diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index da2c65d17e..4068615c24 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -13,10 +13,10 @@ "description": "Qualcomm TrustZone kernel privilege escalation", "fork": false, "created_at": "2016-06-15T11:21:24Z", - "updated_at": "2024-07-26T02:49:42Z", + "updated_at": "2024-08-12T06:47:56Z", "pushed_at": "2016-06-15T11:27:42Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 57, + "watchers": 58, "score": 0, "subscribers_count": 9 }, diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index bb5d643b63..cb827046ed 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -447,10 +447,10 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2024-08-07T01:57:31Z", + "updated_at": "2024-08-12T06:19:54Z", "pushed_at": "2021-04-08T11:35:12Z", - "stargazers_count": 841, - "watchers_count": 841, + "stargazers_count": 842, + "watchers_count": 842, "has_discussions": false, "forks_count": 425, "allow_forking": true, @@ -463,7 +463,7 @@ ], "visibility": "public", "forks": 425, - "watchers": 841, + "watchers": 842, "score": 0, "subscribers_count": 11 }, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 4f9af613c6..9c7b319b9f 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -343,10 +343,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-08-08T19:20:37Z", + "updated_at": "2024-08-12T08:49:58Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 174, - "watchers_count": 174, + "stargazers_count": 175, + "watchers_count": 175, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -355,7 +355,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 174, + "watchers": 175, "score": 0, "subscribers_count": 4 }, diff --git a/2018/CVE-2018-17240.json b/2018/CVE-2018-17240.json index 255c30c387..5f4bc977a3 100644 --- a/2018/CVE-2018-17240.json +++ b/2018/CVE-2018-17240.json @@ -44,7 +44,7 @@ "fork": false, "created_at": "2024-01-04T21:44:21Z", "updated_at": "2024-08-09T16:04:27Z", - "pushed_at": "2024-08-09T16:04:26Z", + "pushed_at": "2024-08-12T08:43:31Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index a38c4770b8..e7b5b3558e 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -73,10 +73,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2024-08-09T12:52:50Z", + "updated_at": "2024-08-12T09:59:16Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 180, - "watchers_count": 180, + "stargazers_count": 181, + "watchers_count": 181, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 180, + "watchers": 181, "score": 0, "subscribers_count": 7 } diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 6d7afcb1b2..ae4fe41c72 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,12 +43,12 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-08-12T03:02:32Z", + "updated_at": "2024-08-12T11:25:52Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4081, - "watchers_count": 4081, + "stargazers_count": 4083, + "watchers_count": 4083, "has_discussions": false, - "forks_count": 1087, + "forks_count": 1088, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -74,8 +74,8 @@ "webshell" ], "visibility": "public", - "forks": 1087, - "watchers": 4081, + "forks": 1088, + "watchers": 4083, "score": 0, "subscribers_count": 151 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 0f7891c729..66b0177bb1 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,12 +13,12 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-08-12T03:02:32Z", + "updated_at": "2024-08-12T11:25:52Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4081, - "watchers_count": 4081, + "stargazers_count": 4083, + "watchers_count": 4083, "has_discussions": false, - "forks_count": 1087, + "forks_count": 1088, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,8 +44,8 @@ "webshell" ], "visibility": "public", - "forks": 1087, - "watchers": 4081, + "forks": 1088, + "watchers": 4083, "score": 0, "subscribers_count": 151 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 37b30d8f63..76069b024b 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -373,10 +373,10 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2024-08-12T04:28:20Z", + "updated_at": "2024-08-12T09:24:08Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 354, - "watchers_count": 354, + "stargazers_count": 355, + "watchers_count": 355, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -391,7 +391,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 354, + "watchers": 355, "score": 0, "subscribers_count": 5 }, @@ -889,10 +889,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-08-08T19:20:37Z", + "updated_at": "2024-08-12T08:49:58Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 174, - "watchers_count": 174, + "stargazers_count": 175, + "watchers_count": 175, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -901,7 +901,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 174, + "watchers": 175, "score": 0, "subscribers_count": 4 }, diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index 9e29d5c7ce..03cef44064 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -108,13 +108,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 4, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 2 diff --git a/2021/CVE-2021-21978.json b/2021/CVE-2021-21978.json index 14300315f2..7134c601a9 100644 --- a/2021/CVE-2021-21978.json +++ b/2021/CVE-2021-21978.json @@ -18,13 +18,13 @@ "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, - "forks_count": 19, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 19, + "forks": 16, "watchers": 22, "score": 0, "subscribers_count": 3 diff --git a/2021/CVE-2021-39141.json b/2021/CVE-2021-39141.json index 1adf598adf..32da1346dd 100644 --- a/2021/CVE-2021-39141.json +++ b/2021/CVE-2021-39141.json @@ -13,10 +13,10 @@ "description": "XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)", "fork": false, "created_at": "2021-08-24T06:15:20Z", - "updated_at": "2023-12-28T02:24:56Z", + "updated_at": "2024-08-12T08:20:08Z", "pushed_at": "2021-08-25T02:00:12Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 60, + "watchers": 61, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-41117.json b/2021/CVE-2021-41117.json index 60c3858445..ba40c2f05d 100644 --- a/2021/CVE-2021-41117.json +++ b/2021/CVE-2021-41117.json @@ -13,7 +13,7 @@ "description": "Private keys generated with vulnerable keypair versions (CVE-2021-41117)", "fork": false, "created_at": "2022-05-15T06:56:53Z", - "updated_at": "2024-08-11T17:09:23Z", + "updated_at": "2024-08-12T08:25:02Z", "pushed_at": "2023-10-12T14:27:08Z", "stargazers_count": 4, "watchers_count": 4, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 3cdd1e6321..411e17899f 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -103,10 +103,10 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2024-06-30T18:39:01Z", + "updated_at": "2024-08-12T10:55:28Z", "pushed_at": "2022-01-18T12:01:52Z", - "stargazers_count": 456, - "watchers_count": 456, + "stargazers_count": 457, + "watchers_count": 457, "has_discussions": false, "forks_count": 124, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 124, - "watchers": 456, + "watchers": 457, "score": 0, "subscribers_count": 8 }, @@ -1268,10 +1268,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2024-08-09T06:35:06Z", + "updated_at": "2024-08-12T07:39:55Z", "pushed_at": "2023-06-13T09:17:54Z", - "stargazers_count": 795, - "watchers_count": 795, + "stargazers_count": 794, + "watchers_count": 794, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -1285,7 +1285,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 795, + "watchers": 794, "score": 0, "subscribers_count": 11 }, @@ -1423,10 +1423,10 @@ "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "fork": false, "created_at": "2021-12-11T11:18:46Z", - "updated_at": "2024-08-03T01:09:30Z", + "updated_at": "2024-08-12T11:57:58Z", "pushed_at": "2022-04-07T14:47:03Z", - "stargazers_count": 854, - "watchers_count": 854, + "stargazers_count": 855, + "watchers_count": 855, "has_discussions": false, "forks_count": 175, "allow_forking": true, @@ -1448,7 +1448,7 @@ ], "visibility": "public", "forks": 175, - "watchers": 854, + "watchers": 855, "score": 0, "subscribers_count": 33 }, @@ -3364,7 +3364,7 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -3377,7 +3377,7 @@ "security" ], "visibility": "public", - "forks": 3, + "forks": 5, "watchers": 7, "score": 0, "subscribers_count": 0 @@ -3641,13 +3641,13 @@ "stargazers_count": 3392, "watchers_count": 3392, "has_discussions": true, - "forks_count": 741, + "forks_count": 740, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 741, + "forks": 740, "watchers": 3392, "score": 0, "subscribers_count": 57 diff --git a/2022/CVE-2022-31814.json b/2022/CVE-2022-31814.json index 6163fa06fe..46688adfd1 100644 --- a/2022/CVE-2022-31814.json +++ b/2022/CVE-2022-31814.json @@ -208,10 +208,10 @@ "description": "Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)", "fork": false, "created_at": "2024-07-23T09:44:46Z", - "updated_at": "2024-08-11T17:26:48Z", + "updated_at": "2024-08-12T12:18:51Z", "pushed_at": "2024-07-23T10:03:08Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -220,7 +220,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 7, "score": 0, "subscribers_count": 0 } diff --git a/2022/CVE-2022-3602.json b/2022/CVE-2022-3602.json index 5b2ae7ca43..bf7c5a2b9d 100644 --- a/2022/CVE-2022-3602.json +++ b/2022/CVE-2022-3602.json @@ -18,7 +18,7 @@ "stargazers_count": 529, "watchers_count": 529, "has_discussions": false, - "forks_count": 114, + "forks_count": 113, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,7 +29,7 @@ "spookyssl" ], "visibility": "public", - "forks": 114, + "forks": 113, "watchers": 529, "score": 0, "subscribers_count": 47 diff --git a/2022/CVE-2022-44149.json b/2022/CVE-2022-44149.json index 20be05ed94..f22db4c3f8 100644 --- a/2022/CVE-2022-44149.json +++ b/2022/CVE-2022-44149.json @@ -28,5 +28,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 840469662, + "name": "CVE-2022-44149", + "full_name": "geniuszlyy\/CVE-2022-44149", + "owner": { + "login": "geniuszlyy", + "id": 137893386, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", + "html_url": "https:\/\/github.com\/geniuszlyy" + }, + "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-44149", + "description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.", + "fork": false, + "created_at": "2024-08-09T19:27:22Z", + "updated_at": "2024-08-12T07:08:10Z", + "pushed_at": "2024-08-09T19:28:51Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 4, + "score": 0, + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-45701.json b/2022/CVE-2022-45701.json index 905a62d340..a58cb8e1a8 100644 --- a/2022/CVE-2022-45701.json +++ b/2022/CVE-2022-45701.json @@ -28,5 +28,35 @@ "watchers": 3, "score": 0, "subscribers_count": 2 + }, + { + "id": 840470520, + "name": "CVE-2022-45701", + "full_name": "geniuszlyy\/CVE-2022-45701", + "owner": { + "login": "geniuszlyy", + "id": 137893386, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", + "html_url": "https:\/\/github.com\/geniuszlyy" + }, + "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-45701", + "description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.", + "fork": false, + "created_at": "2024-08-09T19:30:20Z", + "updated_at": "2024-08-12T07:08:10Z", + "pushed_at": "2024-08-09T19:31:12Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 4, + "score": 0, + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-46080.json b/2022/CVE-2022-46080.json index 5b4c5013c3..ca83b6c5b5 100644 --- a/2022/CVE-2022-46080.json +++ b/2022/CVE-2022-46080.json @@ -28,5 +28,35 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 840471119, + "name": "CVE-2022-46080", + "full_name": "geniuszlyy\/CVE-2022-46080", + "owner": { + "login": "geniuszlyy", + "id": 137893386, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", + "html_url": "https:\/\/github.com\/geniuszlyy" + }, + "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-46080", + "description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.", + "fork": false, + "created_at": "2024-08-09T19:32:32Z", + "updated_at": "2024-08-12T07:08:10Z", + "pushed_at": "2024-08-11T07:29:30Z", + "stargazers_count": 5, + "watchers_count": 5, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 5, + "score": 0, + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-46463.json b/2022/CVE-2022-46463.json index 57849e0f9b..838b3252f6 100644 --- a/2022/CVE-2022-46463.json +++ b/2022/CVE-2022-46463.json @@ -13,10 +13,10 @@ "description": "CVE-2022-46463(Harbor 未授权)", "fork": false, "created_at": "2023-01-17T14:58:14Z", - "updated_at": "2024-08-02T07:23:57Z", + "updated_at": "2024-08-12T06:44:33Z", "pushed_at": "2023-01-19T12:47:21Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 98e58e57cc..28ab83c404 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -103,7 +103,7 @@ "description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.", "fork": false, "created_at": "2022-12-26T06:56:35Z", - "updated_at": "2024-08-06T11:01:47Z", + "updated_at": "2024-08-12T11:16:45Z", "pushed_at": "2023-08-02T09:35:14Z", "stargazers_count": 880, "watchers_count": 880, diff --git a/2023/CVE-2023-23488.json b/2023/CVE-2023-23488.json index c059f7c0ea..f2031ea528 100644 --- a/2023/CVE-2023-23488.json +++ b/2023/CVE-2023-23488.json @@ -13,10 +13,10 @@ "description": "Unauthenticated SQL Injection - Paid Memberships Pro < 2.9.8 (WordPress Plugin)", "fork": false, "created_at": "2023-01-24T18:26:10Z", - "updated_at": "2024-07-26T23:47:16Z", + "updated_at": "2024-08-12T09:57:32Z", "pushed_at": "2023-04-07T20:09:28Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 24, + "watchers": 25, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-3269.json b/2023/CVE-2023-3269.json index c7487df9ec..91432a27cf 100644 --- a/2023/CVE-2023-3269.json +++ b/2023/CVE-2023-3269.json @@ -13,10 +13,10 @@ "description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability", "fork": false, "created_at": "2023-06-28T13:22:26Z", - "updated_at": "2024-08-05T11:49:23Z", + "updated_at": "2024-08-12T12:05:04Z", "pushed_at": "2023-07-28T13:20:45Z", - "stargazers_count": 463, - "watchers_count": 463, + "stargazers_count": 462, + "watchers_count": 462, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 40, - "watchers": 463, + "watchers": 462, "score": 0, "subscribers_count": 15 } diff --git a/2023/CVE-2023-33977.json b/2023/CVE-2023-33977.json index 6932c3a8f9..fbfa1897b4 100644 --- a/2023/CVE-2023-33977.json +++ b/2023/CVE-2023-33977.json @@ -13,8 +13,8 @@ "description": "Read more at Medium", "fork": false, "created_at": "2023-06-01T13:10:31Z", - "updated_at": "2023-06-06T12:20:31Z", - "pushed_at": "2023-06-06T12:18:26Z", + "updated_at": "2024-08-12T11:16:42Z", + "pushed_at": "2024-08-12T11:16:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json index e162212f08..3cec4532c0 100644 --- a/2023/CVE-2023-34362.json +++ b/2023/CVE-2023-34362.json @@ -43,10 +43,10 @@ "description": "MOVEit CVE-2023-34362", "fork": false, "created_at": "2023-06-09T19:07:32Z", - "updated_at": "2024-06-28T01:27:11Z", + "updated_at": "2024-08-12T10:55:23Z", "pushed_at": "2023-06-26T20:24:32Z", - "stargazers_count": 135, - "watchers_count": 135, + "stargazers_count": 136, + "watchers_count": 136, "has_discussions": false, "forks_count": 34, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 34, - "watchers": 135, + "watchers": 136, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-34960.json b/2023/CVE-2023-34960.json index 55f3a6f8e0..57393866b5 100644 --- a/2023/CVE-2023-34960.json +++ b/2023/CVE-2023-34960.json @@ -197,8 +197,8 @@ "description": "Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960", "fork": false, "created_at": "2024-07-13T08:30:18Z", - "updated_at": "2024-07-16T09:15:13Z", - "pushed_at": "2024-07-13T08:30:40Z", + "updated_at": "2024-08-12T08:23:17Z", + "pushed_at": "2024-08-12T08:23:14Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2023/CVE-2023-3710.json b/2023/CVE-2023-3710.json index 581728ee51..8657d3cbb9 100644 --- a/2023/CVE-2023-3710.json +++ b/2023/CVE-2023-3710.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-07-03T01:14:02Z", - "updated_at": "2024-01-15T09:22:37Z", + "updated_at": "2024-08-12T09:51:53Z", "pushed_at": "2023-09-27T01:11:00Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json index 0de27b9983..3e91d141d5 100644 --- a/2023/CVE-2023-41425.json +++ b/2023/CVE-2023-41425.json @@ -13,10 +13,10 @@ "description": "WonderCMS Authenticated RCE - CVE-2023-41425", "fork": false, "created_at": "2023-11-05T15:06:43Z", - "updated_at": "2024-08-11T14:19:05Z", + "updated_at": "2024-08-12T09:52:12Z", "pushed_at": "2023-11-06T18:56:53Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 }, @@ -86,10 +86,10 @@ "description": "WonderCMS RCE CVE-2023-41425", "fork": false, "created_at": "2024-08-12T06:16:17Z", - "updated_at": "2024-08-12T06:16:20Z", - "pushed_at": "2024-08-12T06:16:17Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2024-08-12T07:12:20Z", + "pushed_at": "2024-08-12T06:55:30Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -98,7 +98,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 984530925e..02aec97497 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,10 +13,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-08-11T18:08:30Z", + "updated_at": "2024-08-12T12:11:35Z", "pushed_at": "2024-07-24T13:17:05Z", - "stargazers_count": 1048, - "watchers_count": 1048, + "stargazers_count": 1049, + "watchers_count": 1049, "has_discussions": false, "forks_count": 180, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 180, - "watchers": 1048, + "watchers": 1049, "score": 0, "subscribers_count": 17 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 2d0908a112..672e87b7c1 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -43,10 +43,10 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2024-08-11T15:56:56Z", + "updated_at": "2024-08-12T09:57:34Z", "pushed_at": "2024-07-25T18:12:57Z", - "stargazers_count": 193, - "watchers_count": 193, + "stargazers_count": 194, + "watchers_count": 194, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 193, + "watchers": 194, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-0741.json b/2024/CVE-2024-0741.json index 15ee04a4b7..778c833e58 100644 --- a/2024/CVE-2024-0741.json +++ b/2024/CVE-2024-0741.json @@ -10,11 +10,11 @@ "html_url": "https:\/\/github.com\/HyHy100" }, "html_url": "https:\/\/github.com\/HyHy100\/Firefox-CVE-2024-0741", - "description": "PoC for a vulnerability I reported to Firefox in ANGLE Translator (aka WebGL Shader Compiler).", + "description": "PoC for an OOB write vulnerability I reported to Mozilla in ANGLE Translator (aka WebGL Shader Compiler).", "fork": false, "created_at": "2024-08-12T05:57:34Z", - "updated_at": "2024-08-12T05:57:45Z", - "pushed_at": "2024-08-12T05:57:35Z", + "updated_at": "2024-08-12T07:26:44Z", + "pushed_at": "2024-08-12T07:26:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json index 1da2643bdd..4b6234b10b 100644 --- a/2024/CVE-2024-21887.json +++ b/2024/CVE-2024-21887.json @@ -73,10 +73,10 @@ "description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.", "fork": false, "created_at": "2024-01-16T20:59:38Z", - "updated_at": "2024-08-03T01:35:51Z", + "updated_at": "2024-08-12T10:38:27Z", "pushed_at": "2024-01-17T00:38:28Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 50, + "watchers_count": 50, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 49, + "watchers": 50, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index 5cf69ff749..0dfebde0b3 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -350,10 +350,10 @@ "description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information #RCE #python3", "fork": false, "created_at": "2024-08-12T04:46:34Z", - "updated_at": "2024-08-12T04:47:06Z", + "updated_at": "2024-08-12T09:45:39Z", "pushed_at": "2024-08-12T04:47:04Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -362,7 +362,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json index 3aa74ec4d5..d1551b4340 100644 --- a/2024/CVE-2024-27956.json +++ b/2024/CVE-2024-27956.json @@ -43,10 +43,10 @@ "description": "PoC for SQL Injection in CVE-2024-27956", "fork": false, "created_at": "2024-05-01T01:58:28Z", - "updated_at": "2024-08-11T10:23:34Z", + "updated_at": "2024-08-12T09:54:04Z", "pushed_at": "2024-05-03T11:28:21Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 80, + "watchers": 81, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-38077.json b/2024/CVE-2024-38077.json index e2ed2aee07..8626c298d3 100644 --- a/2024/CVE-2024-38077.json +++ b/2024/CVE-2024-38077.json @@ -13,19 +13,19 @@ "description": "原文已被作者删除,备份用,非原创,EXP & POC", "fork": false, "created_at": "2024-08-09T01:18:48Z", - "updated_at": "2024-08-12T05:59:41Z", + "updated_at": "2024-08-12T12:19:29Z", "pushed_at": "2024-08-09T17:18:10Z", - "stargazers_count": 280, - "watchers_count": 280, + "stargazers_count": 289, + "watchers_count": 289, "has_discussions": false, - "forks_count": 197, + "forks_count": 205, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 197, - "watchers": 280, + "forks": 205, + "watchers": 289, "score": 0, "subscribers_count": 5 }, @@ -43,19 +43,19 @@ "description": "RDL的堆溢出导致的RCE", "fork": false, "created_at": "2024-08-09T05:00:44Z", - "updated_at": "2024-08-12T05:57:55Z", + "updated_at": "2024-08-12T10:32:04Z", "pushed_at": "2024-08-09T10:12:42Z", - "stargazers_count": 136, - "watchers_count": 136, + "stargazers_count": 141, + "watchers_count": 141, "has_discussions": false, - "forks_count": 57, + "forks_count": 58, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 57, - "watchers": 136, + "forks": 58, + "watchers": 141, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-38856.json b/2024/CVE-2024-38856.json index 0704929696..4568ba612e 100644 --- a/2024/CVE-2024-38856.json +++ b/2024/CVE-2024-38856.json @@ -13,10 +13,10 @@ "description": "Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)", "fork": false, "created_at": "2024-08-08T02:40:56Z", - "updated_at": "2024-08-11T23:38:03Z", + "updated_at": "2024-08-12T09:08:52Z", "pushed_at": "2024-08-11T03:28:23Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 17, + "watchers": 19, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index 957d0b90da..bb9dcd55aa 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -13,10 +13,10 @@ "description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept", "fork": false, "created_at": "2024-05-20T10:02:23Z", - "updated_at": "2024-08-12T06:24:15Z", + "updated_at": "2024-08-12T10:12:19Z", "pushed_at": "2024-06-07T03:28:00Z", - "stargazers_count": 90, - "watchers_count": 90, + "stargazers_count": 91, + "watchers_count": 91, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 90, + "watchers": 91, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 303eba8e38..39f0521006 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2773,10 +2773,10 @@ "description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH. ", "fork": false, "created_at": "2024-08-12T06:16:08Z", - "updated_at": "2024-08-12T06:18:40Z", + "updated_at": "2024-08-12T09:44:44Z", "pushed_at": "2024-08-12T06:18:37Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -2785,7 +2785,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index 580f0beaf2..01535c5431 100644 --- a/README.md +++ b/README.md @@ -18063,6 +18063,7 @@ - [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149) +- [geniuszlyy/CVE-2022-44149](https://github.com/geniuszlyy/CVE-2022-44149) ### CVE-2022-44183 (2022-11-21) @@ -18340,6 +18341,7 @@ - [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701) +- [geniuszlyy/CVE-2022-45701](https://github.com/geniuszlyy/CVE-2022-45701) ### CVE-2022-45728 (2023-01-12) @@ -18399,6 +18401,7 @@ - [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080) +- [geniuszlyy/CVE-2022-46080](https://github.com/geniuszlyy/CVE-2022-46080) ### CVE-2022-46087 (2023-01-30)