diff --git a/2006/CVE-2006-2842.json b/2006/CVE-2006-2842.json new file mode 100644 index 0000000000..e6f0dc1fd2 --- /dev/null +++ b/2006/CVE-2006-2842.json @@ -0,0 +1,32 @@ +[ + { + "id": 736683121, + "name": "CVE-2006-2842", + "full_name": "karthi-the-hacker\/CVE-2006-2842", + "owner": { + "login": "karthi-the-hacker", + "id": 33289300, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4", + "html_url": "https:\/\/github.com\/karthi-the-hacker" + }, + "html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2006-2842", + "description": "CVE-2006-2842 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.", + "fork": false, + "created_at": "2023-12-28T15:17:56Z", + "updated_at": "2023-12-28T15:20:03Z", + "pushed_at": "2023-12-28T15:24:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 30c2bb03f4..770c130ed4 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,12 +43,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-12-27T08:25:22Z", + "updated_at": "2023-12-28T15:43:55Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1857, - "watchers_count": 1857, + "stargazers_count": 1859, + "watchers_count": 1859, "has_discussions": false, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -75,8 +75,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 1857, + "forks": 340, + "watchers": 1859, "score": 0, "subscribers_count": 35 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index b2cc7da0c3..c731706db3 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,12 +13,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-12-27T08:25:22Z", + "updated_at": "2023-12-28T15:43:55Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1857, - "watchers_count": 1857, + "stargazers_count": 1859, + "watchers_count": 1859, "has_discussions": false, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,8 +45,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 1857, + "forks": 340, + "watchers": 1859, "score": 0, "subscribers_count": 35 }, diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json index 5e4fcc8bfb..399add1436 100644 --- a/2017/CVE-2017-0781.json +++ b/2017/CVE-2017-0781.json @@ -13,10 +13,10 @@ "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", "fork": false, "created_at": "2017-10-09T15:13:25Z", - "updated_at": "2023-12-14T13:29:19Z", + "updated_at": "2023-12-28T17:10:03Z", "pushed_at": "2021-07-29T12:00:48Z", - "stargazers_count": 128, - "watchers_count": 128, + "stargazers_count": 129, + "watchers_count": 129, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 55, - "watchers": 128, + "watchers": 129, "score": 0, "subscribers_count": 11 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index baec23b321..6ae1638c49 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,12 +43,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-12-27T08:25:22Z", + "updated_at": "2023-12-28T15:43:55Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1857, - "watchers_count": 1857, + "stargazers_count": 1859, + "watchers_count": 1859, "has_discussions": false, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -75,8 +75,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 1857, + "forks": 340, + "watchers": 1859, "score": 0, "subscribers_count": 35 }, diff --git a/2018/CVE-2018-17552.json b/2018/CVE-2018-17552.json index 4000520914..fa9566b973 100644 --- a/2018/CVE-2018-17552.json +++ b/2018/CVE-2018-17552.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2018/CVE-2018-25031.json b/2018/CVE-2018-25031.json index d355f2ec2a..0dd9ced538 100644 --- a/2018/CVE-2018-25031.json +++ b/2018/CVE-2018-25031.json @@ -18,13 +18,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 2, "score": 0, "subscribers_count": 0 diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index d2e0431289..e714367bbb 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -587,12 +587,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-12-27T08:25:22Z", + "updated_at": "2023-12-28T15:43:55Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1857, - "watchers_count": 1857, + "stargazers_count": 1859, + "watchers_count": 1859, "has_discussions": false, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -619,8 +619,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 1857, + "forks": 340, + "watchers": 1859, "score": 0, "subscribers_count": 35 }, diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json index df9f62ed2b..891938d122 100644 --- a/2019/CVE-2019-1405.json +++ b/2019/CVE-2019-1405.json @@ -18,13 +18,13 @@ "stargazers_count": 347, "watchers_count": 347, "has_discussions": false, - "forks_count": 84, + "forks_count": 83, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 84, + "forks": 83, "watchers": 347, "score": 0, "subscribers_count": 12 diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index b1d8344dc1..0655ccaccc 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,12 +193,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-12-27T08:25:22Z", + "updated_at": "2023-12-28T15:43:55Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1857, - "watchers_count": 1857, + "stargazers_count": 1859, + "watchers_count": 1859, "has_discussions": false, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -225,8 +225,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 1857, + "forks": 340, + "watchers": 1859, "score": 0, "subscribers_count": 35 } diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 4dc117f605..a4b7380c85 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -43,10 +43,10 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2023-12-28T03:28:33Z", + "updated_at": "2023-12-28T13:09:42Z", "pushed_at": "2022-01-05T04:09:42Z", - "stargazers_count": 628, - "watchers_count": 628, + "stargazers_count": 629, + "watchers_count": 629, "has_discussions": false, "forks_count": 172, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 172, - "watchers": 628, + "watchers": 629, "score": 0, "subscribers_count": 13 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 926cfc1f94..b1288d0b16 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,12 +13,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-12-27T08:25:22Z", + "updated_at": "2023-12-28T15:43:55Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1857, - "watchers_count": 1857, + "stargazers_count": 1859, + "watchers_count": 1859, "has_discussions": false, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,8 +45,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 1857, + "forks": 340, + "watchers": 1859, "score": 0, "subscribers_count": 35 }, diff --git a/2020/CVE-2020-4463.json b/2020/CVE-2020-4463.json index 0a041cd3de..e9bff4e962 100644 --- a/2020/CVE-2020-4463.json +++ b/2020/CVE-2020-4463.json @@ -13,10 +13,10 @@ "description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)", "fork": false, "created_at": "2020-08-13T09:03:40Z", - "updated_at": "2023-12-08T01:45:58Z", + "updated_at": "2023-12-28T12:31:34Z", "pushed_at": "2023-09-19T10:38:28Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 49, + "watchers": 48, "score": 0, "subscribers_count": 2 } diff --git a/2020/CVE-2020-8554.json b/2020/CVE-2020-8554.json index 74c49e0c67..e20b14190f 100644 --- a/2020/CVE-2020-8554.json +++ b/2020/CVE-2020-8554.json @@ -13,10 +13,10 @@ "description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs", "fork": false, "created_at": "2020-12-01T16:58:39Z", - "updated_at": "2021-12-16T10:30:25Z", + "updated_at": "2023-12-28T16:33:55Z", "pushed_at": "2021-12-31T12:02:38Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 28 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index b575d8bef1..090cf216c4 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -172,10 +172,10 @@ "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-07-01T09:47:13Z", - "updated_at": "2023-12-20T04:04:07Z", + "updated_at": "2023-12-28T17:43:01Z", "pushed_at": "2021-07-05T06:46:12Z", - "stargazers_count": 331, - "watchers_count": 331, + "stargazers_count": 332, + "watchers_count": 332, "has_discussions": false, "forks_count": 79, "allow_forking": true, @@ -193,7 +193,7 @@ ], "visibility": "public", "forks": 79, - "watchers": 331, + "watchers": 332, "score": 0, "subscribers_count": 14 }, diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index c413fb991d..4214a0d7ba 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-13T12:52:20Z", - "updated_at": "2023-12-26T21:27:42Z", + "updated_at": "2023-12-28T16:20:08Z", "pushed_at": "2021-01-29T13:59:07Z", - "stargazers_count": 255, - "watchers_count": 255, + "stargazers_count": 256, + "watchers_count": 256, "has_discussions": false, "forks_count": 70, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 70, - "watchers": 255, + "watchers": 256, "score": 0, "subscribers_count": 14 }, @@ -347,10 +347,10 @@ "description": "Laravel RCE (CVE-2021-3129)", "fork": false, "created_at": "2022-04-16T17:22:55Z", - "updated_at": "2023-12-28T07:19:50Z", + "updated_at": "2023-12-28T16:36:00Z", "pushed_at": "2023-11-22T09:28:49Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -368,7 +368,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 54, + "watchers": 55, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index b43654e617..c4d92b12d7 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -223,10 +223,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2023-12-20T04:06:03Z", + "updated_at": "2023-12-28T16:02:46Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1496, - "watchers_count": 1496, + "stargazers_count": 1497, + "watchers_count": 1497, "has_discussions": false, "forks_count": 490, "allow_forking": true, @@ -235,7 +235,7 @@ "topics": [], "visibility": "public", "forks": 490, - "watchers": 1496, + "watchers": 1497, "score": 0, "subscribers_count": 28 }, @@ -523,10 +523,10 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2023-12-25T07:25:06Z", + "updated_at": "2023-12-28T16:02:49Z", "pushed_at": "2023-10-11T18:44:51Z", - "stargazers_count": 765, - "watchers_count": 765, + "stargazers_count": 766, + "watchers_count": 766, "has_discussions": false, "forks_count": 173, "allow_forking": true, @@ -542,7 +542,7 @@ ], "visibility": "public", "forks": 173, - "watchers": 765, + "watchers": 766, "score": 0, "subscribers_count": 19 }, diff --git a/2021/CVE-2021-44026.json b/2021/CVE-2021-44026.json index a008d51081..602ed929ac 100644 --- a/2021/CVE-2021-44026.json +++ b/2021/CVE-2021-44026.json @@ -13,10 +13,10 @@ "description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube", "fork": false, "created_at": "2023-11-14T11:32:36Z", - "updated_at": "2023-12-27T11:50:11Z", + "updated_at": "2023-12-28T18:03:55Z", "pushed_at": "2023-12-22T11:29:43Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 36c6084d73..55f9b7749f 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -919,10 +919,10 @@ "description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用", "fork": false, "created_at": "2022-04-02T09:13:54Z", - "updated_at": "2023-12-28T08:36:18Z", + "updated_at": "2023-12-28T15:17:22Z", "pushed_at": "2022-04-02T10:14:11Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -931,7 +931,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-30592.json b/2022/CVE-2022-30592.json index 51de529676..4dc3b6a467 100644 --- a/2022/CVE-2022-30592.json +++ b/2022/CVE-2022-30592.json @@ -13,10 +13,10 @@ "description": "HTTP3-attacks (CVE-2022-30592)", "fork": false, "created_at": "2022-08-06T09:57:43Z", - "updated_at": "2023-12-12T08:17:04Z", + "updated_at": "2023-12-28T13:20:31Z", "pushed_at": "2022-12-18T03:36:03Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 20, - "watchers": 65, + "watchers": 66, "score": 0, "subscribers_count": 4 } diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json index 0bdbb2af4f..f7a341f0c9 100644 --- a/2022/CVE-2022-34918.json +++ b/2022/CVE-2022-34918.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2022-07-19T12:46:45Z", - "updated_at": "2023-12-27T09:57:09Z", + "updated_at": "2023-12-28T14:04:01Z", "pushed_at": "2022-09-06T14:05:22Z", - "stargazers_count": 242, - "watchers_count": 242, + "stargazers_count": 241, + "watchers_count": 241, "has_discussions": false, - "forks_count": 38, + "forks_count": 39, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 38, - "watchers": 242, + "forks": 39, + "watchers": 241, "score": 0, "subscribers_count": 13 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 54c014ae62..fc02b4f5e5 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,10 +13,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2023-12-28T02:38:52Z", + "updated_at": "2023-12-28T17:15:24Z", "pushed_at": "2023-12-01T16:28:38Z", - "stargazers_count": 137, - "watchers_count": 137, + "stargazers_count": 138, + "watchers_count": 138, "has_discussions": true, "forks_count": 20, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 20, - "watchers": 137, + "watchers": 138, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-1177.json b/2023/CVE-2023-1177.json index 2bacd3e391..26a0315bbf 100644 --- a/2023/CVE-2023-1177.json +++ b/2023/CVE-2023-1177.json @@ -14,17 +14,17 @@ "fork": false, "created_at": "2023-04-13T02:56:24Z", "updated_at": "2023-04-13T02:56:31Z", - "pushed_at": "2023-04-13T06:32:28Z", + "pushed_at": "2023-12-28T14:49:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-1326.json b/2023/CVE-2023-1326.json index f67dc74faa..a1ca1f2f37 100644 --- a/2023/CVE-2023-1326.json +++ b/2023/CVE-2023-1326.json @@ -13,10 +13,10 @@ "description": "A proof of concept for CVE-2023–1326 in apport-cli 2.26.0", "fork": false, "created_at": "2023-12-06T00:07:40Z", - "updated_at": "2023-12-24T21:16:14Z", + "updated_at": "2023-12-28T15:11:00Z", "pushed_at": "2023-12-06T12:46:08Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 7297f6b461..4769bb30d9 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -499,10 +499,10 @@ "description": "配合 CVE-2023-22515 后台上传jar包实现RCE", "fork": false, "created_at": "2023-11-09T12:55:25Z", - "updated_at": "2023-12-14T07:00:43Z", + "updated_at": "2023-12-28T18:31:49Z", "pushed_at": "2023-11-09T14:21:58Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -511,7 +511,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-28229.json b/2023/CVE-2023-28229.json index c18cdb3b68..6a548794b3 100644 --- a/2023/CVE-2023-28229.json +++ b/2023/CVE-2023-28229.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-09-04T07:48:13Z", - "updated_at": "2023-12-27T10:01:35Z", + "updated_at": "2023-12-28T15:49:49Z", "pushed_at": "2023-09-04T07:51:58Z", - "stargazers_count": 119, - "watchers_count": 119, + "stargazers_count": 120, + "watchers_count": 120, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 119, + "watchers": 120, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-32629.json b/2023/CVE-2023-32629.json index 3896ae3948..07c7c0828a 100644 --- a/2023/CVE-2023-32629.json +++ b/2023/CVE-2023-32629.json @@ -43,10 +43,10 @@ "description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640", "fork": false, "created_at": "2023-11-09T09:19:23Z", - "updated_at": "2023-12-24T08:44:47Z", + "updated_at": "2023-12-28T12:35:52Z", "pushed_at": "2023-11-15T08:35:06Z", - "stargazers_count": 95, - "watchers_count": 95, + "stargazers_count": 96, + "watchers_count": 96, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 95, + "watchers": 96, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-36427.json b/2023/CVE-2023-36427.json index a023b7af29..0db279c19d 100644 --- a/2023/CVE-2023-36427.json +++ b/2023/CVE-2023-36427.json @@ -18,7 +18,7 @@ "stargazers_count": 85, "watchers_count": 85, "has_discussions": false, - "forks_count": 14, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -27,7 +27,7 @@ "vulnerability" ], "visibility": "public", - "forks": 14, + "forks": 15, "watchers": 85, "score": 0, "subscribers_count": 3 diff --git a/2023/CVE-2023-41772.json b/2023/CVE-2023-41772.json index b2f0f5cad8..16af23ab97 100644 --- a/2023/CVE-2023-41772.json +++ b/2023/CVE-2023-41772.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-12-19T11:21:12Z", - "updated_at": "2023-12-24T18:04:12Z", + "updated_at": "2023-12-28T12:37:52Z", "pushed_at": "2023-12-24T10:47:00Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-43177.json b/2023/CVE-2023-43177.json index 6ea88e20ec..9c98275a0e 100644 --- a/2023/CVE-2023-43177.json +++ b/2023/CVE-2023-43177.json @@ -13,10 +13,10 @@ "description": "CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis", "fork": false, "created_at": "2023-12-27T00:06:20Z", - "updated_at": "2023-12-28T01:51:17Z", + "updated_at": "2023-12-28T16:08:19Z", "pushed_at": "2023-12-27T23:24:43Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index a18303a7f4..86c771bb49 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -242,7 +242,7 @@ "fork": false, "created_at": "2023-11-08T20:56:22Z", "updated_at": "2023-12-21T07:11:51Z", - "pushed_at": "2023-12-25T09:18:20Z", + "pushed_at": "2023-12-28T16:12:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json index bfb8838ef8..bcf8f7b8a9 100644 --- a/2023/CVE-2023-4863.json +++ b/2023/CVE-2023-4863.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-09-21T05:22:51Z", - "updated_at": "2023-12-27T11:17:24Z", + "updated_at": "2023-12-28T15:05:47Z", "pushed_at": "2023-12-18T04:25:00Z", - "stargazers_count": 263, - "watchers_count": 263, + "stargazers_count": 264, + "watchers_count": 264, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 263, + "watchers": 264, "score": 0, "subscribers_count": 13 }, diff --git a/2023/CVE-2023-50254.json b/2023/CVE-2023-50254.json index 83833c2155..068813cc88 100644 --- a/2023/CVE-2023-50254.json +++ b/2023/CVE-2023-50254.json @@ -13,10 +13,10 @@ "description": "CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader \"deepin-reader\" software suffers from a serious vulnerability due to a design flaw that leads to Remote Command Execution via crafted docx document.", "fork": false, "created_at": "2023-12-22T06:50:28Z", - "updated_at": "2023-12-28T08:41:06Z", + "updated_at": "2023-12-28T14:35:25Z", "pushed_at": "2023-12-22T06:59:34Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-51385.json b/2023/CVE-2023-51385.json index 46403722b4..e4535ce3ea 100644 --- a/2023/CVE-2023-51385.json +++ b/2023/CVE-2023-51385.json @@ -208,5 +208,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 736713584, + "name": "CVE-2023-51385_test-star-main", + "full_name": "siyi-star\/CVE-2023-51385_test-star-main", + "owner": { + "login": "siyi-star", + "id": 60383315, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60383315?v=4", + "html_url": "https:\/\/github.com\/siyi-star" + }, + "html_url": "https:\/\/github.com\/siyi-star\/CVE-2023-51385_test-star-main", + "description": "CVE-2023-51385_test-star-main", + "fork": false, + "created_at": "2023-12-28T16:56:13Z", + "updated_at": "2023-12-28T16:56:13Z", + "pushed_at": "2023-12-28T17:40:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-51764.json b/2023/CVE-2023-51764.json index c8bacb1d72..5417636077 100644 --- a/2023/CVE-2023-51764.json +++ b/2023/CVE-2023-51764.json @@ -13,10 +13,10 @@ "description": "Postfix SMTP Smuggling - Expect Script POC", "fork": false, "created_at": "2023-12-26T17:02:20Z", - "updated_at": "2023-12-28T05:44:07Z", + "updated_at": "2023-12-28T14:28:30Z", "pushed_at": "2023-12-26T20:16:45Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-6553.json b/2023/CVE-2023-6553.json index 3291997692..b2cfb74f16 100644 --- a/2023/CVE-2023-6553.json +++ b/2023/CVE-2023-6553.json @@ -13,10 +13,10 @@ "description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution", "fork": false, "created_at": "2023-12-13T20:26:59Z", - "updated_at": "2023-12-28T12:06:51Z", + "updated_at": "2023-12-28T12:45:25Z", "pushed_at": "2023-12-15T18:13:06Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -39,7 +39,7 @@ ], "visibility": "public", "forks": 13, - "watchers": 46, + "watchers": 47, "score": 0, "subscribers_count": 1 }, diff --git a/README.md b/README.md index 4bb2d0fff9..0c9002c2d5 100644 --- a/README.md +++ b/README.md @@ -6026,6 +6026,7 @@ - [zls1793/CVE-2023-51385_test](https://github.com/zls1793/CVE-2023-51385_test) - [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test) - [zhulin2/testCVE-2023-51385](https://github.com/zhulin2/testCVE-2023-51385) +- [siyi-star/CVE-2023-51385_test-star-main](https://github.com/siyi-star/CVE-2023-51385_test-star-main) ### CVE-2023-51504 - [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504) @@ -17080,7 +17081,7 @@ ### CVE-2021-41349 (2021-11-09) -Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305. +Microsoft Exchange Server Spoofing Vulnerability - [exploit-io/CVE-2021-41349](https://github.com/exploit-io/CVE-2021-41349) @@ -17457,7 +17458,7 @@ ### CVE-2021-42278 (2021-11-09) -Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291. +Active Directory Domain Services Elevation of Privilege Vulnerability - [safebuffer/sam-the-admin](https://github.com/safebuffer/sam-the-admin) @@ -17468,7 +17469,7 @@ ### CVE-2021-42287 (2021-11-09) -Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291. +Active Directory Domain Services Elevation of Privilege Vulnerability - [cube0x0/noPac](https://github.com/cube0x0/noPac) @@ -38143,6 +38144,13 @@ - [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236) +### CVE-2006-2842 (2006-06-06) + +** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable. + + +- [karthi-the-hacker/CVE-2006-2842](https://github.com/karthi-the-hacker/CVE-2006-2842) + ### CVE-2006-3392 (2006-07-06) Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.