a54623..124f6cf280 100644 --- a/2017/CVE-2017-1000170.json +++ b/2017/CVE-2017-1000170.json @@ -13,10 +13,10 @@ "description": "Jquery File Tree 1.6.6 Path Traversal exploit (CVE-2017-1000170)", "fork": false, "created_at": "2021-03-19T12:39:10Z", - "updated_at": "2023-05-16T18:47:07Z", + "updated_at": "2023-12-30T03:34:28Z", "pushed_at": "2021-05-04T18:21:30Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index ee7908d8ae..8fe52c3afe 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-12-29T16:49:30Z", + "updated_at": "2023-12-30T05:44:07Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3966, - "watchers_count": 3966, + "stargazers_count": 3967, + "watchers_count": 3967, "has_discussions": false, "forks_count": 1094, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1094, - "watchers": 3966, + "watchers": 3967, "score": 0, "subscribers_count": 155 }, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index b68137ec5b..ca51e18396 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -103,19 +103,19 @@ "description": "TelerikUI Vulnerability Scanner (CVE-2019-18935)", "fork": false, "created_at": "2020-05-25T08:37:51Z", - "updated_at": "2023-10-28T10:33:02Z", + "updated_at": "2023-12-30T03:47:40Z", "pushed_at": "2023-05-10T02:17:34Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, - "watchers": 9, + "forks": 7, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 951bcd4dba..08fa236850 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-12-29T16:49:30Z", + "updated_at": "2023-12-30T05:44:07Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3966, - "watchers_count": 3966, + "stargazers_count": 3967, + "watchers_count": 3967, "has_discussions": false, "forks_count": 1094, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1094, - "watchers": 3966, + "watchers": 3967, "score": 0, "subscribers_count": 155 }, diff --git a/2020/CVE-2020-7661.json b/2020/CVE-2020-7661.json index c0f0144b29..c2efd152ee 100644 --- a/2020/CVE-2020-7661.json +++ b/2020/CVE-2020-7661.json @@ -13,10 +13,10 @@ "description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.", "fork": false, "created_at": "2020-08-15T07:42:50Z", - "updated_at": "2023-12-20T07:38:09Z", + "updated_at": "2023-12-30T03:49:09Z", "pushed_at": "2023-08-15T17:57:06Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -38,7 +38,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 73, + "watchers": 74, "score": 0, "subscribers_count": 6 } diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 59bd6c78d2..12a53bde39 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -48,13 +48,13 @@ "stargazers_count": 1766, "watchers_count": 1766, "has_discussions": false, - "forks_count": 586, + "forks_count": 585, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 586, + "forks": 585, "watchers": 1766, "score": 0, "subscribers_count": 44 diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 344c6ac6cf..1738345f30 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -138,13 +138,13 @@ "stargazers_count": 66, "watchers_count": 66, "has_discussions": false, - "forks_count": 18, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 18, + "forks": 17, "watchers": 66, "score": 0, "subscribers_count": 6 diff --git a/2021/CVE-2021-24499.json b/2021/CVE-2021-24499.json index 5d5b8c9333..2ad649b242 100644 --- a/2021/CVE-2021-24499.json +++ b/2021/CVE-2021-24499.json @@ -29,36 +29,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 414051484, - "name": "cve-2021-24499", - "full_name": "hh-hunter\/cve-2021-24499", - "owner": { - "login": "hh-hunter", - "id": 91593280, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4", - "html_url": "https:\/\/github.com\/hh-hunter" - }, - "html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-24499", - "description": null, - "fork": false, - "created_at": "2021-10-06T03:07:31Z", - "updated_at": "2021-10-06T03:45:29Z", - "pushed_at": "2021-10-06T03:44:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 698068217, "name": "CVE-2021-24499", diff --git a/2021/CVE-2021-27651.json b/2021/CVE-2021-27651.json index 0ba6c050a9..90ba3a97af 100644 --- a/2021/CVE-2021-27651.json +++ b/2021/CVE-2021-27651.json @@ -58,39 +58,5 @@ "watchers": 3, "score": 0, "subscribers_count": 1 - }, - { - "id": 414009465, - "name": "CVE-2021-27651", - "full_name": "orangmuda\/CVE-2021-27651", - "owner": { - "login": "orangmuda", - "id": 91846073, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/orangmuda" - }, - "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-27651", - "description": "bypass all stages of the password reset flow", - "fork": false, - "created_at": "2021-10-05T23:33:50Z", - "updated_at": "2023-09-28T11:32:04Z", - "pushed_at": "2021-10-05T23:35:24Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "code-injection", - "pega", - "remote-code-execution" - ], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json index 5bb33ae212..0ae7b06fa8 100644 --- a/2021/CVE-2021-34473.json +++ b/2021/CVE-2021-34473.json @@ -193,10 +193,10 @@ "description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability", "fork": false, "created_at": "2022-06-29T12:37:31Z", - "updated_at": "2023-12-13T16:01:00Z", + "updated_at": "2023-12-30T05:14:10Z", "pushed_at": "2022-06-30T08:36:58Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -205,7 +205,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 24, + "watchers": 25, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index c42c80837e..5a8be501ed 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -29,66 +29,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 413892415, - "name": "CVE-2021-41773", - "full_name": "numanturle\/CVE-2021-41773", - "owner": { - "login": "numanturle", - "id": 7007951, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4", - "html_url": "https:\/\/github.com\/numanturle" - }, - "html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773", - "description": "CVE-2021-41773", - "fork": false, - "created_at": "2021-10-05T16:18:09Z", - "updated_at": "2023-12-08T12:43:35Z", - "pushed_at": "2021-10-05T16:48:27Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 9, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 413901787, - "name": "CVE-2021-41773", - "full_name": "knqyf263\/CVE-2021-41773", - "owner": { - "login": "knqyf263", - "id": 2253692, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4", - "html_url": "https:\/\/github.com\/knqyf263" - }, - "html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773", - "description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ", - "fork": false, - "created_at": "2021-10-05T16:45:41Z", - "updated_at": "2023-12-08T12:43:35Z", - "pushed_at": "2021-10-06T05:40:34Z", - "stargazers_count": 10, - "watchers_count": 10, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 10, - "score": 0, - "subscribers_count": 3 - }, { "id": 413916578, "name": "CVE-2021-41773-PoC", @@ -155,96 +95,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 413943505, - "name": "CVE-2021-41773", - "full_name": "masahiro331\/CVE-2021-41773", - "owner": { - "login": "masahiro331", - "id": 20438853, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4", - "html_url": "https:\/\/github.com\/masahiro331" - }, - "html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773", - "description": null, - "fork": false, - "created_at": "2021-10-05T18:56:04Z", - "updated_at": "2023-09-28T11:32:03Z", - "pushed_at": "2021-10-06T03:43:42Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 413969845, - "name": "CVE-2021-41773", - "full_name": "j4k0m\/CVE-2021-41773", - "owner": { - "login": "j4k0m", - "id": 48088579, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4", - "html_url": "https:\/\/github.com\/j4k0m" - }, - "html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773", - "description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.", - "fork": false, - "created_at": "2021-10-05T20:30:01Z", - "updated_at": "2023-09-28T11:32:03Z", - "pushed_at": "2021-10-05T22:06:50Z", - "stargazers_count": 13, - "watchers_count": 13, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 13, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 413972926, - "name": "POC-CVE-2021-41773", - "full_name": "TishcaTpx\/POC-CVE-2021-41773", - "owner": { - "login": "TishcaTpx", - "id": 91351013, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4", - "html_url": "https:\/\/github.com\/TishcaTpx" - }, - "html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773", - "description": "Poc.py ", - "fork": false, - "created_at": "2021-10-05T20:41:34Z", - "updated_at": "2023-09-28T11:32:03Z", - "pushed_at": "2021-10-05T21:29:59Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 7, - "score": 0, - "subscribers_count": 2 - }, { "id": 414013246, "name": "CVE-2021-41773-PoC", @@ -342,36 +192,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 414050354, - "name": "CVE-2021-41773-PoC", - "full_name": "habibiefaried\/CVE-2021-41773-PoC", - "owner": { - "login": "habibiefaried", - "id": 4345690, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4", - "html_url": "https:\/\/github.com\/habibiefaried" - }, - "html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC", - "description": "PoC for CVE-2021-41773 with docker to demonstrate", - "fork": false, - "created_at": "2021-10-06T03:01:41Z", - "updated_at": "2023-09-28T11:32:04Z", - "pushed_at": "2021-10-06T05:39:24Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 5, - "score": 0, - "subscribers_count": 2 - }, { "id": 414082287, "name": "CVE-2021-41773-POC", @@ -402,36 +222,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 414082633, - "name": "cve-2021-41773-nse", - "full_name": "TAI-REx\/cve-2021-41773-nse", - "owner": { - "login": "TAI-REx", - "id": 78527947, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4", - "html_url": "https:\/\/github.com\/TAI-REx" - }, - "html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse", - "description": "CVE-2021-41773.nse", - "fork": false, - "created_at": "2021-10-06T05:36:22Z", - "updated_at": "2021-11-26T18:07:10Z", - "pushed_at": "2021-10-06T05:23:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 - }, { "id": 414108838, "name": "CVE-2021-41773", diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index b31257884e..3bfce74229 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -912,7 +912,7 @@ "stargazers_count": 1676, "watchers_count": 1676, "has_discussions": false, - "forks_count": 494, + "forks_count": 495, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -923,7 +923,7 @@ "security" ], "visibility": "public", - "forks": 494, + "forks": 495, "watchers": 1676, "score": 0, "subscribers_count": 26 @@ -3703,19 +3703,19 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2023-12-29T05:43:18Z", + "updated_at": "2023-12-30T02:39:35Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3323, - "watchers_count": 3323, + "stargazers_count": 3322, + "watchers_count": 3322, "has_discussions": true, - "forks_count": 750, + "forks_count": 751, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 750, - "watchers": 3323, + "forks": 751, + "watchers": 3322, "score": 0, "subscribers_count": 58 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index bac8c2ed97..0d30281b99 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -2777,6 +2777,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index a1e01d57d8..f329b25a01 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -2003,6 +2003,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-31705.json b/2022/CVE-2022-31705.json index 9d50f00420..8b636e29e3 100644 --- a/2022/CVE-2022-31705.json +++ b/2022/CVE-2022-31705.json @@ -13,10 +13,10 @@ "description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ", "fork": false, "created_at": "2023-01-09T04:27:15Z", - "updated_at": "2023-12-27T09:58:57Z", + "updated_at": "2023-12-30T03:03:49Z", "pushed_at": "2023-01-09T08:19:27Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 117, + "watchers": 118, "score": 0, "subscribers_count": 4 } diff --git a/2022/CVE-2022-45688.json b/2022/CVE-2022-45688.json index 98c3ea6887..2a6004d109 100644 --- a/2022/CVE-2022-45688.json +++ b/2022/CVE-2022-45688.json @@ -87,6 +87,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21716.json b/2023/CVE-2023-21716.json index 0c23a5be21..5094345c0d 100644 --- a/2023/CVE-2023-21716.json +++ b/2023/CVE-2023-21716.json @@ -73,10 +73,10 @@ "description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).", "fork": false, "created_at": "2023-03-08T06:20:45Z", - "updated_at": "2023-09-16T13:54:07Z", + "updated_at": "2023-12-30T02:10:18Z", "pushed_at": "2023-03-08T06:21:58Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 59, + "watchers": 60, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index f1a042358e..44bc48d870 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -1261,6 +1261,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-27163.json b/2023/CVE-2023-27163.json index 3873a543de..3a4cc2aaa4 100644 --- a/2023/CVE-2023-27163.json +++ b/2023/CVE-2023-27163.json @@ -437,6 +437,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36845.json b/2023/CVE-2023-36845.json index 0e6088d984..4ad13b7df2 100644 --- a/2023/CVE-2023-36845.json +++ b/2023/CVE-2023-36845.json @@ -50,7 +50,7 @@ "stargazers_count": 39, "watchers_count": 39, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -75,7 +75,7 @@ "web-application-security" ], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 39, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json index 2048c25adb..63903aac1d 100644 --- a/2023/CVE-2023-36874.json +++ b/2023/CVE-2023-36874.json @@ -73,10 +73,10 @@ "description": null, "fork": false, "created_at": "2023-08-23T12:07:40Z", - "updated_at": "2023-12-27T10:01:29Z", + "updated_at": "2023-12-30T02:40:58Z", "pushed_at": "2023-08-23T16:46:53Z", - "stargazers_count": 216, - "watchers_count": 216, + "stargazers_count": 217, + "watchers_count": 217, "has_discussions": false, "forks_count": 44, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 44, - "watchers": 216, + "watchers": 217, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-40121.json b/2023/CVE-2023-40121.json index c3b8f20aef..3c25fa79de 100644 --- a/2023/CVE-2023-40121.json +++ b/2023/CVE-2023-40121.json @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-49438.json b/2023/CVE-2023-49438.json index 5b5fbd4835..9020867937 100644 --- a/2023/CVE-2023-49438.json +++ b/2023/CVE-2023-49438.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-12-14T23:58:42Z", "updated_at": "2023-12-24T18:50:17Z", - "pushed_at": "2023-12-27T23:41:09Z", + "pushed_at": "2023-12-30T02:02:19Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, diff --git a/2023/CVE-2023-51385.json b/2023/CVE-2023-51385.json index 25bb0c5dbf..bbae05edda 100644 --- a/2023/CVE-2023-51385.json +++ b/2023/CVE-2023-51385.json @@ -209,36 +209,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 736713584, - "name": "CVE-2023-51385_test-star-main", - "full_name": "siyi-star\/CVE-2023-51385_test-star-main", - "owner": { - "login": "siyi-star", - "id": 60383315, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60383315?v=4", - "html_url": "https:\/\/github.com\/siyi-star" - }, - "html_url": "https:\/\/github.com\/siyi-star\/CVE-2023-51385_test-star-main", - "description": "CVE-2023-51385_test-star-main", - "fork": false, - "created_at": "2023-12-28T16:56:13Z", - "updated_at": "2023-12-28T16:56:13Z", - "pushed_at": "2023-12-28T17:40:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 736832290, "name": "CVE-2023-51385_TT", @@ -267,6 +237,36 @@ "forks": 0, "watchers": 0, "score": 0, + "subscribers_count": 1 + }, + { + "id": 737146570, + "name": "CVE-2023-51385_test", + "full_name": "power1314520\/CVE-2023-51385_test", + "owner": { + "login": "power1314520", + "id": 37863351, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37863351?v=4", + "html_url": "https:\/\/github.com\/power1314520" + }, + "html_url": "https:\/\/github.com\/power1314520\/CVE-2023-51385_test", + "description": "一个验证对CVE-2023-51385", + "fork": false, + "created_at": "2023-12-30T01:08:29Z", + "updated_at": "2023-12-30T01:08:29Z", + "pushed_at": "2023-12-30T01:13:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json index 8c43ca55f5..91b9124f97 100644 --- a/2023/CVE-2023-51467.json +++ b/2023/CVE-2023-51467.json @@ -27,7 +27,7 @@ "forks": 1, "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 737019244, @@ -73,7 +73,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 737064466, @@ -103,6 +103,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index f094e525b9..4ded06093e 100644 --- a/README.md +++ b/README.md @@ -6044,8 +6044,8 @@ - [zls1793/CVE-2023-51385_test](https://github.com/zls1793/CVE-2023-51385_test) - [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test) - [zhulin2/testCVE-2023-51385](https://github.com/zhulin2/testCVE-2023-51385) -- [siyi-star/CVE-2023-51385_test-star-main](https://github.com/siyi-star/CVE-2023-51385_test-star-main) - [N0rther/CVE-2023-51385_TT](https://github.com/N0rther/CVE-2023-51385_TT) +- [power1314520/CVE-2023-51385_test](https://github.com/power1314520/CVE-2023-51385_test) ### CVE-2023-51467 (2023-12-26) @@ -14502,7 +14502,6 @@ - [j4k0m/CVE-2021-24499](https://github.com/j4k0m/CVE-2021-24499) -- [hh-hunter/cve-2021-24499](https://github.com/hh-hunter/cve-2021-24499) - [jytmX/CVE-2021-24499](https://github.com/jytmX/CVE-2021-24499) ### CVE-2021-24507 (2021-08-09) @@ -15100,7 +15099,6 @@ - [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC) - [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651) -- [orangmuda/CVE-2021-27651](https://github.com/orangmuda/CVE-2021-27651) ### CVE-2021-27850 (2021-04-15) @@ -17233,19 +17231,12 @@ - [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773) -- [numanturle/CVE-2021-41773](https://github.com/numanturle/CVE-2021-41773) -- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773) - [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC) - [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773) -- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773) -- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773) -- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773) - [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC) - [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013) - [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773) -- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC) - [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC) -- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse) - [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773) - [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773) - [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773) @@ -33779,13 +33770,6 @@ - [zhzhdoai/Weblogic_Vuln](https://github.com/zhzhdoai/Weblogic_Vuln) - [BabyTeam1024/CVE-2016-0638](https://github.com/BabyTeam1024/CVE-2016-0638) -### CVE-2016-0701 (2016-02-14) - -The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file. - - -- [luanjampa/cve-2016-0701](https://github.com/luanjampa/cve-2016-0701) - ### CVE-2016-0702 (2016-03-03) The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack. @@ -33802,7 +33786,6 @@ - [kennetham/cve_2016_0728](https://github.com/kennetham/cve_2016_0728) - [nardholio/cve-2016-0728](https://github.com/nardholio/cve-2016-0728) - [googleweb/CVE-2016-0728](https://github.com/googleweb/CVE-2016-0728) -- [neuschaefer/cve-2016-0728-testbed](https://github.com/neuschaefer/cve-2016-0728-testbed) - [bittorrent3389/cve-2016-0728](https://github.com/bittorrent3389/cve-2016-0728) - [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728) - [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728) @@ -33863,7 +33846,6 @@ - [secmob/CVE-2016-0846](https://github.com/secmob/CVE-2016-0846) -- [b0b0505/CVE-2016-0846-PoC](https://github.com/b0b0505/CVE-2016-0846-PoC) ### CVE-2016-0974 (2016-02-10) @@ -33994,13 +33976,6 @@ - [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107) - [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107) -### CVE-2016-2118 (2016-04-12) - -The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK." - - -- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118) - ### CVE-2016-2173 (2017-04-21) org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code. @@ -34122,13 +34097,6 @@ - [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH) -### CVE-2016-3141 (2016-03-31) - -Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element. - - -- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141) - ### CVE-2016-3238 (2016-07-12) The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability." @@ -34249,6 +34217,7 @@ - [bkfish/Awesome_shiro](https://github.com/bkfish/Awesome_shiro) - [m3terpreter/CVE-2016-4437](https://github.com/m3terpreter/CVE-2016-4437) - [4nth0ny1130/shisoserial](https://github.com/4nth0ny1130/shisoserial) +- [pizza-power/CVE-2016-4437](https://github.com/pizza-power/CVE-2016-4437) ### CVE-2016-4438 (2016-07-04)