diff --git a/2011/CVE-2011-3192.json b/2011/CVE-2011-3192.json index e13d5dfa0b..57519bafb0 100644 --- a/2011/CVE-2011-3192.json +++ b/2011/CVE-2011-3192.json @@ -117,6 +117,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 93084f974f..b3e7fa25c6 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-16T21:29:14Z", + "updated_at": "2023-09-17T15:18:50Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1781, - "watchers_count": 1781, + "stargazers_count": 1782, + "watchers_count": 1782, "has_discussions": false, "forks_count": 333, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 333, - "watchers": 1781, + "watchers": 1782, "score": 0, "subscribers_count": 34 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 59cf538d93..e32dabac75 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-16T21:29:14Z", + "updated_at": "2023-09-17T15:18:50Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1781, - "watchers_count": 1781, + "stargazers_count": 1782, + "watchers_count": 1782, "has_discussions": false, "forks_count": 333, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 333, - "watchers": 1781, + "watchers": 1782, "score": 0, "subscribers_count": 34 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 7c70bdbf7a..ae7794d1de 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-16T21:29:14Z", + "updated_at": "2023-09-17T15:18:50Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1781, - "watchers_count": 1781, + "stargazers_count": 1782, + "watchers_count": 1782, "has_discussions": false, "forks_count": 333, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 333, - "watchers": 1781, + "watchers": 1782, "score": 0, "subscribers_count": 34 }, diff --git a/2018/CVE-2018-20062.json b/2018/CVE-2018-20062.json index 7250d8c78e..04b35e2b68 100644 --- a/2018/CVE-2018-20062.json +++ b/2018/CVE-2018-20062.json @@ -27,7 +27,7 @@ "forks": 2, "watchers": 5, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 562747008, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 2334526ae8..772e8d0f43 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -587,10 +587,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-16T21:29:14Z", + "updated_at": "2023-09-17T15:18:50Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1781, - "watchers_count": 1781, + "stargazers_count": 1782, + "watchers_count": 1782, "has_discussions": false, "forks_count": 333, "allow_forking": true, @@ -620,7 +620,7 @@ ], "visibility": "public", "forks": 333, - "watchers": 1781, + "watchers": 1782, "score": 0, "subscribers_count": 34 }, diff --git a/2018/CVE-2018-3252.json b/2018/CVE-2018-3252.json index 2054d1762b..19a8f888e3 100644 --- a/2018/CVE-2018-3252.json +++ b/2018/CVE-2018-3252.json @@ -27,7 +27,7 @@ "forks": 1, "watchers": 7, "score": 0, - "subscribers_count": 5 + "subscribers_count": 4 }, { "id": 160289379, diff --git a/2018/CVE-2018-6789.json b/2018/CVE-2018-6789.json index 5f80e479f2..b292cb8ee1 100644 --- a/2018/CVE-2018-6789.json +++ b/2018/CVE-2018-6789.json @@ -87,7 +87,7 @@ "forks": 7, "watchers": 8, "score": 0, - "subscribers_count": 3 + "subscribers_count": 4 }, { "id": 244424491, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 78dbe3abe1..f08264b15c 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1858,10 +1858,10 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2023-09-16T21:22:40Z", + "updated_at": "2023-09-17T13:00:59Z", "pushed_at": "2021-12-02T12:00:46Z", - "stargazers_count": 1146, - "watchers_count": 1146, + "stargazers_count": 1147, + "watchers_count": 1147, "has_discussions": false, "forks_count": 355, "allow_forking": true, @@ -1870,7 +1870,7 @@ "topics": [], "visibility": "public", "forks": 355, - "watchers": 1146, + "watchers": 1147, "score": 0, "subscribers_count": 69 }, diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index f24efc7d6a..d1ed33cfa1 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -103,10 +103,10 @@ "description": null, "fork": false, "created_at": "2019-06-24T15:33:50Z", - "updated_at": "2023-09-16T21:23:31Z", + "updated_at": "2023-09-17T15:55:41Z", "pushed_at": "2020-11-09T07:33:12Z", - "stargazers_count": 275, - "watchers_count": 275, + "stargazers_count": 276, + "watchers_count": 276, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 275, + "watchers": 276, "score": 0, "subscribers_count": 9 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 4d41ae8a7f..1f42dfc0a5 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-16T21:29:14Z", + "updated_at": "2023-09-17T15:18:50Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1781, - "watchers_count": 1781, + "stargazers_count": 1782, + "watchers_count": 1782, "has_discussions": false, "forks_count": 333, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 333, - "watchers": 1781, + "watchers": 1782, "score": 0, "subscribers_count": 34 } diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 1fa44c9129..8cedf458c2 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-16T21:29:14Z", + "updated_at": "2023-09-17T15:18:50Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1781, - "watchers_count": 1781, + "stargazers_count": 1782, + "watchers_count": 1782, "has_discussions": false, "forks_count": 333, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 333, - "watchers": 1781, + "watchers": 1782, "score": 0, "subscribers_count": 34 }, diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 65640063f1..08a8433c05 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -142,10 +142,10 @@ "description": null, "fork": false, "created_at": "2021-06-14T20:08:20Z", - "updated_at": "2023-09-16T21:45:10Z", + "updated_at": "2023-09-17T14:29:33Z", "pushed_at": "2022-11-16T13:14:56Z", - "stargazers_count": 102, - "watchers_count": 102, + "stargazers_count": 103, + "watchers_count": 103, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -154,7 +154,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 102, + "watchers": 103, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index ac1f6dfdfb..74899e61f0 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2023-09-17T09:47:52Z", + "updated_at": "2023-09-17T14:35:20Z", "pushed_at": "2023-02-08T23:41:04Z", - "stargazers_count": 1639, - "watchers_count": 1639, + "stargazers_count": 1640, + "watchers_count": 1640, "has_discussions": false, "forks_count": 485, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 485, - "watchers": 1639, + "watchers": 1640, "score": 0, "subscribers_count": 25 }, @@ -3703,10 +3703,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2023-09-17T11:51:22Z", + "updated_at": "2023-09-17T16:54:17Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3287, - "watchers_count": 3287, + "stargazers_count": 3288, + "watchers_count": 3288, "has_discussions": true, "forks_count": 744, "allow_forking": true, @@ -3715,7 +3715,7 @@ "topics": [], "visibility": "public", "forks": 744, - "watchers": 3287, + "watchers": 3288, "score": 0, "subscribers_count": 60 }, diff --git a/2022/CVE-2022-0185.json b/2022/CVE-2022-0185.json index 68dbb2d9f8..5355e47cf9 100644 --- a/2022/CVE-2022-0185.json +++ b/2022/CVE-2022-0185.json @@ -13,10 +13,10 @@ "description": "CVE-2022-0185", "fork": false, "created_at": "2022-01-19T06:19:38Z", - "updated_at": "2023-09-16T21:50:34Z", + "updated_at": "2023-09-17T12:55:38Z", "pushed_at": "2022-04-25T04:11:33Z", - "stargazers_count": 362, - "watchers_count": 362, + "stargazers_count": 363, + "watchers_count": 363, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 55, - "watchers": 362, + "watchers": 363, "score": 0, "subscribers_count": 39 }, diff --git a/2022/CVE-2022-0591.json b/2022/CVE-2022-0591.json index 4ebd68bddb..a676bf8c13 100644 --- a/2022/CVE-2022-0591.json +++ b/2022/CVE-2022-0591.json @@ -13,10 +13,10 @@ "description": "Automatic Mass Tool for checking vulnerability in CVE-2022-0591 - Formcraft3 < 3.8.28 - Unauthenticated SSRF", "fork": false, "created_at": "2023-09-07T18:41:43Z", - "updated_at": "2023-09-07T19:21:47Z", + "updated_at": "2023-09-17T14:26:14Z", "pushed_at": "2023-09-07T19:57:08Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 351d5a1d15..09836e5853 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -2562,5 +2562,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 692738777, + "name": "DirtyPipe", + "full_name": "pashayogi\/DirtyPipe", + "owner": { + "login": "pashayogi", + "id": 50790111, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50790111?v=4", + "html_url": "https:\/\/github.com\/pashayogi" + }, + "html_url": "https:\/\/github.com\/pashayogi\/DirtyPipe", + "description": "CVE: CVE-2022-0847", + "fork": false, + "created_at": "2023-09-17T12:43:52Z", + "updated_at": "2023-09-17T12:43:53Z", + "pushed_at": "2023-09-17T12:44:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 1b4a0dcc6d..a25c5cb659 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -18,7 +18,7 @@ "stargazers_count": 1036, "watchers_count": 1036, "has_discussions": true, - "forks_count": 181, + "forks_count": 182, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,7 +44,7 @@ "gui" ], "visibility": "public", - "forks": 181, + "forks": 182, "watchers": 1036, "score": 0, "subscribers_count": 18 diff --git a/2022/CVE-2022-27499.json b/2022/CVE-2022-27499.json index e8f2aa0d97..d4d33ec4c3 100644 --- a/2022/CVE-2022-27499.json +++ b/2022/CVE-2022-27499.json @@ -18,7 +18,7 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,7 +30,7 @@ "intel-sgx-sdk" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 3 diff --git a/2022/CVE-2022-32947.json b/2022/CVE-2022-32947.json index b6a3c17d21..77bc3d2c87 100644 --- a/2022/CVE-2022-32947.json +++ b/2022/CVE-2022-32947.json @@ -13,19 +13,19 @@ "description": "CVE-2022-32947 walkthough and demo", "fork": false, "created_at": "2023-09-17T08:21:47Z", - "updated_at": "2023-09-17T12:21:46Z", + "updated_at": "2023-09-17T17:42:47Z", "pushed_at": "2023-09-17T10:40:10Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, - "forks_count": 0, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 13, + "forks": 2, + "watchers": 32, "score": 0, "subscribers_count": 0 } diff --git a/2022/CVE-2022-4060.json b/2022/CVE-2022-4060.json index da6461ffdb..3be954ff5a 100644 --- a/2022/CVE-2022-4060.json +++ b/2022/CVE-2022-4060.json @@ -13,10 +13,10 @@ "description": "Automatic Mass Tool for checking vulnerability in CVE-2022-4060 - WordPress Plugin : User Post Gallery <= 2.19 - Unauthenticated RCE", "fork": false, "created_at": "2023-09-15T21:38:47Z", - "updated_at": "2023-09-16T14:46:39Z", + "updated_at": "2023-09-17T15:58:35Z", "pushed_at": "2023-09-16T21:55:56Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -35,7 +35,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-4061.json b/2022/CVE-2022-4061.json index b7c27102be..8805abebad 100644 --- a/2022/CVE-2022-4061.json +++ b/2022/CVE-2022-4061.json @@ -13,10 +13,10 @@ "description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload", "fork": false, "created_at": "2023-09-17T03:20:23Z", - "updated_at": "2023-09-17T03:39:03Z", + "updated_at": "2023-09-17T14:25:35Z", "pushed_at": "2023-09-17T10:05:02Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2022/CVE-2022-4063.json b/2022/CVE-2022-4063.json index 201dc51112..b42f4ab1ac 100644 --- a/2022/CVE-2022-4063.json +++ b/2022/CVE-2022-4063.json @@ -13,10 +13,10 @@ "description": "Automatic Mass Tool for checking vulnerability in CVE-2022-4063 - InPost Gallery < 2.1.4.1 - Unauthenticated LFI to RCE", "fork": false, "created_at": "2023-09-11T20:01:04Z", - "updated_at": "2023-09-11T21:08:43Z", + "updated_at": "2023-09-17T14:26:25Z", "pushed_at": "2023-09-15T21:07:18Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json index 8f3cfa71cd..14734aa9e6 100644 --- a/2022/CVE-2022-46169.json +++ b/2022/CVE-2022-46169.json @@ -755,14 +755,14 @@ { "id": 673282845, "name": "CVE-2022-46169", - "full_name": "4m4Sec\/CVE-2022-46169", + "full_name": "dawnl3ss\/CVE-2022-46169", "owner": { - "login": "4m4Sec", + "login": "dawnl3ss", "id": 52249849, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4", - "html_url": "https:\/\/github.com\/4m4Sec" + "html_url": "https:\/\/github.com\/dawnl3ss" }, - "html_url": "https:\/\/github.com\/4m4Sec\/CVE-2022-46169", + "html_url": "https:\/\/github.com\/dawnl3ss\/CVE-2022-46169", "description": "Unauthenticated Command Injection in Cacti <= 1.2.22", "fork": false, "created_at": "2023-08-01T09:29:30Z", diff --git a/2023/CVE-2023-0159.json b/2023/CVE-2023-0159.json index f7ab607ccf..d18bba88e2 100644 --- a/2023/CVE-2023-0159.json +++ b/2023/CVE-2023-0159.json @@ -13,10 +13,10 @@ "description": "Automatic Mass Tool for checking vulnerability in CVE-2023-0159 - Extensive VC Addons for WPBakery page builder < 1.9.1 - Unauthenticated LFI", "fork": false, "created_at": "2023-09-11T11:36:35Z", - "updated_at": "2023-09-11T12:17:49Z", + "updated_at": "2023-09-17T14:26:38Z", "pushed_at": "2023-09-11T12:18:40Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json index 012b111167..d6eaea5a43 100644 --- a/2023/CVE-2023-0386.json +++ b/2023/CVE-2023-0386.json @@ -193,10 +193,10 @@ "description": "Vulnerabilities Exploitation On Ubuntu 22.04", "fork": false, "created_at": "2023-05-16T10:26:10Z", - "updated_at": "2023-09-07T07:02:46Z", + "updated_at": "2023-09-17T17:17:27Z", "pushed_at": "2023-05-16T10:49:19Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -207,7 +207,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-26256.json b/2023/CVE-2023-26256.json index 9e3c44db72..3caecdfd04 100644 --- a/2023/CVE-2023-26256.json +++ b/2023/CVE-2023-26256.json @@ -18,13 +18,13 @@ "stargazers_count": 28, "watchers_count": 28, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 28, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-27163.json b/2023/CVE-2023-27163.json index 741119c441..cb69cef1f5 100644 --- a/2023/CVE-2023-27163.json +++ b/2023/CVE-2023-27163.json @@ -13,10 +13,10 @@ "description": "Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)", "fork": false, "created_at": "2023-07-11T18:08:05Z", - "updated_at": "2023-09-06T18:15:53Z", + "updated_at": "2023-09-17T16:32:50Z", "pushed_at": "2023-08-09T15:11:09Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -35,7 +35,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-30533.json b/2023/CVE-2023-30533.json index 809e678ec0..7d223a852b 100644 --- a/2023/CVE-2023-30533.json +++ b/2023/CVE-2023-30533.json @@ -13,7 +13,7 @@ "description": "CVE-2023-30533", "fork": false, "created_at": "2023-08-09T06:48:32Z", - "updated_at": "2023-09-07T13:57:14Z", + "updated_at": "2023-09-17T13:03:19Z", "pushed_at": "2023-08-09T06:52:13Z", "stargazers_count": 9, "watchers_count": 9, diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json index 6e72be1298..2a93694f13 100644 --- a/2023/CVE-2023-32784.json +++ b/2023/CVE-2023-32784.json @@ -13,10 +13,10 @@ "description": "Original PoC for CVE-2023-32784", "fork": false, "created_at": "2023-05-01T17:08:55Z", - "updated_at": "2023-09-16T21:59:15Z", + "updated_at": "2023-09-17T14:45:50Z", "pushed_at": "2023-08-17T19:26:55Z", - "stargazers_count": 556, - "watchers_count": 556, + "stargazers_count": 555, + "watchers_count": 555, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 46, - "watchers": 556, + "watchers": 555, "score": 0, "subscribers_count": 10 }, @@ -185,14 +185,14 @@ { "id": 685163840, "name": "CVE-2023-32784", - "full_name": "4m4Sec\/CVE-2023-32784", + "full_name": "dawnl3ss\/CVE-2023-32784", "owner": { - "login": "4m4Sec", + "login": "dawnl3ss", "id": 52249849, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4", - "html_url": "https:\/\/github.com\/4m4Sec" + "html_url": "https:\/\/github.com\/dawnl3ss" }, - "html_url": "https:\/\/github.com\/4m4Sec\/CVE-2023-32784", + "html_url": "https:\/\/github.com\/dawnl3ss\/CVE-2023-32784", "description": "Retrieve the master password of a keepass database <= 2.53.1", "fork": false, "created_at": "2023-08-30T16:42:19Z", diff --git a/2023/CVE-2023-35671.json b/2023/CVE-2023-35671.json index ac4cafaeb6..4943b86bae 100644 --- a/2023/CVE-2023-35671.json +++ b/2023/CVE-2023-35671.json @@ -13,10 +13,10 @@ "description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet", "fork": false, "created_at": "2023-09-01T20:16:28Z", - "updated_at": "2023-09-17T09:04:02Z", + "updated_at": "2023-09-17T16:18:27Z", "pushed_at": "2023-09-12T07:52:40Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 53, + "watchers_count": 53, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 51, + "watchers": 53, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-38146.json b/2023/CVE-2023-38146.json index 5338f0cb40..190ed8dbc3 100644 --- a/2023/CVE-2023-38146.json +++ b/2023/CVE-2023-38146.json @@ -13,10 +13,10 @@ "description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")", "fork": false, "created_at": "2023-09-13T04:00:14Z", - "updated_at": "2023-09-17T07:46:15Z", + "updated_at": "2023-09-17T17:08:07Z", "pushed_at": "2023-09-13T04:50:29Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 82, + "watchers_count": 82, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 80, + "watchers": 82, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 228e89dc7b..2b8a3ea9bc 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -174,10 +174,10 @@ "description": "CVE-2023-38831 PoC (Proof Of Concept)", "fork": false, "created_at": "2023-08-28T04:56:10Z", - "updated_at": "2023-09-17T09:22:54Z", + "updated_at": "2023-09-17T13:06:00Z", "pushed_at": "2023-08-28T20:41:57Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -186,7 +186,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 0 }, @@ -692,36 +692,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 686761368, - "name": "CVE-2023-38831_WinRAR", - "full_name": "LuxCodeDev\/CVE-2023-38831_WinRAR", - "owner": { - "login": "LuxCodeDev", - "id": 130206074, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130206074?v=4", - "html_url": "https:\/\/github.com\/LuxCodeDev" - }, - "html_url": "https:\/\/github.com\/LuxCodeDev\/CVE-2023-38831_WinRAR", - "description": "Steps needed to obtain a reverse shell exploiting the winrar vulnerability CVE-2023-38831 in versions prior to 6.23.", - "fork": false, - "created_at": "2023-09-03T21:14:14Z", - "updated_at": "2023-09-03T21:17:38Z", - "pushed_at": "2023-09-03T21:17:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 688341659, "name": "CVE-2023-38831-winrar", diff --git a/README.md b/README.md index d9d7539420..4c538bb2f3 100644 --- a/README.md +++ b/README.md @@ -2256,7 +2256,7 @@ - [z-jxy/keepass_dump](https://github.com/z-jxy/keepass_dump) - [LeDocteurDesBits/cve-2023-32784](https://github.com/LeDocteurDesBits/cve-2023-32784) - [hau-zy/KeePass-dump-py](https://github.com/hau-zy/KeePass-dump-py) -- [4m4Sec/CVE-2023-32784](https://github.com/4m4Sec/CVE-2023-32784) +- [dawnl3ss/CVE-2023-32784](https://github.com/dawnl3ss/CVE-2023-32784) ### CVE-2023-32961 (2023-06-12) @@ -3177,7 +3177,6 @@ - [K3rnel-Dev/WinrarExploit](https://github.com/K3rnel-Dev/WinrarExploit) - [Fa1c0n35/CVE-2023-38831-winrar-exploit](https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit) - [xaitax/WinRAR-CVE-2023-38831](https://github.com/xaitax/WinRAR-CVE-2023-38831) -- [LuxCodeDev/CVE-2023-38831_WinRAR](https://github.com/LuxCodeDev/CVE-2023-38831_WinRAR) - [GOTonyGO/CVE-2023-38831-winrar](https://github.com/GOTonyGO/CVE-2023-38831-winrar) - [Malwareman007/CVE-2023-38831](https://github.com/Malwareman007/CVE-2023-38831) - [ameerpornillos/CVE-2023-38831-WinRAR-Exploit](https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit) @@ -3776,6 +3775,7 @@ - [jonathanbest7/cve-2022-0847](https://github.com/jonathanbest7/cve-2022-0847) - [0xeremus/dirty-pipe-poc](https://github.com/0xeremus/dirty-pipe-poc) - [joeymeech/CVE-2022-0847-Exploit-Implementation](https://github.com/joeymeech/CVE-2022-0847-Exploit-Implementation) +- [pashayogi/DirtyPipe](https://github.com/pashayogi/DirtyPipe) ### CVE-2022-0848 (2022-03-04) @@ -9344,7 +9344,7 @@ - [BKreisel/CVE-2022-46169](https://github.com/BKreisel/CVE-2022-46169) - [Rickster5555/EH2-PoC](https://github.com/Rickster5555/EH2-PoC) - [antisecc/CVE-2022-46169](https://github.com/antisecc/CVE-2022-46169) -- [4m4Sec/CVE-2022-46169](https://github.com/4m4Sec/CVE-2022-46169) +- [dawnl3ss/CVE-2022-46169](https://github.com/dawnl3ss/CVE-2022-46169) - [a1665454764/CVE-2022-46169](https://github.com/a1665454764/CVE-2022-46169) - [0xZon/CVE-2022-46169-Exploit](https://github.com/0xZon/CVE-2022-46169-Exploit) - [copyleftdev/PricklyPwn](https://github.com/copyleftdev/PricklyPwn)